Shared Flashcard Set

Details

CT mx
N/A
256
Software
07/29/2010

Additional Software Flashcards

 


 

Cards

Term
A(n) operating system is software that controls a computer.
Definition
Term
In 1986, MS-DOS was introduced and quickly became the most popular OS among IBM computers and IBM-compatible computers using the Intel 8086 processors
Definition
Term
A graphical user interface is an interface that uses graphics as compared to a command-driven interface.
Definition
Term
Vista has a new 3D user interface called the Aero user interface.
Definition
Term
A(n) netbook is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive.
Definition
Term
A dual boot makes it possible to boot a computer into one of two installed OSs.
Definition
Term
A(n) shell is the portion of an OS that relates to the user and to applications.
Definition
Term
The OS kernel is responsible for interacting with hardware.
Definition
Term
The executive services interface between the subsystems in user mode and the HAL.
Definition
Term
A thread is a single task, such as the task of printing a file, that the process requests from the kernel.
Definition
Term
Device drivers are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem.
Definition
Term
The taskbar is normally located at the bottom of the Windows desktop, displaying information about open programs and providing quick access to others.
Definition
Term
The system tray is usually on the right side of the taskbar and displays open services.
Definition
Term
A(n) service is a program that runs in the background to support or serve Windows or an application.
Definition
Term
A file extension is one or more characters following the last period in a filename, such as .exe, .txt, or .avi.
Definition
Term
The User Account Control dialog box in Windows Vista appears each time a user attempts to perform an action that can be done only with administrative privileges.
Definition
Term
Windows identifies file types primarily by the file extension .
Definition
Term
Windows offers two ways to sync files: Briefcase and Offline Files .
Definition
Term
From the Properties window, you can change the read-only, hidden, archive, and indexing attributes of the file.
Definition
Term
A(n) index is a list of items that is used to speed up a search
Definition
Term
An applet has a .cpl file extension.
Definition
Term
Upgrading to a better edition of Vista can easily be accomplished by using the Windows Anytime Upgrade feature.
Definition
Term
Use a 64-bit OS if you need increased performance and your system has enough resources to support it.
Definition
Term
Use Device Manager to find out which devices are installed in your XP system.
Definition
Term
A dual boot allows you to install the new OS without disturbing the old one so you can boot to either OS.
Definition
Term
A(n) distribution server is used to hold the setup files on a Windows CD or DVD on the network and then at each PC, you can execute the Setup program on the server.
Definition
Term
A(n) unattended installation is performed by storing the answers to installation questions in a text file or script that Windows calls an answer file.
Definition
Term
A drive image is a copy of the entire volume on which Windows is installed to another bootable media such as CDs or USB drive.
Definition
Term
The Windows utility sysprep.exe is used to remove configuration settings, such as the computer name that uniquely identifies the PC.
Definition
Term
For some brand-name computers, the hard drive contains a hidden recovery partition that can be used to reinstall Windows.
Definition
Term
A virtual computer is software that simulates the hardware of a physical computer.
Definition
Term
The system partition is the active partition of the hard drive.
Definition
Term
A Windows workgroup is a logical group of computers and users that share resources, where administration, resources, and security on a workstation are controlled by that workstation
Definition
Term
A Windows domain is a type of client/server network, which is a network where resources are managed by a centralized computer.
Definition
Term
An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory .
Definition
Term
An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory .
Definition
Term
A Windows domain is a type of client/server network, which is a network where resources are managed by a centralized computer.
Definition
Term
An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory .
Definition
Term
The scanstate command is used to copy the information from the old computer to a server or removable media.
Definition
Term
The loadstate command is used to copy the information to the new computer.
Definition
Term
Product activation is a method used by Microsoft to prevent unlicensed use of its software so that you must purchase a Windows license for each installation of Windows.
Definition
Term
During a normal Windows XP installation, setup causes the system to reboot three times.
Definition
Term
To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use this command at a command prompt: convert D: /FS:NTFS , where D: is the drive to be converted.
Definition
Term
For an always-up broadband connection (such as cable modem or DSL), select Automatic when you configure updates.
Definition
Term
When you configure updates, if the PC doesn’t have an always-up Internet connection (such as dial-up), you might want to select Notify me but don’t automatically download or install them .
Definition
Term
Currently, Microsoft offers four service packs for Windows XP.
Correct Answer(s): False
Definition
Term
Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for a variety of other tasks, so it’s important to delete unneeded files occasionally.
Correct Answer(s): True
Definition
Term
Depending on how fragmented the drive and how large the drive, defragmenting it can take less than an hour or as long as all night.
Correct Answer(s): True
Definition
Term
When a new hard drive is first installed in a system, you must first initialize the disk.
Correct Answer(s): True
Definition
Term
You can install an OS on a spanned or striped volume that uses software RAID.
Correct Answer(s): False
Definition
Term
For Windows XP, use the System Properties box to see which service packs are installed.
Definition
Term
To view and manually install updates, click Start, All Programs, and Windows Updates , and then follow the directions on-screen.
Definition
Term
To protect a system against malicious attack, you need to verify that antivirus software is configured to scan the system regularly and that it is up-to-date.
Definition
Term
Files can end up in fragmented segments all over the drive.
Definition
Term
By default, Vista automatically defrags a drive every Wednesday at 1:00 AM .
Definition
Term
Use the Defrag command to defrag the drive from a command prompt window.
Definition
Term
To make sure the drive is healthy, you need to search for and repair file system errors using the Windows Chkdsk utility.
Definition
Term
A snapshot of the system settings and configuration is called a restore point .
Definition
Term
System Protection creates restore points at regular intervals and just before you install software or hardware.
Definition
Term
When you back up the system state, the registry is also backed up to the folder %SystemRoot%\repair\RegBack .
Definition
Term
Besides backing up user data or system files, you can also back up the entire hard drive using Windows Vista Complete PC Backup .
Definition
Term
The user folder for an account contains a group of subfolders called the user profile namespace .
Definition
Term
If you enter a command and want to terminate its execution before it is finished, you can press Ctrl+Break to do so.
Definition
Term
The MD command creates a subdirectory under a directory.
Definition
Term
A file with a .bat file extension is called a batch file.
Definition
Term
A dynamic disk requires 1 MB of storage for the disk management database.
Definition
Term
You can use Disk Management to convert two or more basic disks to dynamic disks.
Definition
Term
When a hard drive is first sensed by Windows, it is assigned the Basic disk status.
Definition
Term
A disk marked as dynamic can be used with other dynamic disks in a spanned or striped volume.
Definition
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there.
Definition
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there.
Definition
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there.
Definition
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there.
Definition
Term
Windows Vista Ultimate offers language packs through Windows Update .
Definition
Term
You can edit the registry and create a restore point while in Safe Mode.
Correct Answer(s): False
Definition
Term
Windows Vista tracks issues that are interfering with performance.
Correct Answer(s): True
Definition
Term
The indexing service of Windows indexer has a high priority and takes precedence over other programs.
Correct Answer(s): False
Definition
Term
If you notice that performance slows after a system has been up and running without a restart for some time, suspect a memory leak.

Correct Answer(s): True
Definition
Term
Editing the registry can be dangerous, so do this with caution and be sure to back up first!

Correct Answer(s): True
Definition
Term
The Processes tab of Task Manager lists system services and other processes associated with applications, together with how much CPU time and memory the process uses.
Definition
Term
To stop a process using Task Manager, select the process and click End Process.
Definition
Term
If your desktop locks up, you can use Task Manager to refresh it.
Definition
Term
The Performance tab in Task Manager provides details about how a program uses system resources.
Definition
Term
The Networking tab in Task Manager lets you monitor network activity and bandwidth used.
Definition
Term
The Users tab in Task Manager shows all users currently logged on the system.
Definition
Term
You can use the System Configuration Utility to find out what processes are launched at startup and to temporarily disable a process from loading.
Definition
Term
Microsoft Management Console is a Windows utility that can be used to build your own customized console windows.
Definition
Term
A(n) console is a single window that contains one or more administrative tools such as Device Manager or Disk Management.
Definition
Term
In a console, the individual tools are called snap-ins.
Definition
Term
A console is saved in a file with an .msc file extension.
Definition
Term
Device Manager reads data from the HKLM\HARDWARE key to build the information it displays about hardware configurations.
Definition
Term
Windows Experience Index, under Windows Vista, is a summary index designed to measure the overall performance of a system.
Definition
Term
To make sure that all hardware or software installed on the system is compatible with Windows Vista, use the Vista Upgrade Advisor.
Definition
Term
You can use the System Information Utility to find information about the installed processor and its speed, how much RAM is installed, and free space on the hard drive.
Definition
Term
The Windows indexer is responsible for maintaining an index of files and folders on a hard drive to speed up Windows searches.
Definition
Term
The UAC box can protect your system against users making unauthorized changes and against malware installing itself without your knowledge.
Definition
Term
To find out if programs and services are slowing down Windows startup, boot the system in Safe Mode and watch to see if performance improves.
Definition
Term
You can use the MSconfig utility to zero in on the service or other program that is slowing down startup.
Definition
Term
Most programs written for Windows have a(n) uninstall routine which can be accessed from the Vista Programs and Features applet in the Control Panel, the XP Add Remove Programs applet in the Control Panel, or a utility in the All Programs menu.
Definition
Term
If a system is giving repeated startup errors or you have just removed several programs, you might want to search through registry keys for processes left there by uninstalled or corrupted software that might be giving startup problems.
Definition
Term
Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as application errors, user errors, or other hardware component errors.
Correct Answer(s): True
Definition
Term
Driver Verifier attempts to overload the drivers it monitors, which can cause a memory error.
Correct Answer(s): False
Definition
Term
If Driver Verifier runs for a few days and has still not found the problem, it probably will not help you.
Correct Answer(s): True
Definition
Term
Using Windows Vista, you can use Device Manager without responding correctly to the UAC box.
Correct Answer(s): False
Definition
Term
If your hard drive is corrupted, you still might be able to recover data.
Correct Answer(s): True
Definition
Term
Use the Windows Vista Problem Reports and Solutions tool to deal with an immediate hardware or software problem.
Definition
Term
If a problem happens in the kernel mode of Windows, a STOP or blue screen error occurs.
Definition
Term
You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the Vista Memory Diagnostics tool.
Definition
Term
For hardware problems, Driver Verifier is a Windows Vista/XP/2000 utility that runs in the background to put stress on drivers as they are loaded and running.
Definition
Term
The File Signature Verification tool displays information about digitally signed files, including device driver files and application files, and logs information to C:\Windows\Sigverif.txt.
Definition
Term
The Driver Query tool can be used to direct information about drivers to a file, including information about digital signatures.
Definition
Term
Vista configuration data is stored in the Vista Boot Configuration Data file.
Definition
Term
The Vista Advanced Boot Options menu appears when a user presses F8 as Vista is loading.
Definition
Term
Registry settings collectively called the Last Known Good Configuration are saved in the registry each time the user successfully logs onto the system.
Definition
Term
You can use the Windows RE command prompt window to restore registry files using those saved in the c:\windows\system32\config\regback folder.
Definition
Term
The Boot.ini file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see what operating systems are available and how to set up the boot.
Definition
Term
The Recovery Console is used when Windows 2000/XP does not start properly or hangs during the load.
Definition
Term
In the Recovery Console, the command RD deletes a directory.
Definition
Term
To retrieve the last command entered in the Recovery Console, press F3 at the command prompt.
Definition
Term
To retrieve the command entered in the Recovery Console one character at a time, press the F1 key.
Definition
Term
Use the chkdsk C: /r command to repair the file system and recover data from bad sectors.
Definition
Term
Enter the command listsvc to see a list of all services currently installed, which includes device drivers.
Definition
Term
Use the Enable command followed by the name of the service to show the current status of a service.
Definition
Term
To move to the root directory, use the command CD \ .
Definition
Term
A compressed file uses a(n) underscore as the last character in the file extension.
Definition
Term
Use the Expand command to extract .cab files.
Definition
Term
Most computer problems are simple and easy to solve.
Correct Answer(s) True
Definition
Term
Sometimes a Windows update solves a problem with a hardware device.
Correct Answer(s): True
Definition
Term
When installing a device, you must always run the setup CD for the device after you physically install the device.
Correct Answer(s): False
Definition
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted.
Correct Answer(s): True
Definition
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
Correct Answer(s): False
Definition
Term
In Event Viewer, the Administrative Events log shows only warnings and error events
Definition
Term
Check Device Manager to verify that a device is enabled and Windows thinks the device should be working.
Definition
Term
Errors or warnings in Device Manager are displayed as a yellow triangle or question mark.
Definition
Term
To uninstall a program, in Device Manager right-click the device and select Uninstall.
Definition
Term
If you can identify the approximate date the error started and that date is in the recent past, use System Restore.
Definition
Term
If the system is caught in an endless loop of restarts, boot into Safe Mode.
Definition
Term
For essential hardware devices, use the System File Checker to verify and replace system files.
Definition
Term
For Vista, use the Problem Reports and Solutions tool to search for the problem and suggested solutions.
Definition
Term
Reverting to a restore point can solve problems with registry entries the application uses that have become corrupted.
Definition
Term
Use the Memory Diagnostics tool to test memory.
Definition
Term
Press F8 at startup to display the Advanced Boot Options menu.
Definition
Term
During a reinstallation, Vista setup will move all folders of the old installation into the \Windows.old folder.
Definition
Term
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a hidden partition on the hard drive that can be used to recover the Windows installation.
Definition
Term
When you see the Microsoft progress bar appear, you know the Windows kernel, including all critical services and drivers, has loaded.
Definition
Term
The Last Known Good Configuration is updated after you log on normally to Vista.
Definition
Term
The command sfc /scannow searches for and replaces corrupted system files.
Definition
Term
The key that loads services and drivers can be found in the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services location.
Definition
Term
The error Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL is caused by a driver or service making an illegal access to memory.
Definition
Term
The error Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED means a bad driver or service has performed an illegal action.
Definition
Term
After you boot into Safe Mode, you can use the SFC, Chkdsk, and Defrag commands to verify system files and clean the hard drive.
Definition
Term
For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by the computer manufacturer.
Definition
Term
Latency is measured by the round-trip time it takes for a data packet to travel from source to destination and back to source.
Correct Answer(s): True
Definition
Term
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Correct Answer(s): False
Definition
Term
When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection.
Correct Answer(s): False
Definition
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
Correct Answer(s): True
Definition
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
Correct Answer(s): True
Definition
Term
Delays in network transmissions are called latency.
Definition
Term
To connect to the Internet, a network first connects to an Internet Service Provider.
Definition
Term
For almost all networks today, including the Internet, the communication protocol used is called TCP/IP.
Definition
Term
Fiber optic technology uses a dedicated line from your ISP to your place of business or residence.
Definition
Term
Apple Computer calls 802.11b AirPort.
Definition
Term
The three main protocols for encryption for 802.11 wireless networks are WEP, WPA, and WPA2.
Definition
Term
The base station for a cellular network is a fixed transceiver and antenna.
Definition
Term
All wireless phone systems, including cellular, use full-duplex transmission, which means both people in a conversation can talk or transmit at the same time.
Definition
Term
Bluetooth is a standard for short-range wireless communication and data synchronization between devices.
Definition
Term
Twisted-pair cable is the most popular cabling method for local networks.
Definition
Term
A router is a device that manages traffic between two networks.
Definition
Term
A(n) IP address is a 32-bit string used to identify a computer on a network.
Definition
Term
The IP addresses available to the Internet are called public IP addresses.
Definition
Term
A dynamic IP address is assigned for the current connection only.
Definition
Term
The ping command tests connectivity by sending an echo request to a remote computer.
Definition
Term
The ipconfig command can display TCP/IP configuration information and refresh the IP address.
Definition
Term
A client/server application means one computer (the remote computer) is running the Telnet server and another computer (the local computer) runs the Telnet client.
Definition
Term
To use Telnet, you can create user accounts using the Control Panel.
Definition
Term
The solution for securing private data traveling over a public network is a virtual private network.
Definition
Term
A(n) subnet mask is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network.
Definition
Term
A default gateway is the gateway a computer uses to access another network if it does not have a better option.
Definition
Term
DSL service and an older technology, ISDN, are provided by the local telephone company.
Correct Answer(s): True
Definition
Term
A DSL installation works very differently than a cable modem installation.
Correct Answer(s): False
Definition
Term
An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection.
Correct Answer(s): True
Definition
Term
When trying to use client/server applications on the Internet, your software and hardware firewalls and other security settings on the router will automatically allow the communication.
Correct Answer(s): False
Definition
Term
Many software vendors use FTP sites for downloading software to their customers.
Correct Answer(s): True
Definition
Term
In order to activate your service, the cable company must know the MAC address of the cable modem you have installed.
Definition
Term
Most broadband connections today are always up and use dynamic IP addressing.
Definition
Term
The logon for an on-demand broadband connection is managed by a protocol called PPPoE.
Definition
Term
Port triggering opens a port when a PC on the network initiates communication through another port.
Definition
Term
For port forwarding to work, the computer on your network must have a static IP Address.
Definition
Term
Encryption is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN.
Definition
Term
When supporting and troubleshooting small networks, you’ll need to use cable testers to test the physical connections of the network.
Definition
Term
To find out what your DNS server knows about the domain name www.microsoft.com, use the nslookup www.microsoft.com command.
Definition
Term
A(n) reverse lookup is when you use the Nslookup command to find the host name when you know a computer’s IP address.
Definition
Term
Remote Desktop gives a user access to his or her Windows desktop from anywhere on the Internet.
Definition
Term
To prepare a computer to serve up Remote Desktop, you need to configure the computer for static IP addressing.
Definition
Term
When a Remote Desktop session is opened, all local users are logged off.
Definition
Term
Remote Assistance can help you support users and their computers from a distance.
Definition
Term
A log file is kept of every Remote Assistance session in the C:\Users\username\Documents\Remote Assistance Logs folder.
Definition
Term
Networking happens in layers.
Definition
Term
To disconnect a mapped network drive, use the net use z: /delete command.
Definition
Term
The command to flush the DNS cache kept on the computer is ipconfig /flushdns.
Definition
Term
If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong proxy server on the network.
Definition
Term
You can use a regular analog phone as an Internet phone if you use a(n) Analog Telephone Adapter.
Definition
Term
When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the VoIP provider.
Definition
Term
Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ferrite clamp attached.
Definition
Term
Individuals are always free to decide what security measures they want to use.
Correct Answer(s): False
Definition
Term
It’s best to use three-factor authentication.
Correct Answer(s): False
Definition
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
Correct Answer(s): True
Definition
Term
Don’t use the same password on more than one system (computer, network, or application).
Correct Answer(s): True
Definition
Term
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
Correct Answer(s): False
Definition
Term
The International Organization for Standardization has developed two documents (ISO 17799 and ISO 27002), which describe, in detail, the recommended standards to secure computer resources.
Definition
Term
For the health care industry, the HIPAA includes regulations to secure patient data that apply to all health care companies and professionals.
Definition
Term
When implementing a security plan, the four steps are sometimes called the Plan-Do-Study-Act.
Definition
Term
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password reset disk for use in the event the user forgets the password.
Definition
Term
A digital certificate is assigned by a Certification Authority, and is used to prove you are who you say you are.
Definition
Term
A passphrase is made of several words with spaces allowed.
Definition
Term
A(n) strong password means it is not easy to guess by both humans and computer programs designed to hack passwords.
Definition
Term
A(n) administrator account has complete access to the system and can make changes that affect the security of the system and other users.
Definition
Term
A(n) limited account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.
Definition
Term
Folders and files stored on a workstation or server that contain user data need to be classified as to the permissions assigned to the data.
Definition
Term
A network drive map is one of the most powerful and versatile methods of communicating over a network.
Definition
Term
Most encryption software products use a method called Public Key Encryption.
Definition
Term
Grayware is any annoying and unwanted program that might or might not mean you harm.
Definition
Term
A Trojan sometimes installs a backdoor in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
Definition
Term
A boot sector virus can hide in either of two boot areas of a hard drive.
Definition
Term
A multipartite virus is a combination of a boot sector virus and a file virus and can hide in either.
Definition
Term
A macro is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
Definition
Term
As a defensive and offensive measure to protect against malicious software, install and run antivirus software and keep it current.
Definition
Term
Generally speaking, the weakest link in setting up security in a computer environment is people.
Definition
Term
In the computer arena, social engineering is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
Definition
Term
Most hard drive manufacturers offer a zero-fill utility used to wipe clean all data on the drive.
Definition
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups.
Correct Answer(s): True
Definition
Term
Allowing users full control of a folder is always required by job requirements.
Correct Answer(s): False
Definition
Term
Permissions manually set for a subfolder or file cannot override inherited permissions.
Correct Answer(s): False
Definition
Term
It is necessary that all computers belong to the same workgroup in order to share resources.
Correct Answer(s): False
Definition
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
Correct Answer(s): True
Definition
Term
Windows XP uses simple file sharing by default, which means you have no control over who has access to a shared folder or file.
Definition
Term
When you share folders on the network, the share permissions for remote users need to be set.
Definition
Term
The best way to change inherited permissions is to change the permissions of the parent object.
Definition
Term
To know for sure exactly which permissions for a file or folder are in effect, see the Effective Permissions tab of the Advanced Security Settings box.
Definition
Term
A $ at the end of the folder name creates a(n) hidden share.
Definition
Term
If you name a shared folder Financial$, in order to access the folder, a user must enter \\computername\Financial$ in the Vista Start Search box.
Definition
Term
The Cipher command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.
Definition
Term
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a self-signed digital certificate to be used for the encryption.
Definition
Term
Certificates are managed using the Certificate Manager console.
Definition
Term
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) recovery certificate.
Definition
Term
Many notebook computers have a chip on the motherboard called the TPM.
Definition
Term
BIOS on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.
Definition
Term
A(n) quarantined computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources.
Definition
Term
AV software detects a known virus by looking for distinguishing characteristics called virus signatures.
Definition
Term
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under HKLM\System\CurrentControlSet\Control\SafeBoot.
Definition
Term
You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or Network Service .
Definition
Term
Use Task Manager to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.
Definition
Term
To see a list of services managed by Svchost, enter this command in a command-prompt window: tasklist /SVC.
Definition
Term
The term rootkit applies to a kit or set of tools used originally on UNIX computers.
Definition
Term
In UNIX, the lowest and most powerful level of UNIX accounts is called the root account.
Definition
Term
A rootkit running in user mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
Definition