Preview

Chapter 18 WOS review

Satisfactory Essays
Open Document
Open Document
590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 18 WOS review
Chapter 18

Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive? degausser A privacy filter is used for what aspect of security?
Screen viewing
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
You can use gpedit.msc to see if any policies conflict
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
Bootrec /fixboot
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? tailgating It’s usually a good idea to run several anti-malware programs at the same time on your computer.
False
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Ctrl+Alt+Delete
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Process Explorer
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
False
Which of the following is true about the Windows Encrypted File System?
An encrypted file moved to an unencrypted folder remains encrypted
Using Group Policy, you can set security policies to help secure a workstation
True
Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the anti software loads? rootkit If you don’t want to use Bitlocker to protect your computer, you can still configure a power-on password using which of the following?
The BIOS
Which of the following is true about the Guest account in Windows 7?
It is disabled by default
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
True
On a peer-to-peer network, authentication is the responsibility of the domain.
False
Which of the following is true about passwords.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    You issued all of the commands required by the lab and you answered all of…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    7. Domain policy is a default policy for domain computers. Local policies are for your local computer. Domain policies will overwrite local policies.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    system or kernel to load when the computer starts. It is very important to lock this down because of the high access…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    BitLocker does not protect the computers contents while Windows is running. BitLocker is built for offline attacks, once the operating system is up and running.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hit Malware is a Ransom: Win32/VenusLocker.A removal tool with the aid of which you shall not only be able to remove all genres of threats but make sure that system throughput is significantly increased.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What elements are needed in a workstation domain policy regarding use of anti-virus and malicious…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    7. Which of the following built-in Windows 7 accounts are special identities? Everyone, Authenticated Users.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The obnoxious virus is exceptionally unsafe and perilous and can change interior settings of the Windows System.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Windows 7 Config

    • 10250 Words
    • 41 Pages

    If you use a Tablet PC or other computer with a touch screen, you might need to connect a keyboard and mouse in order to use Startup Repair and the other tools in the System Recovery Options menu. The System Recovery Options menu What each recovery option does System recovery option | | Description | Startup Repair | | Fixes certain problems, such as missing or damaged system files, that might prevent Windows from starting correctly. For more information, see Startup Repair: frequently asked questions. | System Restore | | Restores your computer's system files to an earlier point in time without affecting your files, such as email, documents, or photos.…

    • 10250 Words
    • 41 Pages
    Good Essays
  • Satisfactory Essays

    Why: Physical security must be maintained, because no matter what logical measures are taken, if an unauthorized person is able to gain hands-on access directly to a workstation, they can wreak havoc on the organization’s systems. Since we never know who may be around, it is equally as important to lock or logout of a workstation when leaving the desk, and never leave passwords near it. IT Staff needs to ensure all systems have the appropriate software for both day-to-day operations, as well as workstation security are installed to prevent the need to download more additional software, and prevent malware from being loaded into the system.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Rtc Configuration

    • 462 Words
    • 2 Pages

    * Copy xp_ndo.dll and xp_ndo_x64.dll extension files from the Microsoft Dynamics NAV 6.02 setup cd [SQLDatabase\PFiles\Microsoft Dynamics NAV\60\Database] in C:\Program Files\Microsoft SQL Server\MSSQL10_50.MSSQKSERVER\MSSQL\Binn folder.…

    • 462 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    course project ITT

    • 4392 Words
    • 18 Pages

    I will not try to access data or use operating systems or programs, except as specifically authorized.…

    • 4392 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    User Manual on E2M Exports

    • 1983 Words
    • 8 Pages

    In the window above, enter your user name and password. Make sure that the caps lock key is not enabled. Press Login.…

    • 1983 Words
    • 8 Pages
    Good Essays