Free Essay

Nt1230 Chapter 9,10,11

In:

Submitted By racerx4468
Words 593
Pages 3
Chapter 9, 10,11
NT1230

Chapter 9, 10, and 11.

Chapter 9
Authentication: The process of verifying that the identity of the person operating the computer matches that of the user account the person is using to gain access.
Authorization; The process of granting an authorized user a specific degree of access.
Active Directory: Permissions are user based.
Users Rights: are specific O.S. Tasks, such as shut down or allow log in through terminal services.
Local and domain users: They are two completely separate user account systems, which user account system windows uses depends on whether it is a member of a workgroup or an Active directory domain
Home Group: is a simplified network paradigm that enables users connected to a home network to share content with permissions.
Work Group: is a collection of computers that are all peers.
Peer Network: is one in which every computer can function as both server by sharing with other computers, and client by accessing shared resources on other computers.

Domain: is a collection of computers that utilize a central directory service for authentication and authorization.
Domain controller: A Windows server with AD/DS directly service installed with domain in users administrator’s only to have to create one user account for each person.
Workgroup Users: require many different account for one person.
Local Groups: can only use local groups
Only local users from the same computer can be members of a local group.
Special Identity: Functions like a group but is a place holder for a collection of users with similar characteristics.
Chapter 10
Permissions, smart cards, biometrics, using more the one is known as multifactor authentication.
Windows 7 supports a number of group policy settings that administrator can use to enforce password security policies on individual computer or on an active domain server.
Smart Cards: credit card like device with a chip in it.
Biometrics: is theoretically more secure that token based or secret-based authentication methods.
Filters is used to enable you to display rules, according to the profile they apply to, their current state of the group to which they belong.
File Encryption
EFS encrypts the file the user creates using a key generated from the users public key, data encrypted with this key can only be decrypted by the users encryption certificate which is generated using the users private key.

Chapter 11
Trouble Shooting Steps: 1. Establish the systems 2. Identify the affected area 3. Establish what has changed 4. Select the most probable cause 5. Implement a solution 6. Test the result 7. Document the solution
Shared resources take precedence over individual resources
Network wide problems take precedence over workgroup problems.
Departmental issues should be rated according to the function of the department.
System wide problems take precedence over application problems.
Look for simplest problem to fix first
Try different solutions until problem is resolved.
Try to recreated the problem to make sure solution is effective
Keep a complete record of the entire troubleshooting process
Remote desktop: is an administrative feature that enables users to access computer from a remote location.

Windows 7 startup process Steps 1. Power on, self-test: turn on computer loads BIOS (POST) 2. Initial startup Phase: Bios determines which devices use to boot computer 3. Windows Root Manager phase: system reads the boot config date 4. Windows Boot load up phase: system initiates the memory paging process 5. Kernel Loading Phase: systems runs windows kernel and HAL. 6. Logon Phase: system loads service control manager and local security authority, then presents the log on interface.

Similar Documents