It 122 Chapter 18 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| On a peer-to-peer network, authentication is the responsibility of the domain. | False |
| Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. | True |
| After initially installing Windows 7, you need to disable the Guest account so nobody can use it. | False |
| Using Group Policy, you can set security policies to help secure a workstation. | True |
| It’s usually a good idea to run several anti-malware programs at the same time on your computer. | False |
| What keystroke should you press to get a logon window if you don’t use the welcome screen? | Ctrl+Alt+Delete |
| Which of the following is true about the Guest account in Windows 7? | it is disabled by defaul |
| Which of the following is true about passwords. | by default, accounts with a blank password cannot logon remotely |
| Which of the following is true about the Windows Encrypted File System? | an encrypted file moved to an unencrypted folder remains encrypted |
| Which of the following is NOT true about using Group Policy on business and professional editions of Windows? | you can use gpedit.msc to see if any policies conflict |
| If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? | a TPM chip on the motherboard |
| If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? | the BIOS |
| One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? | smart card |
| An RFID badge is related to which type of authentication method? | smart card |
| A privacy filter is used for what aspect of security? | screen viewing |
| Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? | degausser |
| You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? | tailgating |
| Which type of malware hides in the MBR program of a hard drive? | boot sector virus |
| Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? | adware |
| Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7? | bootrec /fixboot |
| If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use? | Process Explorer |
| Which of the following are methods to lock down a workstation in Windows 7? (Choose all that apply.) | press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer |
| Which of the following are true about Windows Firewall? (Choose all that apply.) | it is a personal firewall it is configured when you set your network location |
| Which are among the ways you can use BitLocker Encryption? (Choose all that apply.) | computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM |
| Which of the following would be considered an input to a biometric device? (Choose all that apply.) | retina fingerprint voice |
| The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network’s computers. | layered |
| To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks. | locking or locking down |
| The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network. | Guest |
| To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network. | quarantined |
| Windows _______________ is antispyware included in Windows 7/Vista. | Defender |
| the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer | social engineering |
| an infestation designed to copy itself repeatedly to memory, on drive space, or on a network | worm |
| A type of malware that tricks you into opening it by substituting itself for a legitimate program | Trojan |
| a program that AV software recognizes to be potentially harmful or potentially unwanted | grayware |
| a code used to identify and authenticate a person or organization sending data over a network | digital certificate |
| type of smart card that contains authentication information | RSA tokens |
| a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild | virus signature |
| when someone who is unauthorized follows the employee through a secured entrance to a room or building | tailgating |
| software installed on a computer that produces pop-up ads using your browser | adware |
| type of spyware that tracks your keystrokes, including passwords | keylogger |
Created by:
srentrop