ITN 106 Software2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The logon for an on-demand broadband connection is managed by a protocol called ____.

PPPoE

When implementing a security plan, the four steps are sometimes called the ____.

Plan-Do-Study-Act

Most encryption software products use a method called ____.

Public Key Encryption

After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive.

SFC, Chkdsk, and Defrag

The error ____ is caused by a driver or service making an illegal access to memory.

Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL

The error ____ is means a bad driver or service has performed an illegal action.

Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED

If you select a(n) _____ network, Vista warns you about sending information over it.

unsecured

The solution for securing private data traveling over a public network is a ____.

virtual private network

When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded.

windows kernel

Errors or warnings in Device Manager are displayed as a ____.

yellow triangle or question mark

Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive.

zero-fill utility

You can use a regular analog phone as an Internet phone if you use a(n) ____.

Analog Telephone Adapter

Remote ____ can help you support users and their computers from a distance.

Assistance

____ is any annoying and unwanted program that might or might not mean you harm.

Grayware

For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.

HIPAA

The key that loads services and drivers can be found in the ____ location.

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services

A ____ is the connection a computer uses to access another network if it does not have a better option.

default gateway

Check ____ to verify that a device is enabled and Windows thinks the device should be working.

device manger

A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.

digital certificate

A network ____ map is one of the most powerful and versatile methods of communicating over a network.

drive

A ____ IP address is assigned for the current connection only.

dynamic

Most broadband connections today are always up and use ____ IP addressing.

dynamic

A DSL installation works very differently than a cable modem installation.

false

As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.

false

The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.

false

When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection.

false

Wireless networks can be secured by broadcasting the name of the wireless access point (called the Service Set Identifier or SSID).

false

when installing a device, you must always run the setup CD for the device after you physically install the device.

false

Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ____ clamp attached.

ferrite

Unless you protect your computer by using strong _____ settings, your computer might get hacked.

firewall

For port forwarding to work, the computer on your network must have a ____ IP Address.

static

To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP addressing.

static

A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

strong

A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer's IP address is on the same or a different network.

subnet mask

For essential hardware devices, use the ____ to verify and replace system files.

system file checker

If you can identify the approximate date the error started and that date is in the recent past, use ____.

system restore

To use ____, you can create user accounts using the Control Panel.

telnet

Port ____ opens a port when a PC on the network initiates communication through another port.

triggering

If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted.

true

Most computer problems are simple and easy to solve.

true

Sometimes a Windows update solves a problem with a hardware device.

true

When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.

true

Wireless networks are either public, unsecured hotspots or private, secured hotspots.

true

If the access point is not broadcasting its SSID, the name of the wireless network will appear as "_____."

unnamed network

A private and secured wireless access point might be configured for _____ address filtering in order to control which wireless adapters can use the access point.

MAC

In order to activate your service, the cable company must know the ____ of the cable modem you have installed.

MAC address

A log file is kept of every Remote Assistance session in the ____ folder.

C:\Users\username\Documents\Remote Assistance Logs

Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet.

Desktop

When a Remote ____ session is opened, all local users are logged off.

Desktop

____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN.

Encryption

Press ____ at startup to display the Advanced Boot Options menu.

F8

Individuals are always free to decide what security measures they want to use.

False

It's best to use three-factor authentication.

False

When trying to use client/server applications on the Internet, your software and hardware firewalls and other security settings on the router will automatically allow the communication.

False

When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.

False

An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection.

True

DSL service and an older technology, ISDN, are provided by the local telephone company.

True

Don't use the same password on more than one system (computer, network, or application).

True

Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.

True

Many software vendors use FTP sites for downloading software to their customers.

True

When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____.

VoIP provider

Wireless networks can be secured by using an encryption key (using _____, WPA, or WPA2 encryption standards).

WEP

During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.

\Windows old

In Event Viewer, the ____ log shows only warnings and error events

administrative events

A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.

administrator

If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

alternate configuration

As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.

antivirus

A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

backdoor

A ____ virus can hide in either of two boot areas of a hard drive.

boot sector

When supporting and troubleshooting small networks, you'll need to use ____ to test the physical connections of the network.

cable testers

A____ application means one computer (the remote computer) is running the Telnet component and another computer (the local computer) runs the Telnet component.

client/server

If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation.

hidden partition

The ____ command can display TCP/IP configuration information and refresh the IP address.

ipconfig

The command to flush the DNS cache kept on the computer is ____.

ipconfig /flushdns

If a network adapter is installed on your computer and you need to know the MAC address, you can open a command prompt window and enter the command _____.

ipconfig/all

The ____ Configuration is updated after you log on normally to Vista.

last known good

A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users' data.

limited

A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

macro

The danger in connecting to unknown hotspots is that _____ and hackers might be waiting for unsecured computers to connect.

malware

Use the ____ tool to test memory.

memory diagnostics

A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.

multipartite

When connecting to a wireless network that is not broadcasting its SSID, you are given the opportunity to enter the _____ of the network.

name

To disconnect a mapped network drive, use the ____ command.

net use z: /delete

To verify firewall settings and check for errors, open the _____window.

network and sharing center

To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command.

nslookup www.microsoft.com

A ____ is made of several words with spaces allowed.

passphrase

Generally speaking, the weakest link in setting up security in a computer environment is ____.

people

Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.

permissions

The ____ command tests connectivity by sending an echo request to a remote computer.

ping

For Vista, use the ____ tool to search for the problem and suggested solutions.

problem reports and solutions

If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network.

proxy

The IP addresses available to the Internet are called ____ IP addresses.

public

Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.

reset

Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted

restore

A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a computer's IP address.

reverse

To uninstall a program, in Device Manager ____ the device and select Uninstall.

right-click

If the system is caught in an endless loop of restarts, boot into ____.

safe mode

If you are comfortable with Vista automatically connecting to a particular network in the future, check _____.

save this network

The command ____ searches for and replaces corrupted system files.

sfc /scannow

In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

social engineering


Ensembles d'études connexes

Chapter 43: Nursing Care of the Child With an Alteration in Urinary Elimination/Genitourinary Disorder

View Set

LPI Linux Essentials PRACTICE TEST 3

View Set

Chapter 13: The Molecular Basis of Inheritance

View Set

BL Linux - Ch. 19 Networking Fundamentals

View Set

Chp 24 Making the Transition from Student to Professional Nurse

View Set