ITN 106
If you want to create a hidden share, add the __ sign to the end of the share name
$
Select which folder is compressed: folder 1 (blue) folder 2 (green) folder 3 (regular)
1
One systematic method to solve a problem used by most expert troubleshooters is the six steps diagrammed in textbook, (see below or in the chapter folder resources), which can apply to both software and hardware problems. Review the order of procedures in the diagram and put in correct order:
1. Interview the user and backup data 2. Examine the system what is the source of problem. 3.Fix or escalate the problem. 4.Verify if problem is resolved 5. Try to make preventive measures if applicable 6.Document the process.
In Windows XP the limit how many simultaneous users can access shared resources (like files, folders, printers, etc.) over network (using share permissions) was up to 10. In Windows 7 the limit is up to ___ .
20
If you want to use Microsoft Remote Desktop to connect to your computer and you are behind a firewall, you need to make sure the port number ______ is enabled.
3389
Another name for a stop error, which happens when processes running in kernel mode encounter a problem and Windows must stop the system
Blue screen of death
A Windows 7/Vista file structured the same as a registry file and contains configuration information about how Windows is started.
Boot Configuration Data (BCD) file
Which of the following is NOT true about Remote Desktop?
By default all users can access Remote Desktop.
A tool that can be used to register application components (like .exe with .dll files)
Component Services (also called COM+)
Match the location of these Internet Explorer feature settings to the Internet Options tab: Content Tab Privacy Tab General Tab Connections Tab Security Tab Programs ------------------------------------------------------------ Control how downloaded content like .NET or ActiveX is managed AutoComplete, CertificatesPop-up Delete browsing history Blocker and Cookie handling Proxy settings add-ons or plug-ins
Content Tab - AutoComplete, Certificates Privacy Tab- Pop-up Blocker and Cookie handling General Tab- Delete browsing history Connections Tab-Proxy settings Security Tab- Control how downloaded content like .NET or ActiveX is managed Programs Tab-add-ons or plug-ins
A program associated with a file extension
Default program
The program Windows ________ was introduced in Windows Vista and it delivers comprehensive, ongoing and real-time protection against software threats like viruses, malware and spyware across email, apps, the cloud and the web, all for FREE. (Formerly known as Security Essentials).
Defender
Intel Extended Memory CPU technology supporting 32 and 64 bit modes
EM64T
The relationship between a file type and a supporting application
File Association
One security group has read only NFTS permissions access to a file. Another group has full control NTFS permissions access to the same file. A local user account is a member of both security groups. What are the user's effective permissions to this file?
Full Control
ntel Itanium CPU technology for special, high-end, servers (Recently discontinued)
IA64
The command cacls is used in Windows to display or change the ACLs (Access Control List) of files and folders on NTFS volumes (the NTFS permissions). That command was deprecated and now you should use the new command: ______ . It can be also used to take full control of files.
Icacls
To lock your Windows computer you can press Ctrl+Alt+Delete or the Windows + __ keys.
L
Registry settings and device drivers that were in effect when the computer last booted successfully.
Last Known Good Configuration
The earliest common type of virus was hiding its code in the ________ (location on a disk). That caused the virus to be loaded into the memory whenever that disk boots. These type viruses virtually disappeared. Prominent examples of these viruses include Elk Cloner, Brain, Stoned, Form and Michelangelo.
MBR
The partition table is located in the first sector on hard disk, called ________ (3 letter acronym)
MBR
This tool cannot be used while Windows is started. Only during Windows restart
Memory Diagnostic
Which file systems allow to control access to files and folders for locally logged in users:
NTFS only
a method to control user access to a folder or file on a local drive
NTFS permissions
Paying attention to the type of error messages during the UEFI/BIOS POST can help with troubleshooting. For example: Some disk error messages can indicate, that the disk was not detected at all. Other messages indicate, that the disk was detected, but there are problems reading it. Select 2 messages, that indicate the disk was likely not detected at all:
No boot device available Hard drive not found
When starting Windows in Safe Mode or with enabled boot logging, all loaded files are recorded in the log file named: ______________________ . (complete file name with file extension).
Ntbtlog.txt
After you turn on the computer, startup BIOS runs the ______ , which is a series of tests. (Type the 4 letter acronym)
POST
A self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices.
POST (power-on self test
type of smart card that contains authentication information
RSA tokens
A security group has Read Only NFTS Permissions access to a file. The same group has Full Control Share Permissions access to the same file. What are the group's effective permissions to this file?
Read Only
These option are available from Windows ___ . (2 letter acronym)(system recovery options)
Recovery Environment (ER)
Type the complete command line syntax using the tool System File Checker to ONLY scan the integrity of all protected system files (with NO repair operation performed).
SFC /verifyonly
In this cloud service model the client is outsourcing all services to the vendor:
Saas
Folder and file Share permissions will only work on drives with with these file system(s):
Share permissions do not depend on file system
A Windows utility that protects system files and keeps a cache of current system files in case it needs to refresh a damaged file
System File Checker
The program file named rstrui.exe will start the tool:
System Restore
f you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
TPM chip on the motherboard
A command that uses the process ID to stop a process
Taskkill
A command used to find the ID number of each running process
Tasklist
The Windows 7/Vista program that manages the initial startup of Windows
Windows Boot Manager (BootMgr)
A service that runs in the background to prevent or filter uninvited communication from another computer
Windows Firewall
A lean operating system that can be used to troubleshoot problems when Windows refuses to start.
Windows Recovery Environment (RE)
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.
Write, Read
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\\server\sharedfolder
Windows creates by default administrative hidden shares. One of them (called Remote Admin Share) provides access to the system root, typically the folder C:\windows . The share name is: _________ . To access this share remotely over the network you you can type this UNC address \\servername\__________ . (type only the share name part as answer)
admin$
the folders that are shared by default over a network to be accessed by administrator accounts
administrative shares
software installed on a computer that produces pop-up ads using your browser
adware
Which of the following is true about the Windows Encrypted File System?
an encrypted file moved to an unencrypted folder remains encrypted
Always create a _______, before you make any changes to a system that is experiencing a problem
backup
The ____________ command-line tool is used to copy critical Windows boot files to the system partition and to create a new system BCD store. (not in textbook)
bcdboot
To manually edit the boot configuration data, use the command ____________ in Windows command prompt
bcdedit
hat command produced this output: (windows boot manger) (windows boot loader)
bcdedit
When working with co-workers and supervisors, which of the following is a good practice?
be professional by putting business matters over personal matters
Recording all files used during the load process
boot logging
The file ntldr used in Windows XP was replaced by the file ________ in Windows Vista and later.
bootmgr
To write a new boot sector to the system partition, type this command ____________ in Windows Recovery Environment. (Type the complete command with the switch as typed on the command line).
bootrec/fixboot
The command used to update the master boot code for hard disk partitions or to repair a dual-boot system is _________ Type just the command without any options. These are the possible options for the command: {/help | /nt52 | /nt60} {SYS | ALL | <DriveLetter:>} [/force]
bootsect
Restart the computer by turning off the power or by pressing the Reset button
cold boot
The settings listed on the image below can be used to make older programs run in a current version of Windows. These settings are found on the ________ tab of the program shortcut properties
compatibility
The name of the executable file to start this program is ___________ . This program allows to change how users log onto Windows or to reset user passwords.
control.exe userpasswords2
A disk eraser or ____________ provides a strong magnetic field used to completely erase data on a hard drive or tape drive.
degausser
a code used to identify and authenticate a person or organization sending data over a network
digital certificate
A command to manage hard drives, partitions, and volumes
diskpart
Windows 10 features new web browser called Microsoft ______
edge
In Windows 7 the Windows Boot Manager is used to select which OS to boot from when using multi-boot. To invoke Windows Boot Manager, you need to press the ________ key on your keyboard during the boot process. (It is not F8)
f5 or spacebar
On a peer-to-peer network, authentication is the responsibility of the domain.
false
A Windows 7/Vista command that repairs the boot sector of the system partition.
fixboot
To start the tool Local Group Policy Editor in Windows, use the command _________.
gpedit
a program that AV software recognizes to be potentially harmful or potentially unwanted
grayware
Which is NOT true about using share and NTFS permissions?
if both permissions are used, the least restrictive permission between the two applies
In general, to protect a computer, a firewall blocks by default mostly ___________ connections with few specific exceptions.
inbound
permissions assigned by Windows that are attained from a parent object
inherited permissions
he presence of the Cydia app on an iOS device indicates that the device was __________ . (A process of removing software restrictions imposed by Apple's devices with iOS. It does this by using a series of software exploits. The result is root access to iOS, allowing the downloading and installation of additional applications, extensions, and themes that are unavailable through the official Apple App Store)
jailbroken
A blue screen error, also called a stop error or a blue screen of death (BSOD), happens when processes running in _____ mode encounter a problem and Windows must stop the system.
kernel
type of spyware that tracks your keystrokes, including passwords
keylogger
To start this tool, type the command ___________ on the command line prompt. (memory diagnostic)
mdsched
Type the name of the executable file ( ______.exe) that starts Remote Desktop Connection in Windows.
mstsc
Which of these Windows booting files is processed first:
ntoskrnl.exe
If you have an overly confident user on the phone, what is a good practice?
ompliment the user's knowledge, insight, and experience
Firewall setting are different for each network profile type (network location). The Firewall rules are most restrictive for ______ network locations.
public
CryptoLocker is an example of type of malware called ____________ trojan.
ransomware
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
rootkit
a method to control access to files and folders over network regardless of used volume file system.
share permissions
A virus __________ is a unique string of bits, or the binary pattern, of a virus. It is like a fingerprint in that it can be used to detect and identify specific viruses. Anti-virus software uses them to scan for the presence of malicious code.
signature
__________ is a small device that contains authentication information and can be used to authenticate users on a computer.
smart card
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
social engineering
To restart a PC without turning off the power
soft boot
The Windows 7 Startup Repair started from System Recovery Options, will generate several log files in this folder: C:\Windows\System32\logfiles\____
srt
when someone who is unauthorized follows the employee through a secured entrance to a room or building
tailgating
If an application is locked up and not responding, use the Task Manager to end it. If Task Manager can't end a process, use the commands Tasklist and _______ . The command Tasklist returns the process ID (PID), which is a number that identifies each running process. Then use the process ID with the command ______ to kill the process.
taskkill
A type of malware that tricks you into opening it by substituting itself for a legitimate program
trojan
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
virus signature
Which of the following are true about NTFS permissions? (Choose all that apply.)
when a subfolder is created, it is assigned the permissions of its parent folder by default, the owner of folder has full permissions to the folder
In Windows, by default, accounts ______ password cannot logon remotely
without
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
worm
Clasic 32bit CPU technology
x86
General term for hybrid 32/64 bit CPU technology
x86-64