PCPRO-C8-Keyterms
Across
- 4. A set of rules and guidelines that establish the way that business is conducted within an organization.
- 7. Windows Update options releases updates as soon as they are available to the public
- 8. An account that identifies a specific user. You can assign rights and permissions to a user's account.
- 10. One of the protocols a laptop uses to connect to a network via a virtual tunnel
- 12. WinRE option: enables you to restore a system to a previous state if System Protection is on. User data is not affected
- 14. Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis
- 15. The protocol needs port 443 open
- 16. Backup method: Backs up every file that has changed since the last full or incremental backup.
- 18. operating system uses the Time Machine backup program
- 20. This protocol provides authentication and encryption services for VPN traffic
- 24. A tool used to create a full system image of your Windows drive?
- 28. Backup method: Compares the data found in the last full backup with the current content and uploads only the changes.
- 29. This Active Directory service simplifies how users log in to all the systems and applications that they need
- 30. An environment provided by windows 11 for systems that wont boot
- 31. Backup method: Backs up all files (even those that have not changed)
- 32. Newer boot specification that defines the software interface between an operating system and the computer's firmware.
- 33. A resource within Active Directory.
- 34. Data that includes files installed by an application and application configuration files.
- 36. This protocol was developed by Cisco and can be used to route any Layer 3 protocol across an IP network
- 37. Data that includes all the files required to boot and run the computer.
- 39. VPNs use a *BLANK* that encrypts packet contents and wraps them in an unencrypted packet.
- 40. A collection of user accounts you can use to assign rights and permissions to multiple users.
Down
- 1. Default containers used to organize Active Directory objects that cannot be deleted.
- 2. Microsoft's implementation of peer-to-peer networking.
- 3. Backup method: Backs up every file that has changed since the last full backup.
- 5. An archived copy of data that you can use to restore corrupt or lost data in the event of a hardware or system failure.
- 6. This protocol allows you to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. It was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP
- 9. When you create a VPN, you establish a security association between the two tunnel *BLANK*
- 11. Available with the Windows Server operating system. It gives you a high level of control over updates
- 13. Devices that can encrypt and decrypt packets
- 17. The remote management technology that is best for monitoring laptops. If enabled you would be able to occasionally check on the health of these laptops, including the ability to receive automated alerts for any unusual activity that may indicate some kind of security breach
- 19. Routers use the *BLANK* packet headers to deliver the packet to the destination device
- 21. Support secure communication over an untrusted network
- 22. A Windows server that holds a copy of the Active Directory database.
- 23. WinRE option: use this option if the system is not working after recently installing an application; an application update; or a driver install or update. You have the option to keep all files or remove anything
- 25. The windows updating setting to delay updates
- 26. A folder-like container that organizes network resources.
- 27. used to create a secure Telnet session. Telnet provides a remote connection to a system's command line interface.
- 35. A collection of network resources that share a common directory database.
- 38. The command to open Windows Remote Desktop Connection tool