Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
On a peer-to-peer network, authentication is the responsibility of the domain.
t/f |
false
|
|
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
t/f |
true
|
|
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
t/f |
false
|
|
Using Group Policy, you can set security policies to help secure a workstation.
t/f |
true
|
|
It’s usually a good idea to run several anti-malware programs at the same time on your computer.
t/f |
false
|
|
What keystroke should you press to get a logon window if you don’t use the welcome screen?
|
Ctrl+Alt+Delete
|
|
Which of the following is true about the Guest account in Windows 7?
Question options: 1) it is disabled by default 2) it automatically has a complex password 3) you cannot rename it 4) it has administrative access |
it is disabled by default
|
|
Which of the following is true about passwords.
Question options: 1) it’s best to write your password down so you don’t get locked out of your computer 2) passwords cannot be longer than 14 characters 3) by default, accounts with a blank password cannot logon remotely 4) letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’ |
by default, accounts with a blank password cannot logon remotely
|
|
Which of the following is true about the Windows Encrypted File System?
Question options: 1) files can be marked for encryption, but not folders 2) an encrypted file moved to an unencrypted folder remains encrypted 3) EFS only works on NTFS and FAT32 4) you need to download special software to use EFS |
an encrypted file moved to an unencrypted folder remains encrypted
|
|
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
Question options: 1) you can rename default user accounts 2) you can require user accounts to have non-blank passwords 3) you can use gpedit.msc to see if any policies conflict 4) you can disable logon scripts |
you can use gpedit.msc to see if any policies conflict
|
|
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
|
a TPM chip on the motherboard
|
|
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
|
the BIOS
|
|
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
|
smart card
|
|
An RFID badge is related to which type of authentication method?
|
smart card
|
|
A privacy filter is used for what aspect of security?
|
screen viewing
|
|
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
Question options: 1) ATA Secure Erase 2) low-level format 3) degausser 4) magnetic data filter |
degausser
|
|
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
|
tailgating
|
|
Which type of malware hides in the MBR program of a hard drive?
|
boot sector virus
|
|
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
|
rootkit
|
|
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
|
bootrec /fixboot
|
|
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
|
Process Explorer
|
|
Which of the following are methods to lock down a workstation in Windows 7? (Choose all that apply.)
Question options: 1) press Ctrl+End and click Logon Screen 2) press Windows key + L 3) press Ctrl+Alt+Delete and click Lock this Computer 4) Press F1 and click Sleep |
press Windows key + L
3) press Ctrl+Alt+Delete and click Lock this Computer |
|
Which of the following are true about Windows Firewall? (Choose all that apply.)
Question options: 1) it is a personal firewall 2) it is configured when you set your network location 3) once configured, you can only change settings by changing your network location 4) it can only protect a computer from attacks coming from remote networks |
1) it is a personal firewall
2) it is configured when you set your network location |
|
Which are among the ways you can use BitLocker Encryption? (Choose all that apply.)
Question options: 1) computer authentication using TPM 2) user authentication using a certificate 3) user authentication using a USB flash drive 4) computer and user authentication using a PIN and TPM |
1) computer authentication using TPM
3) user authentication using a USB flash drive 4) computer and user authentication using a PIN and TPM |
|
Which of the following would be considered an input to a biometric device? (Choose all that apply.)
Question options: 1) keystrokes 2) retina 3) fingerprint 4) voice |
2) retina
3) fingerprint 4) voice |
|
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network’s computers.
|
layered
|
|
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
|
locking down
|
|
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
|
guest
|
|
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired and/or wireless network.
|
quarantined
|
|
Windows _______________ is antispyware included in Windows 7/Vista.
|
defender
|