Basic Networking

Topics: Computer virus, Inkjet printer, Microsoft Windows Pages: 7 (2357 words) Published: July 20, 2013
Chapter 19
1. What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation? Kerberos
2. Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system? Audit policy
3. Define and explain the differences between viruses, worms, logic bombs, and Trojans. A virus is a program that can replicate by attaching itself to another program. A worm can spread copies of itself throughout a network without a host program. A Trojan horse, like a worm, does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program. A logic bomb is dormant code added to software and triggered by a predetermined event. 4. Where can viruses hide?

Viruses can hide in the boot sector, in a file, in a macro within a file, or in a combination of the boot sector and a file (for a multipartite virus). 5. What is the best way to protect a computer or network against worms? Use a firewall.

6. What is the best way to determine if an e-mail message warning about a virus is a hoax? Check Web sites on the Internet that track virus hoaxes.
7. Are boot sector viruses limited to hard drives? Explain. No. On a floppy disk, a boot sector virus hides in the boot program of the boot sector. 8. Which feature must you disable in the Folders Options applet of Control Panel before you can control which user group or user has access to a shared file or folder? Simple file sharing

9. What is the most likely way that a virus will get access to your computer? From an e-mail message
10. List three products to remove malicious software that can deal with adware and spyware. Ad-Aware, Spybot Search and Destroy, Windows Defender
11. Why is it best to run AV software in Safe Mode?
Because malware is less likely to be running in the background to prevent AV software from detecting it 12.Which Windows tool do you use to view a recorded log of network activity? Event Viewer
13. What registry key keeps information about services that run when a computer is booted into Safe Mode? HKLM\System\CurrentControlSet\Control\SafeBoot
14. What does AV software look for to determine that a program or a process is a virus? A virus signature
15. What Windows tool can you use to solve a problem of an error message displayed at startup just after your AV software has removed malware? Msconfig
16. What folder is used by Windows to hold System Restore restore points? \System Volume Information
17. How can you delete all restore points and clean up the restore points data storage area? Turn off System Restore and reboot the system.
18. What two methods does anti-rootkit software use to detect a rootkit? •The software looks for running processes that do not match up with the underlying program filename. •The software compares files, registry entries, and processes provided by the OS to the lists it generates from the raw data. If the two lists differ, a rootkit is suspected. 19. Name two anti-rootkit products.

Rootkit Revealer by Sysinternals (
BackLight by F-Secure (
20. What is the major disadvantage of using an AV software installation CD to install the AV software to rid a system of viruses? The software on the CD will not contain the latest virus signatures and other software updates; therefore, the AV software will not catch new viruses. For best results, after the AV software is installed, you must download the latest updates to the software. 21. Why does having Windows display known file extensions help prevent a system from being infected with malware? It helps prevent a system from being infected because users are less likely to be deceived that a file is actually a program or script, rather than a graphics file, some other innocent file type, or URL. 22. How does a rootkit running in user mode normally hide?

By intercepting API calls
23. What is...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • The Basics for Writing Undergraduate History Essays and Papers
  • Essay on Basic Troubleshooting
  • Computer Networking Essay
  • Essay on Networking Devices
  • Essay about Networking Essentials
  • Gw Basic Essay
  • Wireless Networking – Argumentative Essay Rough
  • Networking Test with Answers Essay

Become a StudyMode Member

Sign Up - It's Free