click below
click below
Normal Size Small Size show me how
Win 7 Final T/F
Win 7 Final T/F
| Question | Answer |
|---|---|
| The most critical effect of malware is degraded system performance. | False |
| The most commonly used method for authentication is a username and password. | True |
| NTFS permissions can be easily circumvented when you have physical access to a computer. | True |
| In Windows 7, advanced audit policies can only be edited at a command-line. | False |
| Every object in Windows 7 has audit events related to it. | True |
| Windows 7 can use a different configuration depending on the network you are connected to. | True |
| SMB version 2.1 is included in all versions of Windows prior to Windows 7. | False |
| Windows 7 includes several interfaces that make it easier for developers to create clients, services, protocols, and network drivers. | True |
| IPX is the most popular networking protocol in the world today. | False |
| If a Windows 7 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location. | True |