Chapter 17 CTS 220 (N02) Adv Hard/Software Support
a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
ActiveX control
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?
private data for each user should be kept in their C:\Users folder
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
False
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
False
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
Guests group
When all users on a network require the same access to all resources, what type of network model should you use?
Homegroup
What is the purpose of the Privacy tab in Windows Internet Explorer?
IE Privacy Tab: A tab in IE used to block cookies and manage the Pop-up Blocker. IEContent Tab: A tab in IE that contains settings for Family Safety, certificates used by websites, and how AutoComplete and Feeds are handled.
Windows 10 features what new web browser, which is designed to replace Internet Explorer?
Microsoft Edge
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)
Write Read
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\\server\sharedfolder
What statement about user accounts and groups is NOT true?
a user account can belong to only one group at a time
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
proxy server
What statement about controlling access to folders and files is accurate?
rights are assigned to accounts
a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
share permissions
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
to connect to secured websites on a corporate network VPN
What port is utilized by the Remote Desktop service?
3389
Briefly describe Remote Desktop and its OS requirements.
Allows a user to connect to and control a remote computer, like their office computer, from home over an Internet or dial-up connection. You must have access to a user account on the target machine. The target machine must be configured to allow Remote Desktop Connection. You must have permission to connect to the target machine
Define ActiveX control and explain why they might be unsafe.
An ActiveX control is a small app or add-on that can be downloaded from a web site along with a web page and is executed by IE to enhance the web page (for example, add animation to the page). A virus can sometimes hide in an ActiveX control, but IE is designed to catch them by authenticating each ActiveX control it downloads.
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?
Anonymous users
What are the two most popular web server applications?
Apache IIS
To which group does Windows give access to folders that you create which are not part of your user profile?
Authenticated Users
a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Backup Operators
What is a data source, and how is it used?
Datasource is a name given to the connection set up to a database from a server. The name is commonly used when creating a query to the database. The data source name (DSN) need not be the same as the filename for the database.
On the IE General tab you can block cookies.
False
What type of permission should you set to control access to files and folders by local and network users?
NTFS on NTFS volumes only
a method to control access to a folder or file and can apply to local users and network users
NTFS permissions
What two applications are an example of a mail server and a mail client application, respectively?
Outlook Exchange
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?
PNRP
a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Power Users
gives a user access to a Windows desktop from anywhere on the Internet
Remote Desktop Connection
How does Remote Assistance differ from Remote Desktop?
Remote Desktop Connection allows you to take full control of aremote computer (including exclusive access to the Desktop, documents, programs, etc.), while Windows Remote Assistanceallows you to give partial control to your own computer (shareddesktop, mouse and keyboard) in order to get help from aremote friend
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
True
The default value of the security level in IE is Medium-high.
True
configuring a computer so that it will respond to network activity when the computer is in a sleep state
Wake on LAN
If you want to be able to power up a computer remotely, what feature should you use?
Wake-on LAN
Describe the difference between rights and permissions on a Windows OS.
What is the difference between Right and Permission? I know that the term "rights" applies to users or groups of users (such as "the user X has the right to change system time") and the term "permissions" applies to an object (such as a folder or file, e.g. "the user X has full permissions over this folder").
Describe Workgroup sharing and how it compares to Homegroup sharing.
When all users on a network require the same access to all resources, you can use a Windows homegroup.For better security than a homegroup, use workgroup sharing. Using this method, you decide which users on the network have access to which shared folder and the type of access they have. All rights and permissions are set up on each local computer so that each computer manages access to its files, folders, and printers shared on this peer-to-peer network.
the folders that are shared by default on a network domain that administrator accounts can access
administrative shares
Regarding the use of Group Policy, what statement is NOT accurate?
all policies are applied before the logon screen appears
Which of the following is NOT true about Remote Desktop?
by default all users can access Remote Desktop
What task can't be performed from the IE General tab?
disable file downloads
a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
gpedit.msc
What is the principle of least privilege?
he principle of least privilege (PoLP; also known as the principle of least authority) is an important concept in computer security, promoting minimal user profile privileges on computers, based on users' job necessities.
Which of the following are true about NTFS permissions? (Choose all that apply.)
if NTFS permissions conflict locally, the more liberal permission applies when a subfolder is created, it is assigned the permissions of its parent folder
When utilizing both share and NTFS permissions, what statement is inaccurate?
if both permissions are used, the least restrictive permission between the two applies
permissions assigned by Windows that are attained from a parent object
inherited permissions
What command launches the Remote Desktop client for Windows?
mstsc
When using Group Policy to configure QoS, what options are available? (Choose all that apply.)
outbound traffic can be throttled the priority is a number from 0 and 63