Chapter 10 Flashcards
What do you call the process that tries every combination of characters, numbers, or symbols until a password is guessed?
Man in the middle
Random guessing
Brute force
Blogging
Brute force
To configure password settings such as a minimum password age or a password must meet Complexity Requirements, you use __________.
Registry editor
Group policies
Users console
Computer Management console
Group Policies
What is a credit card-like device that contains a chip on which is stored a digital certificate that helps identify a particular user?
Card vault
Card lock pick
Card unlocker
Smart card
Smart card
Which command enables you to execute a command as an administrator while logged in as a standard user?
Context
Run as
Profile
Net only
Run as
A(n) _____________ is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.
Anti-virus software package
Defender
Net blocker
Firewall
Firewall
Which of the following is a type of software that gathers information about computer users and transmits it back to the attacker?
Spyware
Trojan horse
Polymorphic virus
Boot sector virus
Spyware
When Windows Defender is updated, it updates its ___________ so that it knows how to detect and deal with new spyware.
Logs
Monitors
Definitions
Connections
Definitions
The ________________ is a feature of NTFS that encrypts the files on a computer so that even if an intruder can obtain a file, he is unable to read it.
Public key
Digital reader
Encrypting File System
NTFS compression
Encrypting File System
Which of the following does NOT weaken the effectiveness of a password?
Short passwords
Unchanging passwords
Random characters
Predictable passwords
Random characters
A network that uses two forms of authentication. For example, a smart card combined with a password.
Multifactor Authentication
A software program that tries all of the possible passwords until it finds the right one
Brute Force
Refers to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong
Filter
A software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others
Firewall
A collective reference term for malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user’s knowledge or consent (includes viruses, trojan horses, worms, spyware and adware)
Malware
A rule configured to allow traffic only when the connection between the communicating computers is secured using IPsed
Authenticated Exception
A National Institute of Standards standard for identification verification.
Personal Identity Verification (PIV)
A key used to decrypt an encryption certificate
Private Key
A key used to encrypt a file
Public Key
You can allow programs through a firewall using inbound or outbound ______.
rules
A type of software that gathers information about computer users and transmits it back to the attacker
Spyware
Policies that define specific operating system functions
User Rights
Component included in Windows 7 that provides a core biometric functionality and a similar device control panel
Windows Biometric Framework
Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?
a. Increase the Enforce Password History value
b. Enable the Password Must Meet Complexity Requirements setting
c. Decrease the Account Lockout Threshold value
d. Disable the Store Passwords Using Reversible Encryption policy
d. Disable the Store Passwords Using Reversible Encryption policy
- Which of the following mechanisms is most often used in firewall rules to allow
traffic onto the network?
a. Hardware addresses
b. IP addresses
c. Protocol numbers
d. Port numbers
d. Port numbers
Which of the following NTFS features is incompatible with EFS encryption?
a. Compression
b. IPsec
c. Permissions
d. Parental controls
a. Compression
Which of the following command line parameters will prevent a program executed
using Runas.exe from accessing the elevated user’s encrypted files?
a. /env
b. /noprofile
c. /showcred
d. /profile
b. /noprofile
Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.)
a. Allow a program through the firewall in all three profiles.
b. Manage firewall exceptions for the domain profile.
c. Create firewall exceptions based on port numbers.
d. Turn Windows firewall off for all three profiles.
a. Allow a program through the firewall in all three profiles.
c. Create firewall exceptions based on port numbers.
Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack? (Choose all that apply.)
a. Increase the value of the Reset Account Logon Counter After policy.
b. Enable the Password Must Meet Complexity Requirements policy.
c. Increase the Account Lockout Threshold value.
d. Reduce the value of the Minimum Password Age policy.
a. Increase the value of the Reset Account Logon Counter After policy.
b. Enable the Password Must Meet Complexity Requirements policy.
Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
a. EFS
b. IPsec
c. UAC
d. PIV
b. IPsec
Which of the following statements about Windows Defender is true?
a. Windows Defender uses rules that you create to control its scans.
b. Windows Defender can detect spyware that is already present on the system, but it cannot prevent the infiltration of new spyware.
c. Windows Defender eliminates the need for third-party anti-virus software.
d. Windows Defender receives updates that are supplied free with the regularly scheduled Windows Update downloads.
d. Windows Defender receives updates that are supplied free with the regularly scheduled Windows Update downloads.
Which of the parental controls has been removed from Windows 7?
a. Application restrictions
b. User time limits
c. Restricted access to games
d. Internet filtering
d. Internet filtering
The built-in local groups on a Windows 7 workstation receive their special
capabilities through which of the following mechanisms?
a. Parental controls
b. Windows firewall rules
c. NTFS permissions
d. User rights
d. User rights