98-349 Session 3 Post Lab Follow-up Flashcards
Which are ways to create an acceptable level of risk? Choose all that apply.
A - Fulfill through policies
B - Implement procedures
C - Install antivirus software
D - Define how to create an unsecured environment
A - Fulfill through policies
B - Implement procedures
Worms depend on a carrier to spread.
A - True
B - False
B - False
Which are ways that phishing occurs? Choose all that apply. A - False scenarios B - Spoofed Web sites C - Impersonation of someone D - Entering personal information
A - False scenarios
B - Spoofed Web sites
C - Impersonation of someone
Phishing attacks are an example of\_\_\_\_\_\_\_\_\_\_. A - overlay B - stealing C - pilfering D - social engineering
D - social engineering
Which are ways to avoid phishing attacks? Choose all that apply. A - Be suspicious B - Scan all downloaded applications C - Download anti-phishing software D - Do not click on links within e-mails
A - Be suspicious
B - Scan all downloaded applications
D - Do not click on links within e-mails
Which are Microsoft protection methods? Choose all that apply. A - The Action Center B - Windows Database C - Windows Defender D - Microsoft Forefront E - Microsoft Security Essentials F - The Malicious Software Removal Tool
A - The Action Center C - Windows Defender D - Microsoft Forefront E - Microsoft Security Essentials F - The Malicious Software Removal Tool
Which option is used to check for updates? A - Scan B - Help C - Tools D - History
A – Scan
C - Tools
Which categories are found on the Microsoft Security Essentials Settings tab? Choose all that apply. A - Scheduled scan B - Basic protection C - Microsoft SpyNet D - Community protection
A - Scheduled scan
C - Microsoft SpyNet
How many settings exist for notification of changes in the User Account Control Settings dialog box? A - Six B - Ten C - Four D - Three
C - Four
Which option is used to inject variety into the encryption process? A - Key B - Algorithm C - Ciphered text D - Encryption elements
A - Key
Encrypted folders are displayed in which color in Windows 7? A - Red B - Blue C - Black D - Green
D - Green
Which are encryption systems found in Windows 7? Choose all that apply. A - EFS B - Libraries C - BitLocker D - ActionScript
A – EFS
C - BitLocker
Files that are smaller than the allocation unit size of the drive do not benefit from compression.
A - True
B - False
A - True
A library is actually a/an \_\_\_\_\_\_\_\_\_\_ in Windows 7. A - folder B - XML file C - algorithm D - encrypted file
B - XML file
Which is the result if users clear the Shown in navigation pane check box in the Attributes section of the My Library Properties dialog box?
A - Folder space is limited
B - New cards are implemented
C - Library does not show up on navigation pane
D - Library is moved to the top of the Selections list
C - Library does not show up on navigation pane
Hubs are more efficient than switches and offer better performance for network communications.
A - True
B - False
B - False
Which network software option sends data without a confirmation or a connection? A - IP B - UP C - TCP D - UDP
D - UDP
Which describe a Windows workgroup? Choose all that apply.
A - All computers are peers
B - Workgroups are not password-protected
C - Each computer has a local set of user accounts
D - All computers are typically on the same subnet
E - A single computer has control of other computers
F - The recommended number of computers in a workgroup is no more than 20
A - All computers are peers
C - Each computer has a local set of user accounts
F - The recommended number of computers in a workgroup is no more than 20
Network Shares Windows Workgroups Sharing Which cannot be shared on the homegroup when computers are domain-joined? Choose all that apply. A - Drives B - Printers C - Libraries D - Software
B - Printers
C – Libraries
Which are the three network share types? A - Basic B - Secure C - Public D - Advanced
A – Basic
C - Public
D - Advanced
Which are requirements of a basic network share? Choose all that apply.
A - Read-only
B - Must be individually created
C - Available to anyone that wants to access it
D - Default method used to create shares on Windows 7
A - Read-only
B - Must be individually created
C - Available to anyone that wants to access it
Which options are included when full control permission is given? Choose all that apply. A - Read B - Write C - Modify D - Read and Execute E - List Folder Contents
A - Read
B – Write
D - Read and Execute
E - List Folder Contents
Users can connect a printer through which types of ports? Choose all that apply. A - LPT B - LLC C - TTC D - XPS E - FILE F - COM
A – LPT
D - XPS
E - FILE
F - COM
Which check boxes appear in the Sharing tab of a selected printer dialog box? Choose all that apply.
A - Share this printer
B - Convert print jobs
C - Close all print jobs
D - Render print jobs on client computers
A - Share this printer
D - Render print jobs on client computers
Performing which actions will allow users to view a printer's queue? Choose all that apply. A - Click Printer select B - Right-click a printer C - Double-click a printer D - Click the Customize printer link E - Click the See what's printing link
C - Double-click a printer
E - Click the See what’s printing link
Which are examples of items for which device drivers are needed? Choose all that apply. A - Printers B - Video cards C - Audio cards D - Network outlines E - Storage controllers
A - Printers
B - Video cards
C - Audio cards
E - Storage controllers
Which are steps involved in installing drivers? Choose all that apply. A - Click Open All B - Select Manage C - Click the Start menu D - Right-click Computer E - Click the Access button
C - Click the Start menu
D - Right-click Computer
Which buttons are found on in the Driver tab of the VMware SVGA 3D dialog box? Choose all that apply. A - Clear B - Backup C - Disable D - Uninstall E - Driver Details F - Update Driver G - Roll Back Driver
C - Disable D - Uninstall E - Driver Details F - Update Driver G - Roll Back Driver