CINS 220 - Ch 13 & 14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

20. In professional editions of Windows, the _______________ is a powerful tool that can be used to create, modify, and remove users and groups.

Local Users and Groups

In a BIOS-based system, the BIOS uses its boot order to scan a hard drive for a(n) _______________.

Master Boot Record

1. Through the combination of user accounts and groups and _______________ permissions, Windows provides incredibly powerful file and folder security.

NTFS

2. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.

NTFS

. _______________ is a coding standard that enables programmers to write databases and applications to be able to locate and access a database without any concern about what application or operating system is used.

ODBC

Microsoft's tool to configure ODBC is called the _______________.

ODBC Data Source Administrator

The _______________ tab is a great tool for investigating how hard your RAM and CPU are working at any given moment and why.

Performance

In Windows 7, the _______________ displays a modest screen with some text about Performance Monitor and a System Summary.

Performance Monitor

_______________, a free tool, gives you the ability to see which processes depend on others

Process Explorer

_______________ values are like binary values but are limited to exactly 64 bits.

QWORD

34. By default, all new Windows shares only have _______________ permission.

Read

The _______________ is a huge database that stores everything about your PC.

Registry

21. The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.

Security

The best way to work with services is to use the _______________ applet.

Services Control Panel

_______________ data types are very common and offer the most flexible type of value.

String value

A process started by Windows has the user name _______________.

System

26. If an administrator wants to access a folder or file they do not have permission to access, they can go through a process called _______________.

Take Control

Pressing CTRL-SHIFT-ESC will open Windows _______________.

Task Manager

23. You can do anything you want to a file or folder with the NTFS _______________ permission.

Full Control

The _______________ root key defines the standard class objects used by Windows (i.e., file types and associations).

HKEY_CLASSES_ROOT

The _______________ root key stores all of the personalized information for all users on a PC.

HKEY_USERS

In a(n) _______________ system, the MBR/GUID partition table (GPT) nor the file system boot code is run.

UEFI

15. To add a user in Windows Vista, open the _______________ applet.

User Accounts

40. User Account Control (UAC) can be turned on or off in the ____________________ applet.

User Accounts Control Panel

The _______________ tab of Task Manager enables you to log off or log off other users if you have the proper permissions.

Users

16. In a Windows system, at least one account must be a(n) _______________ account.

administrator

37. The only account that can truly perform any task on a Windows system is the _______________.

administrator

7. In reference to Windows groups, _______________ privileges grant complete control over a machine.

administrator

Current Windows versions use a Windows Boot Manager, called _______________.

bootmgr

33. In Linux, the _______________ command is used to change permissions.

chmod

A(n) _______________ tracks specific information about an object.

counter

By default, the Task Manager shows only processes associated with the _______________.

current user

The HKEY_CURRENT_USER root key stores the _______________ settings.

current user

There are _______________ main subgroups, or root keys.

five

12. In Windows systems, the _______________ account might be used to provide casual Internet access to users at a library terminal.

guest

Registry files are called _______________.

hives

13. In a Windows XP system, the recommended user-account type known as _______________ prevented users from performing common tasks, such as running certain programs, installing applications, updating applications, and updating Windows.

limited user

29. If an object is _______________ within an NTFS-based volume, that object retains its permissions.

moved

A(n) _______________ is a system component that is given a set of characteristics and can be managed by the operating system as a single entity.

object

25. In defining exactly what any particular account can or cannot do to a file or folder, it is considered best practice to assign _______________ to groups and then add user accounts to groups.

permissions

5. In a Windows XP system, ____________________ are almost as powerful as administrators, but they cannot install new devices or access other users' files unless access is provided.

power users

To identify a process, use the _______________, not the process name.

process identifier

35. In a Windows Vista system, the _______________library folders are accessible by all users on the computer.

public

4. Strong passwords should include letters, numbers, and _______________ symbols.

punctuation

Root keys are composed of _______________.

subkeys

You can kill a process using the _______________ command, using either the name or the PID.

taskkill

The _______________ command enables you to view running processes on a local or remote system.

tasklist

17. Parental Controls allow you to limit _______________ logged on as well as restrict access to types of games and specific applications.

time

31. Current versions of Windows refer to groupings of cylinders or transistors on an HDD or SSD as _______________ while earlier versions refer to such groupings as _______________.

volumes, partitions

Before most modern versions of Windows, Windows came with two Registry editors: _______________ and _______________.

regedt32.exe, regedit.exe

The _______________ command can modify the Registry in only one way, adding (or registering) dynamic link library (DLL) files as command components in the Registry.

regsvr32

The name of a process usually ends with what file extension? A. .jpg B. .exe C. .doc D. .msc

B. .exe

32. What tool is offered by Windows Vista Ultimate and Enterprise editions to encrypt entire hard drives? A. NTFS B. BitLocker C. TPMs D. TrueCrypt

B. BitLocker

Which tab in Task Manager can be used to stop an application? A. Applications B. Services C. Processes D. Performance

A. Applications

37. What UAC classification is associated with a digitally signed, third-party program or non- core OS program? A. Verified B. Published by Windows C. Unverified D. Blocked program

A. Verified

_______________ assists in object sharing between applications and computers on a network.

Component Services

18. To create a new user in Windows 7, open the User Accounts Control Panel applet, select Manage another account, and then click ____________________.

Create a new account

3. A strong password should be at least _______________ characters in length.

8

A counter tracks specific information about a(n) ________________. A. Object B. Task C. Tool D. User

A. Object

Which tab in the Task Manager shows information about CPU usage, available physical memory, and the size of the disk cache? A. Performance B. Networking C. User D. Services

A. Performance

What is one way to start Task Manager? A. Press CTRL-ALT-DELETE and select Task Manager. B. Press CTRL-ALT-ENTER and select Task Manager. C. Press CTRL-SHIFT-DELETE and select Task Manager. D. Press CTRL-SHIFT-F1 and select Task Manager.

A. Press CTRL-ALT-DELETE and select Task Manager.

Which key value data type is limited to exactly 64 bits? A. QWORD B. DWORD C. Binary D. String

A. QWORD

What coding standard allows programmers to write databases and applications to locate and access a database without worrying about the application or operating system in use? A. ODBC B. Component Services C. Java D. Microsoft .NET

A. ODBC

Which kind of entries point OBDC to a database and are created and managed by the user through the Data Source Administrator? A. DNS B. DSN C. DHCP D. DCOM

B. DSN

What is the one-stop place for anything you need to do with applications, processes, or services? A. Program Manager B. Task Manager C. Administrative Tools D. Services Manager

B. Task Manager

Current Windows versions support both _______________ and _______________ boot processes.

BIOS, UEFI

_______________ store nothing more than long strings of ones and zeros.

Binary values

Bootmgr starts and reads data from a(n) _______________ file that contains information about the various operating systems installed on the system.

Boot configuration data (BCD)

How is the amount of CPU time used by a process measured in Task Manager? A. By priority B. In seconds C. By percentage D. In kilobytes

C. By percentage

What tool is provided in Windows to facilitate sharing data objects between applications and computers? A. The Registry B. TCP/IP C. Component Services D. ODBC

C. Component Services

Which tab shows you every running process on your computer? A. Applications B. Services C. Processes D. Performance

C. Processes

Which command is a full-featured command-line Registry editor? A. Regedt32 B. Regsrv32 C. Reg D. Regedit

C. Reg

Which user name is associated with a process started by Windows? A. Administrator B. Windows C. System D. The logged in user

C. System

What command enables you to view running processes on a local or remote system? A. Taskview B. Control Panel C. Tasklist D. Services

C. Tasklist

Which tab in the Task Manager would you use to find out what programs are running under a certain user's account? A. Services B. Performance C. Networking D. User

D. User

12. What is the Windows Vista tool for managing users and groups? A. Users and Passwords applet B. User accounts and Groups applet C. Users and Groups applet D. User Accounts applet

D. User Accounts applet

What can be typed in the Windows Search bar to open the Windows performance tool? A. Perfmon.mmc B. Monitor.mmc C. Perform.msc D. Perfmon.msc

D. Perfmon.msc

Which Windows 7 tool gives you an overview of how a PC has behaved over time, showing important events such as application or OS crashes? A. Performance console B. Reliability and Performance Monitor C. System Monitor D. Reliability Monitor

D. Reliability Monitor

What can be typed in the Windows Search to open the Services Control Panel applet? A. Regserv.mmc B. Perfmon.msc C. Service.mmc D. Services.msc

D. Services.msc

25. Which Linux command enables you to change the owner and the group with which a file or folder is associated? A. mount B. chmod C. crontab D. chown

D. chown

6. What unique key is known only by the system and the person with whom the key is associated? A. token B. user name C. user ID D. password

D. password

Processes are usually referred to by their _______________. A. globally unique identifier (GUID) B. service name C. executable name D. process identifier (PID)

D. process identifier (PID)

35. Opening a command line and running _______________ provides access to a utility called Local Security Policy. A. rwx.msc B. ls -l C. dir /p D. secpol.msc

D. secpol.msc

______________ values are like binary values but are limited to exactly 32 bits.

DWORD

_______________ in Reliability and Performance Monitor (Windows Vista) and Performance Monitor (Windows 7 and on) group counters that you can use to make reports.

Data Collector Sets

ODBC Data Source Administrator enables you to create and manage _______________ that point ODBC to a database.

Data Source Names

28. Clicking the _______________ checkbox for a particular NTFS permission tells Windows to overrule inheritance and stop that particular NTFS permission.

Deny

8. Which character in a password is most helpful in defeating common word hacks? A. @ B. 3 C. X D. w

A. @

How is the Registry organized? A. As a tree structure B. As a flat structure C. As a relational structure D. As a peer structure

A. As a tree structure

Which file contains information about the various operating systems installed on the system? A. Boot Configuration Data (BCD) file B. Ntoskrnl.exe C. Task Manager D. Winload.exe

A. Boot Configuration Data (BCD) file

20. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. A. Change B. List C. Read & Execute D. Modify

A. Change

15. _______________ ratings such as E, T, and M can be used to allow or block computer game use. A. ESRB B. ETM C. UAC D. TPM

A. ESRB

What are Registry files called? A. Hives B. Nodes C. DSNs D. Leafs

A. Hives

23. What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder? A. Inheritance B. Traversal C. NTFS propagation D. Permission sharing

A. Inheritance

16. What is the primary tool Windows uses for providing authorization? A. NTFS B. Shared folders C. Local Security Policy D. Parental Controls

A. NTFS

21. By default, who has complete control over a folder or file? A. Owner B. Administrator C. All users D. Power users

A. Owner

24. What happens to a file or folder permission if it is copied within an NTFS partition? A. The original retains permissions, and the copy inherits permissions from the new location. B. Both original and copy retain permissions of the original location. C. Both original and copy inherit permissions from the new location. D. The original inherits permissions from the new location, and the copy retains permissions.

A. The original retains permissions, and the copy inherits permissions from the new location.

17. What two sets of data does every folder and file on an NTFS partition list? A. User and group access and level of access B. Read and Execute permissions C. NTFS and FAT permissions D. Encryption and decryption attributes

A. User and group access and level of access

30. Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely. A. administrative shares B. simple file sharing C. shared folders D. public folders

A. administrative shares

Which Registry root key defines which option is being used currently, assuming that more than one is specified in HKEY_LOCAL_MACHINE? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_CURRENT_USER

A.HKEY_CURRENT_CONFIG

10. To create and manage user accounts in Windows, you must be a member of the ____________________ group.

Administrators

27. Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify? A. -rm-rm-r-- B. -rw-rw-r-- C. -rwxr--rw- D. -rmxrm-rm-

B. -rw-rw-r--

. What is one major risk of editing the Registry? A. Malware infecting the computer B. Applications not starting up C. Applications being uninstalled D. E-mails being sent unintentionally

B. Applications not starting up

2. What process determines what a legitimate user can and cannot do on a system? A. Accessibility B. Authorization C. Permission propagation D. Inheritance

B. Authorization

Which key value data type is limited to exactly 32 bits? A. QWORD B. DWORD C. Binary D. String

B. DWORD

What feature allows you to import a new or backup subkey? A. Add B. Merge C. Create D. Redo

B. Merge

22. Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders? A. Full Control B. Modify C. List Folder Contents D. Read

B. Modify

40. In Windows 7, which UAC notification level is the default setting? A. Always notify B. Notify me only when programs try to make changes C. Notify me only when programs try to make changes (do not dim my desktop) D. Never notify

B. Notify me only when programs try to make changes

34. What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program? A. southbridge B. TPM C. GPU D. northbridge

B. TPM

19. Which NTFS permission allows an account to seize control of a file or folder owned by another account? A. File permissions B. Take Ownership permission C. Folder permissions D. Change permission

B. Take Ownership permission

What is stored in the \%SystemRoot%\System32\config folder? A. Boot files B. The Registry C. Group policies D. System files

B. The Registry

36. An unpopular, but necessary, security feature introduced in Windows Vista was _______________. A. NTFS B. UAC C. EFS D. WAC

B. UAC

14. What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer? A. Parental Controls B. User Account Control C. Primary Controls D. Mandatory Control

B. User Account Control

13. If your Vista computer is on a workgroup, what applet is used to manage user accounts? A. User Accounts B. User Accounts and Family Safety C. Users and Passwords D. Users and Groups

B. User Accounts and Family Safety

9. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. A. six B. eight C. 10 D. 256

B. eight

Windows runs many processes simultaneously, a feature known as ______________. A. multiprocessing B. multitasking C. parallel processing D. serial processing

B. multitasking

26. What three letters are used in a Linux terminal to indicated permissions associated with a file or folder? A. omc B. rwx C. awk D. lsp

B. rwx

11. Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group. A. restricted user B. standard user C. new user D. default user

B. standard user

4. Which term refers to a unique combination of a user name and an associated password? A. user authorization B. user account C. user authentication D. user identity

B. user account

1. What process identifies and grants access to a user who is trying to access a system? A. Credibility B. Authorization C. Authentication D. Honesty

C. Authentication

Which file is the Windows Boot Manager? A. Ntldr B. Ntoskrnl.exe C. Bootmgr D. Bootload.exe

C. Bootmgr

29. What techniques provide the only true way to protect your data from access by any other user? A. Regular backups B. Authorization C. Encryption D. Authentication

C. Encryption

Which Registry root key defines the standard class objects used by Windows? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE

C. HKEY_CLASSES_ROOT

5. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. A. command line B. encrypting C. NTFS D. administrative

C. NTFS

38. If you use the System Configuration utility (msconfig) and select Disable UAC on the Tools tab, what further action is required to turn off UAC? A. Log off B. Log on as a different user C. Reboot D. None

C. Reboot

Which command can modify the Registry by adding (or registering) dynamic link library (DLL) files as command components? A. Regedit B. Reg C. Regsvr32 D. Regedt32

C. Regsvr32

28. How are Libraries folders displayed in Windows 8.1 File Explorer? A. Simply open File Explorer; they display automatically. B. Navigate to the folder C:\Users\MyLibraries. C. Right-click in the navigation section and click Show Libraries. D. Double click on Favorites and click Show Libraries in the dialog box.

C. Right-click in the navigation section and click Show Libraries.

A named group of functions that defines what you can do with an object is called a ________________. A. hive B. counter C. class object D. performance object

C. class object

7. A password _______________ policy forces users to select a new password periodically. A. permissions B. disabling C. expiration D. anti-hack

C. expiration

10. Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. A. network B. directory C. group D. owner

C. group

18. When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder. A. administrator B. developer C. owner D. editor

C. owner

The go-to command to open up the Registry editor is ________________. A. taskmgr B. registryedit.exe C. regedit D. winload.exe

C. regedit

22. A user account with the _______________ permission can give or take away permissions for other accounts.

Change

How many root keys are in the Registry? A. Seven B. Four C. Six D. Five

D. Five

39. How many notification levels of UAC did Microsoft include in Windows 7? A. One B. Two C. Three D. Four

D. Four

31. What type of access is granted if you log on to a computer remotely as administrator with no password? A. Administrator B. Standard user C. Power user D. Guest

D. Guest

Which Registry root key contains all the data for a system's non-user-specific configurations? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE

D. HKEY_LOCAL_MACHINE

3. On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. A. Group account B. Single account C. Specialized account D. Local user account

D. Local user account

Which key value data type can be used for any form of data? A. QWORD B. DWORD C. Binary D. String

D. String

33. What does BitLocker require on a motherboard to validate on boot that a Windows Vista computer has not been changed? A. EFS B. IPC$ C. Core i7 D. TPM

D. TPM

What is a common reason to edit this Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run? A. To change the Windows boot options B. To reset a password C. To change the Windows Product Key D. To delete autostarting programs

D. To delete autostarting programs

24. If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the _______________ permission on the file.

Full Control

19. Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.

Internet

14. In Windows Vista, managers and parents can use _______________ to monitor and limit the activities of standard users.

Parental Controls

32. The ls -l command in a Linux terminal displays a detailed list of files and folder, including permissions for three groups: owner, group, and _______________.

everyone

6. In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.

group

27. The process of determining the default NTFS permissions any newly introduced files or subfolders contained in a folder receive is called ________________.

inheritance

30. When copied from one NTFS volume to another, the copy of the object in the new location _______________ the permissions from that new location.

inherits

11. You create three accounts when you set up a Windows Vista computer: guest, administrator, and a(n) _______________ that is a member of the Administrators group.

local account

36. A(n) ____________________ disk should be created and used at a later time to help users if they forget a password.

password reset

8. In a Windows system, ____________________ have rights almost equal to that of the administrator, except that they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.

power users

9. In a Windows system, members of the Users group are called _______________ users.

standard

38. Both Linux and Mac OS X have been using one UAC function for a long time—it is called _______________.

sudo

39. The UAC classification of an unknown third-party program is known as _______________.

unverified


Ensembles d'études connexes

AC Circuit Analysis Fourth Block

View Set

Chapter 16: Economic Growth and Productivity

View Set

Concept-Based Assessment Online Practice A Level 2

View Set

UNRS 107 Quiz2_Prep_Rationale - ATI Quiz #2 Prep

View Set