• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/275

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

275 Cards in this Set

  • Front
  • Back
An operating system manages hardware, runs applications, provides an interface for users, and stores,
retrieves, and manipulates files.
True
Current versions of Windows use DOS as the operating system.
False
The kernel provides a way for the user to do such things as select music to burn to a CD, install an
application, or change the wallpaper on the Windows desktop.
False
The Windows desktop is itself a folder.
true
System Information can be useful when strange error messages appear during startup.
True
A(n) ____ is software that controls a computer.
Operating System
In 1986, ____ was introduced and quickly became the most popular OS among IBM computers and IBMcompatible
computers using the Intel 8086 processors.
MS DOS
A ____ interface is an interface that uses graphics as compared to a command-driven interface.
graphical user
Vista has a new 3D user interface called the ____ user interface.
Aero
A(n) ____ is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive.
Netbook
A ____ makes it possible to boot a computer into one of two installed OSs.
Dual Boot
A(n) ____ is the portion of an OS that relates to the user and to applications.
shell
The OS ____ is responsible for interacting with hardware.
kernel
The ____ interface between the subsystems in user mode and the HAL.
executive services
A ____ is a single task, such as the task of printing a file, that the process requests from the kernel.
thread
____ are small programs stored on the hard drive that tell the computer how to communicate with a
specific hardware device such as a printer, network card, or modem.
Device Drivers
The ____ is normally located at the bottom of the Windows desktop, displaying information about open
programs and providing quick access to others.
taskbar
The ____ is usually on the right side of the taskbar and displays open services.
system tray
A(n) ____ is a program that runs in the background to support or serve Windows or an application.
service
A ____ is one or more characters following the last period in a filename, such as .exe, .txt, or .avi.
file extension
The ____ dialog box in Windows Vista appears each time a user attempts to perform an action that can be
done only with administrative privileges.
User Account Control
Windows identifies file types primarily by the ____.
file extension
Windows offers two ways to sync files: ____.
Briefcase and Offline Files
From the ____ window, you can change the read-only, hidden, archive, and indexing attributes of the file.
Properties
A(n) ____ is a list of items that is used to speed up a search.
Index
Most PC support jobs require simply working with hardware and software.
False
Knowing how to effectively work with people in a technical world is one of the most sought-after skills in
today’s service-oriented work environments.
True
When working with a customer, your primary job is to satisfy your boss.
False
A help-desk call is the most difficult situation to handle when a customer is not knowledgeable about how to
use a computer.
True
The support technician decides when the work is done.
False
A ____ is the only one responsible for the PC before trouble occurs.
PC Support Technician
The most significant certifying organization for PC technicians is the ____.
CompTIA
____ has industry recognition, so it should be your first choice for certification as a PC technician.
A+
When someone initiates a call for help, the technician starts the process by creating a(n) ____.
ticket
One of the most important ways to achieve customer satisfaction is to do your best by being ____.
Prepared
____ customers are those where you both work for the same company, in which case you might consider
the customer your colleague
internal
____ customers are your customers who come to you or your company for service.
External
To improve your attitude, you must do it from your ____.
heart
When you’re working with or talking to a customer, focus on ____.
him or her
____ differences happen because we are from different countries and societies or because of physical
handicaps.
Cultural
____ a problem increases your value in the eyes of your coworkers and boss.
Taking Ownership OF
To provide good service, you need to have a good ____ when servicing customers on the phone or online,
on site, or in a shop.
plan
Begin each new relationship with a ____.
positive attitude
Troubleshooting begins by ____.
interviewing the user
Part of setting ____ is to establish a timeline with your customer for the completion of a project.
expectations
As a support technician, your goals can include ____ the user, as well as repairing the computer.
educating
____ support requires more interaction with customers than any other type of PC support.
Phone
____ is required if the customer must be told each key to press or command button to click.
Patience
Knowing how to ____ a problem to those higher in the support chain is one of the first things you should
learn on a new job.
escalate
Organize your time by making ____ and sticking with them as best you can.
to-do lists
As a PC support technician, you can expect to be faced with installing Windows in a variety of situations.
True
The retail version costs less than the OEM version, but can only be installed on a new PC for resale.
False
Microsoft offers 64-bit versions for all Vista retail editions.
False
Many hardware manufacturers have chosen to not produce Vista drivers for their older devices, so it’s very
important to find out if your hardware will be compatible with Vista.
True
Microsoft no longer supports Windows 2000, so as a credible technician you should not recommend that it
be installed on a new PC.
true
Upgrading to a better edition of Vista can easily be accomplished by using the ____ feature.
Windows Anytime Upgrade
Use a ____-bit OS if you need increased performance and your system has enough resources to support it.
64
Use ____ to find out which devices are installed in your XP system.
Device Manager
A ____ boot allows you to install the new OS without disturbing the old one so you can boot to either OS.
dual
A(n) ____ server is used to hold the setup files on the Windows CD or DVD to a file server on the network
and then at each PC, you can execute the Setup program on the server.
distribution
A(n) ____ installation is performed by storing the answers to installation questions in a text file or script
that Windows calls an answer file.
unattended
A ____ is a copy of the entire volume on which Windows is installed to another bootable media such as CDs
or USB drive.
drive image
The Windows utility ____ is used to remove configuration settings, such as the computer name that
uniquely identifies the PC.
sysprep.exe
For some brand-name computers, the hard drive contains a ____ partition that can be used to reinstall
Windows.
hidden recovery
A ____ computer is software that simulates the hardware of a physical computer.
virtual
The ____ partition is the active partition of the hard drive.
system
A Windows ____ is a logical group of computers and users that share resources, where administration,
resources, and security on a workstation are controlled by that workstation.
workgroup
A Windows domain is a type of ____ network, which is a network where resources are managed by a
centralized computer.
client/server
An example of a network operating system is Windows Server 2008, which controls a network using the
directory database called ____.
active directory
The ____ command is used to copy the information from the old computer to a server or removable media.
scanstate
The ____ command is used to copy the information to the new computer.
loadstate
Product ____ is a method used by Microsoft to prevent unlicensed use of its software so that you must
purchase a Windows license for each installation of Windows.
activation
During a normal Windows XP installation, setup causes the system to reboot ____ times.
3
To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use
this command at a command prompt: ____, where D: is the drive to be converted.
convert D: /FS:NTFS
For an always-up broadband connection (such as cable modem or DSL), select ____ when you configure
updates.
automatic
Currently, Microsoft offers four service packs for Windows XP.
false
Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning
CDs and DVDs, and for a variety of other tasks, so it’s important to delete unneeded files occasionally.
true
Depending on how fragmented the drive and how large the drive, defragmenting it can take less than an
hour or as long as all night.
true
When a new hard drive is first installed in a system, you must first initialize the disk.
true
You can install an OS on a spanned or striped volume that uses software RAID.
false
For Windows XP, use the ____ to see which service packs are installed.
System Properties
To view and manually install updates, click ____, and then follow the directions on-screen.
Start, All Programs, Windows Update
To protect a system against malicious attack, you need to verify that ____ software is configured to scan
the system regularly and that it is up-to-date.
antivirus
Files can end up in ____ segments all over the drive.
fragmented
By default, Vista automatically defrags a drive every ____.
Wednesday at 1 am
Use the ____ command to defrag the drive from a command prompt window.
defrag
To make sure the drive is healthy, you need to search for and repair file system errors using the Windows
____ utility.
chkdsk
A snapshot of the system settings and configuration is called a ____.
restore point
____ creates restore points at regular intervals and just before you install software or hardware.
system protection
When you back up the system state, the registry is also backed up to the folder ____.
%SystemRoot%\repair\RegBack
Besides backing up user data or system files, you can also back up the entire hard drive using Windows
Vista ____.
Complete PC Backup
The user folder for an account contains a group of subfolders called the user ____.
profile namespace
If you enter a command and want to terminate its execution before it is finished, you can press ____ to do
so.
CTRL+Break
The ____ command creates a subdirectory under a directory.
MD
A file with a .bat file extension is called a ____ file.
batch
A dynamic disk requires ____ MB of storage for the disk management database.
1
You can use ____ to convert two or more basic disks to dynamic disks.
disk management
When a hard drive is first sensed by Windows, it is assigned the ____ disk status.
basic
A disk marked as dynamic can be used with other dynamic disks in a spanned or ____ volume.
striped
If you are having problems with a hard drive, volume, or mounted drive, check ____ for events about the
drive that might have been recorded there.
Event Log
You can edit the registry and create a restore point while in Safe Mode.
false
Windows Vista tracks issues that are interfering with performance.
True
The indexing service of Windows indexer has a high priority and take precedence over other programs.
false
If you notice that performance slows after a system has been up and running without a restart for some
time, suspect a memory leak.
true
Editing the registry can be dangerous, so do this with caution and be sure to back up first!
true
The ____ tab of Task Manager lists system services and other processes associated with applications,
together with how much CPU time and memory the process uses.
Processes
To stop a process using Task Manager, select the process and click ____.
End Process
If your desktop locks up, you can use ____ to refresh it.
Task Manager
The ____ tab in Task Manager provides details about how a program uses system resources.
Performance
The ____ tab in Task Manager lets you monitor network activity and bandwidth used.
Networking
The ____ tab in Task Manager shows all users currently logged on the system.
Users
You can use the ____ to find out what processes are launched at startup and to temporarily disable a
process from loading.
system configuration utility
____ is a Windows utility that can be used to build your own customized console windows.
Microsoft Management Console
A(n) ____ is a single window that contains one or more administrative tools such as Device Manager or
Disk Management.
console
In a console, the individual tools are called ____.
snap-ins
A console is saved in a file with an ____ file extension.
.msc
Device Manager reads data from the ____ key to build the information it displays about hardware
configurations.
HKLM\HARDWARE
____, under Windows Vista, is a summary index designed to measure the overall performance of a
system.
Windows Experience Index
To make sure that all hardware or software installed on the system is compatible with Windows Vista, use
the ____.
Vista Upgrade Advisor
You can use the ____ to find information about the installed processor and its speed, how much RAM is
installed, and free space on the hard drive.
System Information Utility
The ____ is responsible for maintaining an index of files and folders on a hard drive to speed up Windows
searches.
Windows Indexer
The ____ box can protect your system against users making unauthorized changes and against malware
installing itself without your knowledge.
UAC
To find out if programs and services are slowing down Windows startup, boot the system in ____ and
watch to see if performance improves.
Safe Mode
You can use the ____ utility to zero in on the service or other program that is slowing down startup.
MSConfig
Most programs written for Windows have a(n) ____ routine which can be accessed from the Vista
Programs and Features applet in the Control Panel, the XP Add Remove Programs applet in the Control
Panel, or a utility in the All Programs menu.
uninstall
Errors with memory are often difficult to diagnose because they can appear intermittently and might be
mistaken as application errors, user errors, or other hardware component errors.
True
Driver Verifier attempts to overload the drivers it monitors, which can cause a memory error.
False
If Driver Verifier runs for a few days and has still not found the problem, it probably will not help you.
True
Using Windows Vista, you can use Device Manager without responding correctly to the UAC box.
false
If your hard drive is corrupted, you still might be able to recover data.
true
Use the Windows Vista ____ tool to deal with an immediate hardware or software problem.
Problems Reports and Solutions
If the problem happens in the kernel mode of Windows, a ____ or blue screen error occurs.
STOP
You can quickly identify a problem with memory or eliminate memory as the source of a problem by using
the ____ tool.
Vista Memory Diagnostics
For hardware problems, ____ is a Windows Vista/XP/2000 utility that runs in the background to put stress
on drivers as they are loaded and running.
Driver Verification
The ____ tool displays information about digitally signed files, including device driver files and application
files, and logs information to C:\Windows\Sigverif.txt.
File Signature Verification
The ____ tool can be used to direct information about drivers to a file, including information about digital
signatures
Driver Query
Vista configuration data is stored in the Vista ____ file.
Boot Configuration Data
The Vista Advanced Boot Options menu appears when a user presses ____ as Vista is loading.
F8
Registry settings collectively called the ____ are saved in the registry each time the user successfully logs
onto the system.
Last Known Good Configuration
You can use the Windows RE command prompt window to restore registry files using those saved in the
____ folder.
c:\windows\system32\config\regback
The ____ file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see
what operating systems are available and how to set up the boot.
Boot.ini
The ____ is used when Windows 2000/XP does not start properly or hangs during the load.
Recovery Console
In the Recovery Console, the command ____ deletes a directory.
RD
To retrieve the last command entered in the Recovery Console, press ____ at the command prompt.
F3
To retrieve the command entered in the Recovery Console one character at a time, press the ____ key.
F1
Use the ____ command to repair the file system and recover data from bad sectors.
chkdsk C: /r
Enter the command ____ to see a list of all services currently installed, which includes device drivers.
listsvc
Use the ____ command followed by the name of the service to show the current status of a service.
enable
To move to the root directory, use the command ____.
CD \
A compressed file uses a(n) ____ as the last character in the file extension.
underscore
Most computer problems are simple and easy to solve.
true
Sometimes a Windows update solves a problem with a hardware device.
true
When installing a device, you must always run the setup CD for the device after you physically install the
device.
false
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that
the boot files in the root directory of drive C are missing or corrupted.
true
As you work to solve a Windows problem, always choose the method that makes the most changes to the
system as possible in order to rejuvenate the machine.
false
In the Windows Vista Event Viewer, the ____ log shows only warnings and error events
Administrative Events
Check ____ to verify that a device is enabled and Windows thinks the device should be working.
Device Manager
Errors or warnings in Device Manager are displayed as a ____.
yellow triangle or question mark
To uninstall a program, in Device Manager ____ the device and select Uninstall.
right-click
If you can identify the approximate date the error started and that date is in the recent past, use ____.
system restore
If the system is caught in an endless loop of restarts, boot into ____.
safe mode
For essential hardware devices, use the ____ to verify and replace system files.
system file checker
For Vista, use the ____ tool to search for the problem and suggested solutions.
Problem Reports and Solutions
Reverting to a ____ point can solve problems with registry entries the application uses that have become
corrupted
restore
Use the ____ tool to test memory.
Memory Diagnostic
Press ____ at startup to display the Advanced Boot Options menu.
F8
During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.
\Windows.old
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the
manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation.
hidden partition
When you see the Microsoft progress bar appear, you know the ____, including all critical services and
drivers, has loaded.
Windows kernel
The ____ Configuration is updated after you log on normally to Vista.
Last Known Good
The command ____ searches for and replaces corrupted system files.
sfc /scannow
The key that loads services and drivers can be found in the ____ location.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
The error ____ is caused by a driver or service making an illegal access to memory.
Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL
The error ____ is means a bad driver or service has performed an illegal action.
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
After you boot into Safe Mode, you can use the ____ commands to verify system files, repair, and clean
the hard drive.
SFC, Chkdsk, and Defrag
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
false
When connecting to a network, by default Windows assumes static IP addressing and automatically
configures the network connection.
false
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
true
When connecting to a private and secured wireless access point, you must provide the information that
proves you have the right to use the network.
true
Wireless networks can be secured by broadcasting the name of the wireless access point (called the
Service Set Identifier or SSID).
false
A(n) ____ is a 32-bit string used to identify a computer on a network.
IP Address
The IP addresses available to the Internet are called ____ IP addresses.
public
A ____ IP address is assigned for the current connection only.
dynamic
The ____ command tests connectivity by sending an echo request to a remote computer.
ping
The ____ command can display TCP/IP configuration information and refresh the IP address.
ipconfig
A____ application means one computer (the remote computer) is running the Telnet component and
another computer (the local computer) runs the Telnet component.
client/server
To use ____, you can create user accounts using the Control Panel.
telnet
The solution for securing private data traveling over a public network is a ____.
virtual private network
A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s
IP address is on the same or a different network
subnet mask
A ____ is the connection a computer uses to access another network if it does not have a better option.
default gateway
If the computer you are using is a laptop that moves from one network to another, you can click the
_____ tab and configure static IP address settings for a second network.
alternate configuration
Unless you protect your computer by using strong _____ settings, your computer might get hacked.
firewall
If you select a(n) _____ network, Vista warns you about sending information over it.
unsecured
If you are comfortable with Vista automatically connecting to a particular network in the future, check
_____.
save this network
To verify firewall settings and check for errors, open the _____window.
network and sharing center
The danger in connecting to unknown hotspots is that _____ and hackers might be waiting for unsecured
computers to connect.
ADWARE
If the access point is not broadcasting its SSID, the name of the wireless network will appear as “_____.”
UNNAMED NETWORK
A private and secured wireless access point might be configured for _____ address filtering in order to
control which wireless adapters can use the access point.
MAC
If a network adapter is installed on your computer and you need to know the MAC address, you can open
a command prompt window and enter the command _____.
IPCONFIG/ALL
Wireless networks can be secured by using an encryption key (using _____, WPA, or WPA2 encryption
standards).
WEP
DSL service and an older technology, ISDN, are provided by the local telephone company
TRUE
A DSL installation works very differently than a cable modem installation.
FALSE
An on-demand broadband connection that is not always up requires that a user name and password be
authenticated at the ISP each time you make the connection.
TRUE
When trying to use client/server applications on the Internet, your software and hardware firewalls and
other security settings on the router will automatically allow the communication
FALSE
Many software vendors use FTP sites for downloading software to their customers.
TRUE
In order to activate your service, the cable company must know the ____ of the cable modem you have
installed.
MAC ADDRESS
Most broadband connections today are always up and use ____ IP addressing.
DYNAMIC
The logon for an on-demand broadband connection is managed by a protocol called ____.
PPPoE
Port ____ opens a port when a PC on the network initiates communication through another port.
TRIGGERING
For port forwarding to work, the computer on your network must have a ____ IP Address
STATIC
____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of
your wireless LAN.
ENCRYPTION
When supporting and troubleshooting small networks, you’ll need to use ____ to test the physical
connections of the network.
CABLE TESTERS
To find out what your DNS server knows about the domain name www.microsoft.com, use the ____
command.
nslookup www.microsoft.com
A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a
computer’s IP address.
REVERSE
Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet.
DESKTOP
To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP
addressing.
STATIC
When a Remote ____ session is opened, all local users are logged off.
DESKTOP
Remote ____ can help you support users and their computers from a distance.
ASSISTANCE
A log file is kept of every Remote Assistance session in the ____ folder.
C:\Users\username\Documents\Remote Assistance Logs
Networking happens in ____.
LAYERS
To disconnect a mapped network drive, use the ____ command.
net use z: /delete
The command to flush the DNS cache kept on the computer is ____.
ipconfig /flushdns
If you have a problem with connecting to a secured Web site from a corporate network, you might be
using the wrong ____ server on the network.
PROXY
You can use a regular analog phone as an Internet phone if you use a(n) ____.
ANALOG TELEPHONE ADAPTER
You can use a regular analog phone as an Internet phone if you use a(n) ____.
VoIP PROVIDER
Individuals are always free to decide what security measures they want to use.
False
It’s best to use three-factor authentication.
false
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts
and disable scripts embedded in Web pages, and the ability to set the general security level.
true
Don’t use the same password on more than one system (computer, network, or application).
true
When you are responsible for the security of a computer or small network, make it a habit to check every
computer for which you are responsible every day.
false
The International Organization for Standardization has developed two documents (____), which describe,
in detail, the recommended standards to secure computer resources.
ISO 17799 and ISO 27002
For the health care industry, the ____ includes regulations to secure patient data that apply to all health
care companies and professionals
HIPAA
When implementing a security plan, the four steps are sometimes called the ____.
Plan-Do-Study-Act
Because of the problem of losing encrypted data and Internet passwords when a user password is reset,
each new user should create a password ____ disk for use in the event the user forgets the password.
RESET
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
DIGITAL CERTIFICATE
A ____ is made of several words with spaces allowed.
PASSPHRASE
A(n)____ password means it is not easy to guess by both humans and computer programs designed to
hack passwords.
STRONG
A(n) ____ account has complete access to the system and can make changes that affect the security of
the system and other users.
administrator
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders,
and no access to other users’ data.
LIMITED
Folders and files stored on a workstation or server that contain user data need to be classified as to the
____ assigned to the data.
PERMISSIONS
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
DRIVE
Most encryption software products use a method called ____.
PUBLIC KEY ENCRYPTION
____ is any annoying and unwanted program that might or might not mean you harm.
GRAYWARE
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the
system in secret even after the Trojan has been removed.
BACKDOOR
A ____ virus can hide in either of two boot areas of a hard drive.
BOOT SECTOR
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
MULTIPARTITE
A ____ is a small program contained in a document that can be automatically executed either when the
document is first loaded or later by pressing a key combination.
MACRO
As a defensive and offensive measure to protect against malicious software, install and run ____ software
and keep it current.
antivirus
Generally speaking, the weakest link in setting up security in a computer environment is ____.
PEOPLE
In the computer arena, ____ is the practice of tricking people into giving out private information or
allowing unsafe programs into the network or computer.
SOCIAL ENGINEERING
When controlling access to data folders or files, permissions to these resources are assigned to individual
user accounts or user groups.
TRUE
Allowing users full control of a folder is always required by job requirements.
FALSE
Permissions manually set for a subfolder or file cannot override inherited permissions.
FALSE
It is necessary that all computers belong to the same workgroup in order to share resources.
FALSE
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or
damaged or the BIOS code might be corrupted.
TRUE
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a
shared folder or file.
SIMPLE
When you share folders on the network, the ____ permissions for remote users need to be set.
SHARE
The best way to change inherited permissions is to change the permissions of the ____.
PARENT OBJECT
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the
Advanced Security Settings box.
EFFECTIVE PERMISSIONS
A $ at the end of the folder name creates a(n) ____ share.
HIDDEN
If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista
Start Search box.
\\computername\Financial$
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are
lost.
CIPHER
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a
____ digital certificate to be used for the encryption.
SELF-SIGNED
Certificates are managed using the ____ console.
CERTIFICATE MANAGER
If you cannot access an encrypted file because the certificate is corrupted and there are no backup
certificates, you might be able to recover the file using a(n) ____ certificate.
RECOVERY
Many notebook computers have a chip on the motherboard called the ____.
TPM
____ on a motherboard offers security features including power-on passwords, support for intrusiondetection
devices, and support for a TPM chip.
BIOS
A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or
is only allowed to access certain network resources.
QUARANTINED
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.
VIRUS
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try
searching for suspicious entries in the subkeys under ____.
HKLM\System\CurrentControlSet\Control\SafeBoot
You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or
____.
NETWORK SERVICE
Use ____ to search for malware processes, especially those that mask themselves as core Windows
processes and elude AV software.
TASK MANAGER
To see a list of services managed by Svchost, enter this command in a command-prompt window: ____.
TASKLIST/SVC
The term ____ applies to a kit or set of tools used originally on UNIX computers.
ROOTKIT
In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ account.
ROOT