Exam 14: Users, Groups, and Permissions
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
In defining exactly what any particular account can or cannot do to a file or folder, it is considered best practice to assign _______________ to groups and then add user accounts to groups.
(Short Answer)
4.7/5
(38)
An unpopular, but necessary, security feature introduced in Windows Vista was _______________.
(Multiple Choice)
4.8/5
(40)
If your Vista computer is on a workgroup, what applet is used to manage user accounts?
(Multiple Choice)
4.8/5
(31)
What unique key is known only by the system and the person with whom the key is associated?
(Multiple Choice)
4.8/5
(39)
In a Windows system, members of the Users group are called _______________ users.
(Short Answer)
4.8/5
(29)
Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.
(Short Answer)
4.8/5
(30)
In Windows systems, the _______________ account might be used to provide casual Internet
access to users at a library terminal.
(Short Answer)
4.8/5
(27)
By default, all new Windows shares only have _______________ permission.
(Short Answer)
4.7/5
(39)
Jane's account is changed from administrator to standard user.How does this impact Jane's personal files/folders and her privileges on the computer?
(Essay)
4.8/5
(41)
In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.
(Short Answer)
4.7/5
(41)
What techniques provide the only true way to protect your data from access by any other user?
(Multiple Choice)
5.0/5
(33)
Strong passwords should include letters, numbers, and _______________ symbols.
(Short Answer)
4.9/5
(29)
The only account that can truly perform any task on a Windows system is the _______________.
(Short Answer)
4.9/5
(42)
In reference to Windows groups, _______________ privileges grant complete control over a machine.
(Short Answer)
4.7/5
(34)
A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.
(Multiple Choice)
4.9/5
(36)
By default, who has complete control over a folder or file?
(Multiple Choice)
4.9/5
(34)
Which character in a password is most helpful in defeating common word hacks?
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 120
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)