CINS220_Chapter13-14_Windows
16. In a Windows system, at least one account must be a(n) _______________ account.
administrator
7. In reference to Windows groups, _______________ privileges grant complete control over a machine.
administrator
15. Current Windows versions use a Windows Boot Manager, called _______________.
bootmgr
32. A(n) _______________ tracks specific information about an object.
counter
23. By default, the Task Manager shows only processes associated with the _______________.
current user
8. The HKEY_CURRENT_USER root key stores the _______________ settings.
current user
3. A strong password should be at least _______________ characters in length.
eight
5. There are _______________ main subgroups, or root keys.
five
6. In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.
group
12. In Windows systems, the _______________ account might be used to provide casual Internet access to users at a library terminal.
guest
2. Registry files are called _______________.
hives
13. In a Windows XP system, the recommended user-account type known as _______________ prevented users from performing common tasks, such as running certain programs, installing applications, updating applications, and updating Windows.
limited user
11. You create three accounts when you set up a Windows Vista computer: guest, administrator, and a(n) _______________ that is a member of the Administrators group.
local account
17. In a BIOS-based system, the BIOS uses its boot order to scan a hard drive for a(n) _______________.
master boot record (MBR)
31. A(n) _______________ is a system component that is given a set of characteristics and can be managed by the operating system as a single entity.
object
5. In a Windows XP system, ____________________ are almost as powerful as administrators, but they cannot install new devices or access other users' files unless access is provided.
power users
8. In a Windows system, ____________________ have rights almost equal to that of the administrator, except that they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.
power users
22. To identify a process, use the _______________, not the process name.
process identifier (PID)
4. Strong passwords should include letters, numbers, and _______________ symbols.
punctuation
3. Before most modern versions of Windows, Windows came with two Registry editors: _______________ and _______________.
regedt32.exe and regedit.exe
13. The _______________ command can modify the Registry in only one way, adding (or registering) dynamic link library (DLL) files as command components.
regsvr32
18. The _______________ command can modify the Registry in only one way, adding (or registering) dynamic link library (DLL) files as command components in the Registry.
regsvr32
9. In a Windows system, members of the Users group are called _______________ users.
standard
4. Root keys are composed of _______________.
subkeys
29. You can kill a process using the _______________ command, using either the name or the PID.
taskkill
28. The _______________ command enables you to view running processes on a local or remote system.
tasklist
17. Parental Controls allow you to limit _______________ logged on as well as restrict access to types of games and specific applications.
time
28. How are Libraries folders displayed in Windows 8.1 File Explorer? A. Simply open File Explorer; they display automatically. B. Navigate to the folder C:\Users\MyLibraries. C. Right-click in the navigation section and click Show Libraries. D. Double click on Favorites and click Show Libraries in the dialog box.
C. Right-click in the navigation section and click Show Libraries.
24. Which user name is associated with a process started by Windows? A. Administrator B. Windows C. System D. The logged in user
C. System
32. What command enables you to view running processes on a local or remote system? A. Taskview B. Control Panel C. Tasklist D. Services
C. Tasklist
9. A named group of functions that defines what you can do with an object is called a ________________. A. hive B. counter C. class object D. performance object
C. class object
7. A password _______________ policy forces users to select a new password periodically. A. permissions B. disabling C. expiration D. anti-hack
C. expiration
10. Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. A. network B. directory C. group D. owner
C. group
18. When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder. A. administrator B. developer C. owner D. editor
C. owner
2. The go-to command to open up the Registry editor is ________________. A. taskmgr B. registryedit.exe C. regedit D. winload.exe
C. regedit
22. A user account with the _______________ permission can give or take away permissions for other accounts.
Change
34. _______________ assists in object sharing between applications and computers on a network.
Component Services
8. Which character in a password is most helpful in defeating common word hacks? A. @ B. 3 C. X D. w
A. @
25. Which tab in Task Manager can be used to stop an application? A. Applications B. Services C. Processes D. Performance
A. Applications
1. How is the Registry organized? A. As a tree structure B. As a flat structure C. As a relational structure D. As a peer structure
A. As a tree structure
19. Which file contains information about the various operating systems installed on the system? A. Boot Configuration Data (BCD) file B. Ntoskrnl.exe C. Task Manager D. Winload.exe
A. Boot Configuration Data (BCD) file
20. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. A. Change B. List C. Read & Execute D. Modify
A. Change
15. _______________ ratings such as E, T, and M can be used to allow or block computer game use. A. ESRB B. ETM C. UAC D. TPM
A. ESRB
8. Which Registry root key root key defines which option is being used currently, assuming that more than one is specified in HKEY_LOCAL_MACHINE? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_CURRENT_USER
A. HKEY_CURRENT_CONFIG
3. What are Registry files called? A. Hives B. Nodes C. DSNs D. Leafs
A. Hives
23. What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder? A. Inheritance B. Traversal C. NTFS propagation D. Permission sharing
A. Inheritance
16. What is the primary tool Windows uses for providing authorization? A. NTFS B. Shared folders C. Local Security Policy D. Parental Controls
A. NTFS
37. What coding standard allows programmers to write databases and applications to locate and access a database without worrying about the application or operating system in use? A. ODBC B. Component Services C. Java D. Microsoft .NET
A. ODBC
35. A counter tracks specific information about a(n) ________________. A. Object B. Task C. Tool D. User
A. Object
21. By default, who has complete control over a folder or file? A. Owner B. Administrator C. All users D. Power users
A. Owner
30. Which tab in the Task Manager shows information about CPU usage, available physical memory, and the size of the disk cache? A. Performance B. Networking C. User D. Services
A. Performance
27. What is one way to start Task Manager? A. Press CTRL-ALT-DELETE and select Task Manager. B. Press CTRL-ALT-ENTER and select Task Manager. C. Press CTRL-SHIFT-DELETE and select Task Manager. D. Press CTRL-SHIFT-F1 and select Task Manager.
A. Press CTRL-ALT-DELETE and select Task Manager.
10. Which key value data type is limited to exactly 64 bits? A. QWORD B. DWORD C. Binary D. String
A. QWORD
24. What happens to a file or folder permission if it is copied within an NTFS partition? A. The original retains permissions, and the copy inherits permissions from the new location. B. Both original and copy retain permissions of the original location. C. Both original and copy inherit permissions from the new location. D. The original inherits permissions from the new location, and the copy retains permissions.
A. The original retains permissions, and the copy inherits permissions from the new location.
17. What two sets of data does every folder and file on an NTFS partition list? A. User and group access and level of access B. Read and Execute permissions C. NTFS and FAT permissions D. Encryption and decryption attributes
A. User and group access and level of access
37. What UAC classification is associated with a digitally signed, third-party program or non-core OS program? A. Verified B. Published by Windows C. Unverified D. Blocked program
A. Verified
30. Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely. A. administrative shares B. simple file sharing C. shared folders D. public folders
A. administrative shares
10. To create and manage user accounts in Windows, you must be a member of the ____________________ group.
Administrators
27. Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify? A. -rm-rm-r-- B. -rw-rw-r-- C. -rwxr--rw- D. -rmxrm-rm-
B. -rw-rw-r--
22. The name of a process usually ends with what file extension? A. .jpg B. .exe C. .doc D. .msc
B. .exe
16. What is one major risk of editing the Registry? A. Malware infecting the computer B. Applications not starting up C. Applications being uninstalled D. E-mails being sent unintentionally
B. Applications not starting up
2. What process determines what a legitimate user can and cannot do on a system? A. Accessibility B. Authorization C. Permission propagation D. Inheritance
B. Authorization
32. What tool is offered by Windows Vista Ultimate and Enterprise editions to encrypt entire hard drives? A. NTFS B. BitLocker C. TPMs D. TrueCrypt
B. BitLocker
38. Which kind of entries point OBDC to a database and are created and managed by the user through the Data Source Administrator? A. DNS B. DSN C. DHCP D. DCOM
B. DSN
11. Which key value data type is limited to exactly 32 bits? A. QWORD B. DWORD C. Binary D. String
B. DWORD
14. What feature allows you to import a new or backup subkey? A. Add B. Merge C. Create D. Redo
B. Merge
22. Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders? A. Full Control B. Modify C. List Folder Contents D. Read
B. Modify
40. In Windows 7, which UAC notification level is the default setting? A. Always notify B. Notify me only when programs try to make changes C. Notify me only when programs try to make changes (do not dim my desktop) D. Never notify
B. Notify me only when programs try to make changes
34. What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program? A. southbridge B. TPM C. GPU D. northbridge
B. TPM
19. Which NTFS permission allows an account to seize control of a file or folder owned by another account? A. File permissions B. Take Ownership permission C. Folder permissions D. Change permission
B. Take Ownership permission
21. What is the one-stop place for anything you need to do with applications, processes, or services? A. Program Manager B. Task Manager C. Administrative Tools D. Services Manager
B. Task Manager
4. What is stored in the \%SystemRoot%\System32\config folder? A. Boot files B. The Registry C. Group policies D. System files
B. The Registry
36. An unpopular, but necessary, security feature introduced in Windows Vista was _______________. A. NTFS B. UAC C. EFS D. WAC
B. UAC
14. What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer? A. Parental Controls B. User Account Control C. Primary Controls D. Mandatory Control
B. User Account Control
13. If your Vista computer is on a workgroup, what applet is used to manage user accounts? A. User Accounts B. User Accounts and Family Safety C. Users and Passwords D. Users and Groups
B. User Accounts and Family Safety
9. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. A. six B. eight C. 10 D. 256
B. eight
18. Windows runs many processes simultaneously, a feature known as ______________. A. multiprocessing B. multitasking C. parallel processing D. serial processing
B. multitasking
26. What three letters are used in a Linux terminal to indicated permissions associated with a file or folder? A. omc B. rwx C. awk D. lsp
B. rwx
11. Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group. A. restricted user B. standard user C. new user D. default user
B. standard user
4. Which term refers to a unique combination of a user name and an associated password? A. user authorization B. user account C. user authentication D. user identity
B. user account
14. Current Windows versions support both _______________ and _______________ boot processes.
BIOS and UEFI
10. _______________ store nothing more than long strings of ones and zeros.
Binary values
19. Bootmgr starts and reads data from a(n) _______________ file that contains information about the various operating systems installed on the system.
Boot Configuration Data (BCD)
1. What process identifies and grants access to a user who is trying to access a system? A. Credibility B. Authorization C. Authentication D. Honesty
C. Authentication
20. Which file is the Windows Boot Manager? A. Ntldr B. Ntoskrnl.exe C. Bootmgr D. Bootload.exe
C. Bootmgr
28. How is the amount of CPU time used by a process measured in Task Manager? A. By priority B. In seconds C. By percentage D. In kilobytes
C. By percentage
36. What tool is provided in Windows to facilitate sharing data objects between applications and computers? A. The Registry B. TCP/IP C. Component Services D. ODBC
C. Component Services
29. What techniques provide the only true way to protect your data from access by any other user? A. Regular backups B. Authorization C. Encryption D. Authentication
C. Encryption
6. Which Registry root key defines the standard class objects used by Windows? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE
C. HKEY_CLASSES_ROOT
5. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. A. command line B. encrypting C. NTFS D. administrative
C. NTFS
26. Which tab shows you every running process on your computer? A. Applications B. Services C. Processes D. Performance
C. Processes
38. If you use the System Configuration utility (msconfig) and select Disable UAC on the Tools tab, what further action is required to turn off UAC? A. Log off B. Log on as a different user C. Reboot D. None
C. Reboot
13. Which command is a full-featured command-line Registry editor? A. Regedt32 B. Regsrv32 C. Reg D. Regedit
C. Reg
17. Which command can modify the Registry by adding (or registering) dynamic link library (DLL) files as command components? A. Regedit B. Reg C. Regsvr32 D. Regedt32
C. Regsvr32
18. To create a new user in Windows 7, open the User Accounts Control Panel applet, select Manage another account, and then click ____________________.
Create a new account
5. How many root keys are in the Registry? A. Seven B. Four C. Six D. Five
D. Five
39. How many notification levels of UAC did Microsoft include in Windows 7? A. One B. Two C. Three D. Four
D. Four
31. What type of access is granted if you log on to a computer remotely as administrator with no password? A. Administrator B. Standard user C. Power user D. Guest
D. Guest
7. Which Registry root key contains all the data for a system's non-user-specific configurations? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE
D. HKEY_LOCAL_MACHINE
3. On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. A. Group account B. Single account C. Specialized account D. Local user account
D. Local user account
33. What can be typed in the Windows Search bar to open the Windows performance tool? A. Perfmon.mmc B. Monitor.mmc C. Perform.msc D. Perfmon.msc
D. Perfmon.msc
34. Which Windows 7 tool gives you an overview of how a PC has behaved over time, showing important events such as application or OS crashes? A. Performance console B. Reliability and Performance Monitor C. System Monitor D. Reliability Monitor
D. Reliability Monitor
29. What can be typed in the Windows Search to open the Services Control Panel applet? A. Regserv.mmc B. Perfmon.msc C. Service.mmc D. Services.msc
D. Services.msc
12. Which key value data type can be used for any form of data? A. QWORD B. DWORD C. Binary D. String
D. String
33. What does BitLocker require on a motherboard to validate on boot that a Windows Vista computer has not been changed? A. EFS B. IPC$ C. Core i7 D. TPM
D. TPM
15. What is a common reason to edit this Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run? A. To change the Windows boot options B. To reset a password C. To change the Windows Product Key D. To delete autostarting programs
D. To delete autostarting programs
31. Which tab in the Task Manager would you use to find out what programs are running under a certain user's account? A. Services B. Performance C. Networking D. User
D. User
12. What is the Windows Vista tool for managing users and groups? A. Users and Passwords applet B. User accounts and Groups applet C. Users and Groups applet D. User Accounts applet
D. User Accounts applet
25. Which Linux command enables you to change the owner and the group with which a file or folder is associated? A. mount B. chmod C. crontab D. chown
D. chown
6. What unique key is known only by the system and the person with whom the key is associated? A. token B. user name C. user ID D. password
D. password
23. Processes are usually referred to by their _______________. A. globally unique identifier (GUID) B. service name C. executable name D. process identifier (PID)
D. process identifier (PID)
35. Opening a command line and running _______________ provides access to a utility called Local Security Policy. A. rwx.msc B. ls -l C. dir /p D. secpol.msc
D. secpol.msc
11. ______________ values are like binary values but are limited to exactly 32 bits.
DWORD
33. _______________ in Reliability and Performance Monitor (Windows Vista) and Performance Monitor (Windows 7 and on) group counters that you can use to make reports.
Data Collector Sets
37. ODBC Data Source Administrator enables you to create and manage _______________ that point ODBC to a database.
Data Source Names (DSNs)
1. Through the combination of user accounts and groups and _______________ permissions, Windows provides incredibly powerful file and folder security.
NTFS
2. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
NTFS
36. Microsoft's tool to configure ODBC is called the _______________.
ODBC Data Source Administrator
35. _______________ is a coding standard that enables programmers to write databases and applications to be able to locate and access a database without any concern about what application or operating system is used.
Open Database Connectivity (ODBC)
14. In Windows Vista, managers and parents can use _______________ to monitor and limit the activities of standard users.
Parental Controls
27. The _______________ tab is a great tool for investigating how hard your RAM and CPU are working at any given moment and why.
Performance
30. In Windows 7, the _______________ displays a modest screen with some text about Performance Monitor and a System Summary.
Performance Monitor
24. _______________, a free tool, gives you the ability to see which processes depend on others.
Process Explorer
12. _______________ values are like binary values but are limited to exactly 64 bits.
QWORD
1. The _______________ is a huge database that stores everything about your PC.
Registry
21. The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.
Security
25. The best way to work with services is to use the _______________ applet.
Services Control Panel
9. _______________ data types are very common and offer the most flexible type of value.
String value
21. A process started by Windows has the user name _______________.
System
20. Pressing CTRL-SHIFT-ESC will open Windows _______________.
Task Manager
16. In a(n) _______________ system, the MBR/GUID partition table (GPT) nor the file system boot code is run.
UEFI
15. To add a user in Windows Vista, open the _______________ applet.
User Accounts
26. The _______________ tab of Task Manager enables you to log off or log off other users if you have the proper permissions.
Users
23. You can do anything you want to a file or folder with the NTFS _______________ permission.
Full Control
6. The _______________ root key defines the standard class objects used by Windows (i.e., file types and associations).
HKEY_CLASSES_ROOT
7. The _______________ root key stores all of the personalized information for all users on a PC.
HKEY_USERS
19. Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.
Internet
20. In professional editions of Windows, the _______________ is a powerful too that can be used to create, modify, and remove users and groups.
Local Users and Groups