Term
A(n) operating system is software that controls a computer. |
|
Definition
|
|
Term
In 1986, MS-DOS was introduced and quickly became the most popular OS among IBM computers and IBM-compatible computers using the Intel 8086 processors |
|
Definition
|
|
Term
A graphical user interface is an interface that uses graphics as compared to a command-driven interface. |
|
Definition
|
|
Term
Vista has a new 3D user interface called the Aero user interface. |
|
Definition
|
|
Term
A(n) netbook is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive. |
|
Definition
|
|
Term
A dual boot makes it possible to boot a computer into one of two installed OSs. |
|
Definition
|
|
Term
A(n) shell is the portion of an OS that relates to the user and to applications. |
|
Definition
|
|
Term
The OS kernel is responsible for interacting with hardware. |
|
Definition
|
|
Term
The executive services interface between the subsystems in user mode and the HAL. |
|
Definition
|
|
Term
A thread is a single task, such as the task of printing a file, that the process requests from the kernel. |
|
Definition
|
|
Term
Device drivers are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem. |
|
Definition
|
|
Term
The taskbar is normally located at the bottom of the Windows desktop, displaying information about open programs and providing quick access to others. |
|
Definition
|
|
Term
The system tray is usually on the right side of the taskbar and displays open services. |
|
Definition
|
|
Term
A(n) service is a program that runs in the background to support or serve Windows or an application. |
|
Definition
|
|
Term
A file extension is one or more characters following the last period in a filename, such as .exe, .txt, or .avi. |
|
Definition
|
|
Term
The User Account Control dialog box in Windows Vista appears each time a user attempts to perform an action that can be done only with administrative privileges. |
|
Definition
|
|
Term
Windows identifies file types primarily by the file extension . |
|
Definition
|
|
Term
Windows offers two ways to sync files: Briefcase and Offline Files . |
|
Definition
|
|
Term
From the Properties window, you can change the read-only, hidden, archive, and indexing attributes of the file. |
|
Definition
|
|
Term
A(n) index is a list of items that is used to speed up a search |
|
Definition
|
|
Term
An applet has a .cpl file extension. |
|
Definition
|
|
Term
Upgrading to a better edition of Vista can easily be accomplished by using the Windows Anytime Upgrade feature. |
|
Definition
|
|
Term
Use a 64-bit OS if you need increased performance and your system has enough resources to support it. |
|
Definition
|
|
Term
Use Device Manager to find out which devices are installed in your XP system. |
|
Definition
|
|
Term
A dual boot allows you to install the new OS without disturbing the old one so you can boot to either OS. |
|
Definition
|
|
Term
A(n) distribution server is used to hold the setup files on a Windows CD or DVD on the network and then at each PC, you can execute the Setup program on the server. |
|
Definition
|
|
Term
A(n) unattended installation is performed by storing the answers to installation questions in a text file or script that Windows calls an answer file. |
|
Definition
|
|
Term
A drive image is a copy of the entire volume on which Windows is installed to another bootable media such as CDs or USB drive. |
|
Definition
|
|
Term
The Windows utility sysprep.exe is used to remove configuration settings, such as the computer name that uniquely identifies the PC. |
|
Definition
|
|
Term
For some brand-name computers, the hard drive contains a hidden recovery partition that can be used to reinstall Windows. |
|
Definition
|
|
Term
A virtual computer is software that simulates the hardware of a physical computer. |
|
Definition
|
|
Term
The system partition is the active partition of the hard drive. |
|
Definition
|
|
Term
A Windows workgroup is a logical group of computers and users that share resources, where administration, resources, and security on a workstation are controlled by that workstation |
|
Definition
|
|
Term
A Windows domain is a type of client/server network, which is a network where resources are managed by a centralized computer. |
|
Definition
|
|
Term
An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory . |
|
Definition
|
|
Term
An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory . |
|
Definition
|
|
Term
A Windows domain is a type of client/server network, which is a network where resources are managed by a centralized computer. |
|
Definition
|
|
Term
An example of a network operating system is Windows Server 2008, which controls a network using the directory database called Active Directory . |
|
Definition
|
|
Term
The scanstate command is used to copy the information from the old computer to a server or removable media. |
|
Definition
|
|
Term
The loadstate command is used to copy the information to the new computer. |
|
Definition
|
|
Term
Product activation is a method used by Microsoft to prevent unlicensed use of its software so that you must purchase a Windows license for each installation of Windows. |
|
Definition
|
|
Term
During a normal Windows XP installation, setup causes the system to reboot three times. |
|
Definition
|
|
Term
To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use this command at a command prompt: convert D: /FS:NTFS , where D: is the drive to be converted. |
|
Definition
|
|
Term
For an always-up broadband connection (such as cable modem or DSL), select Automatic when you configure updates. |
|
Definition
|
|
Term
When you configure updates, if the PC doesn’t have an always-up Internet connection (such as dial-up), you might want to select Notify me but don’t automatically download or install them . |
|
Definition
|
|
Term
Currently, Microsoft offers four service packs for Windows XP. Correct Answer(s): False |
|
Definition
|
|
Term
Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for a variety of other tasks, so it’s important to delete unneeded files occasionally. Correct Answer(s): True |
|
Definition
|
|
Term
Depending on how fragmented the drive and how large the drive, defragmenting it can take less than an hour or as long as all night. Correct Answer(s): True |
|
Definition
|
|
Term
When a new hard drive is first installed in a system, you must first initialize the disk. Correct Answer(s): True |
|
Definition
|
|
Term
You can install an OS on a spanned or striped volume that uses software RAID. Correct Answer(s): False |
|
Definition
|
|
Term
For Windows XP, use the System Properties box to see which service packs are installed. |
|
Definition
|
|
Term
To view and manually install updates, click Start, All Programs, and Windows Updates , and then follow the directions on-screen. |
|
Definition
|
|
Term
To protect a system against malicious attack, you need to verify that antivirus software is configured to scan the system regularly and that it is up-to-date. |
|
Definition
|
|
Term
Files can end up in fragmented segments all over the drive. |
|
Definition
|
|
Term
By default, Vista automatically defrags a drive every Wednesday at 1:00 AM . |
|
Definition
|
|
Term
Use the Defrag command to defrag the drive from a command prompt window. |
|
Definition
|
|
Term
To make sure the drive is healthy, you need to search for and repair file system errors using the Windows Chkdsk utility. |
|
Definition
|
|
Term
A snapshot of the system settings and configuration is called a restore point . |
|
Definition
|
|
Term
System Protection creates restore points at regular intervals and just before you install software or hardware. |
|
Definition
|
|
Term
When you back up the system state, the registry is also backed up to the folder %SystemRoot%\repair\RegBack . |
|
Definition
|
|
Term
Besides backing up user data or system files, you can also back up the entire hard drive using Windows Vista Complete PC Backup . |
|
Definition
|
|
Term
The user folder for an account contains a group of subfolders called the user profile namespace . |
|
Definition
|
|
Term
If you enter a command and want to terminate its execution before it is finished, you can press Ctrl+Break to do so. |
|
Definition
|
|
Term
The MD command creates a subdirectory under a directory. |
|
Definition
|
|
Term
A file with a .bat file extension is called a batch file. |
|
Definition
|
|
Term
A dynamic disk requires 1 MB of storage for the disk management database. |
|
Definition
|
|
Term
You can use Disk Management to convert two or more basic disks to dynamic disks. |
|
Definition
|
|
Term
When a hard drive is first sensed by Windows, it is assigned the Basic disk status. |
|
Definition
|
|
Term
A disk marked as dynamic can be used with other dynamic disks in a spanned or striped volume. |
|
Definition
|
|
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
If you are having problems with a hard drive, volume, or mounted drive, check Event Viewer for events about the drive that might have been recorded there. |
|
Definition
|
|
Term
Windows Vista Ultimate offers language packs through Windows Update . |
|
Definition
|
|
Term
You can edit the registry and create a restore point while in Safe Mode. Correct Answer(s): False |
|
Definition
|
|
Term
Windows Vista tracks issues that are interfering with performance. Correct Answer(s): True |
|
Definition
|
|
Term
The indexing service of Windows indexer has a high priority and takes precedence over other programs. Correct Answer(s): False |
|
Definition
|
|
Term
If you notice that performance slows after a system has been up and running without a restart for some time, suspect a memory leak. Correct Answer(s): True |
|
Definition
|
|
Term
Editing the registry can be dangerous, so do this with caution and be sure to back up first! Correct Answer(s): True |
|
Definition
|
|
Term
The Processes tab of Task Manager lists system services and other processes associated with applications, together with how much CPU time and memory the process uses. |
|
Definition
|
|
Term
To stop a process using Task Manager, select the process and click End Process. |
|
Definition
|
|
Term
If your desktop locks up, you can use Task Manager to refresh it. |
|
Definition
|
|
Term
The Performance tab in Task Manager provides details about how a program uses system resources. |
|
Definition
|
|
Term
The Networking tab in Task Manager lets you monitor network activity and bandwidth used. |
|
Definition
|
|
Term
The Users tab in Task Manager shows all users currently logged on the system. |
|
Definition
|
|
Term
You can use the System Configuration Utility to find out what processes are launched at startup and to temporarily disable a process from loading. |
|
Definition
|
|
Term
Microsoft Management Console is a Windows utility that can be used to build your own customized console windows. |
|
Definition
|
|
Term
A(n) console is a single window that contains one or more administrative tools such as Device Manager or Disk Management. |
|
Definition
|
|
Term
In a console, the individual tools are called snap-ins. |
|
Definition
|
|
Term
A console is saved in a file with an .msc file extension. |
|
Definition
|
|
Term
Device Manager reads data from the HKLM\HARDWARE key to build the information it displays about hardware configurations. |
|
Definition
|
|
Term
Windows Experience Index, under Windows Vista, is a summary index designed to measure the overall performance of a system. |
|
Definition
|
|
Term
To make sure that all hardware or software installed on the system is compatible with Windows Vista, use the Vista Upgrade Advisor. |
|
Definition
|
|
Term
You can use the System Information Utility to find information about the installed processor and its speed, how much RAM is installed, and free space on the hard drive. |
|
Definition
|
|
Term
The Windows indexer is responsible for maintaining an index of files and folders on a hard drive to speed up Windows searches. |
|
Definition
|
|
Term
The UAC box can protect your system against users making unauthorized changes and against malware installing itself without your knowledge. |
|
Definition
|
|
Term
To find out if programs and services are slowing down Windows startup, boot the system in Safe Mode and watch to see if performance improves. |
|
Definition
|
|
Term
You can use the MSconfig utility to zero in on the service or other program that is slowing down startup. |
|
Definition
|
|
Term
Most programs written for Windows have a(n) uninstall routine which can be accessed from the Vista Programs and Features applet in the Control Panel, the XP Add Remove Programs applet in the Control Panel, or a utility in the All Programs menu. |
|
Definition
|
|
Term
If a system is giving repeated startup errors or you have just removed several programs, you might want to search through registry keys for processes left there by uninstalled or corrupted software that might be giving startup problems. |
|
Definition
|
|
Term
Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as application errors, user errors, or other hardware component errors. Correct Answer(s): True |
|
Definition
|
|
Term
Driver Verifier attempts to overload the drivers it monitors, which can cause a memory error. Correct Answer(s): False |
|
Definition
|
|
Term
If Driver Verifier runs for a few days and has still not found the problem, it probably will not help you. Correct Answer(s): True |
|
Definition
|
|
Term
Using Windows Vista, you can use Device Manager without responding correctly to the UAC box. Correct Answer(s): False |
|
Definition
|
|
Term
If your hard drive is corrupted, you still might be able to recover data. Correct Answer(s): True |
|
Definition
|
|
Term
Use the Windows Vista Problem Reports and Solutions tool to deal with an immediate hardware or software problem. |
|
Definition
|
|
Term
If a problem happens in the kernel mode of Windows, a STOP or blue screen error occurs. |
|
Definition
|
|
Term
You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the Vista Memory Diagnostics tool. |
|
Definition
|
|
Term
For hardware problems, Driver Verifier is a Windows Vista/XP/2000 utility that runs in the background to put stress on drivers as they are loaded and running. |
|
Definition
|
|
Term
The File Signature Verification tool displays information about digitally signed files, including device driver files and application files, and logs information to C:\Windows\Sigverif.txt. |
|
Definition
|
|
Term
The Driver Query tool can be used to direct information about drivers to a file, including information about digital signatures. |
|
Definition
|
|
Term
Vista configuration data is stored in the Vista Boot Configuration Data file. |
|
Definition
|
|
Term
The Vista Advanced Boot Options menu appears when a user presses F8 as Vista is loading. |
|
Definition
|
|
Term
Registry settings collectively called the Last Known Good Configuration are saved in the registry each time the user successfully logs onto the system. |
|
Definition
|
|
Term
You can use the Windows RE command prompt window to restore registry files using those saved in the c:\windows\system32\config\regback folder. |
|
Definition
|
|
Term
The Boot.ini file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see what operating systems are available and how to set up the boot. |
|
Definition
|
|
Term
The Recovery Console is used when Windows 2000/XP does not start properly or hangs during the load. |
|
Definition
|
|
Term
In the Recovery Console, the command RD deletes a directory. |
|
Definition
|
|
Term
To retrieve the last command entered in the Recovery Console, press F3 at the command prompt. |
|
Definition
|
|
Term
To retrieve the command entered in the Recovery Console one character at a time, press the F1 key. |
|
Definition
|
|
Term
Use the chkdsk C: /r command to repair the file system and recover data from bad sectors. |
|
Definition
|
|
Term
Enter the command listsvc to see a list of all services currently installed, which includes device drivers. |
|
Definition
|
|
Term
Use the Enable command followed by the name of the service to show the current status of a service. |
|
Definition
|
|
Term
To move to the root directory, use the command CD \ . |
|
Definition
|
|
Term
A compressed file uses a(n) underscore as the last character in the file extension. |
|
Definition
|
|
Term
Use the Expand command to extract .cab files. |
|
Definition
|
|
Term
Most computer problems are simple and easy to solve. Correct Answer(s) True |
|
Definition
|
|
Term
Sometimes a Windows update solves a problem with a hardware device. Correct Answer(s): True |
|
Definition
|
|
Term
When installing a device, you must always run the setup CD for the device after you physically install the device. Correct Answer(s): False |
|
Definition
|
|
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted. Correct Answer(s): True |
|
Definition
|
|
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. Correct Answer(s): False |
|
Definition
|
|
Term
In Event Viewer, the Administrative Events log shows only warnings and error events |
|
Definition
|
|
Term
Check Device Manager to verify that a device is enabled and Windows thinks the device should be working. |
|
Definition
|
|
Term
Errors or warnings in Device Manager are displayed as a yellow triangle or question mark. |
|
Definition
|
|
Term
To uninstall a program, in Device Manager right-click the device and select Uninstall. |
|
Definition
|
|
Term
If you can identify the approximate date the error started and that date is in the recent past, use System Restore. |
|
Definition
|
|
Term
If the system is caught in an endless loop of restarts, boot into Safe Mode. |
|
Definition
|
|
Term
For essential hardware devices, use the System File Checker to verify and replace system files. |
|
Definition
|
|
Term
For Vista, use the Problem Reports and Solutions tool to search for the problem and suggested solutions. |
|
Definition
|
|
Term
Reverting to a restore point can solve problems with registry entries the application uses that have become corrupted. |
|
Definition
|
|
Term
Use the Memory Diagnostics tool to test memory. |
|
Definition
|
|
Term
Press F8 at startup to display the Advanced Boot Options menu. |
|
Definition
|
|
Term
During a reinstallation, Vista setup will move all folders of the old installation into the \Windows.old folder. |
|
Definition
|
|
Term
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a hidden partition on the hard drive that can be used to recover the Windows installation. |
|
Definition
|
|
Term
When you see the Microsoft progress bar appear, you know the Windows kernel, including all critical services and drivers, has loaded. |
|
Definition
|
|
Term
The Last Known Good Configuration is updated after you log on normally to Vista. |
|
Definition
|
|
Term
The command sfc /scannow searches for and replaces corrupted system files. |
|
Definition
|
|
Term
The key that loads services and drivers can be found in the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services location. |
|
Definition
|
|
Term
The error Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL is caused by a driver or service making an illegal access to memory. |
|
Definition
|
|
Term
The error Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED means a bad driver or service has performed an illegal action. |
|
Definition
|
|
Term
After you boot into Safe Mode, you can use the SFC, Chkdsk, and Defrag commands to verify system files and clean the hard drive. |
|
Definition
|
|
Term
For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by the computer manufacturer. |
|
Definition
|
|
Term
Latency is measured by the round-trip time it takes for a data packet to travel from source to destination and back to source. Correct Answer(s): True |
|
Definition
|
|
Term
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. Correct Answer(s): False |
|
Definition
|
|
Term
When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection. Correct Answer(s): False |
|
Definition
|
|
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots. Correct Answer(s): True |
|
Definition
|
|
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. Correct Answer(s): True |
|
Definition
|
|
Term
Delays in network transmissions are called latency. |
|
Definition
|
|
Term
To connect to the Internet, a network first connects to an Internet Service Provider. |
|
Definition
|
|
Term
For almost all networks today, including the Internet, the communication protocol used is called TCP/IP. |
|
Definition
|
|
Term
Fiber optic technology uses a dedicated line from your ISP to your place of business or residence. |
|
Definition
|
|
Term
Apple Computer calls 802.11b AirPort. |
|
Definition
|
|
Term
The three main protocols for encryption for 802.11 wireless networks are WEP, WPA, and WPA2. |
|
Definition
|
|
Term
The base station for a cellular network is a fixed transceiver and antenna. |
|
Definition
|
|
Term
All wireless phone systems, including cellular, use full-duplex transmission, which means both people in a conversation can talk or transmit at the same time. |
|
Definition
|
|
Term
Bluetooth is a standard for short-range wireless communication and data synchronization between devices. |
|
Definition
|
|
Term
Twisted-pair cable is the most popular cabling method for local networks. |
|
Definition
|
|
Term
A router is a device that manages traffic between two networks. |
|
Definition
|
|
Term
A(n) IP address is a 32-bit string used to identify a computer on a network. |
|
Definition
|
|
Term
The IP addresses available to the Internet are called public IP addresses. |
|
Definition
|
|
Term
A dynamic IP address is assigned for the current connection only. |
|
Definition
|
|
Term
The ping command tests connectivity by sending an echo request to a remote computer. |
|
Definition
|
|
Term
The ipconfig command can display TCP/IP configuration information and refresh the IP address. |
|
Definition
|
|
Term
A client/server application means one computer (the remote computer) is running the Telnet server and another computer (the local computer) runs the Telnet client. |
|
Definition
|
|
Term
To use Telnet, you can create user accounts using the Control Panel. |
|
Definition
|
|
Term
The solution for securing private data traveling over a public network is a virtual private network. |
|
Definition
|
|
Term
A(n) subnet mask is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network. |
|
Definition
|
|
Term
A default gateway is the gateway a computer uses to access another network if it does not have a better option. |
|
Definition
|
|
Term
DSL service and an older technology, ISDN, are provided by the local telephone company. Correct Answer(s): True |
|
Definition
|
|
Term
A DSL installation works very differently than a cable modem installation. Correct Answer(s): False |
|
Definition
|
|
Term
An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection. Correct Answer(s): True |
|
Definition
|
|
Term
When trying to use client/server applications on the Internet, your software and hardware firewalls and other security settings on the router will automatically allow the communication. Correct Answer(s): False |
|
Definition
|
|
Term
Many software vendors use FTP sites for downloading software to their customers. Correct Answer(s): True |
|
Definition
|
|
Term
In order to activate your service, the cable company must know the MAC address of the cable modem you have installed. |
|
Definition
|
|
Term
Most broadband connections today are always up and use dynamic IP addressing. |
|
Definition
|
|
Term
The logon for an on-demand broadband connection is managed by a protocol called PPPoE. |
|
Definition
|
|
Term
Port triggering opens a port when a PC on the network initiates communication through another port. |
|
Definition
|
|
Term
For port forwarding to work, the computer on your network must have a static IP Address. |
|
Definition
|
|
Term
Encryption is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN. |
|
Definition
|
|
Term
When supporting and troubleshooting small networks, you’ll need to use cable testers to test the physical connections of the network. |
|
Definition
|
|
Term
To find out what your DNS server knows about the domain name www.microsoft.com, use the nslookup www.microsoft.com command. |
|
Definition
|
|
Term
A(n) reverse lookup is when you use the Nslookup command to find the host name when you know a computer’s IP address. |
|
Definition
|
|
Term
Remote Desktop gives a user access to his or her Windows desktop from anywhere on the Internet. |
|
Definition
|
|
Term
To prepare a computer to serve up Remote Desktop, you need to configure the computer for static IP addressing. |
|
Definition
|
|
Term
When a Remote Desktop session is opened, all local users are logged off. |
|
Definition
|
|
Term
Remote Assistance can help you support users and their computers from a distance. |
|
Definition
|
|
Term
A log file is kept of every Remote Assistance session in the C:\Users\username\Documents\Remote Assistance Logs folder. |
|
Definition
|
|
Term
Networking happens in layers. |
|
Definition
|
|
Term
To disconnect a mapped network drive, use the net use z: /delete command. |
|
Definition
|
|
Term
The command to flush the DNS cache kept on the computer is ipconfig /flushdns. |
|
Definition
|
|
Term
If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong proxy server on the network. |
|
Definition
|
|
Term
You can use a regular analog phone as an Internet phone if you use a(n) Analog Telephone Adapter. |
|
Definition
|
|
Term
When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the VoIP provider. |
|
Definition
|
|
Term
Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ferrite clamp attached. |
|
Definition
|
|
Term
Individuals are always free to decide what security measures they want to use. Correct Answer(s): False |
|
Definition
|
|
Term
It’s best to use three-factor authentication. Correct Answer(s): False |
|
Definition
|
|
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level. Correct Answer(s): True |
|
Definition
|
|
Term
Don’t use the same password on more than one system (computer, network, or application). Correct Answer(s): True |
|
Definition
|
|
Term
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day. Correct Answer(s): False |
|
Definition
|
|
Term
The International Organization for Standardization has developed two documents (ISO 17799 and ISO 27002), which describe, in detail, the recommended standards to secure computer resources. |
|
Definition
|
|
Term
For the health care industry, the HIPAA includes regulations to secure patient data that apply to all health care companies and professionals. |
|
Definition
|
|
Term
When implementing a security plan, the four steps are sometimes called the Plan-Do-Study-Act. |
|
Definition
|
|
Term
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password reset disk for use in the event the user forgets the password. |
|
Definition
|
|
Term
A digital certificate is assigned by a Certification Authority, and is used to prove you are who you say you are. |
|
Definition
|
|
Term
A passphrase is made of several words with spaces allowed. |
|
Definition
|
|
Term
A(n) strong password means it is not easy to guess by both humans and computer programs designed to hack passwords. |
|
Definition
|
|
Term
A(n) administrator account has complete access to the system and can make changes that affect the security of the system and other users. |
|
Definition
|
|
Term
A(n) limited account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data. |
|
Definition
|
|
Term
Folders and files stored on a workstation or server that contain user data need to be classified as to the permissions assigned to the data. |
|
Definition
|
|
Term
A network drive map is one of the most powerful and versatile methods of communicating over a network. |
|
Definition
|
|
Term
Most encryption software products use a method called Public Key Encryption. |
|
Definition
|
|
Term
Grayware is any annoying and unwanted program that might or might not mean you harm. |
|
Definition
|
|
Term
A Trojan sometimes installs a backdoor in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. |
|
Definition
|
|
Term
A boot sector virus can hide in either of two boot areas of a hard drive. |
|
Definition
|
|
Term
A multipartite virus is a combination of a boot sector virus and a file virus and can hide in either. |
|
Definition
|
|
Term
A macro is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination. |
|
Definition
|
|
Term
As a defensive and offensive measure to protect against malicious software, install and run antivirus software and keep it current. |
|
Definition
|
|
Term
Generally speaking, the weakest link in setting up security in a computer environment is people. |
|
Definition
|
|
Term
In the computer arena, social engineering is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. |
|
Definition
|
|
Term
Most hard drive manufacturers offer a zero-fill utility used to wipe clean all data on the drive. |
|
Definition
|
|
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups. Correct Answer(s): True |
|
Definition
|
|
Term
Allowing users full control of a folder is always required by job requirements. Correct Answer(s): False |
|
Definition
|
|
Term
Permissions manually set for a subfolder or file cannot override inherited permissions. Correct Answer(s): False |
|
Definition
|
|
Term
It is necessary that all computers belong to the same workgroup in order to share resources. Correct Answer(s): False |
|
Definition
|
|
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted. Correct Answer(s): True |
|
Definition
|
|
Term
Windows XP uses simple file sharing by default, which means you have no control over who has access to a shared folder or file. |
|
Definition
|
|
Term
When you share folders on the network, the share permissions for remote users need to be set. |
|
Definition
|
|
Term
The best way to change inherited permissions is to change the permissions of the parent object. |
|
Definition
|
|
Term
To know for sure exactly which permissions for a file or folder are in effect, see the Effective Permissions tab of the Advanced Security Settings box. |
|
Definition
|
|
Term
A $ at the end of the folder name creates a(n) hidden share. |
|
Definition
|
|
Term
If you name a shared folder Financial$, in order to access the folder, a user must enter \\computername\Financial$ in the Vista Start Search box. |
|
Definition
|
|
Term
The Cipher command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost. |
|
Definition
|
|
Term
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a self-signed digital certificate to be used for the encryption. |
|
Definition
|
|
Term
Certificates are managed using the Certificate Manager console. |
|
Definition
|
|
Term
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) recovery certificate. |
|
Definition
|
|
Term
Many notebook computers have a chip on the motherboard called the TPM. |
|
Definition
|
|
Term
BIOS on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip. |
|
Definition
|
|
Term
A(n) quarantined computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources. |
|
Definition
|
|
Term
AV software detects a known virus by looking for distinguishing characteristics called virus signatures. |
|
Definition
|
|
Term
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under HKLM\System\CurrentControlSet\Control\SafeBoot. |
|
Definition
|
|
Term
You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or Network Service . |
|
Definition
|
|
Term
Use Task Manager to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software. |
|
Definition
|
|
Term
To see a list of services managed by Svchost, enter this command in a command-prompt window: tasklist /SVC. |
|
Definition
|
|
Term
The term rootkit applies to a kit or set of tools used originally on UNIX computers. |
|
Definition
|
|
Term
In UNIX, the lowest and most powerful level of UNIX accounts is called the root account. |
|
Definition
|
|
Term
A rootkit running in user mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window. |
|
Definition
|
|