access control list (ACL)

Answer:

A list of all users and groups that have access to an object.

accounting

Answer:

Also known as auditing, is the process of keeping track of a user's activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session.

Active Directory

Answer:

Active Directory is a directory service technology created by Microsoft that provides a variety of network services, including Lightweight Directory Access Protocol (LDAP), Kerberos-based and single sign-on (SSO) authentication, DNS-based naming and other network information and a central location for network administration and delegation of authority.

administrative share

Answer:

A shared folder typically used for administrative purposes.

asymmetric encryption

Answer:

Also known as public key cryptography, uses two mathematically related keys for encryption. One key is used to encrypt the data, while the second is used to decrypt it.

auditing

Answer:

Also known as accounting, is the process of keeping track of a user's activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session.

authentication

Answer:

The process of identifying an individual, usually based on a username and password.

authorization

Answer:

The process of giving individuals access to system objects based on their identity.

biometrics

Answer:

An authentication method that identifies and recognizes people based on physical traits, such as fingerprints, face recognition, iris recognition, retinal scans, and voice recognition.

BitLocker To Go

Answer:

A new feature in Windows 7 that enables users to encrypt removable USB devices, such as flash drives and external hard disks.