Preview

Chapter 18 WOS review

Satisfactory Essays
Open Document
Open Document
590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 18 WOS review
Chapter 18

Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? degausser A privacy filter is used for what aspect of security?
Screen viewing
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
You can use gpedit.msc to see if any policies conflict
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
Bootrec /fixboot
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? tailgating It’s usually a good idea to run several anti-malware programs at the same time on your computer.
False
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Ctrl+Alt+Delete
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Process Explorer
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
False
Which of the following is true about the Windows Encrypted File System?
An encrypted file moved to an unencrypted folder remains encrypted
Using Group Policy, you can set security policies to help secure a workstation
True
Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the anti software loads? rootkit If you don’t want to use Bitlocker to protect your computer, you can still configure a power-on password using which of the following?
The BIOS
Which of the following is true about the Guest account in Windows 7?
It is disabled by default
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
True
On a peer-to-peer network, authentication is the responsibility of the domain.
False
Which of the following is true about passwords.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    You issued all of the commands required by the lab and you answered all of…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3) Does turning off a computer make the information it contains secure? D) No, because secure data must still be available to authorized users.…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    system or kernel to load when the computer starts. It is very important to lock this down because of the high access…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    BitLocker does not protect the computers contents while Windows is running. BitLocker is built for offline attacks, once the operating system is up and running.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    7. Which of the following built-in Windows 7 accounts are special identities? Everyone, Authenticated Users.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Why: Physical security must be maintained, because no matter what logical measures are taken, if an unauthorized person is able to gain hands-on access directly to a workstation, they can wreak havoc on the organization’s systems. Since we never know who may be around, it is equally as important to lock or logout of a workstation when leaving the desk, and never leave passwords near it. IT Staff needs to ensure all systems have the appropriate software for both day-to-day operations, as well as workstation security are installed to prevent the need to download more additional software, and prevent malware from being loaded into the system.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    User Manual on E2M Exports

    • 1983 Words
    • 8 Pages

    In the window above, enter your user name and password. Make sure that the caps lock key is not enabled. Press Login.…

    • 1983 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Rtc Configuration

    • 462 Words
    • 2 Pages

    * Copy xp_ndo.dll and xp_ndo_x64.dll extension files from the Microsoft Dynamics NAV 6.02 setup cd [SQLDatabase\PFiles\Microsoft Dynamics NAV\60\Database] in C:\Program Files\Microsoft SQL Server\MSSQL10_50.MSSQKSERVER\MSSQL\Binn folder.…

    • 462 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    course project ITT

    • 4392 Words
    • 18 Pages

    I will not try to access data or use operating systems or programs, except as specifically authorized.…

    • 4392 Words
    • 18 Pages
    Powerful Essays