REVIEWING THE BASICS
1. What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation? Kerberos
2. Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system? Audit policy
3. Define and explain the differences between viruses, worms, logic bombs, and Trojans. A virus is a program that can replicate by attaching itself to another program. A worm can spread copies of itself throughout a network without a host program. A Trojan horse, like a worm, does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program. A logic bomb is dormant code added to software and triggered by a predetermined event. 4. Where can viruses hide?
Viruses can hide in the boot sector, in a file, in a macro within a file, or in a combination of the boot sector and a file (for a multipartite virus). 5. What is the best way to protect a computer or network against worms? Use a firewall.
6. What is the best way to determine if an e-mail message warning about a virus is a hoax? Check Web sites on the Internet that track virus hoaxes.
7. Are boot sector viruses limited to hard drives? Explain. No. On a floppy disk, a boot sector virus hides in the boot program of the boot sector. 8. Which feature must you disable in the Folders Options applet of Control Panel before you can control which user group or user has access to a shared file or folder? Simple file sharing
9. What is the most likely way that a virus will get access to your computer? From an e-mail message
10. List three products to remove malicious software that can deal with adware and spyware. Ad-Aware, Spybot Search and Destroy, Windows Defender
11. Why is it best to run AV software in Safe Mode?
Because malware is less likely to be running in the background to prevent AV software from detecting it 12.Which Windows tool do you use to view a...