Deck 6: User Management

Full screen (f)
exit full mode
Question
____ protects your computer from viruses and spyware that may attempt to steal your password.

A) Fast use switching
B) Secure logon
C) Windows Welcome
D) Manual logon
Use Space or
up arrow
down arrow
to flip the card.
Question
The ____ applet in Control Panel is a simplified interface for user management.

A) Privileges
B) Permissions
C) User Accounts
D) Accounts
Question
In Windows 7, most actions that are triggered by an Administrator do not result in a prompt from User Account Control.
Question
Holding down the ____ key during the boot process stops the automatic logon from occurring.

A) Shift
B) Ctrl
C) Alt
D) Esc
Question
An administrator account derives its privileges from being a member of the local ____ group.

A) Administrators
B) Users
C) Guest
D) Performance Monitor Users
Question
Members of the ____ group can back up and restore all files and folders on the computer.

A) Cryptographic Operators
B) Event Log Readers
C) Distributed COM Users
D) Backup Operators
Question
Local user accounts can be used to access resources on other computers in a workgroup or a domain.
Question
Each time a user logs on locally, the ____ database is used to verify logon credentials.

A) SAM
B) SSID
C) SID
D) NID
Question
The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.

A) Root
B) Guest
C) Administrator
D) User
Question
In Windows 7, the default profile is configured using ____.

A) Sysprep
B) the User Profiles applet
C) the User Manager
D) the Account Manager
Question
The ____ profile is used when new user profiles are created.

A) default
B) roaming
C) mandatory
D) public
Question
Members of the ____ group are able to monitor performance counters and access performance logs on the computer.

A) Event Log Readers
B) IIS_IUSRS
C) Performance Log Users
D) Guests
Question
Windows 7 cannot perform fast user switching when configured as a domain client.
Question
When the computer is a domain client, then secure logon is required.
Question
The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.

A) User
B) Domain
C) Everyone
D) Initial
Question
____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.

A) Secure logon
B) Windows Welcome
C) Automatic logon
D) Fast user switching
Question
The password for the Administrator account is blank by default.
Question
____ are required for individuals to log on to Windows 7 and use resources on the computer.

A) Public keys
B) IP addresses
C) User accounts
D) Digital certificates
Question
The ____ account is the most powerful local user account possible.

A) Guest
B) Initial
C) Installation
D) Administrator
Question
Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.

A) Event Log Readers
B) Performance Monitor Users
C) Performance Log Users
D) Guests
Question
What are some of the most common naming conventions for user logon names?
Question
____________________ is the logon method used by standalone computers and workgroup members, which authenticate users by using the local SAM database.
Question
A ____ network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information.

A) domain-based
B) peer-to-peer
C) server-based
D) centralized
Question
The ____ profile is different from other profiles because it is not a complete profile.

A) default
B) roaming
C) mandatory
D) public
Question
Local user accounts are stored in the ___________________________________ database of Windows 7.
Question
What are the characteristics of the Windows 7 Administrator account?
Question
A standard user account derives its privileges from being a member of the local ____________________ group.
Question
What are the characteristics of the Windows 7 Guest account?
Question
What are some of the restrictions imposed by Windows 7 on the user logon name?
Question
A ____ simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer.

A) Personal User Password
B) Pass-through authentication
C) HomeGroup
D) Game control
Question
What are some of the user account attributes that describe user and control access?
Question
A ____ profile is stored in a network location rather than on the local hard drive.

A) roaming
B) public
C) mandatory
D) default
Question
What are some of the differences between the Administrator account and the initial account?
Question
____ control when a user is able to log on and use the computer.

A) Game controls
B) Time limits
C) Web filters
D) Activity reports
Question
A ____ profile is a profile that cannot be modified.

A) public
B) roaming
C) default
D) mandatory
Question
What are the logon methods supported by Windows 7?
Question
What are the logon configurations supported by Windows 7?
Question
What are the folders included in the default public profile?
Question
The user accounts created in Windows 7 are ____________________ user accounts. This means that they exist only on the local computer.
Question
Automatic logon is configured on the ____________________ tab of the User Accounts applet.
Question
Match between columns
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Fast user switching
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Ntuser.ini
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
NTUSER.DAT
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Safe Mode
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
User profile
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Naming convention
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Replicator
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Security Identifier (SID)
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Secure Logon
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Fast user switching
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Ntuser.ini
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
NTUSER.DAT
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Safe Mode
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
User profile
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Naming convention
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Replicator
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Security Identifier (SID)
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Secure Logon
a boot option you can use when troubleshooting Windows 7
Fast user switching
a boot option you can use when troubleshooting Windows 7
Ntuser.ini
a boot option you can use when troubleshooting Windows 7
NTUSER.DAT
a boot option you can use when troubleshooting Windows 7
Safe Mode
a boot option you can use when troubleshooting Windows 7
User profile
a boot option you can use when troubleshooting Windows 7
Naming convention
a boot option you can use when troubleshooting Windows 7
Replicator
a boot option you can use when troubleshooting Windows 7
Security Identifier (SID)
a boot option you can use when troubleshooting Windows 7
Secure Logon
a collection of desktop and environment configurations for a specific user or group of users
Fast user switching
a collection of desktop and environment configurations for a specific user or group of users
Ntuser.ini
a collection of desktop and environment configurations for a specific user or group of users
NTUSER.DAT
a collection of desktop and environment configurations for a specific user or group of users
Safe Mode
a collection of desktop and environment configurations for a specific user or group of users
User profile
a collection of desktop and environment configurations for a specific user or group of users
Naming convention
a collection of desktop and environment configurations for a specific user or group of users
Replicator
a collection of desktop and environment configurations for a specific user or group of users
Security Identifier (SID)
a collection of desktop and environment configurations for a specific user or group of users
Secure Logon
a file that stores user-specific registry information
Fast user switching
a file that stores user-specific registry information
Ntuser.ini
a file that stores user-specific registry information
NTUSER.DAT
a file that stores user-specific registry information
Safe Mode
a file that stores user-specific registry information
User profile
a file that stores user-specific registry information
Naming convention
a file that stores user-specific registry information
Replicator
a file that stores user-specific registry information
Security Identifier (SID)
a file that stores user-specific registry information
Secure Logon
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Fast user switching
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Ntuser.ini
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
NTUSER.DAT
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Safe Mode
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
User profile
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Naming convention
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Replicator
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Security Identifier (SID)
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Secure Logon
value assigned to each user account within the SAM database
Fast user switching
value assigned to each user account within the SAM database
Ntuser.ini
value assigned to each user account within the SAM database
NTUSER.DAT
value assigned to each user account within the SAM database
Safe Mode
value assigned to each user account within the SAM database
User profile
value assigned to each user account within the SAM database
Naming convention
value assigned to each user account within the SAM database
Replicator
value assigned to each user account within the SAM database
Security Identifier (SID)
value assigned to each user account within the SAM database
Secure Logon
a standard process for creating names on a network or standalone computer
Fast user switching
a standard process for creating names on a network or standalone computer
Ntuser.ini
a standard process for creating names on a network or standalone computer
NTUSER.DAT
a standard process for creating names on a network or standalone computer
Safe Mode
a standard process for creating names on a network or standalone computer
User profile
a standard process for creating names on a network or standalone computer
Naming convention
a standard process for creating names on a network or standalone computer
Replicator
a standard process for creating names on a network or standalone computer
Security Identifier (SID)
a standard process for creating names on a network or standalone computer
Secure Logon
group used by special user accounts to perform file replication between computers
Fast user switching
group used by special user accounts to perform file replication between computers
Ntuser.ini
group used by special user accounts to perform file replication between computers
NTUSER.DAT
group used by special user accounts to perform file replication between computers
Safe Mode
group used by special user accounts to perform file replication between computers
User profile
group used by special user accounts to perform file replication between computers
Naming convention
group used by special user accounts to perform file replication between computers
Replicator
group used by special user accounts to perform file replication between computers
Security Identifier (SID)
group used by special user accounts to perform file replication between computers
Secure Logon
Question
What are the main characteristics of a domain-based network?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: User Management
1
____ protects your computer from viruses and spyware that may attempt to steal your password.

A) Fast use switching
B) Secure logon
C) Windows Welcome
D) Manual logon
B
2
The ____ applet in Control Panel is a simplified interface for user management.

A) Privileges
B) Permissions
C) User Accounts
D) Accounts
C
3
In Windows 7, most actions that are triggered by an Administrator do not result in a prompt from User Account Control.
True
4
Holding down the ____ key during the boot process stops the automatic logon from occurring.

A) Shift
B) Ctrl
C) Alt
D) Esc
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
An administrator account derives its privileges from being a member of the local ____ group.

A) Administrators
B) Users
C) Guest
D) Performance Monitor Users
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Members of the ____ group can back up and restore all files and folders on the computer.

A) Cryptographic Operators
B) Event Log Readers
C) Distributed COM Users
D) Backup Operators
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Local user accounts can be used to access resources on other computers in a workgroup or a domain.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Each time a user logs on locally, the ____ database is used to verify logon credentials.

A) SAM
B) SSID
C) SID
D) NID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.

A) Root
B) Guest
C) Administrator
D) User
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
In Windows 7, the default profile is configured using ____.

A) Sysprep
B) the User Profiles applet
C) the User Manager
D) the Account Manager
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ profile is used when new user profiles are created.

A) default
B) roaming
C) mandatory
D) public
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Members of the ____ group are able to monitor performance counters and access performance logs on the computer.

A) Event Log Readers
B) IIS_IUSRS
C) Performance Log Users
D) Guests
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Windows 7 cannot perform fast user switching when configured as a domain client.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
When the computer is a domain client, then secure logon is required.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.

A) User
B) Domain
C) Everyone
D) Initial
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.

A) Secure logon
B) Windows Welcome
C) Automatic logon
D) Fast user switching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The password for the Administrator account is blank by default.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ are required for individuals to log on to Windows 7 and use resources on the computer.

A) Public keys
B) IP addresses
C) User accounts
D) Digital certificates
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ account is the most powerful local user account possible.

A) Guest
B) Initial
C) Installation
D) Administrator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.

A) Event Log Readers
B) Performance Monitor Users
C) Performance Log Users
D) Guests
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What are some of the most common naming conventions for user logon names?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____________________ is the logon method used by standalone computers and workgroup members, which authenticate users by using the local SAM database.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
A ____ network (or workgroup) consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information.

A) domain-based
B) peer-to-peer
C) server-based
D) centralized
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The ____ profile is different from other profiles because it is not a complete profile.

A) default
B) roaming
C) mandatory
D) public
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Local user accounts are stored in the ___________________________________ database of Windows 7.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the characteristics of the Windows 7 Administrator account?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A standard user account derives its privileges from being a member of the local ____________________ group.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the characteristics of the Windows 7 Guest account?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are some of the restrictions imposed by Windows 7 on the user logon name?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ simplifies the configuration of peer-to-peer networks by removing the need to synchronize users and passwords on each computer.

A) Personal User Password
B) Pass-through authentication
C) HomeGroup
D) Game control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What are some of the user account attributes that describe user and control access?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ profile is stored in a network location rather than on the local hard drive.

A) roaming
B) public
C) mandatory
D) default
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are some of the differences between the Administrator account and the initial account?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ control when a user is able to log on and use the computer.

A) Game controls
B) Time limits
C) Web filters
D) Activity reports
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
A ____ profile is a profile that cannot be modified.

A) public
B) roaming
C) default
D) mandatory
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the logon methods supported by Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What are the logon configurations supported by Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the folders included in the default public profile?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The user accounts created in Windows 7 are ____________________ user accounts. This means that they exist only on the local computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Automatic logon is configured on the ____________________ tab of the User Accounts applet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Fast user switching
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Ntuser.ini
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
NTUSER.DAT
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Safe Mode
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
User profile
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Naming convention
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Replicator
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Security Identifier (SID)
a file that controls which portions of a profile are not to be copied up to a server when roaming profiles are enabled
Secure Logon
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Fast user switching
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Ntuser.ini
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
NTUSER.DAT
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Safe Mode
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
User profile
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Naming convention
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Replicator
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Security Identifier (SID)
increases security on your computer by forcing you to press Ctrl+Alt+Delete before logging on
Secure Logon
a boot option you can use when troubleshooting Windows 7
Fast user switching
a boot option you can use when troubleshooting Windows 7
Ntuser.ini
a boot option you can use when troubleshooting Windows 7
NTUSER.DAT
a boot option you can use when troubleshooting Windows 7
Safe Mode
a boot option you can use when troubleshooting Windows 7
User profile
a boot option you can use when troubleshooting Windows 7
Naming convention
a boot option you can use when troubleshooting Windows 7
Replicator
a boot option you can use when troubleshooting Windows 7
Security Identifier (SID)
a boot option you can use when troubleshooting Windows 7
Secure Logon
a collection of desktop and environment configurations for a specific user or group of users
Fast user switching
a collection of desktop and environment configurations for a specific user or group of users
Ntuser.ini
a collection of desktop and environment configurations for a specific user or group of users
NTUSER.DAT
a collection of desktop and environment configurations for a specific user or group of users
Safe Mode
a collection of desktop and environment configurations for a specific user or group of users
User profile
a collection of desktop and environment configurations for a specific user or group of users
Naming convention
a collection of desktop and environment configurations for a specific user or group of users
Replicator
a collection of desktop and environment configurations for a specific user or group of users
Security Identifier (SID)
a collection of desktop and environment configurations for a specific user or group of users
Secure Logon
a file that stores user-specific registry information
Fast user switching
a file that stores user-specific registry information
Ntuser.ini
a file that stores user-specific registry information
NTUSER.DAT
a file that stores user-specific registry information
Safe Mode
a file that stores user-specific registry information
User profile
a file that stores user-specific registry information
Naming convention
a file that stores user-specific registry information
Replicator
a file that stores user-specific registry information
Security Identifier (SID)
a file that stores user-specific registry information
Secure Logon
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Fast user switching
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Ntuser.ini
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
NTUSER.DAT
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Safe Mode
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
User profile
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Naming convention
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Replicator
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Security Identifier (SID)
allows multiple users to have applications running in the background on a Windows Vista computer at the same time
Secure Logon
value assigned to each user account within the SAM database
Fast user switching
value assigned to each user account within the SAM database
Ntuser.ini
value assigned to each user account within the SAM database
NTUSER.DAT
value assigned to each user account within the SAM database
Safe Mode
value assigned to each user account within the SAM database
User profile
value assigned to each user account within the SAM database
Naming convention
value assigned to each user account within the SAM database
Replicator
value assigned to each user account within the SAM database
Security Identifier (SID)
value assigned to each user account within the SAM database
Secure Logon
a standard process for creating names on a network or standalone computer
Fast user switching
a standard process for creating names on a network or standalone computer
Ntuser.ini
a standard process for creating names on a network or standalone computer
NTUSER.DAT
a standard process for creating names on a network or standalone computer
Safe Mode
a standard process for creating names on a network or standalone computer
User profile
a standard process for creating names on a network or standalone computer
Naming convention
a standard process for creating names on a network or standalone computer
Replicator
a standard process for creating names on a network or standalone computer
Security Identifier (SID)
a standard process for creating names on a network or standalone computer
Secure Logon
group used by special user accounts to perform file replication between computers
Fast user switching
group used by special user accounts to perform file replication between computers
Ntuser.ini
group used by special user accounts to perform file replication between computers
NTUSER.DAT
group used by special user accounts to perform file replication between computers
Safe Mode
group used by special user accounts to perform file replication between computers
User profile
group used by special user accounts to perform file replication between computers
Naming convention
group used by special user accounts to perform file replication between computers
Replicator
group used by special user accounts to perform file replication between computers
Security Identifier (SID)
group used by special user accounts to perform file replication between computers
Secure Logon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the main characteristics of a domain-based network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.