You are on page 1of 4

Homework Chapter 7 Windows 7 Security Essentials

TruelFalse Indicate whether the statement is true or false.

l. 2.

The most critical effect of mal ware is degraded system performance. The most commonly used method for authentication is a username and password.

-r
r.r:

r:L

--

3. NTFS permissions can be easily circumvented when you have physical access to a computer. 4. 5. In Windows 7, advanced audit policies can only be edited at a command-line. Every object in Windows 7 has audit events related to it.

/L
,--~

Multiple Choice Identify the choice that best completes the statement or answers the question. 6. __ a. b. is a threat to privacy and often makes systems unstable. Windows Defender c. Macro script EFS d. Spyware

7. A(n) __ computer is one that has outdated antivirus signatures or is missing security updates. a. unhealthy c. safe b. healthy d. authorized 8. To address the risks to data stored on workstations and laptops, __ is available on Windows 7. a. NAP c. BitLocker Drive Encryption b. Dual Locked Hard Drive d. TPM 9. Windows 7 includes a(n) __ a. NAP b. local security policy, which can be used to control many facets of Windows. c. EFS security d. remote ' which can be

fA...

/b
<L-=

10. The local security policy is part of a larger Windows management system called __ implemented on a local computer, but is typically part of a domain-based network. a. Group Policy c. Network Policy b. Local Policy d. Domain Policy 11. A(n) __ policy controls password characteristics for local user accounts. a. account lockout c. domain b. password d. user control

12. Using the __ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts. a. domain c. account lockout b. group d. password

Name:

----------------------13. ____ is(are) used to define which programs are allowed or disallowed in the system. a. Software restriction policies c. Local policies b. A network zone d. AppLocker

ID: A

14. A rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run. a. network zone c. hash b. path d. certificate

1115.
-V-/l L

____ is the security process that records the occurrence of specific operating system events in the Security log. a. Encrypting c. Filtering b. Hashing d. Auditing

tracks when tasks are performed that require a user rights assignment, such as changing the 16. Audit system time. a. logon events c. privilege use b. account management d. process tracking Newer Windows applications use an application a. manifest c. b. log d. to describe the structure of an application. record hash

~rA.. 17.

..... J

18. You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the . a. Administrative Privileges Toolkit c. Secure Toolkit b. Private Toolkit d. Application Compatibility Toolkit is a great source of information, it is also the biggest source of malware (malicious software). 19. While a. the Internet c. a hard disk b. a cloud library d. a router

20.

____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior. a. Adware c. Spyware b. Worm d. Virus The most basic level of data security in Windows 7 is a. EFS c. FAT b. NTFS d. NAP permissions.

21.

22.

1 23.

a. b.

is the process of taking data and making it unreadable. Encryption c. Signing Decryption d. Verifying

A(n) encryption algorithm uses the same key to encrypt data and decrypt data. a. asymmetric c. signing b. symmetric d. hash

Name:

ID: A

.L;.

l~.

A(n) __ encryption algorithm uses two keys to encrypt and decrypt data. a. signing c. asymmetric b. symmetric d. hash A(n) __ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted. a. signing c. asymmetric d. hash b. symmetric A(n) __ is part of the motherboard in your computer and is used to store encryption keys and certificates. a. NTFS c. EFS b. TPM d. NAP

Completion Complete each statement.


27.

Internet Explorer has been modified to run in a limited state, called _+?----'f
user files cannot be modified. \"

o=--"'-_~,-t--,c+~J_--,--__

mode, in which

28.

Windows 7 is protected ~etor)<.s IV r Ce 55 +-i 0 ,e.CJ\.

eJ.uo K Ac

by an enhanced firewall and


l() Y\ .

29. 30.

The Account Policies category contains the

=t>6 s..s ~or~

policy and the account lockout policy.

~Uf;

t'7'jeb~~cjC>are .inffiles that contain settings that correspond with the Account Policies and Local Policies in the local security policy. is a method for protecting data on removable storage such as USB drives.

Matching Match each term with the correct statement below: ~ Malware Y. BitLocker Drive Encryption ~ User Account Control (UAC) . % Auditing Windows Defender /1.' Path rule condition y. Phishing filter /. Password Policy ~ Network Access Protection (NAP)

~/

32.

prevents unauthorized Web sites from stealing log-on credentials and other personal information controls password characteristics for local user accounts.

'I /"

33.

AI" 34.

malicious software designed to perform unauthorized acts on your computer a real-time spyware monitor to prevent the installation of and remove spyware lets you track when users log on and which resources are used encrypts the entire volume of a partition and protects the system partition

U 35.
~
~ I

36. 37.

Name:

ID:A
prevents unhealthy computers from accessing the network identifies software by file location prompts administrative user if an administrative action is initiated by a program

L ~ 38.
~39.

b./40.

You might also like