click below
click below
Normal Size Small Size show me how
It 122 Chapter 18
| Question | Answer |
|---|---|
| On a peer-to-peer network, authentication is the responsibility of the domain. | False |
| Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. | True |
| After initially installing Windows 7, you need to disable the Guest account so nobody can use it. | False |
| Using Group Policy, you can set security policies to help secure a workstation. | True |
| It’s usually a good idea to run several anti-malware programs at the same time on your computer. | False |
| What keystroke should you press to get a logon window if you don’t use the welcome screen? | Ctrl+Alt+Delete |
| Which of the following is true about the Guest account in Windows 7? | it is disabled by defaul |
| Which of the following is true about passwords. | by default, accounts with a blank password cannot logon remotely |
| Which of the following is true about the Windows Encrypted File System? | an encrypted file moved to an unencrypted folder remains encrypted |
| Which of the following is NOT true about using Group Policy on business and professional editions of Windows? | you can use gpedit.msc to see if any policies conflict |
| If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? | a TPM chip on the motherboard |
| If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? | the BIOS |
| One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? | smart card |
| An RFID badge is related to which type of authentication method? | smart card |
| A privacy filter is used for what aspect of security? | screen viewing |
| Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? | degausser |
| You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? | tailgating |
| Which type of malware hides in the MBR program of a hard drive? | boot sector virus |
| Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? | adware |
| Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7? | bootrec /fixboot |
| If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use? | Process Explorer |
| Which of the following are methods to lock down a workstation in Windows 7? (Choose all that apply.) | press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer |
| Which of the following are true about Windows Firewall? (Choose all that apply.) | it is a personal firewall it is configured when you set your network location |
| Which are among the ways you can use BitLocker Encryption? (Choose all that apply.) | computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM |
| Which of the following would be considered an input to a biometric device? (Choose all that apply.) | retina fingerprint voice |
| The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network’s computers. | layered |
| To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks. | locking or locking down |
| The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network. | Guest |
| To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network. | quarantined |
| Windows _______________ is antispyware included in Windows 7/Vista. | Defender |
| the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer | social engineering |
| an infestation designed to copy itself repeatedly to memory, on drive space, or on a network | worm |
| A type of malware that tricks you into opening it by substituting itself for a legitimate program | Trojan |
| a program that AV software recognizes to be potentially harmful or potentially unwanted | grayware |
| a code used to identify and authenticate a person or organization sending data over a network | digital certificate |
| type of smart card that contains authentication information | RSA tokens |
| a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild | virus signature |
| when someone who is unauthorized follows the employee through a secured entrance to a room or building | tailgating |
| software installed on a computer that produces pop-up ads using your browser | adware |
| type of spyware that tracks your keystrokes, including passwords | keylogger |