Installing & Upgrading Client Systems Flashcards
an application whitelisting technology introduced with Microsoft’s Windows 7 operating system. It allows restricting which programs users can execute based on the program’s path, publisher, or hash, and in an enterprise can be configured via Group Policy
AppLocker
setting that lets you restrict a specified standard user account to only use one Windows Store App when signed in
Assigned Access 8.1
a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining or XTS mode with a 128-bit or 256-bit key.
BitLocker
allows computers at a local branch office to cache data from a file or web server on a WAN (wide area network). The data can be cached either on the client computers, in distributed cache mode, or on a local server, in hosted cache mode.
BranchCache
a software installation in which any previous version is eradicated. The alternative to a clean install is an upgrade, in which elements of a previous version remain. The terms are often heard in reference to operating systems.
Clean installation
a type-1 hypervisor for the Windows 8. x and Windows 10 operating systems (OSes) that allows users to run multiple operating systems inside a virtual machine (VM).
Client Hyper-V
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.
Cloud
A command-line interface processes commands to a computer program in the form of lines of text. The program which handles the interface is called a command-line interpreter or command-line processor.
Command Line Interface (CLI)
a continuous sequence in which adjacent elements are not perceptibly different from each other, although the extremes are quite distinct.
Continuum
Cortana is a virtual assistant developed by Microsoft which uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user
Cortana
Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks. Credential Guard was introduced with Microsoft’s Windows 10 operating system.
Credential Guard
This support statement means that if you encounter a code defect that warrants a critical update, you must have the latest current branch version installed in order to receive a fix
Current Branch for Business
A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements.
Desktop PC
a computer program that operates or controls a particular type of device that is attached to a computer or automaton
Device Driver
a Windows 10 security feature that enables virtualization-based security by using the Windows Hypervisor to support security services on the device.
Device Guard
the ability to obtain data from a storage device by going directly to where it is physically located on the device rather than by having to sequentially look for the data at one physical location after another.
Direct Access
on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.
Encryption File System(EFS)
a new feature in Internet Explorer that allows businesses to use old web applications in modern versions of IE. This feature is designed to help businesses who still need Internet Explorer 8 for some reason to upgrade to a more modern, secure browser.
Enterprise Mode Internet Explorer (EMIE)
a built-in Windows administration tool that enables administrators to manage Group Policy in an Active Directory forest and obtain data for troubleshooting Group Policy
Group Policy Management
a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead.
Hardware interrupts (IRQ)