CINS 220 - Ch 13 & 14
20. In professional editions of Windows, the _______________ is a powerful tool that can be used to create, modify, and remove users and groups.
Local Users and Groups
In a BIOS-based system, the BIOS uses its boot order to scan a hard drive for a(n) _______________.
Master Boot Record
1. Through the combination of user accounts and groups and _______________ permissions, Windows provides incredibly powerful file and folder security.
NTFS
2. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
NTFS
. _______________ is a coding standard that enables programmers to write databases and applications to be able to locate and access a database without any concern about what application or operating system is used.
ODBC
Microsoft's tool to configure ODBC is called the _______________.
ODBC Data Source Administrator
The _______________ tab is a great tool for investigating how hard your RAM and CPU are working at any given moment and why.
Performance
In Windows 7, the _______________ displays a modest screen with some text about Performance Monitor and a System Summary.
Performance Monitor
_______________, a free tool, gives you the ability to see which processes depend on others
Process Explorer
_______________ values are like binary values but are limited to exactly 64 bits.
QWORD
34. By default, all new Windows shares only have _______________ permission.
Read
The _______________ is a huge database that stores everything about your PC.
Registry
21. The primary way to set NTFS permissions is through the _______________ tab under the folder or files Properties.
Security
The best way to work with services is to use the _______________ applet.
Services Control Panel
_______________ data types are very common and offer the most flexible type of value.
String value
A process started by Windows has the user name _______________.
System
26. If an administrator wants to access a folder or file they do not have permission to access, they can go through a process called _______________.
Take Control
Pressing CTRL-SHIFT-ESC will open Windows _______________.
Task Manager
23. You can do anything you want to a file or folder with the NTFS _______________ permission.
Full Control
The _______________ root key defines the standard class objects used by Windows (i.e., file types and associations).
HKEY_CLASSES_ROOT
The _______________ root key stores all of the personalized information for all users on a PC.
HKEY_USERS
In a(n) _______________ system, the MBR/GUID partition table (GPT) nor the file system boot code is run.
UEFI
15. To add a user in Windows Vista, open the _______________ applet.
User Accounts
40. User Account Control (UAC) can be turned on or off in the ____________________ applet.
User Accounts Control Panel
The _______________ tab of Task Manager enables you to log off or log off other users if you have the proper permissions.
Users
16. In a Windows system, at least one account must be a(n) _______________ account.
administrator
37. The only account that can truly perform any task on a Windows system is the _______________.
administrator
7. In reference to Windows groups, _______________ privileges grant complete control over a machine.
administrator
Current Windows versions use a Windows Boot Manager, called _______________.
bootmgr
33. In Linux, the _______________ command is used to change permissions.
chmod
A(n) _______________ tracks specific information about an object.
counter
By default, the Task Manager shows only processes associated with the _______________.
current user
The HKEY_CURRENT_USER root key stores the _______________ settings.
current user
There are _______________ main subgroups, or root keys.
five
12. In Windows systems, the _______________ account might be used to provide casual Internet access to users at a library terminal.
guest
Registry files are called _______________.
hives
13. In a Windows XP system, the recommended user-account type known as _______________ prevented users from performing common tasks, such as running certain programs, installing applications, updating applications, and updating Windows.
limited user
29. If an object is _______________ within an NTFS-based volume, that object retains its permissions.
moved
A(n) _______________ is a system component that is given a set of characteristics and can be managed by the operating system as a single entity.
object
25. In defining exactly what any particular account can or cannot do to a file or folder, it is considered best practice to assign _______________ to groups and then add user accounts to groups.
permissions
5. In a Windows XP system, ____________________ are almost as powerful as administrators, but they cannot install new devices or access other users' files unless access is provided.
power users
To identify a process, use the _______________, not the process name.
process identifier
35. In a Windows Vista system, the _______________library folders are accessible by all users on the computer.
public
4. Strong passwords should include letters, numbers, and _______________ symbols.
punctuation
Root keys are composed of _______________.
subkeys
You can kill a process using the _______________ command, using either the name or the PID.
taskkill
The _______________ command enables you to view running processes on a local or remote system.
tasklist
17. Parental Controls allow you to limit _______________ logged on as well as restrict access to types of games and specific applications.
time
31. Current versions of Windows refer to groupings of cylinders or transistors on an HDD or SSD as _______________ while earlier versions refer to such groupings as _______________.
volumes, partitions
Before most modern versions of Windows, Windows came with two Registry editors: _______________ and _______________.
regedt32.exe, regedit.exe
The _______________ command can modify the Registry in only one way, adding (or registering) dynamic link library (DLL) files as command components in the Registry.
regsvr32
The name of a process usually ends with what file extension? A. .jpg B. .exe C. .doc D. .msc
B. .exe
32. What tool is offered by Windows Vista Ultimate and Enterprise editions to encrypt entire hard drives? A. NTFS B. BitLocker C. TPMs D. TrueCrypt
B. BitLocker
Which tab in Task Manager can be used to stop an application? A. Applications B. Services C. Processes D. Performance
A. Applications
37. What UAC classification is associated with a digitally signed, third-party program or non- core OS program? A. Verified B. Published by Windows C. Unverified D. Blocked program
A. Verified
_______________ assists in object sharing between applications and computers on a network.
Component Services
18. To create a new user in Windows 7, open the User Accounts Control Panel applet, select Manage another account, and then click ____________________.
Create a new account
3. A strong password should be at least _______________ characters in length.
8
A counter tracks specific information about a(n) ________________. A. Object B. Task C. Tool D. User
A. Object
Which tab in the Task Manager shows information about CPU usage, available physical memory, and the size of the disk cache? A. Performance B. Networking C. User D. Services
A. Performance
What is one way to start Task Manager? A. Press CTRL-ALT-DELETE and select Task Manager. B. Press CTRL-ALT-ENTER and select Task Manager. C. Press CTRL-SHIFT-DELETE and select Task Manager. D. Press CTRL-SHIFT-F1 and select Task Manager.
A. Press CTRL-ALT-DELETE and select Task Manager.
Which key value data type is limited to exactly 64 bits? A. QWORD B. DWORD C. Binary D. String
A. QWORD
What coding standard allows programmers to write databases and applications to locate and access a database without worrying about the application or operating system in use? A. ODBC B. Component Services C. Java D. Microsoft .NET
A. ODBC
Which kind of entries point OBDC to a database and are created and managed by the user through the Data Source Administrator? A. DNS B. DSN C. DHCP D. DCOM
B. DSN
What is the one-stop place for anything you need to do with applications, processes, or services? A. Program Manager B. Task Manager C. Administrative Tools D. Services Manager
B. Task Manager
Current Windows versions support both _______________ and _______________ boot processes.
BIOS, UEFI
_______________ store nothing more than long strings of ones and zeros.
Binary values
Bootmgr starts and reads data from a(n) _______________ file that contains information about the various operating systems installed on the system.
Boot configuration data (BCD)
How is the amount of CPU time used by a process measured in Task Manager? A. By priority B. In seconds C. By percentage D. In kilobytes
C. By percentage
What tool is provided in Windows to facilitate sharing data objects between applications and computers? A. The Registry B. TCP/IP C. Component Services D. ODBC
C. Component Services
Which tab shows you every running process on your computer? A. Applications B. Services C. Processes D. Performance
C. Processes
Which command is a full-featured command-line Registry editor? A. Regedt32 B. Regsrv32 C. Reg D. Regedit
C. Reg
Which user name is associated with a process started by Windows? A. Administrator B. Windows C. System D. The logged in user
C. System
What command enables you to view running processes on a local or remote system? A. Taskview B. Control Panel C. Tasklist D. Services
C. Tasklist
Which tab in the Task Manager would you use to find out what programs are running under a certain user's account? A. Services B. Performance C. Networking D. User
D. User
12. What is the Windows Vista tool for managing users and groups? A. Users and Passwords applet B. User accounts and Groups applet C. Users and Groups applet D. User Accounts applet
D. User Accounts applet
What can be typed in the Windows Search bar to open the Windows performance tool? A. Perfmon.mmc B. Monitor.mmc C. Perform.msc D. Perfmon.msc
D. Perfmon.msc
Which Windows 7 tool gives you an overview of how a PC has behaved over time, showing important events such as application or OS crashes? A. Performance console B. Reliability and Performance Monitor C. System Monitor D. Reliability Monitor
D. Reliability Monitor
What can be typed in the Windows Search to open the Services Control Panel applet? A. Regserv.mmc B. Perfmon.msc C. Service.mmc D. Services.msc
D. Services.msc
25. Which Linux command enables you to change the owner and the group with which a file or folder is associated? A. mount B. chmod C. crontab D. chown
D. chown
6. What unique key is known only by the system and the person with whom the key is associated? A. token B. user name C. user ID D. password
D. password
Processes are usually referred to by their _______________. A. globally unique identifier (GUID) B. service name C. executable name D. process identifier (PID)
D. process identifier (PID)
35. Opening a command line and running _______________ provides access to a utility called Local Security Policy. A. rwx.msc B. ls -l C. dir /p D. secpol.msc
D. secpol.msc
______________ values are like binary values but are limited to exactly 32 bits.
DWORD
_______________ in Reliability and Performance Monitor (Windows Vista) and Performance Monitor (Windows 7 and on) group counters that you can use to make reports.
Data Collector Sets
ODBC Data Source Administrator enables you to create and manage _______________ that point ODBC to a database.
Data Source Names
28. Clicking the _______________ checkbox for a particular NTFS permission tells Windows to overrule inheritance and stop that particular NTFS permission.
Deny
8. Which character in a password is most helpful in defeating common word hacks? A. @ B. 3 C. X D. w
A. @
How is the Registry organized? A. As a tree structure B. As a flat structure C. As a relational structure D. As a peer structure
A. As a tree structure
Which file contains information about the various operating systems installed on the system? A. Boot Configuration Data (BCD) file B. Ntoskrnl.exe C. Task Manager D. Winload.exe
A. Boot Configuration Data (BCD) file
20. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. A. Change B. List C. Read & Execute D. Modify
A. Change
15. _______________ ratings such as E, T, and M can be used to allow or block computer game use. A. ESRB B. ETM C. UAC D. TPM
A. ESRB
What are Registry files called? A. Hives B. Nodes C. DSNs D. Leafs
A. Hives
23. What process is described as a file or folder automatically getting all the NTFS permissions of the parent folder? A. Inheritance B. Traversal C. NTFS propagation D. Permission sharing
A. Inheritance
16. What is the primary tool Windows uses for providing authorization? A. NTFS B. Shared folders C. Local Security Policy D. Parental Controls
A. NTFS
21. By default, who has complete control over a folder or file? A. Owner B. Administrator C. All users D. Power users
A. Owner
24. What happens to a file or folder permission if it is copied within an NTFS partition? A. The original retains permissions, and the copy inherits permissions from the new location. B. Both original and copy retain permissions of the original location. C. Both original and copy inherit permissions from the new location. D. The original inherits permissions from the new location, and the copy retains permissions.
A. The original retains permissions, and the copy inherits permissions from the new location.
17. What two sets of data does every folder and file on an NTFS partition list? A. User and group access and level of access B. Read and Execute permissions C. NTFS and FAT permissions D. Encryption and decryption attributes
A. User and group access and level of access
30. Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely. A. administrative shares B. simple file sharing C. shared folders D. public folders
A. administrative shares
Which Registry root key defines which option is being used currently, assuming that more than one is specified in HKEY_LOCAL_MACHINE? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_CURRENT_USER
A.HKEY_CURRENT_CONFIG
10. To create and manage user accounts in Windows, you must be a member of the ____________________ group.
Administrators
27. Which string displayed using the ls -l command in a Linux terminal indicates that group permissions are set to read and modify? A. -rm-rm-r-- B. -rw-rw-r-- C. -rwxr--rw- D. -rmxrm-rm-
B. -rw-rw-r--
. What is one major risk of editing the Registry? A. Malware infecting the computer B. Applications not starting up C. Applications being uninstalled D. E-mails being sent unintentionally
B. Applications not starting up
2. What process determines what a legitimate user can and cannot do on a system? A. Accessibility B. Authorization C. Permission propagation D. Inheritance
B. Authorization
Which key value data type is limited to exactly 32 bits? A. QWORD B. DWORD C. Binary D. String
B. DWORD
What feature allows you to import a new or backup subkey? A. Add B. Merge C. Create D. Redo
B. Merge
22. Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders? A. Full Control B. Modify C. List Folder Contents D. Read
B. Modify
40. In Windows 7, which UAC notification level is the default setting? A. Always notify B. Notify me only when programs try to make changes C. Notify me only when programs try to make changes (do not dim my desktop) D. Never notify
B. Notify me only when programs try to make changes
34. What chip on the motherboard validates on boot that you still have the same operating system installed and that the computer was not hacked by some malevolent program? A. southbridge B. TPM C. GPU D. northbridge
B. TPM
19. Which NTFS permission allows an account to seize control of a file or folder owned by another account? A. File permissions B. Take Ownership permission C. Folder permissions D. Change permission
B. Take Ownership permission
What is stored in the \%SystemRoot%\System32\config folder? A. Boot files B. The Registry C. Group policies D. System files
B. The Registry
36. An unpopular, but necessary, security feature introduced in Windows Vista was _______________. A. NTFS B. UAC C. EFS D. WAC
B. UAC
14. What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer? A. Parental Controls B. User Account Control C. Primary Controls D. Mandatory Control
B. User Account Control
13. If your Vista computer is on a workgroup, what applet is used to manage user accounts? A. User Accounts B. User Accounts and Family Safety C. Users and Passwords D. Users and Groups
B. User Accounts and Family Safety
9. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. A. six B. eight C. 10 D. 256
B. eight
Windows runs many processes simultaneously, a feature known as ______________. A. multiprocessing B. multitasking C. parallel processing D. serial processing
B. multitasking
26. What three letters are used in a Linux terminal to indicated permissions associated with a file or folder? A. omc B. rwx C. awk D. lsp
B. rwx
11. Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group. A. restricted user B. standard user C. new user D. default user
B. standard user
4. Which term refers to a unique combination of a user name and an associated password? A. user authorization B. user account C. user authentication D. user identity
B. user account
1. What process identifies and grants access to a user who is trying to access a system? A. Credibility B. Authorization C. Authentication D. Honesty
C. Authentication
Which file is the Windows Boot Manager? A. Ntldr B. Ntoskrnl.exe C. Bootmgr D. Bootload.exe
C. Bootmgr
29. What techniques provide the only true way to protect your data from access by any other user? A. Regular backups B. Authorization C. Encryption D. Authentication
C. Encryption
Which Registry root key defines the standard class objects used by Windows? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE
C. HKEY_CLASSES_ROOT
5. Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. A. command line B. encrypting C. NTFS D. administrative
C. NTFS
38. If you use the System Configuration utility (msconfig) and select Disable UAC on the Tools tab, what further action is required to turn off UAC? A. Log off B. Log on as a different user C. Reboot D. None
C. Reboot
Which command can modify the Registry by adding (or registering) dynamic link library (DLL) files as command components? A. Regedit B. Reg C. Regsvr32 D. Regedt32
C. Regsvr32
28. How are Libraries folders displayed in Windows 8.1 File Explorer? A. Simply open File Explorer; they display automatically. B. Navigate to the folder C:\Users\MyLibraries. C. Right-click in the navigation section and click Show Libraries. D. Double click on Favorites and click Show Libraries in the dialog box.
C. Right-click in the navigation section and click Show Libraries.
A named group of functions that defines what you can do with an object is called a ________________. A. hive B. counter C. class object D. performance object
C. class object
7. A password _______________ policy forces users to select a new password periodically. A. permissions B. disabling C. expiration D. anti-hack
C. expiration
10. Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. A. network B. directory C. group D. owner
C. group
18. When you create a new file or folder on an NTFS partition, you become the ____________________ of that file or folder. A. administrator B. developer C. owner D. editor
C. owner
The go-to command to open up the Registry editor is ________________. A. taskmgr B. registryedit.exe C. regedit D. winload.exe
C. regedit
22. A user account with the _______________ permission can give or take away permissions for other accounts.
Change
How many root keys are in the Registry? A. Seven B. Four C. Six D. Five
D. Five
39. How many notification levels of UAC did Microsoft include in Windows 7? A. One B. Two C. Three D. Four
D. Four
31. What type of access is granted if you log on to a computer remotely as administrator with no password? A. Administrator B. Standard user C. Power user D. Guest
D. Guest
Which Registry root key contains all the data for a system's non-user-specific configurations? A. HKEY_CURRENT_CONFIG B. HKEY_USERS C. HKEY_CLASSES_ROOT D. HKEY_LOCAL_MACHINE
D. HKEY_LOCAL_MACHINE
3. On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. A. Group account B. Single account C. Specialized account D. Local user account
D. Local user account
Which key value data type can be used for any form of data? A. QWORD B. DWORD C. Binary D. String
D. String
33. What does BitLocker require on a motherboard to validate on boot that a Windows Vista computer has not been changed? A. EFS B. IPC$ C. Core i7 D. TPM
D. TPM
What is a common reason to edit this Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run? A. To change the Windows boot options B. To reset a password C. To change the Windows Product Key D. To delete autostarting programs
D. To delete autostarting programs
24. If you have the Full Control permission on a folder and only the Read permission on a file within that folder, you will actually get the _______________ permission on the file.
Full Control
19. Starting with Windows 8, Microsoft shifted the focus of user accounts from local accounts to _______________-wide Microsoft accounts.
Internet
14. In Windows Vista, managers and parents can use _______________ to monitor and limit the activities of standard users.
Parental Controls
32. The ls -l command in a Linux terminal displays a detailed list of files and folder, including permissions for three groups: owner, group, and _______________.
everyone
6. In a Windows system, a container that holds user accounts and defines the capabilities of its members is called a(n) ____________________.
group
27. The process of determining the default NTFS permissions any newly introduced files or subfolders contained in a folder receive is called ________________.
inheritance
30. When copied from one NTFS volume to another, the copy of the object in the new location _______________ the permissions from that new location.
inherits
11. You create three accounts when you set up a Windows Vista computer: guest, administrator, and a(n) _______________ that is a member of the Administrators group.
local account
36. A(n) ____________________ disk should be created and used at a later time to help users if they forget a password.
password reset
8. In a Windows system, ____________________ have rights almost equal to that of the administrator, except that they cannot install new devices or access other users' files or folders unless the files or folders specifically provide them access.
power users
9. In a Windows system, members of the Users group are called _______________ users.
standard
38. Both Linux and Mac OS X have been using one UAC function for a long time—it is called _______________.
sudo
39. The UAC classification of an unknown third-party program is known as _______________.
unverified