• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
On a peer-to-peer network, authentication is the responsibility of the domain.
t/f
false
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
t/f
true
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
t/f
false
Using Group Policy, you can set security policies to help secure a workstation.
t/f
true
It’s usually a good idea to run several anti-malware programs at the same time on your computer.
t/f
false
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Ctrl+Alt+Delete
Which of the following is true about the Guest account in Windows 7?
Question options:

1) it is disabled by default

2) it automatically has a complex password

3) you cannot rename it

4) it has administrative access
it is disabled by default
Which of the following is true about passwords.
Question options:

1) it’s best to write your password down so you don’t get locked out of your computer

2) passwords cannot be longer than 14 characters

3)
by default, accounts with a blank password cannot logon remotely


4) letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’
by default, accounts with a blank password cannot logon remotely
Which of the following is true about the Windows Encrypted File System?
Question options:

1) files can be marked for encryption, but not folders

2)
an encrypted file moved to an unencrypted folder remains encrypted


3) EFS only works on NTFS and FAT32

4) you need to download special software to use EFS
an encrypted file moved to an unencrypted folder remains encrypted
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?

Question options:

1) you can rename default user accounts

2) you can require user accounts to have non-blank passwords

3)
you can use gpedit.msc to see if any policies conflict


4) you can disable logon scripts
you can use gpedit.msc to see if any policies conflict
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
a TPM chip on the motherboard
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
the BIOS
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
smart card
An RFID badge is related to which type of authentication method?
smart card
A privacy filter is used for what aspect of security?
screen viewing
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
Question options:

1) ATA Secure Erase

2) low-level format

3)
degausser


4) magnetic data filter
degausser
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
tailgating
Which type of malware hides in the MBR program of a hard drive?
boot sector virus
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
rootkit
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
bootrec /fixboot
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Process Explorer
Which of the following are methods to lock down a workstation in Windows 7? (Choose all that apply.)
Question options:

1) press Ctrl+End and click Logon Screen

2) press Windows key + L

3) press Ctrl+Alt+Delete and click Lock this Computer

4) Press F1 and click Sleep
press Windows key + L

3) press Ctrl+Alt+Delete and click Lock this Computer
Which of the following are true about Windows Firewall? (Choose all that apply.)

Question options:

1) it is a personal firewall

2) it is configured when you set your network location

3) once configured, you can only change settings by changing your network location

4) it can only protect a computer from attacks coming from remote networks
1) it is a personal firewall

2) it is configured when you set your network location
Which are among the ways you can use BitLocker Encryption? (Choose all that apply.)
Question options:

1) computer authentication using TPM

2) user authentication using a certificate

3) user authentication using a USB flash drive

4) computer and user authentication using a PIN and TPM
1) computer authentication using TPM
3) user authentication using a USB flash drive

4) computer and user authentication using a PIN and TPM
Which of the following would be considered an input to a biometric device? (Choose all that apply.)
Question options:

1) keystrokes

2) retina

3) fingerprint

4) voice
2) retina

3) fingerprint

4) voice
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network’s computers.
layered
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
locking down
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
guest
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired and/or wireless network.
quarantined
Windows _______________ is antispyware included in Windows 7/Vista.
defender