Deck 20: Security Practices

Full screen (f)
exit full mode
Question
When controlling access to data folders or files,permissions to these resources are assigned to individual user accounts or user groups.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ on a motherboard offers security features including power-on passwords,support for intrusion-detection devices,and support for a TPM chip.

A)Software
B)BIOS
C)Blocks
D)Chipsets
Question
To know for sure exactly which permissions for a file or folder are in effect,see the ____ tab of the Advanced Security Settings box.

A)Security
B)Derived Permissions
C)Actual Permissions
D)Effective Permissions
Question
It is necessary that all computers belong to the same workgroup in order to share resources.
Question
Windows XP uses ____ file sharing by default,which means you have no control over who has access to a shared folder or file.

A)network
B)simple
C)directory
D)user
Question
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates,you might be able to recover the file using a(n)____ certificate.

A)recovery
B)restoration
C)backup
D)administrator
Question
When you share folders on the network,the ____ permissions for remote users need to be set.

A)share
B)file
C)folder
D)disc
Question
A $ at the end of the folder name creates a(n)____ share.

A)public
B)hidden
C)inaccessible
D)visible
Question
Permissions manually set for a subfolder or file cannot override inherited permissions.
Question
Certificates are managed using the ____ console.

A)Certificate Store
B)Certificate Preparation
C)Certificate Manager
D)Digital Certificate
Question
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work,try searching for suspicious entries in the subkeys under ____.

A)HKLM\System\CurrentControlSet\Control\SafeBoot
B)HKLM\System\CurrentControlSet\System\SafeBoot
C)HKCU\System\CurrentControlSet\Control\SafeBoot
D)HKLM\System\CurrentControlSet\Services\SafeBoot
Question
The best way to change inherited permissions is to change the permissions of the ____.

A)child object
B)inherited objects
C)parent object
D)inheriting objects
Question
The ____ command can be used to encrypt,decrypt,or recover an encrypted file when the certificates are lost.

A)Decipher
B)Cipher
C)Decode
D)Transcode
Question
If you name a shared folder Financial$,in order to access the folder,a user must enter ____ in the Vista Start Search box.

A)\\computername\Financial$
B)\\financial$\computername
C)\\computername\shares\financial$
D)\\shares\computername\financial$
Question
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.

A)behavior
B)process
C)virus
D)malicious
Question
For a stand-alone computer that is not part of a Windows domain,the EFS encrypting process generates a ____ digital certificate to be used for the encryption.

A)publicly-signed
B)network-signed
C)system-signed
D)self-signed
Question
A(n)____ computer is not allowed to use the network,is put on a different network dedicated to them,or is only allowed to access certain network resources.

A)unrestricted
B)restricted
C)isolated
D)quarantined
Question
Allowing users full control of a folder is always required by job requirements.
Question
Many notebook computers have a chip on the motherboard called the ____.

A)MPM
B)CPM
C)UPM
D)TPM
Question
If an infected computer will not boot,it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Permissions that are attained from a parent object
Question
____________________shares are the folders that are shared by default on a network that administrator accounts can access.
Question
In UNIX,the lowest and most powerful level of UNIX accounts is called the ____ account.

A)God
B)master
C)universal
D)root
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Those users who have not been authenticated on a remote computer
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Designed to do varying degrees of damage to data and software,although it does not damage PC hardware
Question
To see a list of services managed by Svchost,enter this command in a command-prompt window: ____.

A)taskview /svc
B)taskmgr /svc
C)tasklist /SVC
D)tasklist /all
Question
Use ____ to search for malware processes,especially those that mask themselves as core Windows processes and elude AV software.

A)Computer Manager
B)Task Manager
C)System Manager
D)Event Viewer
Question
A virus is often programmed to attempt to hide from ____________________ software.
Question
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

A)root
B)privileged
C)user
D)executive
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Folders on a computer that are shared with others on the network using a folder's Properties box
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes the Authenticated Users group as well as the Guest account
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes all user accounts that can access the system except the Guest account
Question
If you need to change the rights of a user account to the administrator's level,use the ____________________ console and add the user to the administrators group.
Question
A(n)____________________ running in kernel mode actually interferes with the Windows kernel and substitutes its own information in place of the raw data read by the Windows kernel.
Question
A(n)____________________ is placed in a special directory and cannot be opened.
Question
You can recognize a program as a counterfeit process if it's not running under System,Local Service,or ____.

A)Administrator
B)Guest
C)Local
D)Network Service
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Is when permissions are passed from parent to child
Question
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
A program that uses unusually complex methods to hide itself on a system,and many spyware and adware programs are also rootkits
Question
The term ____ applies to a kit or set of tools used originally on UNIX computers.

A)rootkit
B)botkit
C)stealthkit
D)worm
Question
Discuss the methods to deal with infected or damaged boot sectors or corrupted BIOS code.
Question
Discuss the Anonymous users group.
Question
Explain why sharing all the drives on all computers is not a good security practice.
Question
List the steps to add a certificate to an encrypted file.
Question
Describe one method that can be used to decrypt a file or folder.
Question
List three methods for protecting a system against malicious software.
Question
Discuss how to get the best results when scanning for rootkits.
Question
Explain the Authenticated Users group.
Question
Discuss encrypting files and folders.
Question
List the two methods used by antirootkit software to remove rootkits after they are installed.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 20: Security Practices
1
When controlling access to data folders or files,permissions to these resources are assigned to individual user accounts or user groups.
True
2
____ on a motherboard offers security features including power-on passwords,support for intrusion-detection devices,and support for a TPM chip.

A)Software
B)BIOS
C)Blocks
D)Chipsets
B
3
To know for sure exactly which permissions for a file or folder are in effect,see the ____ tab of the Advanced Security Settings box.

A)Security
B)Derived Permissions
C)Actual Permissions
D)Effective Permissions
D
4
It is necessary that all computers belong to the same workgroup in order to share resources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Windows XP uses ____ file sharing by default,which means you have no control over who has access to a shared folder or file.

A)network
B)simple
C)directory
D)user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates,you might be able to recover the file using a(n)____ certificate.

A)recovery
B)restoration
C)backup
D)administrator
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
When you share folders on the network,the ____ permissions for remote users need to be set.

A)share
B)file
C)folder
D)disc
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A $ at the end of the folder name creates a(n)____ share.

A)public
B)hidden
C)inaccessible
D)visible
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Permissions manually set for a subfolder or file cannot override inherited permissions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Certificates are managed using the ____ console.

A)Certificate Store
B)Certificate Preparation
C)Certificate Manager
D)Digital Certificate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work,try searching for suspicious entries in the subkeys under ____.

A)HKLM\System\CurrentControlSet\Control\SafeBoot
B)HKLM\System\CurrentControlSet\System\SafeBoot
C)HKCU\System\CurrentControlSet\Control\SafeBoot
D)HKLM\System\CurrentControlSet\Services\SafeBoot
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The best way to change inherited permissions is to change the permissions of the ____.

A)child object
B)inherited objects
C)parent object
D)inheriting objects
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ command can be used to encrypt,decrypt,or recover an encrypted file when the certificates are lost.

A)Decipher
B)Cipher
C)Decode
D)Transcode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
If you name a shared folder Financial$,in order to access the folder,a user must enter ____ in the Vista Start Search box.

A)\\computername\Financial$
B)\\financial$\computername
C)\\computername\shares\financial$
D)\\shares\computername\financial$
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.

A)behavior
B)process
C)virus
D)malicious
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
For a stand-alone computer that is not part of a Windows domain,the EFS encrypting process generates a ____ digital certificate to be used for the encryption.

A)publicly-signed
B)network-signed
C)system-signed
D)self-signed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A(n)____ computer is not allowed to use the network,is put on a different network dedicated to them,or is only allowed to access certain network resources.

A)unrestricted
B)restricted
C)isolated
D)quarantined
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Allowing users full control of a folder is always required by job requirements.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Many notebook computers have a chip on the motherboard called the ____.

A)MPM
B)CPM
C)UPM
D)TPM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
If an infected computer will not boot,it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Permissions that are attained from a parent object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____________________shares are the folders that are shared by default on a network that administrator accounts can access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
In UNIX,the lowest and most powerful level of UNIX accounts is called the ____ account.

A)God
B)master
C)universal
D)root
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Those users who have not been authenticated on a remote computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Designed to do varying degrees of damage to data and software,although it does not damage PC hardware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
To see a list of services managed by Svchost,enter this command in a command-prompt window: ____.

A)taskview /svc
B)taskmgr /svc
C)tasklist /SVC
D)tasklist /all
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Use ____ to search for malware processes,especially those that mask themselves as core Windows processes and elude AV software.

A)Computer Manager
B)Task Manager
C)System Manager
D)Event Viewer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A virus is often programmed to attempt to hide from ____________________ software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

A)root
B)privileged
C)user
D)executive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Folders on a computer that are shared with others on the network using a folder's Properties box
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes the Authenticated Users group as well as the Guest account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes all user accounts that can access the system except the Guest account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
If you need to change the rights of a user account to the administrator's level,use the ____________________ console and add the user to the administrators group.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A(n)____________________ running in kernel mode actually interferes with the Windows kernel and substitutes its own information in place of the raw data read by the Windows kernel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)____________________ is placed in a special directory and cannot be opened.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
You can recognize a program as a counterfeit process if it's not running under System,Local Service,or ____.

A)Administrator
B)Guest
C)Local
D)Network Service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Is when permissions are passed from parent to child
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
A program that uses unusually complex methods to hide itself on a system,and many spyware and adware programs are also rootkits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The term ____ applies to a kit or set of tools used originally on UNIX computers.

A)rootkit
B)botkit
C)stealthkit
D)worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the methods to deal with infected or damaged boot sectors or corrupted BIOS code.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Discuss the Anonymous users group.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Explain why sharing all the drives on all computers is not a good security practice.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List the steps to add a certificate to an encrypted file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe one method that can be used to decrypt a file or folder.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List three methods for protecting a system against malicious software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss how to get the best results when scanning for rootkits.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain the Authenticated Users group.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss encrypting files and folders.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List the two methods used by antirootkit software to remove rootkits after they are installed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.