Term
| A(n) operating system is software that controls a computer. |
|
Definition
|
|
Term
| In 1986, MS-DOS was introduced and quickly became the most popular OS among IBM computers and IBM-compatible computers using the Intel 8086 processors |
|
Definition
|
|
Term
| A graphical user interface is an interface that uses graphics as compared to a command-driven interface. |
|
Definition
|
|
Term
| Vista has a new 3D user interface called the Aero user interface. |
|
Definition
|
|
Term
| A(n) netbook is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive. |
|
Definition
|
|
Term
| A dual boot makes it possible to boot a computer into one of two installed OSs. |
|
Definition
|
|
Term
| A(n) shell is the portion of an OS that relates to the user and to applications. |
|
Definition
|
|
Term
| The OS kernel is responsible for interacting with hardware. |
|
Definition
|
|
Term
| The executive services interface between the subsystems in user mode and the HAL. |
|
Definition
|
|
Term
| A thread is a single task, such as the task of printing a file, that the process requests from the kernel. |
|
Definition
|
|
Term
| Device drivers are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem. |
|
Definition
|
|
Term
| The taskbar is normally located at the bottom of the Windows desktop, displaying information about open programs and providing quick access to others. |
|
Definition
|
|
Term
| The system tray is usually on the right side of the taskbar and displays open services. |
|
Definition
|
|
Term
| A(n) service is a program that runs in the background to support or serve Windows or an application. |
|
Definition
|
|
Term
| A file extension is one or more characters following the last period in a filename, such as .exe, .txt, or .avi. |
|
Definition
|
|
Term
| The User Account Control dialog box in Windows Vista appears each time a user attempts to perform an action that can be done only with administrative privileges. |
|
Definition
|
|
Term
| Windows identifies file types primarily by the file extension . |
|
Definition
|
|
Term
| Windows offers two ways to sync files: Briefcase and Offline Files . |
|
Definition
|
|
Term
| From the Properties window, you can change the read-only, hidden, archive, and indexing attributes of the file. |
|
Definition
|
|
Term
| A(n) index is a list of items that is used to speed up a search |
|
Definition
|
|
Term
| An applet has a .cpl file extension. |
|
Definition
|
|
Term
| Upgrading to a better edition of Vista can easily be accomplished by using the Windows Anytime Upgrade feature. |
|
Definition
|
|
Term
| Use a 64-bit OS if you need increased performance and your system has enough resources to support it. |
|
Definition
|
|
Term
| Use Device Manager to find out which devices are installed in your XP system. |
|
Definition
|
|
Term
| A dual boot allows you to install the new OS without disturbing the old one so you can boot to either OS. |
|
Definition
|
|
Term
| A(n) distribution server is used to hold the setup files on a Windows CD or DVD on the network and then at each PC, you can execute the Setup program on the server. |
|
Definition
|
|
Term
| A(n) unattended installation is performed by storing the answers to installation questions in a text file or script that Windows calls an answer file. |
|
Definition
|
|
Term
| A drive image is a copy of the entire volume on which Windows is installed to another bootable media such as CDs or USB drive. |
|
Definition
|
|
Term
| The Windows utility sysprep.exe is used to remove configuration settings, such as the computer name that uniquely identifies the PC. |
|
Definition
|
|
Term
| For some brand-name computers, the hard drive contains a hidden recovery partition that can be used to reinstall Windows. |
|
Definition
|
|
Term
| A virtual computer is software that simulates the hardware of a physical computer. |
|
Definition
|
|
Term
| The system partition is the active partition of the hard drive. |
|
Definition
|
|
Term
| A Windows workgroup is a logical group of computers and users that share resources, where administration, resources, and security on a workstation are controlled by that workstation |
|
Definition
|
|
Term
| A Windows domain is a type of client/server network, which is a network where resources are managed by a centralized computer. |
|
Definition
|
|
Term
| An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory . |
|
Definition
|
|
Term
| An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory . |
|
Definition
|
|
Term
| A Windows domain is a type of client/server network, which is a network where resources are managed by a centralized computer. |
|
Definition
|
|
Term
| An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory . |
|
Definition
|
|
Term
| The scanstate command is used to copy the information from the old computer to a server or removable media. |
|
Definition
|
|
Term
| The loadstate command is used to copy the information to the new computer. |
|
Definition
|
|
Term
| Product activation is a method used by Microsoft to prevent unlicensed use of its software so that you must purchase a Windows license for each installation of Windows. |
|
Definition
|
|
Term
| During a normal Windows XP installation, setup causes the system to reboot three times. |
|
Definition
|
|
Term
| To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use this command at a command prompt: convert D: /FS:NTFS , where D: is the drive to be converted. |
|
Definition
|
|
Term
| For an always-up broadband connection (such as cable modem or DSL), select Automatic when you configure updates. |
|
Definition
|
|
Term
| When you configure updates, if the PC doesn’t have an always-up Internet connection (such as dial-up), you might want to select Notify me but don’t automatically download or install them . |
|
Definition
|
|
Term
Currently, Microsoft offers four service packs for Windows XP. Correct Answer(s): False |
|
Definition
|
|
Term
Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for a variety of other tasks, so it’s important to delete unneeded files occasionally. Correct Answer(s): True |
|
Definition
|
|
Term
Depending on how fragmented the drive and how large the drive, defragmenting it can take less than an hour or as long as all night. Correct Answer(s): True |
|
Definition
|
|
Term
When a new hard drive is first installed in a system, you must first initialize the disk. Correct Answer(s): True |
|
Definition
|
|
Term
You can install an OS on a spanned or striped volume that uses software RAID. Correct Answer(s): False |
|
Definition
|
|
Term
| For Windows XP, use the System Properties box to see which service packs are installed. |
|
Definition
|
|
Term
| To view and manually install updates, click Start, All Programs, and Windows Updates , and then follow the directions on-screen. |
|
Definition
|
|
Term
| To protect a system against malicious attack, you need to verify that antivirus software is configured to scan the system regularly and that it is up-to-date. |
|
Definition
|
|
Term
| Files can end up in fragmented segments all over the drive. |
|
Definition
|
|
Term
| By default, Vista automatically defrags a drive every Wednesday at 1:00 AM . |
|
Definition
|
|
Term
| Use the Defrag command to defrag the drive from a command prompt window. |
|
Definition
|
|
Term
| To make sure the drive is healthy, you need to search for and repair file system errors using the Windows Chkdsk utility. |
|
Definition
|
|
Term
| A snapshot of the system settings and configuration is called a restore point . |
|
Definition
|
|
Term
| System Protection creates restore points at regular intervals and just before you install software or hardware. |
|
Definition
|
|
Term
| When you back up the system state, the registry is also backed up to the folder %SystemRoot%\repair\RegBack . |
|
Definition
|
|
Term
| Besides backing up user data or system files, you can also back up the entire hard drive using Windows Vista Complete PC Backup . |
|
Definition
|
|
Term
| The user folder for an account contains a group of subfolders called the user profile namespace . |
|
Definition
|
|
Term
| If you enter a command and want to terminate its execution before it is finished, you can press Ctrl+Break to do so. |
|
Definition
|
|
Term
| The MD command creates a subdirectory under a directory. |
|
Definition
|
|
Term
| A file with a .bat file extension is called a batch file. |
|
Definition
|
|
Term
| A dynamic disk requires 1 MB of storage for the disk management database. |
|
Definition
|
|
Term
| You can use Disk Management to convert two or more basic disks to dynamic disks. |
|
Definition
|
|
Term
| When a hard drive is first sensed by Windows, it is assigned the Basic disk status. |
|
Definition
|
|
Term
| A disk marked as dynamic can be used with other dynamic disks in a spanned or striped volume. |
|
Definition
|
|
Term
| If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
| If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
| If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
| If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
| Windows Vista Ultimate offers language packs through Windows Update . |
|
Definition
|
|
Term
You can edit the registry and create a restore point while in Safe Mode. Correct Answer(s): False |
|
Definition
|
|
Term
Windows Vista tracks issues that are interfering with performance. Correct Answer(s): True |
|
Definition
|
|
Term
The indexing service of Windows indexer has a high priority and takes precedence over other programs. Correct Answer(s): False |
|
Definition
|
|
Term
If you notice that performance slows after a system has been up and running without a restart for some time, suspect a memory leak. Correct Answer(s): True |
|
Definition
|
|
Term
Editing the registry can be dangerous, so do this with caution and be sure to back up first! Correct Answer(s): True |
|
Definition
|
|
Term
| The Processes tab of Task Manager lists system services and other processes associated with applications, together with how much CPU time and memory the process uses. |
|
Definition
|
|
Term
| To stop a process using Task Manager, select the process and click End Process. |
|
Definition
|
|
Term
| If your desktop locks up, you can use Task Manager to refresh it. |
|
Definition
|
|
Term
| The Performance tab in Task Manager provides details about how a program uses system resources. |
|
Definition
|
|
Term
| The Networking tab in Task Manager lets you monitor network activity and bandwidth used. |
|
Definition
|
|
Term
| The Users tab in Task Manager shows all users currently logged on the system. |
|
Definition
|
|
Term
| You can use the System Configuration Utility to find out what processes are launched at startup and to temporarily disable a process from loading. |
|
Definition
|
|
Term
| Microsoft Management Console is a Windows utility that can be used to build your own customized console windows. |
|
Definition
|
|
Term
| A(n) console is a single window that contains one or more administrative tools such as Device Manager or Disk Management. |
|
Definition
|
|
Term
| In a console, the individual tools are called snap-ins. |
|
Definition
|
|
Term
| A console is saved in a file with an .msc file extension. |
|
Definition
|
|
Term
| Device Manager reads data from the HKLM\HARDWARE key to build the information it displays about hardware configurations. |
|
Definition
|
|
Term
| Windows Experience Index, under Windows Vista, is a summary index designed to measure the overall performance of a system. |
|
Definition
|
|
Term
| To make sure that all hardware or software installed on the system is compatible with Windows Vista, use the Vista Upgrade Advisor. |
|
Definition
|
|
Term
| You can use the System Information Utility to find information about the installed processor and its speed, how much RAM is installed, and free space on the hard drive. |
|
Definition
|
|
Term
| The Windows indexer is responsible for maintaining an index of files and folders on a hard drive to speed up Windows searches. |
|
Definition
|
|
Term
| The UAC box can protect your system against users making unauthorized changes and against malware installing itself without your knowledge. |
|
Definition
|
|
Term
| To find out if programs and services are slowing down Windows startup, boot the system in Safe Mode and watch to see if performance improves. |
|
Definition
|
|
Term
| You can use the MSconfig utility to zero in on the service or other program that is slowing down startup. |
|
Definition
|
|
Term
| Most programs written for Windows have a(n) uninstall routine which can be accessed from the Vista Programs and Features applet in the Control Panel, the XP Add Remove Programs applet in the Control Panel, or a utility in the All Programs menu. |
|
Definition
|
|
Term
| If a system is giving repeated startup errors or you have just removed several programs, you might want to search through registry keys for processes left there by uninstalled or corrupted software that might be giving startup problems. |
|
Definition
|
|
Term
Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as application errors, user errors, or other hardware component errors. Correct Answer(s): True |
|
Definition
|
|
Term
Driver Verifier attempts to overload the drivers it monitors, which can cause a memory error. Correct Answer(s): False |
|
Definition
|
|
Term
If Driver Verifier runs for a few days and has still not found the problem, it probably will not help you. Correct Answer(s): True |
|
Definition
|
|
Term
Using Windows Vista, you can use Device Manager without responding correctly to the UAC box. Correct Answer(s): False |
|
Definition
|
|
Term
If your hard drive is corrupted, you still might be able to recover data. Correct Answer(s): True |
|
Definition
|
|
Term
| Use the Windows Vista Problem Reports and Solutions tool to deal with an immediate hardware or software problem. |
|
Definition
|
|
Term
| If a problem happens in the kernel mode of Windows, a STOP or blue screen error occurs. |
|
Definition
|
|
Term
| You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the Vista Memory Diagnostics tool. |
|
Definition
|
|
Term
| For hardware problems, Driver Verifier is a Windows Vista/XP/2000 utility that runs in the background to put stress on drivers as they are loaded and running. |
|
Definition
|
|
Term
| The File Signature Verification tool displays information about digitally signed files, including device driver files and application files, and logs information to C:\Windows\Sigverif.txt. |
|
Definition
|
|
Term
| The Driver Query tool can be used to direct information about drivers to a file, including information about digital signatures. |
|
Definition
|
|
Term
| Vista configuration data is stored in the Vista Boot Configuration Data file. |
|
Definition
|
|
Term
| The Vista Advanced Boot Options menu appears when a user presses F8 as Vista is loading. |
|
Definition
|
|
Term
| Registry settings collectively called the Last Known Good Configuration are saved in the registry each time the user successfully logs onto the system. |
|
Definition
|
|
Term
| You can use the Windows RE command prompt window to restore registry files using those saved in the c:\windows\system32\config\regback folder. |
|
Definition
|
|
Term
| The Boot.ini file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see what operating systems are available and how to set up the boot. |
|
Definition
|
|
Term
| The Recovery Console is used when Windows 2000/XP does not start properly or hangs during the load. |
|
Definition
|
|
Term
| In the Recovery Console, the command RD deletes a directory. |
|
Definition
|
|
Term
| To retrieve the last command entered in the Recovery Console, press F3 at the command prompt. |
|
Definition
|
|
Term
| To retrieve the command entered in the Recovery Console one character at a time, press the F1 key. |
|
Definition
|
|
Term
| Use the chkdsk C: /r command to repair the file system and recover data from bad sectors. |
|
Definition
|
|
Term
| Enter the command listsvc to see a list of all services currently installed, which includes device drivers. |
|
Definition
|
|
Term
| Use the Enable command followed by the name of the service to show the current status of a service. |
|
Definition
|
|
Term
| To move to the root directory, use the command CD \ . |
|
Definition
|
|
Term
| A compressed file uses a(n) underscore as the last character in the file extension. |
|
Definition
|
|
Term
| Use the Expand command to extract .cab files. |
|
Definition
|
|
Term
Most computer problems are simple and easy to solve. Correct Answer(s) True |
|
Definition
|
|
Term
Sometimes a Windows update solves a problem with a hardware device. Correct Answer(s): True |
|
Definition
|
|
Term
When installing a device, you must always run the setup CD for the device after you physically install the device. Correct Answer(s): False |
|
Definition
|
|
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted. Correct Answer(s): True |
|
Definition
|
|
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. Correct Answer(s): False |
|
Definition
|
|
Term
| In Event Viewer, the Administrative Events log shows only warnings and error events |
|
Definition
|
|
Term
| Check Device Manager to verify that a device is enabled and Windows thinks the device should be working. |
|
Definition
|
|
Term
| Errors or warnings in Device Manager are displayed as a yellow triangle or question mark. |
|
Definition
|
|
Term
| To uninstall a program, in Device Manager right-click the device and select Uninstall. |
|
Definition
|
|
Term
| If you can identify the approximate date the error started and that date is in the recent past, use System Restore. |
|
Definition
|
|
Term
| If the system is caught in an endless loop of restarts, boot into Safe Mode. |
|
Definition
|
|
Term
| For essential hardware devices, use the System File Checker to verify and replace system files. |
|
Definition
|
|
Term
| For Vista, use the Problem Reports and Solutions tool to search for the problem and suggested solutions. |
|
Definition
|
|
Term
| Reverting to a restore point can solve problems with registry entries the application uses that have become corrupted. |
|
Definition
|
|
Term
| Use the Memory Diagnostics tool to test memory. |
|
Definition
|
|
Term
| Press F8 at startup to display the Advanced Boot Options menu. |
|
Definition
|
|
Term
| During a reinstallation, Vista setup will move all folders of the old installation into the \Windows.old folder. |
|
Definition
|
|
Term
| If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a hidden partition on the hard drive that can be used to recover the Windows installation. |
|
Definition
|
|
Term
| When you see the Microsoft progress bar appear, you know the Windows kernel, including all critical services and drivers, has loaded. |
|
Definition
|
|
Term
| The Last Known Good Configuration is updated after you log on normally to Vista. |
|
Definition
|
|
Term
| The command sfc /scannow searches for and replaces corrupted system files. |
|
Definition
|
|
Term
| The key that loads services and drivers can be found in the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services location. |
|
Definition
|
|
Term
| The error Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL is caused by a driver or service making an illegal access to memory. |
|
Definition
|
|
Term
| The error Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED means a bad driver or service has performed an illegal action. |
|
Definition
|
|
Term
| After you boot into Safe Mode, you can use the SFC, Chkdsk, and Defrag commands to verify system files and clean the hard drive. |
|
Definition
|
|
Term
| For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by the computer manufacturer. |
|
Definition
|
|
Term
Latency is measured by the round-trip time it takes for a data packet to travel from source to destination and back to source. Correct Answer(s): True |
|
Definition
|
|
Term
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. Correct Answer(s): False |
|
Definition
|
|
Term
When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection. Correct Answer(s): False |
|
Definition
|
|
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots. Correct Answer(s): True |
|
Definition
|
|
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. Correct Answer(s): True |
|
Definition
|
|
Term
| Delays in network transmissions are called latency. |
|
Definition
|
|
Term
| To connect to the Internet, a network first connects to an Internet Service Provider. |
|
Definition
|
|
Term
| For almost all networks today, including the Internet, the communication protocol used is called TCP/IP. |
|
Definition
|
|
Term
| Fiber optic technology uses a dedicated line from your ISP to your place of business or residence. |
|
Definition
|
|
Term
| Apple Computer calls 802.11b AirPort. |
|
Definition
|
|
Term
| The three main protocols for encryption for 802.11 wireless networks are WEP, WPA, and WPA2. |
|
Definition
|
|
Term
| The base station for a cellular network is a fixed transceiver and antenna. |
|
Definition
|
|
Term
| All wireless phone systems, including cellular, use full-duplex transmission, which means both people in a conversation can talk or transmit at the same time. |
|
Definition
|
|
Term
| Bluetooth is a standard for short-range wireless communication and data synchronization between devices. |
|
Definition
|
|
Term
| Twisted-pair cable is the most popular cabling method for local networks. |
|
Definition
|
|
Term
| A router is a device that manages traffic between two networks. |
|
Definition
|
|
Term
| A(n) IP address is a 32-bit string used to identify a computer on a network. |
|
Definition
|
|
Term
| The IP addresses available to the Internet are called public IP addresses. |
|
Definition
|
|
Term
| A dynamic IP address is assigned for the current connection only. |
|
Definition
|
|
Term
| The ping command tests connectivity by sending an echo request to a remote computer. |
|
Definition
|
|
Term
| The ipconfig command can display TCP/IP configuration information and refresh the IP address. |
|
Definition
|
|
Term
| A client/server application means one computer (the remote computer) is running the Telnet server and another computer (the local computer) runs the Telnet client. |
|
Definition
|
|
Term
| To use Telnet, you can create user accounts using the Control Panel. |
|
Definition
|
|
Term
| The solution for securing private data traveling over a public network is a virtual private network. |
|
Definition
|
|
Term
| A(n) subnet mask is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network. |
|
Definition
|
|
Term
| A default gateway is the gateway a computer uses to access another network if it does not have a better option. |
|
Definition
|
|
Term
DSL service and an older technology, ISDN, are provided by the local telephone company. Correct Answer(s): True |
|
Definition
|
|
Term
A DSL installation works very differently than a cable modem installation. Correct Answer(s): False |
|
Definition
|
|
Term
An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection. Correct Answer(s): True |
|
Definition
|
|
Term
When trying to use client/server applications on the Internet, your software and hardware firewalls and other security settings on the router will automatically allow the communication. Correct Answer(s): False |
|
Definition
|
|
Term
Many software vendors use FTP sites for downloading software to their customers. Correct Answer(s): True |
|
Definition
|
|
Term
| In order to activate your service, the cable company must know the MAC address of the cable modem you have installed. |
|
Definition
|
|
Term
| Most broadband connections today are always up and use dynamic IP addressing. |
|
Definition
|
|
Term
| The logon for an on-demand broadband connection is managed by a protocol called PPPoE. |
|
Definition
|
|
Term
| Port triggering opens a port when a PC on the network initiates communication through another port. |
|
Definition
|
|
Term
| For port forwarding to work, the computer on your network must have a static IP Address. |
|
Definition
|
|
Term
| Encryption is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN. |
|
Definition
|
|
Term
| When supporting and troubleshooting small networks, you’ll need to use cable testers to test the physical connections of the network. |
|
Definition
|
|
Term
| To find out what your DNS server knows about the domain name www.microsoft.com, use the nslookup www.microsoft.com command. |
|
Definition
|
|
Term
| A(n) reverse lookup is when you use the Nslookup command to find the host name when you know a computer’s IP address. |
|
Definition
|
|
Term
| Remote Desktop gives a user access to his or her Windows desktop from anywhere on the Internet. |
|
Definition
|
|
Term
| To prepare a computer to serve up Remote Desktop, you need to configure the computer for static IP addressing. |
|
Definition
|
|
Term
| When a Remote Desktop session is opened, all local users are logged off. |
|
Definition
|
|
Term
| Remote Assistance can help you support users and their computers from a distance. |
|
Definition
|
|
Term
| A log file is kept of every Remote Assistance session in the C:\Users\username\Documents\Remote Assistance Logs folder. |
|
Definition
|
|
Term
| Networking happens in layers. |
|
Definition
|
|
Term
| To disconnect a mapped network drive, use the net use z: /delete command. |
|
Definition
|
|
Term
| The command to flush the DNS cache kept on the computer is ipconfig /flushdns. |
|
Definition
|
|
Term
| If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong proxy server on the network. |
|
Definition
|
|
Term
| You can use a regular analog phone as an Internet phone if you use a(n) Analog Telephone Adapter. |
|
Definition
|
|
Term
| When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the VoIP provider. |
|
Definition
|
|
Term
| Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ferrite clamp attached. |
|
Definition
|
|
Term
Individuals are always free to decide what security measures they want to use. Correct Answer(s): False |
|
Definition
|
|
Term
It’s best to use three-factor authentication. Correct Answer(s): False |
|
Definition
|
|
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level. Correct Answer(s): True |
|
Definition
|
|
Term
Don’t use the same password on more than one system (computer, network, or application). Correct Answer(s): True |
|
Definition
|
|
Term
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day. Correct Answer(s): False |
|
Definition
|
|
Term
| The International Organization for Standardization has developed two documents (ISO 17799 and ISO 27002), which describe, in detail, the recommended standards to secure computer resources. |
|
Definition
|
|
Term
| For the health care industry, the HIPAA includes regulations to secure patient data that apply to all health care companies and professionals. |
|
Definition
|
|
Term
| When implementing a security plan, the four steps are sometimes called the Plan-Do-Study-Act. |
|
Definition
|
|
Term
| Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password reset disk for use in the event the user forgets the password. |
|
Definition
|
|
Term
| A digital certificate is assigned by a Certification Authority, and is used to prove you are who you say you are. |
|
Definition
|
|
Term
| A passphrase is made of several words with spaces allowed. |
|
Definition
|
|
Term
| A(n) strong password means it is not easy to guess by both humans and computer programs designed to hack passwords. |
|
Definition
|
|
Term
| A(n) administrator account has complete access to the system and can make changes that affect the security of the system and other users. |
|
Definition
|
|
Term
| A(n) limited account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data. |
|
Definition
|
|
Term
| Folders and files stored on a workstation or server that contain user data need to be classified as to the permissions assigned to the data. |
|
Definition
|
|
Term
| A network drive map is one of the most powerful and versatile methods of communicating over a network. |
|
Definition
|
|
Term
| Most encryption software products use a method called Public Key Encryption. |
|
Definition
|
|
Term
| Grayware is any annoying and unwanted program that might or might not mean you harm. |
|
Definition
|
|
Term
| A Trojan sometimes installs a backdoor in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. |
|
Definition
|
|
Term
| A boot sector virus can hide in either of two boot areas of a hard drive. |
|
Definition
|
|
Term
| A multipartite virus is a combination of a boot sector virus and a file virus and can hide in either. |
|
Definition
|
|
Term
| A macro is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination. |
|
Definition
|
|
Term
| As a defensive and offensive measure to protect against malicious software, install and run antivirus software and keep it current. |
|
Definition
|
|
Term
| Generally speaking, the weakest link in setting up security in a computer environment is people. |
|
Definition
|
|
Term
| In the computer arena, social engineering is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. |
|
Definition
|
|
Term
| Most hard drive manufacturers offer a zero-fill utility used to wipe clean all data on the drive. |
|
Definition
|
|
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups. Correct Answer(s): True |
|
Definition
|
|
Term
Allowing users full control of a folder is always required by job requirements. Correct Answer(s): False |
|
Definition
|
|
Term
Permissions manually set for a subfolder or file cannot override inherited permissions. Correct Answer(s): False |
|
Definition
|
|
Term
It is necessary that all computers belong to the same workgroup in order to share resources. Correct Answer(s): False |
|
Definition
|
|
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted. Correct Answer(s): True |
|
Definition
|
|
Term
| Windows XP uses simple file sharing by default, which means you have no control over who has access to a shared folder or file. |
|
Definition
|
|
Term
| When you share folders on the network, the share permissions for remote users need to be set. |
|
Definition
|
|
Term
| The best way to change inherited permissions is to change the permissions of the parent object. |
|
Definition
|
|
Term
| To know for sure exactly which permissions for a file or folder are in effect, see the Effective Permissions tab of the Advanced Security Settings box. |
|
Definition
|
|
Term
| A $ at the end of the folder name creates a(n) hidden share. |
|
Definition
|
|
Term
| If you name a shared folder Financial$, in order to access the folder, a user must enter \\computername\Financial$ in the Vista Start Search box. |
|
Definition
|
|
Term
| The Cipher command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost. |
|
Definition
|
|
Term
| For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a self-signed digital certificate to be used for the encryption. |
|
Definition
|
|
Term
| Certificates are managed using the Certificate Manager console. |
|
Definition
|
|
Term
| If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) recovery certificate. |
|
Definition
|
|
Term
| Many notebook computers have a chip on the motherboard called the TPM. |
|
Definition
|
|
Term
| BIOS on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip. |
|
Definition
|
|
Term
| A(n) quarantined computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources. |
|
Definition
|
|
Term
| AV software detects a known virus by looking for distinguishing characteristics called virus signatures. |
|
Definition
|
|
Term
| If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under HKLM\System\CurrentControlSet\Control\SafeBoot. |
|
Definition
|
|
Term
| You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or Network Service . |
|
Definition
|
|
Term
| Use Task Manager to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software. |
|
Definition
|
|
Term
| To see a list of services managed by Svchost, enter this command in a command-prompt window: tasklist /SVC. |
|
Definition
|
|
Term
| The term rootkit applies to a kit or set of tools used originally on UNIX computers. |
|
Definition
|
|
Term
| In UNIX, the lowest and most powerful level of UNIX accounts is called the root account. |
|
Definition
|
|
Term
| A rootkit running in user mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window. |
|
Definition
|
|