Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

It 122 Chapter 18

QuestionAnswer
On a peer-to-peer network, authentication is the responsibility of the domain. False
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. False
Using Group Policy, you can set security policies to help secure a workstation. True
It’s usually a good idea to run several anti-malware programs at the same time on your computer. False
What keystroke should you press to get a logon window if you don’t use the welcome screen? Ctrl+Alt+Delete
Which of the following is true about the Guest account in Windows 7? it is disabled by defaul
Which of the following is true about passwords. by default, accounts with a blank password cannot logon remotely
Which of the following is true about the Windows Encrypted File System? an encrypted file moved to an unencrypted folder remains encrypted
Which of the following is NOT true about using Group Policy on business and professional editions of Windows? you can use gpedit.msc to see if any policies conflict
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? a TPM chip on the motherboard
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? the BIOS
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? smart card
An RFID badge is related to which type of authentication method? smart card
A privacy filter is used for what aspect of security? screen viewing
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? degausser
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? tailgating
Which type of malware hides in the MBR program of a hard drive? boot sector virus
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? adware
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7? bootrec /fixboot
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use? Process Explorer
Which of the following are methods to lock down a workstation in Windows 7? (Choose all that apply.) press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
Which of the following are true about Windows Firewall? (Choose all that apply.) it is a personal firewall it is configured when you set your network location
Which are among the ways you can use BitLocker Encryption? (Choose all that apply.) computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
Which of the following would be considered an input to a biometric device? (Choose all that apply.) retina fingerprint voice
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network’s computers. layered
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks. locking or locking down
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network. Guest
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network. quarantined
Windows _______________ is antispyware included in Windows 7/Vista. Defender
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer social engineering
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network worm
A type of malware that tricks you into opening it by substituting itself for a legitimate program Trojan
a program that AV software recognizes to be potentially harmful or potentially unwanted grayware
a code used to identify and authenticate a person or organization sending data over a network digital certificate
type of smart card that contains authentication information RSA tokens
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild virus signature
when someone who is unauthorized follows the employee through a secured entrance to a room or building tailgating
software installed on a computer that produces pop-up ads using your browser adware
type of spyware that tracks your keystrokes, including passwords keylogger
Created by: srentrop
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards