SAM 5 -9

Cards (228)

  • System Management
    The is to secure conditions necessary for a system’s components to be able to carry out their function. It is not to direct and monitor (control) every detail of a system
  • structured information model
    One way of binding together an organization is through a
  • structured information model
    a database of its personnel, assets and services
  • Novell Directory Service
     provide a centralized and hierarchical database of network resources
  • Novell Directory Service
    a popular directory service developed by Novell, Inc
  • Directory Service
    a centralized database or repository for managing information about objects within a network
  • Directory Service
    the primary purpose is to provide  a single point of access
  • Authentication
    Directory Services authenticate users' identities when they attempt to access network resources. This involves verifying user credentials such as usernames and passwords against the directory database
  • Authorization
    After authentication, Directory Services determine what resources and actions a user is authorized to access based on their permissions and group memberships stored in the directory
  • Centralized Management
    Directory Services provide a centralized platform for administrators to manage user accounts, groups, access permissions, and other network resources
  • Replication and Redundancy
    allowing directory data to be distributed across multiple servers for redundancy and fault tolerance. This ensures high availability and reliability of directory information
  • Security
    Directory Services typically include security features such as access control lists (ACLs), encryption, and auditing to protect directory data from unauthorized access and tampering.
  • Directory Schema
    defines the structure and attributes of objects stored in the directory.
  • Active Directory
    is Microsoft's directory service that stores information about objects on a network and makes this information available to users and network administrators.
  • Active Directory
    a centralized and hierarchical database that provides authentication and authorization services in a Windows environment
  • Active Directory
    The purpose is to provide a centralized and standardized way to manage and organize resources within a networked environment, particularly in Windows-based systems
  • Security Authentication
    Provides authentication services, allowing users to securely log in to the network using their credentials
  • Domain
    a logical grouping of network objects
  • tree
    consists of one or more domains
  • forest
    a collection of one or more trees
  • Domain Controllers
    are servers that run the Active Directory Domain Services (AD DS) role
  • Authenticating users, granting access to resources, maintaining directory replication
    Domain controllers are responsible for
  • Directory database
    stores information about users, groups, computers, and other network objects.
  • Directory database

    maintains attributes for each object, such as usernames, passwords, email addresses, group memberships, and permissions
  • Group Policy
    allows administrators to define and enforce security settings, configurations, and restrictions across the network
  • Group Policy Objects
    can be applied to users, computers, or groups, enabling centralized management of security policies, software deployment, and system configurations
  • Password resets
    common task in Active Directory administration, often required when users forget their passwords or when security concerns arise
  • Password policies
    govern password complexity requirements, expiration periods, and lockout thresholds, ensuring security best practices are enforced
  • Network Administration Models
    Refers to different approaches or frameworks for managing and organizing network infrastructure, resources, and operations.
  • Network Administration Models
    These models provide guidelines and strategies for administering networks effectively
  • Central Management Star Model
    refers to a design approach for organizing and managing Active Directory forests, domains, and sites
  • Central Management Star Model
    This model is based on a central hub (the star) from which management activities are performed, with spokes extending outward to represent different domains or sites
  • Windows Server 2008 R2
    a server operating system produced by Microsoft. There are seven editions: Foundation, Standard, Enterprise, Datacenter, Web, HPC Server and Itanium, as well as Windows Storage Server 2008 R2.
  • Active Directory Domain Services
    This role is called domain controller that responds to security authentication requests such as checking permissions, logging in, and granting the user access to computer resources within a windows domain
  • Domain Name System
    Using the DCpromo (Domain Controller Promotion) software allows the administrator to create a windows domain for the locale
  • File Services
    provides a central location for storing and sharing files across the network
  • Dynamic Host Configuration Protocol
    is the standard way of delivering IP addresses to clients
  • Dynamic Host Configuration Protocol
    provides the subnet mask, default gateway, domain suffix, DNS server addresses, WINS server addresses and other parameters in addition to the IP address
  • print server
    or printer server, is a device that connects printers to client computers over a network.
  • Role-Based Access Control (RBAC)
    where permissions are assigned based on predefined roles or job functions.