• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back
When using UAC, which of the following requires administrative permissions or rights?
a - installing updates from windows update
b - changing the date and time
c - resetting the network adapter
d - installing drivers
a - UAC
What host-based firewall software comes with current versions of Windows?
a - Windows Firewall
b - Windows Protected Mode
c - UAC
d - Windows GuardIT
a - Windows Firewall
SMTP uses TCP port
a - 43
b - 25
c - 80
d - 443
b - 25
What program would you use to configure IPsec on a computer running windows server 08?
a - Windows Firewall with IPsec plugin
b - IPsec monitor
c - windows with advanced security
d - IPsec configuration console
C
Pg 143
How many content zones are there in IE?
1
2
4
8
There are 4
If you want to control what updates get pushed to clients you would use what two programs?
WSUS - Windows Server Update Service or SCCM - System Center Configuration Manager. Either system gives the ability to test patches, schedule updates, and prioritize client updates.
Pg 139
___________ is an email validation system designed to verify that an email is coming from the proper email server and thereby prevent spam messages.
SPF - Sender Policy Framework
Pg 149
As an IT administrator, how would you make sure company programmers are unable to create backdoors in the programs they create for the company?
A review and auditing process needs to be in place where programmers are audited by their peers. That way it would require a minimum of two programmers going rogue for any backdoor to slip through (much less likely than one).
Give an example of a virus hoax.
A message, popup, or email instructing the user to delete the win.com file because it's a virus.

A message instructs the user to avoid clicking on, downloading, or installing "Windows Live Update" because it is really a virus in disguise and will "burn the hard drive" and "destroy sector zero of the hard drive." It says McAfee discovered the virus which is untrue.