Chapter 8 - System Access
Across
- 5. Permissions listed on an access control list (ACL) that are granted to a user. ACEs can be Allow or Deny. They can be assigned explicitly or inherited.
- 7. The level of permissions that have been granted to a user who has been authenticated to a system.
- 9. An object that contains security credentials. In Windows, it includes the user's security ID (SID) as well as the SID for each security group the user is a member.
- 12. A method of authentication for which the user creates an online user account with Microsoft. Each time the user signs into the local system, Windows submits the credentials over the internet to Microsoft for authentication.
- 14. The generally accessible key in a cryptographic system. It is used to encrypt data and is stored within a certificate. It cannot be used to decrypt the data.
- 17. The security process in which the client authenticates to the server and, before data is exchanged, the server authenticates back to the client.
- 19. A security feature that can be configured in the Windows sign-in settings to automatically lock a computer when the user walks away. It requires a Bluetooth device (typically a smartphone) that can be connected to the workstation.
- 22. A collection of access rights, usually connected with an employee's responsibilities in an organization.
- 25. A text string or regular expression used to scan files for matches.
- 26. Rules that include a condition that must be matched for permission assignments to be made.
- 28. The key that is used to decrypt data in a cryptographic system. It is stored in a private certificate store and should be protected and not shared.
- 31. A group of users who have complete and unrestricted access to the system and accounts.
- 33. In Windows, the ability to set policies that will provide feedback on specified events within a host or network.
- 35. An action a user can perform on a system. Group Policy provides a set of predefined rights.
- 36. Permissions granted to files or subfolders based on the permissions assigned to a parent folder.
- 37. A method of authentication that stores on the local system the usernames and passwords for each user.
Down
- 1. Microsoft's virtualization machine creation software that can create software-based virtual computers within a Windows system.
- 2. A setting or group of settings applied to a user or computer. Polices are configured using Group Policy on the local computer or in the domain.
- 3. A process of translating data into an unreadable format or code to prevent unauthorized access to the data.
- 4. A permission uses an allow or deny statement to control user access to resources.
- 6. A Windows feature that uses virtualization extensions of the central processing unit. It is used to protect data in memory from malicious attacks.
- 8. A feature of Windows server systems that allows the system administrator to centralize control of access to files and folders based on file and folder attributes in combination with the attributes of the user.
- 10. The security process in which the client authenticates to the server before the server will send data back to the client.
- 11. A method of authentication that stores the usernames and passwords on a remote computer within the network that is configured as a domain controller.
- 13. A device you can buy from a retailer for authentication. It can be configured in Windows for use as an additional sign-in option.
- 15. A Windows encryption feature that is used on full volumes and cannot be used on individual files or folders.
- 16. In Windows auditing, a setting in an auditing policy that turns on the logging of events in a host or network.
- 18. A list of permissions granted to users and groups. The permissions are associated with an NTFS file or folder.
- 20. A list of central access rules that define the level of access a user has to data managed by DAC.
- 21. A collection of users that, by default, has very minimal access to the system.
- 23. The creator of a file or folder who, by default, has full access.
- 24. A Windows sub-security process that authenticates to the local system, stores security-related information, and creates access tokens.
- 27. Security features that restrict or allow user access to resources on the system.
- 29. A component of the Windows operating system that helps protect the system during the start-up or boot process.
- 30. A biometric logon system incorporated into Windows 10 sign-in settings.
- 32. In Windows auditing, a setting that turns off an auditing policy.
- 34. Verifying that an entity requesting credentials is the entity associated with the credentials. It is also called identity proofing.