Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Operating Systems

Chapter 18 Review Questions

1. Why is it more secure to require a user to press Ctrol+Alt+Delete to log on rather than displaying the Windows Welcome Screen? It prevents Malware from displaying a fake welcome screen which can fool users into providing their user account information.
2. Which window in Control Panel is used to require a Windows password to wake up a sleeping computer? The Power Options window.
3. Which 2 tools can be used to reset a Windows password for another user when using Windows 7 Home Premium? a user's password can be reset in 3 places 1. by using "Netplwiz" command, 2. by going into Local users and groups in Computer Management screen. 3. from the User Accounts link in Control Panel.
4. Why is PINE963$&apple not a strong password? They are common words which are easy to find with a dictionary type attack.
5. Which Link in the Windows Firewall window allows you to add a port to the list of exceptions allowed through the firewall? "Allow a program or feature through Windows Firewall"
6. Which Policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows system? Audit Logon event policy
7. What Hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? a chip called TPM (Trusted Platform Module) located on the motherboard. This can be configured in the system BIOS.
8. What Windows utility can you use to change the name of the built-in Administrator account? Administrator account name can be changed by using gpedit.msc. Drill down through computer configuration > Windows Settings > Security Settings > Local Policies > Security Options. Find and open Accounts Administrator Account. located near the top.
9. What type of employee batdge does not have to be swiped by a card reader to allow the employee through a door? An RFID Badge
10. Which type of biometric data is considered the most secure? Retinal Scanning is the most secure biometric scan.
11. Which is better to destroy sensitive data on a hard drive, a low level format, drill, or degausser? Degausser is best to use and it is recommended to physically destroy the hard drive also.
12. What tool is best to use when destroying data on an SSD drive? Where can you get this tool? A Secure Erase Utility is required by the government to erase SSD drives, and can be downloaded from the manufacturer of the device.
13. What device can be installed on a laptop to prevent shoulder surfing? A privacy filter
14. Define and explain the differences between a virus, Worm, and Trojan. A Virus is a program that replicates by attaching itself to other programs, The infected program must be executed for the virus to run. it can be an application, macro in a document, a windows system file, or a boot loader program. A Worm is a program
15. What are the 2 best ways to protect a computer or network against worms? Use a Firewall. Use Anti-Malware and Anti-Virus Software. Personal note - to be effective, Anti Malware and Anti-Virus software must have the definitions updated daily. it is also recommended to run system scans on a regular basis, as well as running scan
16. What is the best way to determine if an email message warning about a virus is a hoax? You will never receive emails stating your computer has a virus. You can search the internet on sites such as Snopes.com or Hoaxslayer.com as well as talking to someone in your IT dept.
17. What is the first thing you should do when you discover a computer is infected with malware? Quarantine - Imediately disconnect the computer from the network and internet to prevent spreading of the infection to other computers.
18. What does AV software look for to determine that a program or a process is a virus? The AV program compares signatures of all files in the computer system against a list / database of known viruses.
19. Which antispyware software is imbedded in Windows 7? Windows Defender, Also known as Microsoft Security Essentials.
20. Why is it helpful to run AV software in Safe Mode? Some malware can prevent AV software from running. Safe Mode (without networking preferred) has limited program and driver support which can prevent the malware from loading.
21. What registry key keeps information about services that run when a comptuer is booted into Safe Mode? HKLM\System\CurrentControlSet\Control\Safeboot is where the information is kept. Subkeys are Minimal - Safe Mode without networking and Network - Safe Mode with Networking.
22. What folder is used by Windows to hold Restore Points? The hidden folder "System Volume Information Located in C:\System Volume Infomration\Restore
23. What must you do to allow AV software to scan and delete malware it might find in the data storage area where Restore Points are kept? 1. verify the AV / Anti Malware software definitions are up to date, 2. Disable System Restore 3. scan the computer allowing the AV/AM software to clean and delete the infected files.
24. What is the best tool to use to find out the purpose of a program that is running on your system? Task Manager
25. What software can you use to display a process tree that shows how processes relate, yielding more information that given by Task Manager? Process Explorer