click below
click below
Normal Size Small Size show me how
chapter 18 questions
| Question | Answer |
|---|---|
| Why is it more secure to require a user to press Ctrl+Alt+Delete to log on rather than displaying the Windows Welcome screen? | Malware can sometimes display a false welcome screen to trick users into providing user account passwords. |
| Which windows in Control Panel is used to require a Windows password to wake up a sleeping computer? | Power Options window |
| What command launches the User Accounts or Network Places Wizard, which can be used to manage users and their passwords? | netsetup.cpl for Network Places nusrmgr.cpl for User Account Management |
| Why is PINE963$&apple not a strong password? | uses words |
| What is the policy in Group Policy that can be set to audit failed logon events? Give the full path to the policy. | "success/failure" of "Audit Logon Events Policy" |
| What hardware component is used to setup BitLocker Encryption so that you can authenticate the computer? | Motherboard chip called the TPM Trusted Platform Module chip. |
| What command can you use to refresh local group policies without having to reboot the system? | gpupdate |
| What type of employee badge does not have to be swiped by a card reader to allow the employee through a door? | RFID badge |
| what technique can be used so that sensitive company data on an employee's personal mobile device is not stolen when the device is stolen? | degausser |
| How can an apple iOS device install an app that is downloaded from a source other than the apple app store. | by jail breaking it |
| Which tool is best to use when destroying data on an SSD drive? Where can you get this tool? | ATA Secure Erase from the manufacturer |
| What device can be installed on a laptop to prevent shoulder surfing? | A privacy filter |
| Define and explain the differences between a virus, worm, and Trojan | A virus is a program that replicates by attaching itself to other programs, A worm is a program that copies itself throughout a network or the Internet without a host program, A Trojan does not need a host program to work rather it replaces an actual prog |
| What are the two best way to determine if an email message warning about a virus is a hoax? | call the machines manufacturer |
| What is the first thing you should do when you discover a computer is infected with malware? | Quarantine the computer |
| What does antivirus software look for to determine that a program or a process is infected with malware? | repeating lines |
| Which antispyware software is embedded in Windows 8? | Microsoft antivirus |
| what registry key keeps information about services that run when a computer is booted into safe mode? | NVRAM |
| What folder is used by windows to hold restore points? | "System Volume Information |
| What must you do to allow anti-malware software to scan and delete malware it might find in the data storage area where restore points are kept? | disable System Restore |