Term
Which of the following is used to help prevent attackers that penetrate the comp defense? |
|
Definition
|
|
Term
Which of the following is not available security zone found in internet explorer? |
|
Definition
|
|
Term
Which of the following is used in IE and is a text file and contains info about you and web surfing habits |
|
Definition
|
|
Term
How do you know if you are using ssl while browsing with IE? |
|
Definition
|
|
Term
To keep windows reliable and secure, you must download and install windows ___ on a regular basis |
|
Definition
|
|
Term
Which of the following is a windows update that addresses a specific problem or issue with windows |
|
Definition
|
|
Term
A ___ is a cumulative set of all updates for a particular OS usually going back to its original release and are extensively tested |
|
Definition
|
|
Term
Which of the following is not a method to install windows patches and updates? |
|
Definition
|
|
Term
__ is a program that downloads updates from Microsoft update website, stores them for admin, and deploys the updates when they are released by admin |
|
Definition
|
|
Term
The best way to configure WSUS clients is |
|
Definition
|
|
Term
Logs are traditionally text files but the windows OS have long used a graphical operation called __ to display log info gathered by operation |
|
Definition
|
|
Term
Which of the following is not a traditional type of windows log? |
|
Definition
|
|
Term
You can use the __ console on one comp to connect to another comp and display its logs |
|
Definition
|
|
Term
__ is known as virtual memory in Win 7 |
|
Definition
|
|
Term
Which of the following is the process of verifying the identity of the person operating the comp? |
|
Definition
|
|
Term
Which of the following is the process of granting an authenticated user a specific degree of access to specific resources? |
|
Definition
|
|
Term
Which of the following enables user to perform specific tasks such as shut down or perform backups? |
|
Definition
|
|
Term
Which of the following enables the user to manage, configure, or perform certain tasks on an object like a file or folder? |
|
Definition
|
|
Term
Which of the following is an entity that represents a collection of users or comp? |
|
Definition
|
|
Term
What is a collection of comps that are all peers? |
|
Definition
|
|
Term
What is a collection of comps that all utilize a central directory service for authentication and authorization? |
|
Definition
|
|
Term
Which of the following is a series of folders associated with a specific user account that contain personal doc and settings? |
|
Definition
|
|
Term
Which type of user profile is automatically created when a user logs onto a comp for the first time and is stored on the comp local hard drive? |
|
Definition
|
|
Term
Which type of user profile is stored on a shared user drive which makes it accessible from anywhere on the network? |
|
Definition
|
|
Term
Which type of user profile is stored on a network share but does not allow changes to be saved? |
|
Definition
|
|
Term
What technology helps prevent software from making changes to system without your knowledge? |
|
Definition
|
|
Term
When accessing an object, which of the following will list each user that can access the object and what each user can do with the object? |
|
Definition
|
|
Term
Which group includes all the members of the authenticated users group plus the guest user account? |
|
Definition
|
|
Term
Which program is an MMC (Microsoft management console) snap-in? |
|
Definition
|
|
Term
What option is used to make sure a user doesn’t reuse the same password when changing the password? |
|
Definition
|
|
Term
What option enables strong passwords on Win7 system? |
|
Definition
password must meet complexity |
|
|
Term
Which value defines the number of invalid login attempts to trigger an account lockout? |
|
Definition
|
|
Term
Which command enables you to execute a command as an admin while logged on as a standard user? |
|
Definition
|
|
Term
What component in Win7 provides a centralized console that provides users and admin access to configure various Win7 security mechanisms? |
|
Definition
|
|
Term
A __ is a software program that protects comp by allowing certain network traffic in or out |
|
Definition
|
|
Term
Which of the following is a type of software that gathers info about comp user and transmits it back to attacker? |
|
Definition
|
|
Term
What software component is used to prevent against spyware? |
|
Definition
|
|
Term
The __ is a feature of NTFS that encrypts the files on a comp so that even if an intruder gets the file, they can’t read it |
|
Definition
|
|
Term
You want to view the logs shown in an event viewer on a remote comp. How do you do it? |
|
Definition
connect to another comp command in the action menu within the event viewer |
|
|
Term
Which console can be customized to include any snap-in to be organized anyway that you want? |
|
Definition
|
|
Term
Which trouble shooting tool allows you to connect to a user’s remote comp, view and interact with user |
|
Definition
|
|
Term
What port does remote assistance and desktop use? |
|
Definition
|
|
Term
Which program enables you to connect to remote comp with no |
|
Definition
|
|
Term
Which of the following requires invitation to use? |
|
Definition
|
|
Term
Which of the following reverses all system config and driver and registry changes you made since comp last booted successfully? |
|
Definition
|
|
Term
What option starts the comp with a min set of generic drivers needed to run the system? |
|
Definition
|
|
Term
What new feature used in Win7 enables networks with comp at remote locations to conserve bandwidth? |
|
Definition
|
|
Term
Which of the following is a copy of various OS config settings and registry info from a specific point in time? |
|
Definition
|
|
Term
What technology uses a remote client to connect to remote access server over the internet? |
|
Definition
|
|
Term
Which command is used to manage power? |
|
Definition
|
|