Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Vista Ch. 7

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
____ is a threat to privacy and often makes systems unstable.   spyware  
🗑
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates   unhealthy  
🗑
To address the risks to data stored on workstations and laptops, ____ has been added to Windows Vista.   BitLocker Drive Encryption  
🗑
Windows Vista includes a(n) ____ policy, which can be used to control many facets of Windows.   local security  
🗑
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.   Group Policy  
🗑
The ____ policy controls password characteristics for local user accounts.   password  
🗑
Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.   account lockout  
🗑
A ____ rule allows or denies access to software based on the software publisher certificate.   certificate  
🗑
A ____ rule allows or denies access to software based on the filename and location.   path  
🗑
____ is the security process that records the occurrence of specific operating system events in the Security log.   auditing  
🗑
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.   privilege use  
🗑
Newer Windows applications use an application ____ to describe the structure of an application.   manifest  
🗑
____ Mode works in conjunction with UAC to prevent malicious software from installing through Internet Explorer.   protected  
🗑
____ is a very organized and deliberate attempt by individuals to steal personal and business information.   phishing  
🗑
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.   spyware  
🗑
The most basic level of data security in Windows Vista is ____ permissions.   NTFS  
🗑
____ is the process of taking data and making it unreadable.   encryption  
🗑
A(n) ____ encryption algorithm uses the same key to encrypt data and decrypt data.   symmetric  
🗑
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.   asymmetric  
🗑
A(n) ____ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted.   hash  
🗑
A(n) ____ is part of the motherboard in your computer and is used to store encryption keys and certificates.   TPM  
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑
   
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: paulysa