Term
To modify firewall settings, you use the __________ tab of the Windows Firewall Settings dialog box. |
|
Definition
|
|
Term
The __________ is a dedicated cryptographic processor chip that the system uses to store BitLocker encryption keys. |
|
Definition
Trusted Platform Module (TPM) |
|
|
Term
__________ authentication is required to create an environment in which users can access all network resources with a single set of credentials—a desirable situation known as single sign-on (SSO). |
|
Definition
|
|
Term
Many administrators express concern about whether they have enough bandwidth, but it's __________ (the time it takes for a packet to travel from a source to a destination) that's more likely to cause authentication problems across wide area network links. |
|
Definition
|
|
Term
Kerberos authentication is based on specially formatted data packets known as __________. |
|
Definition
|
|
Term
Permission __________ means that parent resources pass their permissions down to their subordinates. |
|
Definition
|
|
Term
Which term refers to mechanisms that regulate access to computers, software, or other resources? |
|
Definition
|
|
Term
What numbers identify specific applications running on the computer? |
|
Definition
|
|
Term
Which control panel provides a simplified interface that enables administrators to avoid the details of rules and port numbers? |
|
Definition
|
|
Term
Besides opening a port, what is the other basic method for opening a hole in a firewall? |
|
Definition
|
|