gmetrix device configuration

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/66

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

67 Terms

1
New cards

Acceptable Use Policies

A document that states constraints and practices that users must agree to follow to have access to a corporate network

2
New cards

Active Directory

A Windows general-purpose directory that stores network objectives such as users, accounts, and resources.

3
New cards

Administrator

An individual that has the highest level of control and access on a computer and can make changes that affect other users of the computer

4
New cards

Adware

Software that displays or downloads advertising material like pop-up ads

5
New cards

Antimalware Software

A type of security software used to detect remove, and prevent malware attacks on a computer. Antimalware is used to detect advanced forms of malware

6
New cards

Antivirus software

a type of security software used to detect and remove traditional computer viruses

7
New cards

APIPA

Automatic Private IP Addressing is a Windows function that provides a DHCP fail-safe autoconfiguration address that protects the computer from system failure

8
New cards

Authentication

Any process a system uses to verify a user's identity

9
New cards

Azure Remote App

An application that can be used to connect mobile devices to a corporate network

10
New cards

Biometrics

Any physical or behavioral characteristics used to identify a person: examples include fingerprints, retinal scans, voice readers, and facial recognition

11
New cards

Boot Logging

A computer startup method where Windows creates a special file that logs the list of drivers that are used during the startup process

12
New cards

BYOD

Bring your own device is a company practice that allows employees to bring and use their personal computers, phones, and other devices at work

13
New cards

Cloud Storage

A method used to store data. Data is kept in remote servers and the accessed through the internet

14
New cards

Command Prompt

A Windows application that allows users to input data in a text-based interface to execute commands

15
New cards

Computer Virus

A program or malicious code that runs on a computer without the user's knowledge. A computer virus copies itself to other devices with the purpose of damaging the device and/or stealing data.

16
New cards

Control Panel

A part of the Microsoft graphical user interface used to view and manage basic computer settings.

17
New cards

Custom Install

A type of installation that allows administrators to determine the components they want to install and where they want them stored.

18
New cards

Differential Backup

A backup type that only backs up data that has changed or been created since the initial full backup.

19
New cards

DisplayPort

A port commonly found on a PC that provides high-definition video and audio between a computer and monitor.

20
New cards

Driver

A software component that allows the operating system and a device to communicate with each other

21
New cards

File Sharing

A method used to transmit files from one computer to another or via a network or the internet.

22
New cards

Firewall

A network security system that controls incoming and outgoing network traffic

23
New cards

Full Backup

Making one or more copies of selected data on a hard drive

24
New cards

Group Policies

An infrastructure that allows network administrators to implement security policy settings for users and computers.

25
New cards

HDMI

High-definition multimedia interface is a standard for connecting and transmitting high-definition digital video and audio to the computer from another source

26
New cards

Incremental Backup

a backup type that backs up data that has changed from the last backup

27
New cards

Keyloggers

A type of spyware where a hacker captures keyboard keystrokes, including the keystrokes used to sign in to accounts.

28
New cards

Last Known Good Configuration

A boot-up option where Windows can be started if it is not starting normally. The drivers that successfully worked the last time Windows was started and shut down will be used to start the operating system.

29
New cards

Local Account

An account that exists on a single computer

30
New cards

Malware

Malicious software, including viruses, ransomware, and spyware

31
New cards

Memorandum of Understanding

A document outlining an agreement between parties

32
New cards

Microsoft Account

A single sign-on web service that allows users to synchronize devices, websites, and applications using one account

33
New cards

Microsoft Azure

A Microsoft cloud computing platform used to build, deploy, and manage applications.

34
New cards

Microsoft Intune

A cloud-based desktop management tool that allows organizations to provide employees with access to corporate resources.

35
New cards

Microsoft Store

A digital storefront that offers applications, games, and music to Windows users. Some content is free, and others cost money to download.

36
New cards

Mirror Backup

A backup that automatically creates copies of the data as it changes on the drive.

37
New cards

Mobile Device Management

A type of software that allows companies to control, secure, and automate policies on devices connected to the organization's network.

38
New cards

multifactor authentication

An authentication process that uses two or more forms of distinct authentication factors to authenticate the user.

39
New cards

NTFS

New Technology File System is a Windows file system that organizes, stores, and finds files on the hard disk

40
New cards

OneDrive

A Microsoft cloud-based file storage service used to store and share files.

41
New cards

Patches

A set of changes made to software and operating systems that provide an update that improves security and performance within a program or product

42
New cards

Permissions

The ability for a user to access a resource

43
New cards

Physical Attack

An attack where an individual steals valuable equipment or data or physically harms another individual.

44
New cards

PIN Lock

A screen lock security method used to protect a device from unauthorized access. The code must be entered any time the device is turned on to unlock it

45
New cards

Ransomware

A form of malware where malicious code is installed on a computer and the legitimate user to locked out of their sensitive data

46
New cards

Remote Wipe

A security feature for mobile devices that allows users to erase data remotely from a mobile device

47
New cards

Retention Policy

A policy that determines what data is stored and archived on a computer along with how long that data is stored and what happens to the data after the retention period is over

48
New cards

Roll Back

An operation that takes an operating system back to the previous version

49
New cards

Safe mode

A Windows boot option that starts the computer in a basic mode with limited files and drivers.

50
New cards

Safe Mode with Networking

A windows boot method that only loads the minimum amount of drivers required to connect the computer to other computers

51
New cards

Smart Card

A card with a microprocessor chip inside used as an authentication security token.

52
New cards

Social Engineering Attack

A type of malicious attack where individuals are tricked into providing confidential info.

53
New cards

Spyware

A type of malicious software designed to allow an individual to collect information about another user's computer activities

54
New cards

Start Menu

An interface tool used in Windows environments. It is used as the main launching point for computer applications and programs.

55
New cards

Taskbar

A bar provided on a Windows display that allows users quick access to applications in use and pinned to the taskbar.

56
New cards

Time Zone

A time assigned to a geographical region.

57
New cards

Trojan Horse

A type of malware that is not self-replicating. It presents a program that appears to be legitimate and harmless to trick users into clicking and launching the trojan horse

58
New cards

Troubleshoot

the process of locating and isolating a problem in a program, computer system, or network and resolving it

59
New cards

USB

Universal serial bus is an external interface that connects peripheral devices to a computer

60
New cards

USB-C

a type of USB connector used to connect devices like mobiles devices and game consoles

61
New cards

User Account Control

A Windows feature that sets user authentication levels that require the computer administrator to allow some or all changes made to Windows system settings.

62
New cards

VGA

a video graphics array is an analog connection used to link a computer to a projector or additional monitors

63
New cards

Virtual Machine

A virtual environment that is created on a computer using software that emulates a separate computer

64
New cards

Vishing

A social engineering attack where individuals make phone calls or leave voice messages to try and trick companies or individuals into revealing personal information.

65
New cards

Windows Safe Mode with Command Prompt

A method of Safe Mode that boots a computer with a limited amount of drivers and files, providing the user with access to a limited version of Windows.

66
New cards

Windows Troubleshooting Tools

A Windows built-in troubleshooter.

67
New cards

Worm

Malware that replicates and spread itself across devices within a network