Technology created by Microsoft that provides a variety of network services
What is Active Directory
What are two common types of passwords attacks?
What is Cracking and Brute Force
What does CIA stand for?
What is Confidentiality, Integrity, and Availability.
A type of site security that requires a person's identity to be proven and authenticated is called what?
What is Access Control.
The process of eliminating a risk by choosing not to engage in an action or activity is called what?
What is Risk Avoidance.
Electronic document that contains an identity, such as a user or organization name
What is a digital certificate
What is Local Security Policy
What are you violating in CIA when HIPPA is broken?
What is Confidentiality
Fingerprint Scanners, Retinal Scanners, Voice Recognition Systems are apart of what type of security?
What is Bio Metric Technologies
What does Non repudiation do?
What is prevents one party from denying the actions it has carried out.
Card with embedded integrated circuits consisting of nonvolatile memory storage
What is a smart card
What are two new features introduced in Windows Server 2008 that permit that use of fine-gained password policies?
What is Password Settings Container and Password Setting Object
What is Keylogger
An attack that relies on having a user execute a malicious script embedded in a web page is which kind of attack?
What enables a user log on to a computer and domain?
What is User Account.
What are the base NTFS permissions
What is read, execute, and list folder contents.
A ____ account is one type of account you can configure so that the password does not expire.
What is Administrator
Security Cameras, Gate with access badge reader, Guard Patrols, Gate with guard are all what?
What is Perimeter Security
Which three elements and issues should be considered when deciding whether to use a software or hardware firewall?
What is Host Operating System, Application Conflicts, and Stability.
What is the process identifying an individual called?
What is Authentication.
Network authentication protocol, allows host to prove their identity over a non secure network.
What is Kerberos
A set of rules that allows an administrator granular control over the configuration of objects in Active Directory (AD), including user accounts, operating systems, applications, and other AD objects, is known as a ________.
What is Global Policy Object (GPO)
This is a phrase meaning the security discipline that requires a particular user system, or application be given no more privilege than necessary to perform its function
What is the Principle of Least Privilege.
The best way to simplify a complex environment is to standardize a limited number of account types, what is this process called?
What is Account Standardization?
Interconnection model is a conceptual model that characterizes and standardizes the communication functions of telecommunication or computing system without regard to its underlying internal structure and tech. What is the name of this model?
What is the OSI Model.