Deck 20: Security Practices

ملء الشاشة (f)
exit full mode
سؤال
When controlling access to data folders or files,permissions to these resources are assigned to individual user accounts or user groups.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ on a motherboard offers security features including power-on passwords,support for intrusion-detection devices,and support for a TPM chip.

A)Software
B)BIOS
C)Blocks
D)Chipsets
سؤال
To know for sure exactly which permissions for a file or folder are in effect,see the ____ tab of the Advanced Security Settings box.

A)Security
B)Derived Permissions
C)Actual Permissions
D)Effective Permissions
سؤال
It is necessary that all computers belong to the same workgroup in order to share resources.
سؤال
Windows XP uses ____ file sharing by default,which means you have no control over who has access to a shared folder or file.

A)network
B)simple
C)directory
D)user
سؤال
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates,you might be able to recover the file using a(n)____ certificate.

A)recovery
B)restoration
C)backup
D)administrator
سؤال
When you share folders on the network,the ____ permissions for remote users need to be set.

A)share
B)file
C)folder
D)disc
سؤال
A $ at the end of the folder name creates a(n)____ share.

A)public
B)hidden
C)inaccessible
D)visible
سؤال
Permissions manually set for a subfolder or file cannot override inherited permissions.
سؤال
Certificates are managed using the ____ console.

A)Certificate Store
B)Certificate Preparation
C)Certificate Manager
D)Digital Certificate
سؤال
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work,try searching for suspicious entries in the subkeys under ____.

A)HKLM\System\CurrentControlSet\Control\SafeBoot
B)HKLM\System\CurrentControlSet\System\SafeBoot
C)HKCU\System\CurrentControlSet\Control\SafeBoot
D)HKLM\System\CurrentControlSet\Services\SafeBoot
سؤال
The best way to change inherited permissions is to change the permissions of the ____.

A)child object
B)inherited objects
C)parent object
D)inheriting objects
سؤال
The ____ command can be used to encrypt,decrypt,or recover an encrypted file when the certificates are lost.

A)Decipher
B)Cipher
C)Decode
D)Transcode
سؤال
If you name a shared folder Financial$,in order to access the folder,a user must enter ____ in the Vista Start Search box.

A)\\computername\Financial$
B)\\financial$\computername
C)\\computername\shares\financial$
D)\\shares\computername\financial$
سؤال
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.

A)behavior
B)process
C)virus
D)malicious
سؤال
For a stand-alone computer that is not part of a Windows domain,the EFS encrypting process generates a ____ digital certificate to be used for the encryption.

A)publicly-signed
B)network-signed
C)system-signed
D)self-signed
سؤال
A(n)____ computer is not allowed to use the network,is put on a different network dedicated to them,or is only allowed to access certain network resources.

A)unrestricted
B)restricted
C)isolated
D)quarantined
سؤال
Allowing users full control of a folder is always required by job requirements.
سؤال
Many notebook computers have a chip on the motherboard called the ____.

A)MPM
B)CPM
C)UPM
D)TPM
سؤال
If an infected computer will not boot,it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Permissions that are attained from a parent object
سؤال
____________________shares are the folders that are shared by default on a network that administrator accounts can access.
سؤال
In UNIX,the lowest and most powerful level of UNIX accounts is called the ____ account.

A)God
B)master
C)universal
D)root
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Those users who have not been authenticated on a remote computer
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Designed to do varying degrees of damage to data and software,although it does not damage PC hardware
سؤال
To see a list of services managed by Svchost,enter this command in a command-prompt window: ____.

A)taskview /svc
B)taskmgr /svc
C)tasklist /SVC
D)tasklist /all
سؤال
Use ____ to search for malware processes,especially those that mask themselves as core Windows processes and elude AV software.

A)Computer Manager
B)Task Manager
C)System Manager
D)Event Viewer
سؤال
A virus is often programmed to attempt to hide from ____________________ software.
سؤال
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

A)root
B)privileged
C)user
D)executive
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Folders on a computer that are shared with others on the network using a folder's Properties box
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes the Authenticated Users group as well as the Guest account
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes all user accounts that can access the system except the Guest account
سؤال
If you need to change the rights of a user account to the administrator's level,use the ____________________ console and add the user to the administrators group.
سؤال
A(n)____________________ running in kernel mode actually interferes with the Windows kernel and substitutes its own information in place of the raw data read by the Windows kernel.
سؤال
A(n)____________________ is placed in a special directory and cannot be opened.
سؤال
You can recognize a program as a counterfeit process if it's not running under System,Local Service,or ____.

A)Administrator
B)Guest
C)Local
D)Network Service
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Is when permissions are passed from parent to child
سؤال
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
A program that uses unusually complex methods to hide itself on a system,and many spyware and adware programs are also rootkits
سؤال
The term ____ applies to a kit or set of tools used originally on UNIX computers.

A)rootkit
B)botkit
C)stealthkit
D)worm
سؤال
Discuss the methods to deal with infected or damaged boot sectors or corrupted BIOS code.
سؤال
Discuss the Anonymous users group.
سؤال
Explain why sharing all the drives on all computers is not a good security practice.
سؤال
List the steps to add a certificate to an encrypted file.
سؤال
Describe one method that can be used to decrypt a file or folder.
سؤال
List three methods for protecting a system against malicious software.
سؤال
Discuss how to get the best results when scanning for rootkits.
سؤال
Explain the Authenticated Users group.
سؤال
Discuss encrypting files and folders.
سؤال
List the two methods used by antirootkit software to remove rootkits after they are installed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 20: Security Practices
1
When controlling access to data folders or files,permissions to these resources are assigned to individual user accounts or user groups.
True
2
____ on a motherboard offers security features including power-on passwords,support for intrusion-detection devices,and support for a TPM chip.

A)Software
B)BIOS
C)Blocks
D)Chipsets
B
3
To know for sure exactly which permissions for a file or folder are in effect,see the ____ tab of the Advanced Security Settings box.

A)Security
B)Derived Permissions
C)Actual Permissions
D)Effective Permissions
D
4
It is necessary that all computers belong to the same workgroup in order to share resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Windows XP uses ____ file sharing by default,which means you have no control over who has access to a shared folder or file.

A)network
B)simple
C)directory
D)user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates,you might be able to recover the file using a(n)____ certificate.

A)recovery
B)restoration
C)backup
D)administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
When you share folders on the network,the ____ permissions for remote users need to be set.

A)share
B)file
C)folder
D)disc
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
A $ at the end of the folder name creates a(n)____ share.

A)public
B)hidden
C)inaccessible
D)visible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Permissions manually set for a subfolder or file cannot override inherited permissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Certificates are managed using the ____ console.

A)Certificate Store
B)Certificate Preparation
C)Certificate Manager
D)Digital Certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work,try searching for suspicious entries in the subkeys under ____.

A)HKLM\System\CurrentControlSet\Control\SafeBoot
B)HKLM\System\CurrentControlSet\System\SafeBoot
C)HKCU\System\CurrentControlSet\Control\SafeBoot
D)HKLM\System\CurrentControlSet\Services\SafeBoot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The best way to change inherited permissions is to change the permissions of the ____.

A)child object
B)inherited objects
C)parent object
D)inheriting objects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ____ command can be used to encrypt,decrypt,or recover an encrypted file when the certificates are lost.

A)Decipher
B)Cipher
C)Decode
D)Transcode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
If you name a shared folder Financial$,in order to access the folder,a user must enter ____ in the Vista Start Search box.

A)\\computername\Financial$
B)\\financial$\computername
C)\\computername\shares\financial$
D)\\shares\computername\financial$
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.

A)behavior
B)process
C)virus
D)malicious
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
For a stand-alone computer that is not part of a Windows domain,the EFS encrypting process generates a ____ digital certificate to be used for the encryption.

A)publicly-signed
B)network-signed
C)system-signed
D)self-signed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A(n)____ computer is not allowed to use the network,is put on a different network dedicated to them,or is only allowed to access certain network resources.

A)unrestricted
B)restricted
C)isolated
D)quarantined
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Allowing users full control of a folder is always required by job requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Many notebook computers have a chip on the motherboard called the ____.

A)MPM
B)CPM
C)UPM
D)TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
If an infected computer will not boot,it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Permissions that are attained from a parent object
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
____________________shares are the folders that are shared by default on a network that administrator accounts can access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
In UNIX,the lowest and most powerful level of UNIX accounts is called the ____ account.

A)God
B)master
C)universal
D)root
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Those users who have not been authenticated on a remote computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Designed to do varying degrees of damage to data and software,although it does not damage PC hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
To see a list of services managed by Svchost,enter this command in a command-prompt window: ____.

A)taskview /svc
B)taskmgr /svc
C)tasklist /SVC
D)tasklist /all
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Use ____ to search for malware processes,especially those that mask themselves as core Windows processes and elude AV software.

A)Computer Manager
B)Task Manager
C)System Manager
D)Event Viewer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
A virus is often programmed to attempt to hide from ____________________ software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

A)root
B)privileged
C)user
D)executive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Folders on a computer that are shared with others on the network using a folder's Properties box
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes the Authenticated Users group as well as the Guest account
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Includes all user accounts that can access the system except the Guest account
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
If you need to change the rights of a user account to the administrator's level,use the ____________________ console and add the user to the administrators group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A(n)____________________ running in kernel mode actually interferes with the Windows kernel and substitutes its own information in place of the raw data read by the Windows kernel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n)____________________ is placed in a special directory and cannot be opened.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
You can recognize a program as a counterfeit process if it's not running under System,Local Service,or ____.

A)Administrator
B)Guest
C)Local
D)Network Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
Is when permissions are passed from parent to child
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each term with the correct statement below.
a.Everyone group
b.Drive lock password
c.Permission propagation
d.Rootkit
e.Anonymous users"
f.Authenticated Users group
g.Local shares
h.Inherited permissions
i.Malicious software
A program that uses unusually complex methods to hide itself on a system,and many spyware and adware programs are also rootkits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
The term ____ applies to a kit or set of tools used originally on UNIX computers.

A)rootkit
B)botkit
C)stealthkit
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss the methods to deal with infected or damaged boot sectors or corrupted BIOS code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss the Anonymous users group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Explain why sharing all the drives on all computers is not a good security practice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List the steps to add a certificate to an encrypted file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe one method that can be used to decrypt a file or folder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
List three methods for protecting a system against malicious software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Discuss how to get the best results when scanning for rootkits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Explain the Authenticated Users group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss encrypting files and folders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List the two methods used by antirootkit software to remove rootkits after they are installed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.