_______________ and Terminal Access Controller Access-Control System Plus (TACACS+) are two protocols that provide centralized authentication, authorization, and accounting management for computers to connect to and use a network service.
A ______________________ is a Windows server that stores a r…
A ______________________ is a Windows server that stores a replica of the account and security information of the domain and defines the domain boundaries.
The Principle of _____________________is a security discipli…
The Principle of _____________________is a security discipline that requires that a user, system, or application be given no more privilege than necessary to perform its function or job.
___________________ is an authentication method that identif…
___________________ is an authentication method that identifies and recognizes people based on voice recognition or a physical trait such as a fingerprint, face recognition, iris recognition, or retina scan
_______________________is a concept we deal with frequently…
_______________________is a concept we deal with frequently in real life. We expect our doctor to keep our medical records confidential.
________________________(EFS) can encrypt files on an NTFS v…
________________________(EFS) can encrypt files on an NTFS volume that cannot be used unless the user has access to the keys required to decrypt the information.
_________________________ is a method used to gain access to…
_________________________ is a method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.
A _________________ is a pocket-sized card with embedded in…
A _________________ is a pocket-sized card with embedded integrated circuits consisting of non-volatile memory storage components and, perhaps, dedicated security logic
NT_________________________ (NTLM) is the default authentic…
NT_________________________ (NTLM) is the default authentication protocol for Windows stand-alone computers that are not part of a domain or when authenticating to a server using an IP address.
Used for locating, managing, and administering common items…
Used for locating, managing, and administering common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects. A popular directory service used by many organizations is Microsoft’s __________________.