Practice Exam Flashcards

(75 cards)

1
Q

____ is a threat to privacy and often makes systems unstable.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.

A

Unhealthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To address the risks to data stored on workstations and laptops, ____ is available on Windows 7.

A

BitLocker Drive Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows 7 includes a(n) ____ policy, which can be used to control many facets of Windows.

A

Local Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.

A

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ____ policy controls password characteristics for local user accounts.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.

A

Account Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.

A

Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is the security process that records the occurrence of specific operating system events in the Security log.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.

A

Privilege Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the ____.

A

Application Compatibility Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

While ____ is a great source of information, it is also the biggest source of malware (malicious software).

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most basic level of data security in Windows 7 is ____ permissions.

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ is the process of taking data and making it unreadable.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ allows you to configure the security settings for each location type differently.

A

Network Location Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ____ location type is used when the computer is connected as part of a peer-to-peer network in a trusted location.

A

Home Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ____ location type is used when the computer is connected in an untrusted public location such as an airport.

A

Public Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ define how much data can be sent and the format of the data as it crosses the network.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____ is an updated version of TCP/IPv4 with a larger address space and additional features.

A

TCP/IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ____ protocol is responsible for discovering network devices on the network, such as computers and routers.

A

Link-Layer Topology Discovery Mapper I/O Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ____ interface supports communication between applications and the TCP/IP protocol.

A

Windows Sockets (Winsock) user mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ____ interface supports communication between clients or services and protocols, including TCP/IP.

A

Transport Device Interface (TDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ____ interface is a replacement for TDI and supports communication between services or clients and protocols, including TCP/IP.

A

WInsock Kernel (WSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The ____ interface supports communication between protocols and network drivers.
Network Driver Interface Specification (NDIS)
26
The most common use for ____ is resolving host names to IP addresses.
DNS
27
____ is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices.
DHCP
28
If Windows 7 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use a(n) ____ address.
APIPA
29
DSL connections usually use ____ to secure connections.
PPPoE
30
The two most common mechanisms for sharing an IP address are a router or ____.
ICS
31
The ____ in Windows 7 allows you to connect two separate networks, with Windows 7 acting as a bridge between them.
Network Bridge
32
____ allows some disk access to be designated as low priority.
Low-priority I/O
33
____ allows Windows 7 to use flash memory embedded directly in hard disks.
Windows ReadyDrive
34
A ____ occurs when a limitation in a single computer system component slows down the entire system.
Bottleneck
35
Most ____ bottlenecks occur when the applications you are running require more memory than is physically available in the computer.
Memory
36
A ____ bottleneck occurs when there is too much work for a processor to do.
Processor
37
Counters in the ____ category monitor individual partitions and logical drives on a disk.
LogicalDisk
38
A Data Collector Set can monitor a(n) ____ to track when system events occur.
Event Trace
39
For performance counters, you can configure ____ instead of logging to disk.
Alerts
40
____ are used to process log file data and display it in a meaningful way.
Reports
41
To process the data in the log files, you specify rules. A rule is a(n) ____ file that contains instructions specifying how the data is to be processed.
XML
42
____ provides an overview of the current state of a computer.
Task Manager
43
The Windows Experience Index base score is the overall ranking of your system. The ranking is from 1 to ____ (the best possible).
7.9
44
The base score is determined by the ____ subscore.
Lowest
45
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.
Executive Services
46
An application’s view of the operating system is restricted to those methods and services exposed by the different ____.
Environment Subsystems
47
The Executive Services operate in ____ mode.
Kernel
48
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.
User
49
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.
ntvdm.exe
50
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.
Hives
51
The ____ hive contains global settings for the entire computer and the applications installed on it.
HKEY_LOCAL_MACHINE
52
The ____ hive contains details about the current hardware profile in use.
HKEY_CURRENT_CONFIG
53
The owner of the registry keys is usually listed as ____.
SYSTEM
54
UAC-aware applications can include a(n) ____ file called the application manifest.
XML
55
The Run As feature has been modified in Windows 7 to now be known as the ____ option.
Run As Administrator
56
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.
Program Compatibility Assistant
57
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.
XP Mode
58
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.
Kernel Patching
59
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.
Microsoft Application Compatibility Toolkit
60
The ____ tool scans the current state of the computer and reports its findings in a searchable tree format.
System Information
61
System Information files use the extension ____ and store data in a compressed binary format.
.NFO
62
The ____ console is used to view the recent and current status of tasks that are started automatically.
Task Scheduler
63
The ____ utility is an MMC console snap-in used to browse and manage the records of system events and messages stored in system event logs.
Event Viewer
64
Which of the following file formats can be used to save an event’s log data?
.CSV
65
The ____ console identifies what folders are shared on the current computer, who is connected to those shared folders, and what files in those shared folders are open.
Shared Folders
66
The ____ console reports the status of the currently attached computer hardware.
Device Manager
67
The ____ is a tool that provides you with a single location where you can identify and address any security issues, maintenance requirements, and errors that have arisen.
Action Center
68
The image data created by the Create a System Image wizard is stored as a virtual hard disk image, which is stored as a(n) ____ file.
.VHD
69
____ is a troubleshooting startup mode that is typically used when the regular startup mode for Windows 7 fails.
Safe Mode
70
The ____ tool is used to recover a Windows 7 installation when it is unable to start.
Startup Repair
71
____ allows the computer’s operating system to be restored from an image created earlier with the Windows Backup and Restore utility.
System Image Recovery
72
____ allows the computer state to be rolled back to a previous restore point.
System Restore
73
____ is used to protect both critical operating system files and registry keys by restricting permissions to these resources.
Windows Resource Protection
74
Since the early versions of x86 computers, the ____ has acted as an interface between hardware and the operating system.
BIOS
75
____ is the resume loader for Windows 7. It is responsible for starting the operating system from hibernation.
Winresume.exe