Term
| To modify firewall settings, you use the __________ tab of the Windows Firewall Settings dialog box. |
|
Definition
|
|
Term
| The __________ is a dedicated cryptographic processor chip that the system uses to store BitLocker encryption keys. |
|
Definition
| Trusted Platform Module (TPM) |
|
|
Term
| __________ authentication is required to create an environment in which users can access all network resources with a single set of credentials—a desirable situation known as single sign-on (SSO). |
|
Definition
|
|
Term
| Many administrators express concern about whether they have enough bandwidth, but it's __________ (the time it takes for a packet to travel from a source to a destination) that's more likely to cause authentication problems across wide area network links. |
|
Definition
|
|
Term
| Kerberos authentication is based on specially formatted data packets known as __________. |
|
Definition
|
|
Term
| Permission __________ means that parent resources pass their permissions down to their subordinates. |
|
Definition
|
|
Term
| Which term refers to mechanisms that regulate access to computers, software, or other resources? |
|
Definition
|
|
Term
| What numbers identify specific applications running on the computer? |
|
Definition
|
|
Term
| Which control panel provides a simplified interface that enables administrators to avoid the details of rules and port numbers? |
|
Definition
|
|
Term
| Besides opening a port, what is the other basic method for opening a hole in a firewall? |
|
Definition
|
|