Lesson 04 Glossary for Configure Windows Server 2012 R2 Flashcards
A way of creating information so that it cannot be read if it is intercepted by an untrusted party.
Encryption
Security constructs used to regulate access to resources by username or group affiliation.
Administrators can assign permissions to allow any level of access (such as read-only, read/write, or delete) by controlling the ability of users to initiate object services.
Security is implemented by the system checking the user’s security identifier (SID) against each object’s access control list (ACL).
Permissions
Folder with contents that are accessible over the network. In Active Directory, sharing a folder is known as publishing.
The administrator can determine what access users have to the folder’s contents.
Shared folder
Active Directory object that specifies the name and location of specific shared resources that are available to users of the Active Directory.
Often, Shared Folder objects are used to give logical names to specific file collections.
For example, system administrators might create separate shared folders for common applications, user data, and shared public files.
Shared Folder object