Deck 7: Windows 7 Security Features
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 7: Windows 7 Security Features
1
NTFS permissions can be easily circumvented when you have physical access to a computer.
True
2
____ is(are) used to define which programs are allowed or disallowed in the system.
A) Software restriction policies
B) A network zone
C) Local policies
D) AppLocker
A) Software restriction policies
B) A network zone
C) Local policies
D) AppLocker
D
3
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.
A) Adware
B) Worm
C) Spyware
D) Virus
A) Adware
B) Worm
C) Spyware
D) Virus
C
4
The most critical effect of malware is degraded system performance.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.
A) unhealthy
B) healthy
C) safe
D) authorized
A) unhealthy
B) healthy
C) safe
D) authorized
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a threat to privacy and often makes systems unstable.
A) Windows Defender
B) EFS
C) Macro script
D) Spyware
A) Windows Defender
B) EFS
C) Macro script
D) Spyware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) ____ policy controls password characteristics for local user accounts.
A) account lockout
B) password
C) domain
D) user control
A) account lockout
B) password
C) domain
D) user control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is the security process that records the occurrence of specific operating system events in the Security log.
A) Encrypting
B) Hashing
C) Filtering
D) Auditing
A) Encrypting
B) Hashing
C) Filtering
D) Auditing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Newer Windows applications use an application ____ to describe the structure of an application.
A) manifest
B) log
C) record
D) hash
A) manifest
B) log
C) record
D) hash
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Every object in Windows 7 has audit events related to it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
While ____ is a great source of information, it is also the biggest source of malware (malicious software).
A) the Internet
B) a cloud library
C) a hard disk
D) a router
A) the Internet
B) a cloud library
C) a hard disk
D) a router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In Windows 7, advanced audit policies can only be edited at a command-line.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Windows 7 includes a(n) ____ policy, which can be used to control many facets of Windows.
A) NAP
B) local security
C) EFS security
D) remote
A) NAP
B) local security
C) EFS security
D) remote
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.
A) network zone
B) path
C) hash
D) certificate
A) network zone
B) path
C) hash
D) certificate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.
A) logon events
B) account management
C) privilege use
D) process tracking
A) logon events
B) account management
C) privilege use
D) process tracking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The most commonly used method for authentication is a username and password.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the ____.
A) Administrative Privileges Toolkit
B) Private Toolkit
C) Secure Toolkit
D) Application Compatibility Toolkit
A) Administrative Privileges Toolkit
B) Private Toolkit
C) Secure Toolkit
D) Application Compatibility Toolkit
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.
A) domain
B) group
C) account lockout
D) password
A) domain
B) group
C) account lockout
D) password
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
To address the risks to data stored on workstations and laptops, ____ is available on Windows 7.
A) NAP
B) Dual Locked Hard Drive
C) BitLocker Drive Encryption
D) TPM
A) NAP
B) Dual Locked Hard Drive
C) BitLocker Drive Encryption
D) TPM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.
A) Group Policy
B) Local Policy
C) Network Policy
D) Domain Policy
A) Group Policy
B) Local Policy
C) Network Policy
D) Domain Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.
A) signing
B) symmetric
C) asymmetric
D) hash
A) signing
B) symmetric
C) asymmetric
D) hash
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
What are the most common reasons that the BitLocker Drive Encryption recovery password is required?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The most basic level of data security in Windows 7 is ____ permissions.
A) EFS
B) NTFS
C) FAT
D) NAP
A) EFS
B) NTFS
C) FAT
D) NAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ____ encryption algorithm uses the same key to encrypt data and decrypt data.
A) asymmetric
B) symmetric
C) signing
D) hash
A) asymmetric
B) symmetric
C) signing
D) hash
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the major security improvements in Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
The Account Policies category contains the ____________________ policy and the account lockout policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
What are the tasks you can perform with the Security Configuration and Analysis tool?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the settings available to control account lockouts?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are some of the settings available in the security options of the local policy?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) ____ is part of the motherboard in your computer and is used to store encryption keys and certificates.
A) NTFS
B) TPM
C) EFS
D) NAP
A) NTFS
B) TPM
C) EFS
D) NAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Windows 7 is protected on networks by an enhanced firewall and ___________________________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ are .inf files that contain settings that correspond with the Account Policies and Local Policies in the local security policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are some of the settings available in the user rights assignment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Briefly describe the rule collections used by AppLocker.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____ is the process of taking data and making it unreadable.
A) Encryption
B) Decryption
C) Signing
D) Verifying
A) Encryption
B) Decryption
C) Signing
D) Verifying
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted.
A) signing
B) symmetric
C) asymmetric
D) hash
A) signing
B) symmetric
C) asymmetric
D) hash
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Internet Explorer has been modified to run in a limited state, called ____________________ mode, in which user files cannot be modified.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the categories of local security policy settings?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe the changes in Windows services that have been made to harden them.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
____________________ is a method for protecting data on removable storage such as USB drives.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the security settings monitored by Action Center?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck