click below
click below
Normal Size Small Size show me how
It 122 Chapter 18
Question | Answer |
---|---|
On a peer-to-peer network, authentication is the responsibility of the domain. | False |
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. | True |
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. | False |
Using Group Policy, you can set security policies to help secure a workstation. | True |
It’s usually a good idea to run several anti-malware programs at the same time on your computer. | False |
What keystroke should you press to get a logon window if you don’t use the welcome screen? | Ctrl+Alt+Delete |
Which of the following is true about the Guest account in Windows 7? | it is disabled by defaul |
Which of the following is true about passwords. | by default, accounts with a blank password cannot logon remotely |
Which of the following is true about the Windows Encrypted File System? | an encrypted file moved to an unencrypted folder remains encrypted |
Which of the following is NOT true about using Group Policy on business and professional editions of Windows? | you can use gpedit.msc to see if any policies conflict |
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? | a TPM chip on the motherboard |
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? | the BIOS |
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? | smart card |
An RFID badge is related to which type of authentication method? | smart card |
A privacy filter is used for what aspect of security? | screen viewing |
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? | degausser |
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? | tailgating |
Which type of malware hides in the MBR program of a hard drive? | boot sector virus |
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? | adware |
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7? | bootrec /fixboot |
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use? | Process Explorer |
Which of the following are methods to lock down a workstation in Windows 7? (Choose all that apply.) | press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer |
Which of the following are true about Windows Firewall? (Choose all that apply.) | it is a personal firewall it is configured when you set your network location |
Which are among the ways you can use BitLocker Encryption? (Choose all that apply.) | computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM |
Which of the following would be considered an input to a biometric device? (Choose all that apply.) | retina fingerprint voice |
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network’s computers. | layered |
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks. | locking or locking down |
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network. | Guest |
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network. | quarantined |
Windows _______________ is antispyware included in Windows 7/Vista. | Defender |
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer | social engineering |
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network | worm |
A type of malware that tricks you into opening it by substituting itself for a legitimate program | Trojan |
a program that AV software recognizes to be potentially harmful or potentially unwanted | grayware |
a code used to identify and authenticate a person or organization sending data over a network | digital certificate |
type of smart card that contains authentication information | RSA tokens |
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild | virus signature |
when someone who is unauthorized follows the employee through a secured entrance to a room or building | tailgating |
software installed on a computer that produces pop-up ads using your browser | adware |
type of spyware that tracks your keystrokes, including passwords | keylogger |