Computer Networking > QUESTIONS & ANSWERS > MTA Mobility And Device Fundamentals (All)

MTA Mobility And Device Fundamentals

Document Content and Description Below

MTA Mobility And Device Fundamentals The process of converting data into a format that cant be read by other users - ✔✔Encryption The main graphical utility to configure the Windows environment... and hardware devices - ✔✔Control Panel Microsoft's personal assistant - ✔✔Cortana The process of converting data back into its original format - ✔✔Decryption To communicate with the operating system, each device requires a what? - ✔✔Device Driver The Windows 10 tool for managing devices and their drivers - ✔✔Device Manager Allows users to see all the devices connected to the computer - ✔✔Devices and Printers Folder Accounts stored as objects on a domain controller, also known as Active Directory Accounts - ✔✔Domain-based Accounts Controls the working environment for user and computer accounts; provides centralized management and configuration of operating systems, applications, and user settings - ✔✔Group Policy Icons in Windows 10 that displays dynamic content - ✔✔Live Tiles Accounts that allows you to synchronize your desktop across multiple Windows 10 devices - ✔✔Microsoft Accounts One of the primary administrative tools used to manage Windows and many of the network services provided by Windows - ✔✔Microsoft Management Console (MMC) The second Tuesday of every month when Microsoft regularly releases security updates - ✔✔Patch Tuesday Microchip that's built into a computer; used to store cryptographic information - ✔✔Trusted Platform Module (TPM) A series of folders, associated with a specific user account that contains personal documents and settings - ✔✔User Profile Shows important notifications related to the security and maintenance of your computer - ✔✔Action Center Writes one copy of your data but doesn't protect against drive failures; requires at least one drive - ✔✔Simple (no resiliency) Writes two copies of your data to protect against a single drive failure; requires at least two drives - ✔✔Two-way mirror Writes three copies of your data to protect against two simultaneous drive failures; requires at least five drives - ✔✔Three-way mirror Writes data with parity information to protect against single drive failures; requires at least three drives - ✔✔Parity Users can modify, add, move, and delete files, as well as their associated properties and directories. In addition, users can change permissions settings for all files and subdirectories - ✔✔Full Control Users can view and modify files and file properties, including deleting and adding files to a directory or file properties to a file - ✔✔Modify Users can run executable files, including scripts - ✔✔Read & Execute Users can view files and file properties - ✔✔Read Users can write to a file - ✔✔Write This descriptor includes information that controls which users and groups can access the file or folder, as well as what type of access is granted to particular users or groups - ✔✔Access Control List (ACL) Cloud storage designed for large-scale applications, including providing a storage foundation for Azure virtual machines - ✔✔Azure Storage Enables users to encrypt removable USB devices, such as flash drives and external hard disks - ✔✔BitLocker To Go NTFS permissions that are granted directly to a file or folder - ✔✔Explicit Permissions A group of computers on a home network that can share files and printers - ✔✔HomeGroup NTFS permissions that are granted to a file (parent object or container) that flow to a child objects (subfolders or files inside the parent folder) - ✔✔Inherited Permissions Permissions that allow you to control which users and groups gain access to files and folders - ✔✔NTFS Permissions A file-hosting service that allows you to store and create files and folders and share them with other users and groups - ✔✔OneDrive A web-based service that is hosted outside of your organization - ✔✔Public Cloud Designed to increase data availability, despite errors that would normally cause data loss or downtime while providing increased scalability and performance - ✔✔Resilient File System (ReFS) A pocket-sized card with embedded integrated circuits used for security purposes - ✔✔Smart Card When multiple drives are combined together - ✔✔Storage Pool Combining multiple disks into a single logical volume that can be mirrored to protect against drive failures - ✔✔Storage Spaces A private network that uses a public network to connect remote sites and users - ✔✔Virtual Private Network (VPN) The Microsoft directory services that are used to locate and manage resources - ✔✔Active Directory Domain Services (AD DS) Any software package that plays or displays unwanted ads - ✔✔Adware The process of identifying an individual - ✔✔Authentication The process of giving individuals access to system objects - ✔✔Authorization Uses encryption, identity, and authorization policies to help secure your files and email across multiple devices - ✔✔Azure Rights Management (Azure RMS) An authentication method that identifies and recognizes people based on physical traits - ✔✔Biometrics Attacks that consist of trying as many possible combinations of characters as possible - ✔✔Brute Force Attacks An attack that attempts all words in one or more dictionaries - ✔✔Dictionary Attacks A connection that is extended to users outside a company and possibly to entire organizations that are separate from or lateral to the company - ✔✔Extranet Used to protect a network from malicious attack and unwanted intrusion - ✔✔Firewalls A worldwide system of connected computer networks - ✔✔Internet A private computer network or single website that an organization implements in order to share data with employees - ✔✔Intranet Software that is designed to infiltrate of affect a computer system without the owner's informed consent - ✔✔Malicious Software (Malware) When two or more authentication methods are used to authenticate a user - ✔✔MultiFactor Authentication (MFA) Two or more computers connected together to share resources - ✔✔Network A secret numeric password shared between a user and a system that can be used to authenticate the user to the system - ✔✔Personal Identification Number (PIN) A network owned by a person, company, or organization and access is restricted - ✔✔Private Network A network not owned by any one person, company, or organization and anyone can connect to it - ✔✔Public Network A software or hardware device designed to gain administrator-level control over a computer system without being detected - ✔✔Rootkit A physical device that an authorized computer services user is given to ease authentication - ✔✔Security Token Malware that is used to collect personal information without the user's knowledge - ✔✔Spyware Malware that appears as a desirable or useful program - ✔✔Trojan Horse A program that can copy itself and infect a computer without the user's consent; also corrupts or modifies files - ✔✔Virus A self-replicating program that copies [Show More]

Last updated: 1 year ago

Preview 1 out of 6 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
76
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 17, 2022

Number of pages

6

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

578 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 17, 2022

Downloads

 0

Views

 76

Document Keyword Tags


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·