Deck 6: User Management

ملء الشاشة (f)
exit full mode
سؤال
____ protects your computer from viruses and spyware that may attempt to steal your password.

A) Fast use switching
B) Secure logon
C) Windows Welcome
D) Manual logon
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ applet in Control Panel is a simplified interface for user management.

A) Privileges
B) Permissions
C) User Accounts
D) Accounts
سؤال
In Windows 7, most actions that are triggered by an Administrator do not result in a prompt from User Account Control.
سؤال
Holding down the ____ key during the boot process stops the automatic logon from occurring.

A) Shift
B) Ctrl
C) Alt
D) Esc
سؤال
An administrator account derives its privileges from being a member of the local ____ group.

A) Administrators
B) Users
C) Guest
D) Performance Monitor Users
سؤال
Members of the ____ group can back up and restore all files and folders on the computer.

A) Cryptographic Operators
B) Event Log Readers
C) Distributed COM Users
D) Backup Operators
سؤال
Local user accounts can be used to access resources on other computers in a workgroup or a domain.
سؤال
Each time a user logs on locally, the ____ database is used to verify logon credentials.

A) SAM
B) SSID
C) SID
D) NID
سؤال
The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.

A) Root
B) Guest
C) Administrator
D) User
سؤال
In Windows 7, the default profile is configured using ____.

A) Sysprep
B) the User Profiles applet
C) the User Manager
D) the Account Manager
سؤال
The ____ profile is used when new user profiles are created.

A) default
B) roaming
C) mandatory
D) public
سؤال
Members of the ____ group are able to monitor performance counters and access performance logs on the computer.

A) Event Log Readers
B) IIS_IUSRS
C) Performance Log Users
D) Guests
سؤال
Windows 7 cannot perform fast user switching when configured as a domain client.
سؤال
When the computer is a domain client, then secure logon is required.
سؤال
The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.

A) User
B) Domain
C) Everyone
D) Initial
سؤال
____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.

A) Secure logon
B) Windows Welcome
C) Automatic logon
D) Fast user switching
سؤال
The password for the Administrator account is blank by default.
سؤال
____ are required for individuals to log on to Windows 7 and use resources on the computer.

A) Public keys
B) IP addresses
C) User accounts
D) Digital certificates
سؤال
The ____ account is the most powerful local user account possible.

A) Guest
B) Initial
C) Installation
D) Administrator
سؤال
Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.

A) Event Log Readers
B) Performance Monitor Users
C) Performance Log Users
D) Guests
سؤال
What are some of the most common naming conventions for user logon names?
سؤال
____________________ is the logon method used by standalone computers and workgroup members, which authenticate users by using the local SAM database.
سؤال
A ____ network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information.

A) domain-based
B) peer-to-peer
C) server-based
D) centralized
سؤال
The ____ profile is different from other profiles because it is not a complete profile.

A) default
B) roaming
C) mandatory
D) public
سؤال
Local user accounts are stored in the ___________________________________ database of Windows 7.
سؤال
What are the characteristics of the Windows 7 Administrator account?
سؤال
A standard user account derives its privileges from being a member of the local ____________________ group.
سؤال
What are the characteristics of the Windows 7 Guest account?
سؤال
What are some of the restrictions imposed by Windows 7 on the user logon name?
سؤال
A ____ simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer.

A) Personal User Password
B) Pass-through authentication
C) HomeGroup
D) Game control
سؤال
What are some of the user account attributes that describe user and control access?
سؤال
A ____ profile is stored in a network location rather than on the local hard drive.

A) roaming
B) public
C) mandatory
D) default
سؤال
What are some of the differences between the Administrator account and the initial account?
سؤال
____ control when a user is able to log on and use the computer.

A) Game controls
B) Time limits
C) Web filters
D) Activity reports
سؤال
A ____ profile is a profile that cannot be modified.

A) public
B) roaming
C) default
D) mandatory
سؤال
What are the logon methods supported by Windows 7?
سؤال
What are the logon configurations supported by Windows 7?
سؤال
What are the folders included in the default public profile?
سؤال
The user accounts created in Windows 7 are ____________________ user accounts. This means that they exist only on the local computer.
سؤال
Automatic logon is configured on the ____________________ tab of the User Accounts applet.
سؤال
Match between columns
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Fast user switching
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Ntuser.ini
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
NTUSER.DAT
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Safe Mode
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
User profile
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Naming convention
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Replicator
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Security Identifier (SID)
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Secure Logon
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Fast user switching
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Ntuser.ini
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
NTUSER.DAT
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Safe Mode
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
User profile
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Naming convention
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Replicator
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Security Identifier (SID)
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Secure Logon
a boot option you can use when troubleshooting Windows 7
Fast user switching
a boot option you can use when troubleshooting Windows 7
Ntuser.ini
a boot option you can use when troubleshooting Windows 7
NTUSER.DAT
a boot option you can use when troubleshooting Windows 7
Safe Mode
a boot option you can use when troubleshooting Windows 7
User profile
a boot option you can use when troubleshooting Windows 7
Naming convention
a boot option you can use when troubleshooting Windows 7
Replicator
a boot option you can use when troubleshooting Windows 7
Security Identifier (SID)
a boot option you can use when troubleshooting Windows 7
Secure Logon
a collection of desktop and environment configurations for a specific user or group of users
Fast user switching
a collection of desktop and environment configurations for a specific user or group of users
Ntuser.ini
a collection of desktop and environment configurations for a specific user or group of users
NTUSER.DAT
a collection of desktop and environment configurations for a specific user or group of users
Safe Mode
a collection of desktop and environment configurations for a specific user or group of users
User profile
a collection of desktop and environment configurations for a specific user or group of users
Naming convention
a collection of desktop and environment configurations for a specific user or group of users
Replicator
a collection of desktop and environment configurations for a specific user or group of users
Security Identifier (SID)
a collection of desktop and environment configurations for a specific user or group of users
Secure Logon
a file that stores user-specific registry information
Fast user switching
a file that stores user-specific registry information
Ntuser.ini
a file that stores user-specific registry information
NTUSER.DAT
a file that stores user-specific registry information
Safe Mode
a file that stores user-specific registry information
User profile
a file that stores user-specific registry information
Naming convention
a file that stores user-specific registry information
Replicator
a file that stores user-specific registry information
Security Identifier (SID)
a file that stores user-specific registry information
Secure Logon
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Fast user switching
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Ntuser.ini
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
NTUSER.DAT
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Safe Mode
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
User profile
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Naming convention
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Replicator
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Security Identifier (SID)
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Secure Logon
value assigned to each user account within the SAM database
Fast user switching
value assigned to each user account within the SAM database
Ntuser.ini
value assigned to each user account within the SAM database
NTUSER.DAT
value assigned to each user account within the SAM database
Safe Mode
value assigned to each user account within the SAM database
User profile
value assigned to each user account within the SAM database
Naming convention
value assigned to each user account within the SAM database
Replicator
value assigned to each user account within the SAM database
Security Identifier (SID)
value assigned to each user account within the SAM database
Secure Logon
a standard process for creating names on a network or standalone computer
Fast user switching
a standard process for creating names on a network or standalone computer
Ntuser.ini
a standard process for creating names on a network or standalone computer
NTUSER.DAT
a standard process for creating names on a network or standalone computer
Safe Mode
a standard process for creating names on a network or standalone computer
User profile
a standard process for creating names on a network or standalone computer
Naming convention
a standard process for creating names on a network or standalone computer
Replicator
a standard process for creating names on a network or standalone computer
Security Identifier (SID)
a standard process for creating names on a network or standalone computer
Secure Logon
group used by special user accounts to perform file replication between computers
Fast user switching
group used by special user accounts to perform file replication between computers
Ntuser.ini
group used by special user accounts to perform file replication between computers
NTUSER.DAT
group used by special user accounts to perform file replication between computers
Safe Mode
group used by special user accounts to perform file replication between computers
User profile
group used by special user accounts to perform file replication between computers
Naming convention
group used by special user accounts to perform file replication between computers
Replicator
group used by special user accounts to perform file replication between computers
Security Identifier (SID)
group used by special user accounts to perform file replication between computers
Secure Logon
سؤال
What are the main characteristics of a domain-based network?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: User Management
1
____ protects your computer from viruses and spyware that may attempt to steal your password.

A) Fast use switching
B) Secure logon
C) Windows Welcome
D) Manual logon
B
2
The ____ applet in Control Panel is a simplified interface for user management.

A) Privileges
B) Permissions
C) User Accounts
D) Accounts
C
3
In Windows 7, most actions that are triggered by an Administrator do not result in a prompt from User Account Control.
True
4
Holding down the ____ key during the boot process stops the automatic logon from occurring.

A) Shift
B) Ctrl
C) Alt
D) Esc
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
An administrator account derives its privileges from being a member of the local ____ group.

A) Administrators
B) Users
C) Guest
D) Performance Monitor Users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Members of the ____ group can back up and restore all files and folders on the computer.

A) Cryptographic Operators
B) Event Log Readers
C) Distributed COM Users
D) Backup Operators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
Local user accounts can be used to access resources on other computers in a workgroup or a domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Each time a user logs on locally, the ____ database is used to verify logon credentials.

A) SAM
B) SSID
C) SID
D) NID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.

A) Root
B) Guest
C) Administrator
D) User
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
In Windows 7, the default profile is configured using ____.

A) Sysprep
B) the User Profiles applet
C) the User Manager
D) the Account Manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ____ profile is used when new user profiles are created.

A) default
B) roaming
C) mandatory
D) public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Members of the ____ group are able to monitor performance counters and access performance logs on the computer.

A) Event Log Readers
B) IIS_IUSRS
C) Performance Log Users
D) Guests
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Windows 7 cannot perform fast user switching when configured as a domain client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
When the computer is a domain client, then secure logon is required.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.

A) User
B) Domain
C) Everyone
D) Initial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.

A) Secure logon
B) Windows Welcome
C) Automatic logon
D) Fast user switching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
The password for the Administrator account is blank by default.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ are required for individuals to log on to Windows 7 and use resources on the computer.

A) Public keys
B) IP addresses
C) User accounts
D) Digital certificates
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ____ account is the most powerful local user account possible.

A) Guest
B) Initial
C) Installation
D) Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.

A) Event Log Readers
B) Performance Monitor Users
C) Performance Log Users
D) Guests
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are some of the most common naming conventions for user logon names?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
____________________ is the logon method used by standalone computers and workgroup members, which authenticate users by using the local SAM database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ____ network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information.

A) domain-based
B) peer-to-peer
C) server-based
D) centralized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
The ____ profile is different from other profiles because it is not a complete profile.

A) default
B) roaming
C) mandatory
D) public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Local user accounts are stored in the ___________________________________ database of Windows 7.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the characteristics of the Windows 7 Administrator account?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A standard user account derives its privileges from being a member of the local ____________________ group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are the characteristics of the Windows 7 Guest account?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are some of the restrictions imposed by Windows 7 on the user logon name?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A ____ simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer.

A) Personal User Password
B) Pass-through authentication
C) HomeGroup
D) Game control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
What are some of the user account attributes that describe user and control access?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ____ profile is stored in a network location rather than on the local hard drive.

A) roaming
B) public
C) mandatory
D) default
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are some of the differences between the Administrator account and the initial account?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ control when a user is able to log on and use the computer.

A) Game controls
B) Time limits
C) Web filters
D) Activity reports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
A ____ profile is a profile that cannot be modified.

A) public
B) roaming
C) default
D) mandatory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the logon methods supported by Windows 7?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the logon configurations supported by Windows 7?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the folders included in the default public profile?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The user accounts created in Windows 7 are ____________________ user accounts. This means that they exist only on the local computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Automatic logon is configured on the ____________________ tab of the User Accounts applet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Fast user switching
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Ntuser.ini
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
NTUSER.DAT
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Safe Mode
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
User profile
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Naming convention
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Replicator
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Security Identifier (SID)
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Secure Logon
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Fast user switching
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Ntuser.ini
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
NTUSER.DAT
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Safe Mode
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
User profile
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Naming convention
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Replicator
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Security Identifier (SID)
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Secure Logon
a boot option you can use when troubleshooting Windows 7
Fast user switching
a boot option you can use when troubleshooting Windows 7
Ntuser.ini
a boot option you can use when troubleshooting Windows 7
NTUSER.DAT
a boot option you can use when troubleshooting Windows 7
Safe Mode
a boot option you can use when troubleshooting Windows 7
User profile
a boot option you can use when troubleshooting Windows 7
Naming convention
a boot option you can use when troubleshooting Windows 7
Replicator
a boot option you can use when troubleshooting Windows 7
Security Identifier (SID)
a boot option you can use when troubleshooting Windows 7
Secure Logon
a collection of desktop and environment configurations for a specific user or group of users
Fast user switching
a collection of desktop and environment configurations for a specific user or group of users
Ntuser.ini
a collection of desktop and environment configurations for a specific user or group of users
NTUSER.DAT
a collection of desktop and environment configurations for a specific user or group of users
Safe Mode
a collection of desktop and environment configurations for a specific user or group of users
User profile
a collection of desktop and environment configurations for a specific user or group of users
Naming convention
a collection of desktop and environment configurations for a specific user or group of users
Replicator
a collection of desktop and environment configurations for a specific user or group of users
Security Identifier (SID)
a collection of desktop and environment configurations for a specific user or group of users
Secure Logon
a file that stores user-specific registry information
Fast user switching
a file that stores user-specific registry information
Ntuser.ini
a file that stores user-specific registry information
NTUSER.DAT
a file that stores user-specific registry information
Safe Mode
a file that stores user-specific registry information
User profile
a file that stores user-specific registry information
Naming convention
a file that stores user-specific registry information
Replicator
a file that stores user-specific registry information
Security Identifier (SID)
a file that stores user-specific registry information
Secure Logon
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Fast user switching
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Ntuser.ini
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
NTUSER.DAT
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Safe Mode
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
User profile
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Naming convention
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Replicator
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Security Identifier (SID)
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Secure Logon
value assigned to each user account within the SAM database
Fast user switching
value assigned to each user account within the SAM database
Ntuser.ini
value assigned to each user account within the SAM database
NTUSER.DAT
value assigned to each user account within the SAM database
Safe Mode
value assigned to each user account within the SAM database
User profile
value assigned to each user account within the SAM database
Naming convention
value assigned to each user account within the SAM database
Replicator
value assigned to each user account within the SAM database
Security Identifier (SID)
value assigned to each user account within the SAM database
Secure Logon
a standard process for creating names on a network or standalone computer
Fast user switching
a standard process for creating names on a network or standalone computer
Ntuser.ini
a standard process for creating names on a network or standalone computer
NTUSER.DAT
a standard process for creating names on a network or standalone computer
Safe Mode
a standard process for creating names on a network or standalone computer
User profile
a standard process for creating names on a network or standalone computer
Naming convention
a standard process for creating names on a network or standalone computer
Replicator
a standard process for creating names on a network or standalone computer
Security Identifier (SID)
a standard process for creating names on a network or standalone computer
Secure Logon
group used by special user accounts to perform file replication between computers
Fast user switching
group used by special user accounts to perform file replication between computers
Ntuser.ini
group used by special user accounts to perform file replication between computers
NTUSER.DAT
group used by special user accounts to perform file replication between computers
Safe Mode
group used by special user accounts to perform file replication between computers
User profile
group used by special user accounts to perform file replication between computers
Naming convention
group used by special user accounts to perform file replication between computers
Replicator
group used by special user accounts to perform file replication between computers
Security Identifier (SID)
group used by special user accounts to perform file replication between computers
Secure Logon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are the main characteristics of a domain-based network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.