1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
s the typical file system for servers because it offers file level encryption it is also preferred for workstations as well.
NTFS
is an acronym that stands for Network Operating System.
NOS
act as workstations but rely on a server to serve out software and applications. The benefit to such a system is on point of administration authority.
Thin Clients
relay on the server to control the resources on the network. With a client/server environment there is one single point of administration authority.
Client/Server environment
where the setup files are stored and ran from the server.
Network install
The maximum number of computers you can have communicating effectively in a peer- to peer environment before needing to move over to a client/server environment.
10
are when one server has many virtual servers running from the one single server hard drive.
Virtual Machine servers
uses a script that enters the commands needed to install the software instead of an administrator having to be at the workstation to enter them manually.
An unattended install
One reason to consider an open source OS is
it allows you to make changes to the OS.
In cloud computing software that is delivered from the cloud is called
Software as a service
Linux relies heavy on
a command line interface for operating the OS.
Open Source falls under the
GNU licenses agreement
is preferred for servers and workstations because it can handle long file names. FAT32 can handle long file names as well but does not have as many features.
NTFS
When sharing a computer with multiple people a good policy is to
password protect your work.
is when someone pretends to be someone who they are not and tries to
extort from you information or have you change passwords they are not authorized to do.
Social engineering
requires the presences of the person who is trying to log in to be authenticated.
Biometrics
is when a user name and password is matched on the AD server and
accesses is granted if the user provides the correct information.
Network authentication
A working habit of always logging off your account is important to
enforce for security.
After updating your virus software a full system scan is needed to make sure the
viruses in the
new database are searched for on the workstation.
A virus can be loaded on a computer and it will wait till the
infected software is run to spawn.
is a self-replicating virus that infects other computers on a network.
A worm
will redirect your browser to a consumer site automatically.
Adware
is a network of private computers infected with malicious software and controlled as a
group without the owners' knowledge. This remote control software can make your computer
do attacks for the hackers
Botnet
is common in e-mail communications where the sender trys to get you to click a link
and go to a dummy site to input personal information such as bank information or account
information.
Phishing
prevent unauthorized data communications with workstations on your network by
blocking ports and protocols. An ACL list controls access based on a matrix such as IP address,
Mac Address, Port or protocol.
Firewalls
checks the 48 bit mac address of the client and compares them to the ones in the
filter to see if there is a match.
MAC filtering
is a secure browser connection, HTTP is not.
HTTPs
can degrade a networks performance and can cause data on the computers affected to
be compromised. Running antivirus/malware software is one way to remove the threat. After removal follow the prevention plan and re-train the computer user.
Malware
will allow remote users to connect to the company network and services securely.
A VPN
To insure a company has minimal downtime after a disaster a tested disaster
recovery plan should be in place.
s the document you should check to see what you can or
cannot do with software or operating systems.
The end user license agreement
All new hires should review the company
acceptable computer use policy also known as AUP
is regulated by HIPAA. Always refer to the regulations when involving medical records.
All health care data
is comprised of computers/workstations, servers, routers and switches. Moremodern networks also contain phones, TVs, video and audio.
A network
is measured in BPS or bits per second.
Bandwidth