Shared Flashcard Set

Details

Lesson 7 - Working with Applications - Key Terms
Windows 7 Configuration - MCTS Exam 70-680
19
Computer Networking
Undergraduate 1
05/16/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Application Compatibility Toolkit (ACT)
Definition
a collection of programs that allow administrators to gather information about incompatibilities between specific applications and Windows 7 and create customized solutions that enable those applications to run.
Term
Application control policies (AppLocker)
Definition
a new Windows 7 feature that uses rules managed from a wizard-based interface.
Term
Certification authority (CA)
Definition
Distributes digital certificates containing public keys to web servers using Public Key Infrastructure (PKI).
Term
Compatibility fix
Definition
Formerly known as a shim, it is a software component that sits between an application and the operating system.
Term
Compatibility mode
Definition
A collection of compatibility fixs
Term
Compatibility view
Definition
allows Internet Explorer to properly display older pages.
Term
InPrivate Mode
Definition
a new feature of IE 8 that enables you to surf the Internet without leaving any record of your activities.
Term
Phishing
Definition
is a technique that takes social engineering to mass scale. Instead of convincing sounding telephone callers, phishing uses convincing-looking Web sites that urge users to supply personal information.
Term
Program Compatibility Troubleshooter
Definition
a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism.
Term
Protected mode
Definition
is an operational state designed to prevent attackers who do penetrate the computer's defenses from accessing vital system components.
Term
Public key infrastructure (PKI)
Definition
A secure communication method that requires two encryption keys—a public one and a private one. Data encrypted using the public key can only be decrypted with the private key, and in the same way, data encrypted with the private key can only be encrypted using the public key.
Term
RSS feeds
Definition
a push technology that simplifies the process of delivering updated contented to designated users.
Term
Secure Sockets Layer (SSL)
Definition
the protocol that most Web sites use when establishing secure connections with clients over the Internet.
Term
Security zones
Definition
In Internet Explorer, a segment of the Internet or intranet assigned a particular level of security. The four levels are: Internet, Local Intranet, Trusted Sites, and Restricted Sites.
Term
Shim
Definition
a software component that sits between an application and the operating system
Term
SmartScreen Filter
Definition
examines traffic for evidence of phishing activity and displays a warning signs and to refrain from supplying confidential information to unknown parties.
Term
Social engineering
Definition
a term that describes any attempt to penetrate the security of a system by convincing people to disclose secret information
Term
Software restriction policies
Definition
are Group Policy settings that enable administrators to specify the programs that are allowed to run on workstations bt creating rules of various types.
Term
Windows XP mode
Definition
a free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native XP application.
Supporting users have an ad free experience!