You are on page 1of 15

A+ Review Quizzes Ch20

Question 1 Correct Mark 9 out of 9

Flag question

Question text Match the Best Answer Includes all user accounts that can access the system except the Guest account
Authenticated Users group

Includes the Authenticated Users group as well as the Guest account

Everyone group

Those users who have not been authenticated on a remote computer

Anonymous users

Permissions that are attained from a parent object

Inherited permissions

Is when permissions are passed from parent to child

Permission propagation

Folders on a computer that are shared with others on the network using a folders Properties box

Local shares

Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system

Drive lock passw ord

Designed to do varying degrees of damage to data and software, although it does not damage PC hardware A program that uses unusually complex methods to hide itself on a system, and

Malicious softw are

Rootkit

many spyware and adware programs are also rootkits Feedback The correct answer is: Includes all user accounts that can access the system except the Guest account Authenticated Users group, Includes the Authenticated Users group as well as the Guest account Everyone group, Those users who have not been authenticated on a remote computer Anonymous users, Permissions that are attained from a parent object Inherited permissions, Is when permissions are passed from parent to child Permission propagation, Folders on a computer that are shared with others on the network using a folders Properties box Local shares, Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system Drive lock password, Designed to do varying degrees of damage to data and software, although it does not damage PC hardware Malicious software, A program that uses unusually complex methods to hide itself on a system, and many spyware and adware programs are also rootkits Rootkit.
Question 2 Correct Mark 1 out of 1

Flag question

Question text Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file. Select one: a. network b. simple c. directory d. user Feedback The correct answer is: simple.
Question 3 Correct Mark 1 out of 1

Flag question

Question text When you share folders on the network, the ____ permissions for remote users need to be set. Select one: a. share b. file c. folder d. disc Feedback The correct answer is: share.
Question 4 Correct Mark 1 out of 1

Flag question

Question text The best way to change inherited permissions is to change the permissions of the ____. Select one: a. child object b. inherited objects c. parent object d. inheriting objects Feedback The correct answer is: parent object.
Question 5 Correct

Mark 1 out of 1

Flag question

Question text To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. Select one: a. Security b. Derived Permissions c. Actual Permissions d. Effective Permissions Feedback The correct answer is: Effective Permissions.
Question 6 Correct Mark 1 out of 1

Flag question

Question text A $ at the end of the folder name creates a ____ share. Select one: a. public b. hidden c. inaccessible d. visible Feedback The correct answer is: hidden.

Question 7 Correct Mark 1 out of 1

Flag question

Question text If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box. Select one: a. \\computername\Financial$ b. \\financial$\computername c. \\computername\shares\financial$ d. \\shares\computername\financial$ Feedback The correct answer is: \\computername\Financial$.
Question 8 Correct Mark 1 out of 1

Flag question

Question text The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost. Select one: a. Decipher b. Cipher c. Decode d. Transcode

Feedback The correct answer is: Cipher.


Question 9 Correct Mark 1 out of 1

Flag question

Question text For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption. Select one: a. publicly-signed b. network-signed c. system-signed d. self-signed Feedback The correct answer is: self-signed.
Question 10 Correct Mark 1 out of 1

Flag question

Question text Certificates are managed using the ____ console. Select one: a. Certificate Store b. Certificate Preparation

c. Certificate Manager d. Digital Certificate Feedback The correct answer is: Certificate Manager.
Question 11 Correct Mark 1 out of 1

Flag question

Question text If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a ____ certificate. Select one: a. recovery b. restoration c. backup d. administrator Feedback The correct answer is: recovery.
Question 12 Correct Mark 1 out of 1

Flag question

Question text Many notebook computers have a chip on the motherboard called the ____. Select one:

a. MPM b. CPM c. UPM d. TPM Feedback The correct answer is: TPM.
Question 13 Correct Mark 1 out of 1

Flag question

Question text ____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip. Select one: a. Software b. BIOS c. Blocks d. Chipsets Feedback The correct answer is: BIOS.
Question 14 Correct Mark 1 out of 1

Flag question

Question text

A ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources. Select one: a. unrestricted b. restricted c. isolated d. quarantined Feedback The correct answer is: quarantined.
Question 15 Correct Mark 1 out of 1

Flag question

Question text AV software detects a known virus by looking for distinguishing characteristics called ____ signatures. Select one: a. behavior b. process c. virus d. malicious Feedback The correct answer is: virus.
Question 16 Correct Mark 1 out of 1

Flag question

Question text If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____. Select one: a. HKLM\System\CurrentControlSet\Control\SafeBoot b. HKLM\System\CurrentControlSet\System\SafeBoot c. HKCU\System\CurrentControlSet\Control\SafeBoot d. HKLM\System\CurrentControlSet\Services\SafeBoot Feedback The correct answer is: HKLM\System\CurrentControlSet\Control\SafeBoot.
Question 17 Correct Mark 1 out of 1

Flag question

Question text You can recognize a program as a counterfeit process if its not running under System, Local Service, or ____. Select one: a. Administrator b. Guest c. Local d. Network Service Feedback The correct answer is: Network Service.
Question 18

Correct Mark 1 out of 1

Flag question

Question text Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software. Select one: a. Computer Manager b. Task Manager c. System Manager d. Event Viewer Feedback The correct answer is: Task Manager.
Question 19 Correct Mark 1 out of 1

Flag question

Question text To see a list of services managed by Svchost, enter this command in a command-prompt window: ____. Select one: a. taskview /svc b. taskmgr /svc c. tasklist /SVC d. tasklist /all

Feedback The correct answer is: tasklist /SVC.


Question 20 Correct Mark 1 out of 1

Flag question

Question text The term ____ applies to a kit or set of tools used originally on UNIX computers. Select one: a. rootkit b. botkit c. stealthkit d. worm Feedback The correct answer is: rootkit.
Question 21 Correct Mark 1 out of 1

Flag question

Question text In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ account. Select one: a. God b. master c. universal

d. root Feedback The correct answer is: root.


Question 22 Correct Mark 1 out of 1

Flag question

Question text A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window. Select one: a. root b. privileged c. user d. executive Feedback The correct answer is: user.
Question 23 Correct Mark 1 out of 1

Flag question

Question text When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups. Select one: True

False Feedback The correct answer is 'True'.


Question 24 Correct Mark 1 out of 1

Flag question

Question text Allowing users full control of a folder is always required by job requirements. Select one: True False Feedback The correct answer is 'False'.
Question 25 Correct Mark 1 out of 1

Flag question

Question text Permissions manually set for a subfolder or file cannot override inherited permissions. Select one: True False Feedback The correct answer is 'False'.

Question 26 Correct Mark 1 out of 1

Flag question

Question text It is necessary that all computers belong to the same workgroup in order to share resources. Select one: True False Feedback The correct answer is 'False'.
Question 27 Correct Mark 1 out of 1

Flag question

Question text If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted. Select one: True False Feedback The correct answer is 'True'.

You might also like