ITN 106 Software2
The logon for an on-demand broadband connection is managed by a protocol called ____.
PPPoE
When implementing a security plan, the four steps are sometimes called the ____.
Plan-Do-Study-Act
Most encryption software products use a method called ____.
Public Key Encryption
After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive.
SFC, Chkdsk, and Defrag
The error ____ is caused by a driver or service making an illegal access to memory.
Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL
The error ____ is means a bad driver or service has performed an illegal action.
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
If you select a(n) _____ network, Vista warns you about sending information over it.
unsecured
The solution for securing private data traveling over a public network is a ____.
virtual private network
When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded.
windows kernel
Errors or warnings in Device Manager are displayed as a ____.
yellow triangle or question mark
Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive.
zero-fill utility
You can use a regular analog phone as an Internet phone if you use a(n) ____.
Analog Telephone Adapter
Remote ____ can help you support users and their computers from a distance.
Assistance
____ is any annoying and unwanted program that might or might not mean you harm.
Grayware
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
HIPAA
The key that loads services and drivers can be found in the ____ location.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
A ____ is the connection a computer uses to access another network if it does not have a better option.
default gateway
Check ____ to verify that a device is enabled and Windows thinks the device should be working.
device manger
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
digital certificate
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
drive
A ____ IP address is assigned for the current connection only.
dynamic
Most broadband connections today are always up and use ____ IP addressing.
dynamic
A DSL installation works very differently than a cable modem installation.
false
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
false
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
false
When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection.
false
Wireless networks can be secured by broadcasting the name of the wireless access point (called the Service Set Identifier or SSID).
false
when installing a device, you must always run the setup CD for the device after you physically install the device.
false
Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ____ clamp attached.
ferrite
Unless you protect your computer by using strong _____ settings, your computer might get hacked.
firewall
For port forwarding to work, the computer on your network must have a ____ IP Address.
static
To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP addressing.
static
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
strong
A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer's IP address is on the same or a different network.
subnet mask
For essential hardware devices, use the ____ to verify and replace system files.
system file checker
If you can identify the approximate date the error started and that date is in the recent past, use ____.
system restore
To use ____, you can create user accounts using the Control Panel.
telnet
Port ____ opens a port when a PC on the network initiates communication through another port.
triggering
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted.
true
Most computer problems are simple and easy to solve.
true
Sometimes a Windows update solves a problem with a hardware device.
true
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
true
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
true
If the access point is not broadcasting its SSID, the name of the wireless network will appear as "_____."
unnamed network
A private and secured wireless access point might be configured for _____ address filtering in order to control which wireless adapters can use the access point.
MAC
In order to activate your service, the cable company must know the ____ of the cable modem you have installed.
MAC address
A log file is kept of every Remote Assistance session in the ____ folder.
C:\Users\username\Documents\Remote Assistance Logs
Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet.
Desktop
When a Remote ____ session is opened, all local users are logged off.
Desktop
____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN.
Encryption
Press ____ at startup to display the Advanced Boot Options menu.
F8
Individuals are always free to decide what security measures they want to use.
False
It's best to use three-factor authentication.
False
When trying to use client/server applications on the Internet, your software and hardware firewalls and other security settings on the router will automatically allow the communication.
False
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
False
An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection.
True
DSL service and an older technology, ISDN, are provided by the local telephone company.
True
Don't use the same password on more than one system (computer, network, or application).
True
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
True
Many software vendors use FTP sites for downloading software to their customers.
True
When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____.
VoIP provider
Wireless networks can be secured by using an encryption key (using _____, WPA, or WPA2 encryption standards).
WEP
During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.
\Windows old
In Event Viewer, the ____ log shows only warnings and error events
administrative events
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.
administrator
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.
alternate configuration
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.
antivirus
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
backdoor
A ____ virus can hide in either of two boot areas of a hard drive.
boot sector
When supporting and troubleshooting small networks, you'll need to use ____ to test the physical connections of the network.
cable testers
A____ application means one computer (the remote computer) is running the Telnet component and another computer (the local computer) runs the Telnet component.
client/server
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation.
hidden partition
The ____ command can display TCP/IP configuration information and refresh the IP address.
ipconfig
The command to flush the DNS cache kept on the computer is ____.
ipconfig /flushdns
If a network adapter is installed on your computer and you need to know the MAC address, you can open a command prompt window and enter the command _____.
ipconfig/all
The ____ Configuration is updated after you log on normally to Vista.
last known good
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users' data.
limited
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
macro
The danger in connecting to unknown hotspots is that _____ and hackers might be waiting for unsecured computers to connect.
malware
Use the ____ tool to test memory.
memory diagnostics
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
multipartite
When connecting to a wireless network that is not broadcasting its SSID, you are given the opportunity to enter the _____ of the network.
name
To disconnect a mapped network drive, use the ____ command.
net use z: /delete
To verify firewall settings and check for errors, open the _____window.
network and sharing center
To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command.
nslookup www.microsoft.com
A ____ is made of several words with spaces allowed.
passphrase
Generally speaking, the weakest link in setting up security in a computer environment is ____.
people
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
permissions
The ____ command tests connectivity by sending an echo request to a remote computer.
ping
For Vista, use the ____ tool to search for the problem and suggested solutions.
problem reports and solutions
If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network.
proxy
The IP addresses available to the Internet are called ____ IP addresses.
public
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
reset
Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted
restore
A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a computer's IP address.
reverse
To uninstall a program, in Device Manager ____ the device and select Uninstall.
right-click
If the system is caught in an endless loop of restarts, boot into ____.
safe mode
If you are comfortable with Vista automatically connecting to a particular network in the future, check _____.
save this network
The command ____ searches for and replaces corrupted system files.
sfc /scannow
In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
social engineering