Import Settings: Base Settings: Brownstone Default



Download 91.06 Kb.
Date07.01.2017
Size91.06 Kb.
#7693
Import Settings:

Base Settings: Brownstone Default

Information Field: Difficulty

Information Field: Link to

Information Field: Section Refs

Lesson: Lesson 8: Configuring Windows Vista Security


Multiple Choice


1. What term is most commonly used to collectively refer to a variety of technologies including viruses, Trojan horses, worms, spyware, and adware?

a) netware

b) virii


c) spam

d) malware


Ans: d

Difficulty: Easy

Section Ref: Defending Against Malware
2. What Windows Vista service ensures that your system is protected from malware intrusion if any of the Vista security mechanisms are not running properly?

a) Windows Defender

b) Windows Security Base

c) Windows Security Center

d) Microsoft Security Center
Ans: c

Difficulty: Medium

Section Ref: Defending Against Malware
3. By default, when a Widows Vista computer is a member of a domain, Windows Security Center is disabled. Where can you enable it?

a) Control Panel

b) Group Policy

c) System BIOS

d) Add/Remove Programs
Ans: b

Difficulty: Hard

Section Ref: Defending Against Malware
4. What program protects Windows Vista computers by blocking dangerous traffic, both incoming and outgoing?

a) Windows Vista Defender

b) Windows Firewall

c) Windows Security Center

d) Windows Anti-Virus
Ans: b

Difficulty: Easy

Section Ref: Defending Against Malware
5. On which of the following does Windows Firewall not base its filtering?

a) program names

b) IP addresses

c) protocol numbers

d) port numbers
Ans: a

Difficulty: Hard

Section Ref: Defending Against Malware
6. When configuring Windows Firewall rules, which parameter specifies the IP addresses of the local and remote systems to which the rule applies?

a) Rule Type

b) Scope

c) Action

d) Profile
Ans: b

Difficulty: Medium

Section Ref: Defending Against Malware
7. When dealing with Windows Firewall, what term is used to refer to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong?

a) group


b) profile

c) filter

d) scope
Ans: c

Difficulty: Easy

Section Ref: Defending Against Malware
8. What is a collection of documents that defines a method for securing data while it is in transit over a TCP/IP network?

a) Advanced IP Security Standards

b) TCP/IP

c) IPSec


d) ISPec
Ans: c

Difficulty: Medium

Section Ref: Defending Against Malware
9. When configuring connection security rules, what parameter specifies the IP addresses of the computer that will establish a secured connection before transmitting any data?

a) Profile

b) Name

c) Requirements



d) Endpoints
Ans: d

Difficulty: Easy

Section Ref: Defending Against Malware
10. What day of the month does Microsoft typically release operating system updates?

a) 12th

b) 15th

c) 21st

d) 2nd
Ans: a

Difficulty: Medium

Section Ref: Defending Against Malware
11. What Windows Vista feature enables users to keep their computers current with no manual intervention?

a) Windows Defender

b) Windows Security Center

c) Complete PC

d) Automatic Update
Ans: d

Difficulty: Easy

Section Ref: Defending Against Malware
12. What new Windows Vista application prevents the infiltration of spyware into the system?

a) Windows Defender

b) Windows Firewall

c) Windows Security Center

d) Automatic Update
Ans: a

Difficulty: Easy

Section Ref: Defending Against Malware
13. What additional application, provided by Windows Defender, enables you to monitor details about specific applications running on a Windows Vista computer?

a) Windows Defender Plus

b) Defender Explorer

c) Windows Explorer

d) Software Explorer
Ans: d

Difficulty: Medium

Section Ref: Defending Against Malware
14. What is a one-time virus scanner program that Microsoft distributes with its monthly updates?

a) Windows Defender

b) Automatic Update

c) Windows Malicious Software Removal Tool

d) Windows Firewall
Ans: c

Difficulty: Easy

Section Ref: Defending Against Malware
15. What feature of NTFS encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it?

a) Windows Firewall

b) Encrypted File System

c) BitLocker

d) Windows Malicious Software Removal Tool
Ans: b

Difficulty: Easy

Section Ref: Protecting Sensitive Data
16. Which version of Windows Vista does not support EFS?

a) Business

b) Home Premium

c) Enterprise

d) Ultimate
Ans: b

Difficulty: Medium

Section Ref: Protecting Sensitive Data
17. What technology makes it possible to store the user keys required for access to EFS-encrypted files on what is essentially a credit card with a chip that stores data?

a) Smart chip

b) Smart card

c) SmartID

d) Smart pen
Ans: b

Difficulty: Easy

Section Ref: Protecting Sensitive Data
18. By default, in what color does Windows Explorer display the names of encrypted files?

a) blue


b) red

c) yellow

d) green
Ans: d

Difficulty: Hard

Section Ref: Protecting Sensitive Data
19. What enables parents to limit their children’s access to specific Internet sites, games, and applications?

a) Windows Defender

b) BitLocker

c) Parental Control

d) EFS
Ans: c

Difficulty: Easy

Section Ref: Configuring Parental Controls
20. Which version of Vista does not support parental controls?

a) Business

b) Ultimate

c) Home Premium

d) Home Basic
Ans: a

Difficulty: Medium

Section Ref: Configuring Parental Controls

True/False


21. Windows Firewall filters based on IP addresses, protocol numbers, and application names.


Ans: False

Difficulty: Medium

Section Ref: Defending Against Malware
22. Windows Defender is a feature that enables users to keep their computers current with no manual intervention.
Ans: False

Difficulty: Easy

Section Ref: Defending Against Malware
23. The Malicious Software Removal Tool is a one-time virus scanner program that Microsoft distributes with its monthly updates.
Ans: True

Difficulty: Medium

Section Ref: Defending Against Malware
24. Bitlocker is a feature of NTFS that encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it.
Ans: False

Difficulty: Medium

Section Ref: Protecting Sensitive Data
25. Parental controls are only available on the Home Basic, Home Premium, and Ultimate versions of Windows Vista.
Ans: True

Difficulty: Easy

Section Ref: Configuring Parental Controls

Fill-in-the-Blank


26. __________ is the term most commonly used to collectively refer to a variety of technologies including viruses, Trojan horses, worms, spyware, and adware.


Ans: Malware

Difficulty: Easy

Section Ref: Defending Against Malware
27. Windows __________ Center is a centralized console that enables users and administrators to access, monitor, and configure the various Windows Vista security mechanisms.
Ans: Security

Difficulty: Easy

Section Ref: Defending Against Malware
28. Windows __________ protects Windows Vista computers by blocking dangerous traffic, both incoming and outgoing.
Ans: Firewall

Difficulty: Easy

Section Ref: Defending Against Malware
29. There are times when users might want to modify the firewall settings, such as when a specific application requires access to a port not anticipated by the firewall’s preconfigured rules. This is done by creating a(n) __________.
Ans: exception

Difficulty: Hard

Section Ref: Defending Against Malware
30. For full access to the Windows Firewall configuration settings, you must use the Windows Firewall With Advanced __________ snap-in for the Microsoft Management Console.
Ans: Security

Difficulty: Hard

Section Ref: Defending Against Malware
31. The Windows Vista version of Windows Firewall enables you to create rules that call for the use of IPsec to encapsulate data packets within other packets. This process is called __________.
Ans: tunneling

Difficulty: Hard

Section Ref: Protecting Sensitive Data
32. __________ Updates is a Windows Vista features that enables users to keep their computers current with no manual intervention.
Ans: Automatic

Difficulty: Easy

Section Ref: Defending Against Malware
33. The ________ File System protects users’ data by encrypting and decrypting it on the fly as the user works.
Ans: Encrypted

Difficulty: Medium

Section Ref: Protecting Sensitive Data
34. By default, Windows Explorer displays the names of files that are encrypted in the color __________.
Ans: green

Difficulty: Hard

Section Ref: Protecting Sensitive Data
35. Parental __________ enable parents to limit their children’s access to specific Internet sites, games, and applications.
Ans: controls

Difficulty: Medium

Section Ref: Configuring Parental Controls

Short Answer


36. What Windows Vista feature ensures that your system is protected by malware intrusion if any of the Vista security mechanisms are not running properly?


Ans: Windows Security Center

Difficulty: Easy

Section Ref: Defending Against Malware
37. When creating Windows Firewall rules, what option specifies whether you want to create a program rule, port rule, variant on one of the predefined rules, or custom rule?
Ans: Rule Type

Difficulty: Medium

Section Ref: Defending Against Malware
38. When creating Windows Firewall connection security rules, which option specifies whether authentication between two computers should be requested or required in each direction?
Ans: Requirements

Difficulty: Hard

Section Ref: Defending Against Malware
39. What Windows Vista feature enables users to keep their computers current with no manual intervention?
Ans: Automatic Update

Difficulty: Easy

Section Ref: Defending Against Malware
40. What new Windows Vista application prevents the infiltration of spyware into the system?
Ans: Windows Defender

Difficulty: Medium

Section Ref: Defending Against Malware
41. What additional application, provided by Windows Defender, enables you to monitor details about specific applications running on a Windows Vista computer?
Ans: Software Explorer

Difficulty: Medium

Section Ref: Defending Against Malware
42. What does EFS utilize from a user to encrypt the files that the user creates?
Ans: public key

Difficulty: Hard

Section Ref: Protecting Sensitive Data
43. For parental controls to be effective, what must each child using the computer have?
Ans: user account

Difficulty: Medium

Section Ref: Configuring Parental Controls
44. In its Home Basic, Home Premium, and Ultimate editions, what feature does Windows Vista include that you can use to exercise restrictions over other users’ computing habits?
Ans: Parental Controls

Difficulty: Easy

Section Ref: Configuring Parental Controls

Essay

45. What does the term “malware” refer to?
Ans: Malware includes a variety of technologies including viruses, Trojan horses, worms, spyware, and adware.

Difficulty: Easy

Section Ref: Defending Against Malware
46. On what does the Windows Firewall base its filtering?
Ans: IP addresses, protocol numbers, and port numbers

Difficulty: Medium

Section Ref: Defending Against Malware
47. When configuring Windows Firewall connection security rules, to what does the Endpoints option pertain?
Ans: The Endpoints option specifies the IP addresses of the computer that will establish a secured connection before transmitting any data.

Difficulty: Hard

Section Ref: Defending Against Malware
48. What is the Malicious Software Removal Tool?
Ans: The Malicious Software Removal Tool is a single-user virus scanner that Microsoft supplies in each of its monthly operating system updates. The tool scans the system for viruses and other forms of malware immediately after its installation and removes any potentially damaging software that it finds.

Difficulty: Easy

Section Ref: Defending Against Malware
49. What are the two main restrictions when implementing EFS?
Ans: EFS is a feature of the NTFS file system, so you cannot use EFS on FAT drives. You cannot use EFS to encrypt files that have already been compressed using NTFS compression.

Difficulty: Hard

Section Ref: Protecting Sensitive Data
50. What is the first thing that parents must do to use the Windows Vista Parental Controls feature?
Ans: Windows Vista Parental Controls are keyed to user accounts, so the first thing parents must do is create separate accounts for their children and make sure the family becomes accustomed to logging on and off of their accounts whenever they use the computer.

Difficulty: Hard



Section Ref: Configuring Parental Controls
Download 91.06 Kb.

Share with your friends:




The database is protected by copyright ©www.sckool.org 2022
send message

    Main page