Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? degausser A privacy filter is used for what aspect of security?
Screen viewing
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
You can use gpedit.msc to see if any policies conflict
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
Bootrec /fixboot
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? tailgating It’s usually a good idea to run several anti-malware programs at the same time on your computer.
False
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Ctrl+Alt+Delete
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Process Explorer
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
False
Which of the following is true about the Windows Encrypted File System?
An encrypted file moved to an unencrypted folder remains encrypted
Using Group Policy, you can set security policies to help secure a workstation
True
Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the anti software loads? rootkit If you don’t want to use Bitlocker to protect your computer, you can still configure a power-on password using which of the following?
The BIOS
Which of the following is true about the Guest account in Windows 7?
It is disabled by default
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
True
On a peer-to-peer network, authentication is the responsibility of the domain.
False
Which of the following is true about passwords.