ITN 106

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If you want to create a hidden share, add the __ sign to the end of the share name

$

Select which folder is compressed: folder 1 (blue) folder 2 (green) folder 3 (regular)

1

One systematic method to solve a problem used by most expert troubleshooters is the six steps diagrammed in textbook, (see below or in the chapter folder resources), which can apply to both software and hardware problems. Review the order of procedures in the diagram and put in correct order:

1. Interview the user and backup data 2. Examine the system what is the source of problem. 3.Fix or escalate the problem. 4.Verify if problem is resolved 5. Try to make preventive measures if applicable 6.Document the process.

In Windows XP the limit how many simultaneous users can access shared resources (like files, folders, printers, etc.) over network (using share permissions) was up to 10. In Windows 7 the limit is up to ___ .

20

If you want to use Microsoft Remote Desktop to connect to your computer and you are behind a firewall, you need to make sure the port number ______ is enabled.

3389

Another name for a stop error, which happens when processes running in kernel mode encounter a problem and Windows must stop the system

Blue screen of death

A Windows 7/Vista file structured the same as a registry file and contains configuration information about how Windows is started.

Boot Configuration Data (BCD) file

Which of the following is NOT true about Remote Desktop?

By default all users can access Remote Desktop.

A tool that can be used to register application components (like .exe with .dll files)

Component Services (also called COM+)

Match the location of these Internet Explorer feature settings to the Internet Options tab: Content Tab Privacy Tab General Tab Connections Tab Security Tab Programs ------------------------------------------------------------ Control how downloaded content like .NET or ActiveX is managed AutoComplete, CertificatesPop-up Delete browsing history Blocker and Cookie handling Proxy settings add-ons or plug-ins

Content Tab - AutoComplete, Certificates Privacy Tab- Pop-up Blocker and Cookie handling General Tab- Delete browsing history Connections Tab-Proxy settings Security Tab- Control how downloaded content like .NET or ActiveX is managed Programs Tab-add-ons or plug-ins

A program associated with a file extension

Default program

The program Windows ________ was introduced in Windows Vista and it delivers comprehensive, ongoing and real-time protection against software threats like viruses, malware and spyware across email, apps, the cloud and the web, all for FREE. (Formerly known as Security Essentials).

Defender

Intel Extended Memory CPU technology supporting 32 and 64 bit modes

EM64T

The relationship between a file type and a supporting application

File Association

One security group has read only NFTS permissions access to a file. Another group has full control NTFS permissions access to the same file. A local user account is a member of both security groups. What are the user's effective permissions to this file?

Full Control

ntel Itanium CPU technology for special, high-end, servers (Recently discontinued)

IA64

The command cacls is used in Windows to display or change the ACLs (Access Control List) of files and folders on NTFS volumes (the NTFS permissions). That command was deprecated and now you should use the new command: ______ . It can be also used to take full control of files.

Icacls

To lock your Windows computer you can press Ctrl+Alt+Delete or the Windows + __ keys.

L

Registry settings and device drivers that were in effect when the computer last booted successfully.

Last Known Good Configuration

The earliest common type of virus was hiding its code in the ________ (location on a disk). That caused the virus to be loaded into the memory whenever that disk boots. These type viruses virtually disappeared. Prominent examples of these viruses include Elk Cloner, Brain, Stoned, Form and Michelangelo.

MBR

The partition table is located in the first sector on hard disk, called ________ (3 letter acronym)

MBR

This tool cannot be used while Windows is started. Only during Windows restart

Memory Diagnostic

Which file systems allow to control access to files and folders for locally logged in users:

NTFS only

a method to control user access to a folder or file on a local drive

NTFS permissions

Paying attention to the type of error messages during the UEFI/BIOS POST can help with troubleshooting. For example: Some disk error messages can indicate, that the disk was not detected at all. Other messages indicate, that the disk was detected, but there are problems reading it. Select 2 messages, that indicate the disk was likely not detected at all:

No boot device available Hard drive not found

When starting Windows in Safe Mode or with enabled boot logging, all loaded files are recorded in the log file named: ______________________ . (complete file name with file extension).

Ntbtlog.txt

After you turn on the computer, startup BIOS runs the ______ , which is a series of tests. (Type the 4 letter acronym)

POST

A self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices.

POST (power-on self test

type of smart card that contains authentication information

RSA tokens

A security group has Read Only NFTS Permissions access to a file. The same group has Full Control Share Permissions access to the same file. What are the group's effective permissions to this file?

Read Only

These option are available from Windows ___ . (2 letter acronym)(system recovery options)

Recovery Environment (ER)

Type the complete command line syntax using the tool System File Checker to ONLY scan the integrity of all protected system files (with NO repair operation performed).

SFC /verifyonly

In this cloud service model the client is outsourcing all services to the vendor:

Saas

Folder and file Share permissions will only work on drives with with these file system(s):

Share permissions do not depend on file system

A Windows utility that protects system files and keeps a cache of current system files in case it needs to refresh a damaged file

System File Checker

The program file named rstrui.exe will start the tool:

System Restore

f you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?

TPM chip on the motherboard

A command that uses the process ID to stop a process

Taskkill

A command used to find the ID number of each running process

Tasklist

The Windows 7/Vista program that manages the initial startup of Windows

Windows Boot Manager (BootMgr)

A service that runs in the background to prevent or filter uninvited communication from another computer

Windows Firewall

A lean operating system that can be used to troubleshoot problems when Windows refuses to start.

Windows Recovery Environment (RE)

Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.

Write, Read

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

\\server\sharedfolder

Windows creates by default administrative hidden shares. One of them (called Remote Admin Share) provides access to the system root, typically the folder C:\windows . The share name is: _________ . To access this share remotely over the network you you can type this UNC address \\servername\__________ . (type only the share name part as answer)

admin$

the folders that are shared by default over a network to be accessed by administrator accounts

administrative shares

software installed on a computer that produces pop-up ads using your browser

adware

Which of the following is true about the Windows Encrypted File System?

an encrypted file moved to an unencrypted folder remains encrypted

Always create a _______, before you make any changes to a system that is experiencing a problem

backup

The ____________ command-line tool is used to copy critical Windows boot files to the system partition and to create a new system BCD store. (not in textbook)

bcdboot

To manually edit the boot configuration data, use the command ____________ in Windows command prompt

bcdedit

hat command produced this output: (windows boot manger) (windows boot loader)

bcdedit

When working with co-workers and supervisors, which of the following is a good practice?

be professional by putting business matters over personal matters

Recording all files used during the load process

boot logging

The file ntldr used in Windows XP was replaced by the file ________ in Windows Vista and later.

bootmgr

To write a new boot sector to the system partition, type this command ____________ in Windows Recovery Environment. (Type the complete command with the switch as typed on the command line).

bootrec/fixboot

The command used to update the master boot code for hard disk partitions or to repair a dual-boot system is _________ Type just the command without any options. These are the possible options for the command: {/help | /nt52 | /nt60} {SYS | ALL | <DriveLetter:>} [/force]

bootsect

Restart the computer by turning off the power or by pressing the Reset button

cold boot

The settings listed on the image below can be used to make older programs run in a current version of Windows. These settings are found on the ________ tab of the program shortcut properties

compatibility

The name of the executable file to start this program is ___________ . This program allows to change how users log onto Windows or to reset user passwords.

control.exe userpasswords2

A disk eraser or ____________ provides a strong magnetic field used to completely erase data on a hard drive or tape drive.

degausser

a code used to identify and authenticate a person or organization sending data over a network

digital certificate

A command to manage hard drives, partitions, and volumes

diskpart

Windows 10 features new web browser called Microsoft ______

edge

In Windows 7 the Windows Boot Manager is used to select which OS to boot from when using multi-boot. To invoke Windows Boot Manager, you need to press the ________ key on your keyboard during the boot process. (It is not F8)

f5 or spacebar

On a peer-to-peer network, authentication is the responsibility of the domain.

false

A Windows 7/Vista command that repairs the boot sector of the system partition.

fixboot

To start the tool Local Group Policy Editor in Windows, use the command _________.

gpedit

a program that AV software recognizes to be potentially harmful or potentially unwanted

grayware

Which is NOT true about using share and NTFS permissions?

if both permissions are used, the least restrictive permission between the two applies

In general, to protect a computer, a firewall blocks by default mostly ___________ connections with few specific exceptions.

inbound

permissions assigned by Windows that are attained from a parent object

inherited permissions

he presence of the Cydia app on an iOS device indicates that the device was __________ . (A process of removing software restrictions imposed by Apple's devices with iOS. It does this by using a series of software exploits. The result is root access to iOS, allowing the downloading and installation of additional applications, extensions, and themes that are unavailable through the official Apple App Store)

jailbroken

A blue screen error, also called a stop error or a blue screen of death (BSOD), happens when processes running in _____ mode encounter a problem and Windows must stop the system.

kernel

type of spyware that tracks your keystrokes, including passwords

keylogger

To start this tool, type the command ___________ on the command line prompt. (memory diagnostic)

mdsched

Type the name of the executable file ( ______.exe) that starts Remote Desktop Connection in Windows.

mstsc

Which of these Windows booting files is processed first:

ntoskrnl.exe

If you have an overly confident user on the phone, what is a good practice?

ompliment the user's knowledge, insight, and experience

Firewall setting are different for each network profile type (network location). The Firewall rules are most restrictive for ______ network locations.

public

CryptoLocker is an example of type of malware called ____________ trojan.

ransomware

Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

rootkit

a method to control access to files and folders over network regardless of used volume file system.

share permissions

A virus __________ is a unique string of bits, or the binary pattern, of a virus. It is like a fingerprint in that it can be used to detect and identify specific viruses. Anti-virus software uses them to scan for the presence of malicious code.

signature

__________ is a small device that contains authentication information and can be used to authenticate users on a computer.

smart card

the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer

social engineering

To restart a PC without turning off the power

soft boot

The Windows 7 Startup Repair started from System Recovery Options, will generate several log files in this folder: C:\Windows\System32\logfiles\____

srt

when someone who is unauthorized follows the employee through a secured entrance to a room or building

tailgating

If an application is locked up and not responding, use the Task Manager to end it. If Task Manager can't end a process, use the commands Tasklist and _______ . The command Tasklist returns the process ID (PID), which is a number that identifies each running process. Then use the process ID with the command ______ to kill the process.

taskkill

A type of malware that tricks you into opening it by substituting itself for a legitimate program

trojan

a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild

virus signature

Which of the following are true about NTFS permissions? (Choose all that apply.)

when a subfolder is created, it is assigned the permissions of its parent folder by default, the owner of folder has full permissions to the folder

In Windows, by default, accounts ______ password cannot logon remotely

without

an infestation designed to copy itself repeatedly to memory, on drive space, or on a network

worm

Clasic 32bit CPU technology

x86

General term for hybrid 32/64 bit CPU technology

x86-64


Set pelajaran terkait

Nursing 1: Fundamentals Pretest A and B

View Set

Chapter 9 PrepU: The Nurse-Patient Relationship

View Set

Advantages/Disadvantages of the Waterfall Method

View Set

Exam 1 Small Business Management

View Set

Women's Roles During World War II

View Set

Organization Structure Intermediate Exam (3-8)

View Set

Abnormal Psychology Exam 3 Practice Questions

View Set