CINS220_Chapter13-14_Windows

¡Supera tus tareas y exámenes ahora con Quizwiz!

16. In a Windows system, at least one account must be a(n) _______________ account.

administrator

7. In reference to Windows groups, _______________ privileges grant complete control over a machine.

administrator

15. Current Windows versions use a Windows Boot Manager, called _______________.

bootmgr

32. A(n) _______________ tracks specific information about an object.

counter

23. By default, the Task Manager shows only processes associated with the _______________.

current user

8. The HKEY_CURRENT_USER root key stores the _______________ settings.

current user

3. A strong password should be at least _______________ characters in length.

eight

5. There are _______________ main subgroups, or root keys.

five

6. In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.

group

12. In Windows systems, the _______________ account might be used to provide casual Internet access to users at a library terminal.

guest

2. Registry files are called _______________.

hives

13. In a Windows XP system, the recommended user-account type known as _______________ prevented users from performing common tasks, such as running certain programs, installing applications, updating applications, and updating Windows.

limited user

11. You create three accounts when you set up a Windows Vista computer: guest, administrator, and a(n) _______________ that is a member of the Administrators group.

local account

17. In a BIOS-based system, the BIOS uses its boot order to scan a hard drive for a(n) _______________.

master boot record (MBR)

31. A(n) _______________ is a system component that is given a set of characteristics and can be managed by the operating system as a single entity.

object

5. In a Windows XP system, ____________________ are almost as powerful as administrators, but they cannot install new devices or access other users' files unless access is provided.

power users

8. In a Windows system, ____________________ have rights almost equal to that of the administrator, except that they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.

power users

22. To identify a process, use the _______________, not the process name.

process identifier (PID)

4. Strong passwords should include letters, numbers, and _______________ symbols.

punctuation

3. Before most modern versions of Windows, Windows came with two Registry editors: _______________ and _______________.

regedt32.exe and regedit.exe

13. The _______________ command can modify the Registry in only one way, adding (or registering) dynamic link library (DLL) files as command components.

regsvr32

18. The _______________ command can modify the Registry in only one way, adding (or registering) dynamic link library (DLL) files as command components in the Registry.

regsvr32

9. In a Windows system, members of the Users group are called _______________ users.

standard

4. Root keys are composed of _______________.

subkeys

29. You can kill a process using the _______________ command, using either the name or the PID.

taskkill

28. The _______________ command enables you to view running processes on a local or remote system.

tasklist

17. Parental Controls allow you to limit _______________ logged on as well as restrict access to types of games and specific applications.

time

28. How are Libraries folders displayed in Windows 8.1 File Explorer? A. Simply open File Explorer; they display automatically. B. Navigate to the folder C:\Users\MyLibraries. C. Right-click in the navigation section and click Show Libraries. D. Double click on Favorites and click Show Libraries in the dialog box.

C. Right-click in the navigation section and click Show Libraries.

24. Which user name is associated with a process started by Windows? A. Administrator B. Windows C. System D. The logged in user

C. System

32. What command enables you to view running processes on a local or remote system? A. Taskview B. Control Panel C. Tasklist D. Services

C. Tasklist

9. A named group of functions that defines what you can do with an object is called a ________________. A. hive B. counter C. class object D. performance object

C. class object

7. A password _______________ policy forces users to select a new password periodically. A. permissions B. disabling C. expiration D. anti-hack

C. expiration

10. Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. A. network B. directory C. group D. owner

C. group

18. When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder. A. administrator B. developer C. owner D. editor

C. owner

2. The go-to command to open up the Registry editor is ________________. A. taskmgr B. registryedit.exe C. regedit D. winload.exe

C. regedit

22. A user account with the _______________ permission can give or take away permissions for other accounts.

Change

34. _______________ assists in object sharing between applications and computers on a network.

Component Services

8. Which character in a password is most helpful in defeating common word hacks? A. @ B. 3 C. X D. w

A. @

25. Which tab in Task Manager can be used to stop an application? A. Applications B. Services C. Processes D. Performance

A. Applications

1. How is the Registry organized? A. As a tree structure B. As a flat structure C. As a relational structure D. As a peer structure

A. As a tree structure

19. Which file contains information about the various operating systems installed on the system? A. Boot Configuration Data (BCD) file B. Ntoskrnl.exe C. Task Manager D. Winload.exe

A. Boot Configuration Data (BCD) file

20. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. A. Change B. List C. Read & Execute D. Modify

A. Change

15. _______________ ratings such as E, T, and M can be used to allow or block computer game use. A. ESRB B. ETM C. UAC D. TPM

A. ESRB

8. Which Registry root key root key defines which option is being used currently, assuming that more than one is specified in HKEY_LOCAL_MACHINE? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_CURRENT_USER

A. HKEY_CURRENT_CONFIG

3. What are Registry files called? A. Hives B. Nodes C. DSNs D. Leafs

A. Hives

23. What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder? A. Inheritance B. Traversal C. NTFS propagation D. Permission sharing

A. Inheritance

16. What is the primary tool Windows uses for providing authorization? A. NTFS B. Shared folders C. Local Security Policy D. Parental Controls

A. NTFS

37. What coding standard allows programmers to write databases and applications to locate and access a database without worrying about the application or operating system in use? A. ODBC B. Component Services C. Java D. Microsoft .NET

A. ODBC

35. A counter tracks specific information about a(n) ________________. A. Object B. Task C. Tool D. User

A. Object

21. By default, who has complete control over a folder or file? A. Owner B. Administrator C. All users D. Power users

A. Owner

30. Which tab in the Task Manager shows information about CPU usage, available physical memory, and the size of the disk cache? A. Performance B. Networking C. User D. Services

A. Performance

27. What is one way to start Task Manager? A. Press CTRL-ALT-DELETE and select Task Manager. B. Press CTRL-ALT-ENTER and select Task Manager. C. Press CTRL-SHIFT-DELETE and select Task Manager. D. Press CTRL-SHIFT-F1 and select Task Manager.

A. Press CTRL-ALT-DELETE and select Task Manager.

10. Which key value data type is limited to exactly 64 bits? A. QWORD B. DWORD C. Binary D. String

A. QWORD

24. What happens to a file or folder permission if it is copied within an NTFS partition? A. The original retains permissions, and the copy inherits permissions from the new location. B. Both original and copy retain permissions of the original location. C. Both original and copy inherit permissions from the new location. D. The original inherits permissions from the new location, and the copy retains permissions.

A. The original retains permissions, and the copy inherits permissions from the new location.

17. What two sets of data does every folder and file on an NTFS partition list? A. User and group access and level of access B. Read and Execute permissions C. NTFS and FAT permissions D. Encryption and decryption attributes

A. User and group access and level of access

37. What UAC classification is associated with a digitally signed, third-party program or non-core OS program? A. Verified B. Published by Windows C. Unverified D. Blocked program

A. Verified

30. Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely. A. administrative shares B. simple file sharing C. shared folders D. public folders

A. administrative shares

10. To create and manage user accounts in Windows, you must be a member of the ____________________ group.

Administrators

27. Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify? A. -rm-rm-r-- B. -rw-rw-r-- C. -rwxr--rw- D. -rmxrm-rm-

B. -rw-rw-r--

22. The name of a process usually ends with what file extension? A. .jpg B. .exe C. .doc D. .msc

B. .exe

16. What is one major risk of editing the Registry? A. Malware infecting the computer B. Applications not starting up C. Applications being uninstalled D. E-mails being sent unintentionally

B. Applications not starting up

2. What process determines what a legitimate user can and cannot do on a system? A. Accessibility B. Authorization C. Permission propagation D. Inheritance

B. Authorization

32. What tool is offered by Windows Vista Ultimate and Enterprise editions to encrypt entire hard drives? A. NTFS B. BitLocker C. TPMs D. TrueCrypt

B. BitLocker

38. Which kind of entries point OBDC to a database and are created and managed by the user through the Data Source Administrator? A. DNS B. DSN C. DHCP D. DCOM

B. DSN

11. Which key value data type is limited to exactly 32 bits? A. QWORD B. DWORD C. Binary D. String

B. DWORD

14. What feature allows you to import a new or backup subkey? A. Add B. Merge C. Create D. Redo

B. Merge

22. Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders? A. Full Control B. Modify C. List Folder Contents D. Read

B. Modify

40. In Windows 7, which UAC notification level is the default setting? A. Always notify B. Notify me only when programs try to make changes C. Notify me only when programs try to make changes (do not dim my desktop) D. Never notify

B. Notify me only when programs try to make changes

34. What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program? A. southbridge B. TPM C. GPU D. northbridge

B. TPM

19. Which NTFS permission allows an account to seize control of a file or folder owned by another account? A. File permissions B. Take Ownership permission C. Folder permissions D. Change permission

B. Take Ownership permission

21. What is the one-stop place for anything you need to do with applications, processes, or services? A. Program Manager B. Task Manager C. Administrative Tools D. Services Manager

B. Task Manager

4. What is stored in the \%SystemRoot%\System32\config folder? A. Boot files B. The Registry C. Group policies D. System files

B. The Registry

36. An unpopular, but necessary, security feature introduced in Windows Vista was _______________. A. NTFS B. UAC C. EFS D. WAC

B. UAC

14. What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer? A. Parental Controls B. User Account Control C. Primary Controls D. Mandatory Control

B. User Account Control

13. If your Vista computer is on a workgroup, what applet is used to manage user accounts? A. User Accounts B. User Accounts and Family Safety C. Users and Passwords D. Users and Groups

B. User Accounts and Family Safety

9. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. A. six B. eight C. 10 D. 256

B. eight

18. Windows runs many processes simultaneously, a feature known as ______________. A. multiprocessing B. multitasking C. parallel processing D. serial processing

B. multitasking

26. What three letters are used in a Linux terminal to indicated permissions associated with a file or folder? A. omc B. rwx C. awk D. lsp

B. rwx

11. Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group. A. restricted user B. standard user C. new user D. default user

B. standard user

4. Which term refers to a unique combination of a user name and an associated password? A. user authorization B. user account C. user authentication D. user identity

B. user account

14. Current Windows versions support both _______________ and _______________ boot processes.

BIOS and UEFI

10. _______________ store nothing more than long strings of ones and zeros.

Binary values

19. Bootmgr starts and reads data from a(n) _______________ file that contains information about the various operating systems installed on the system.

Boot Configuration Data (BCD)

1. What process identifies and grants access to a user who is trying to access a system? A. Credibility B. Authorization C. Authentication D. Honesty

C. Authentication

20. Which file is the Windows Boot Manager? A. Ntldr B. Ntoskrnl.exe C. Bootmgr D. Bootload.exe

C. Bootmgr

28. How is the amount of CPU time used by a process measured in Task Manager? A. By priority B. In seconds C. By percentage D. In kilobytes

C. By percentage

36. What tool is provided in Windows to facilitate sharing data objects between applications and computers? A. The Registry B. TCP/IP C. Component Services D. ODBC

C. Component Services

29. What techniques provide the only true way to protect your data from access by any other user? A. Regular backups B. Authorization C. Encryption D. Authentication

C. Encryption

6. Which Registry root key defines the standard class objects used by Windows? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE

C. HKEY_CLASSES_ROOT

5. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. A. command line B. encrypting C. NTFS D. administrative

C. NTFS

26. Which tab shows you every running process on your computer? A. Applications B. Services C. Processes D. Performance

C. Processes

38. If you use the System Configuration utility (msconfig) and select Disable UAC on the Tools tab, what further action is required to turn off UAC? A. Log off B. Log on as a different user C. Reboot D. None

C. Reboot

13. Which command is a full-featured command-line Registry editor? A. Regedt32 B. Regsrv32 C. Reg D. Regedit

C. Reg

17. Which command can modify the Registry by adding (or registering) dynamic link library (DLL) files as command components? A. Regedit B. Reg C. Regsvr32 D. Regedt32

C. Regsvr32

18. To create a new user in Windows 7, open the User Accounts Control Panel applet, select Manage another account, and then click ____________________.

Create a new account

5. How many root keys are in the Registry? A. Seven B. Four C. Six D. Five

D. Five

39. How many notification levels of UAC did Microsoft include in Windows 7? A. One B. Two C. Three D. Four

D. Four

31. What type of access is granted if you log on to a computer remotely as administrator with no password? A. Administrator B. Standard user C. Power user D. Guest

D. Guest

7. Which Registry root key contains all the data for a system's non-user-specific configurations? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE

D. HKEY_LOCAL_MACHINE

3. On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. A. Group account B. Single account C. Specialized account D. Local user account

D. Local user account

33. What can be typed in the Windows Search bar to open the Windows performance tool? A. Perfmon.mmc B. Monitor.mmc C. Perform.msc D. Perfmon.msc

D. Perfmon.msc

34. Which Windows 7 tool gives you an overview of how a PC has behaved over time, showing important events such as application or OS crashes? A. Performance console B. Reliability and Performance Monitor C. System Monitor D. Reliability Monitor

D. Reliability Monitor

29. What can be typed in the Windows Search to open the Services Control Panel applet? A. Regserv.mmc B. Perfmon.msc C. Service.mmc D. Services.msc

D. Services.msc

12. Which key value data type can be used for any form of data? A. QWORD B. DWORD C. Binary D. String

D. String

33. What does BitLocker require on a motherboard to validate on boot that a Windows Vista computer has not been changed? A. EFS B. IPC$ C. Core i7 D. TPM

D. TPM

15. What is a common reason to edit this Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run? A. To change the Windows boot options B. To reset a password C. To change the Windows Product Key D. To delete autostarting programs

D. To delete autostarting programs

31. Which tab in the Task Manager would you use to find out what programs are running under a certain user's account? A. Services B. Performance C. Networking D. User

D. User

12. What is the Windows Vista tool for managing users and groups? A. Users and Passwords applet B. User accounts and Groups applet C. Users and Groups applet D. User Accounts applet

D. User Accounts applet

25. Which Linux command enables you to change the owner and the group with which a file or folder is associated? A. mount B. chmod C. crontab D. chown

D. chown

6. What unique key is known only by the system and the person with whom the key is associated? A. token B. user name C. user ID D. password

D. password

23. Processes are usually referred to by their _______________. A. globally unique identifier (GUID) B. service name C. executable name D. process identifier (PID)

D. process identifier (PID)

35. Opening a command line and running _______________ provides access to a utility called Local Security Policy. A. rwx.msc B. ls -l C. dir /p D. secpol.msc

D. secpol.msc

11. ______________ values are like binary values but are limited to exactly 32 bits.

DWORD

33. _______________ in Reliability and Performance Monitor (Windows Vista) and Performance Monitor (Windows 7 and on) group counters that you can use to make reports.

Data Collector Sets

37. ODBC Data Source Administrator enables you to create and manage _______________ that point ODBC to a database.

Data Source Names (DSNs)

1. Through the combination of user accounts and groups and _______________ permissions, Windows provides incredibly powerful file and folder security.

NTFS

2. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.

NTFS

36. Microsoft's tool to configure ODBC is called the _______________.

ODBC Data Source Administrator

35. _______________ is a coding standard that enables programmers to write databases and applications to be able to locate and access a database without any concern about what application or operating system is used.

Open Database Connectivity (ODBC)

14. In Windows Vista, managers and parents can use _______________ to monitor and limit the activities of standard users.

Parental Controls

27. The _______________ tab is a great tool for investigating how hard your RAM and CPU are working at any given moment and why.

Performance

30. In Windows 7, the _______________ displays a modest screen with some text about Performance Monitor and a System Summary.

Performance Monitor

24. _______________, a free tool, gives you the ability to see which processes depend on others.

Process Explorer

12. _______________ values are like binary values but are limited to exactly 64 bits.

QWORD

1. The _______________ is a huge database that stores everything about your PC.

Registry

21. The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.

Security

25. The best way to work with services is to use the _______________ applet.

Services Control Panel

9. _______________ data types are very common and offer the most flexible type of value.

String value

21. A process started by Windows has the user name _______________.

System

20. Pressing CTRL-SHIFT-ESC will open Windows _______________.

Task Manager

16. In a(n) _______________ system, the MBR/GUID partition table (GPT) nor the file system boot code is run.

UEFI

15. To add a user in Windows Vista, open the _______________ applet.

User Accounts

26. The _______________ tab of Task Manager enables you to log off or log off other users if you have the proper permissions.

Users

23. You can do anything you want to a file or folder with the NTFS _______________ permission.

Full Control

6. The _______________ root key defines the standard class objects used by Windows (i.e., file types and associations).

HKEY_CLASSES_ROOT

7. The _______________ root key stores all of the personalized information for all users on a PC.

HKEY_USERS

19. Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.

Internet

20. In professional editions of Windows, the _______________ is a powerful too that can be used to create, modify, and remove users and groups.

Local Users and Groups


Conjuntos de estudio relacionados

LearnKey Photoshop CS6 Session 3 Labs and Post Assessment.

View Set

3-8 The Caribbean Today Reading Support

View Set

Allergic Rhinitis, Asthma, and ARDS

View Set

Microeconomics final (example questions)

View Set

Quiz 5: Stratification and Inequality

View Set