Practice Exam Flashcards
____ is a threat to privacy and often makes systems unstable.
Spyware
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.
Unhealthy
To address the risks to data stored on workstations and laptops, ____ is available on Windows 7.
BitLocker Drive Encryption
Windows 7 includes a(n) ____ policy, which can be used to control many facets of Windows.
Local Security
The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.
Group Policy
A(n) ____ policy controls password characteristics for local user accounts.
Password
Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.
Account Lockout
A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.
Path
____ is the security process that records the occurrence of specific operating system events in the Security log.
Auditing
Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.
Privilege Use
You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the ____.
Application Compatibility Toolkit
While ____ is a great source of information, it is also the biggest source of malware (malicious software).
The Internet
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.
Spyware
The most basic level of data security in Windows 7 is ____ permissions.
NTFS
____ is the process of taking data and making it unreadable.
Encryption
____ allows you to configure the security settings for each location type differently.
Network Location Awareness
The ____ location type is used when the computer is connected as part of a peer-to-peer network in a trusted location.
Home Network
The ____ location type is used when the computer is connected in an untrusted public location such as an airport.
Public Network
____ define how much data can be sent and the format of the data as it crosses the network.
Protocols
____ is an updated version of TCP/IPv4 with a larger address space and additional features.
TCP/IPv6
The ____ protocol is responsible for discovering network devices on the network, such as computers and routers.
Link-Layer Topology Discovery Mapper I/O Driver
The ____ interface supports communication between applications and the TCP/IP protocol.
Windows Sockets (Winsock) user mode
The ____ interface supports communication between clients or services and protocols, including TCP/IP.
Transport Device Interface (TDI)
The ____ interface is a replacement for TDI and supports communication between services or clients and protocols, including TCP/IP.
WInsock Kernel (WSK)
The ____ interface supports communication between protocols and network drivers.
Network Driver Interface Specification (NDIS)
The most common use for ____ is resolving host names to IP addresses.
DNS
____ is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices.
DHCP
If Windows 7 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use a(n) ____ address.
APIPA
DSL connections usually use ____ to secure connections.
PPPoE
The two most common mechanisms for sharing an IP address are a router or ____.
ICS
The ____ in Windows 7 allows you to connect two separate networks, with Windows 7 acting as a bridge between them.
Network Bridge
____ allows some disk access to be designated as low priority.
Low-priority I/O
____ allows Windows 7 to use flash memory embedded directly in hard disks.
Windows ReadyDrive
A ____ occurs when a limitation in a single computer system component slows down the entire system.
Bottleneck
Most ____ bottlenecks occur when the applications you are running require more memory than is physically available in the computer.
Memory
A ____ bottleneck occurs when there is too much work for a processor to do.
Processor
Counters in the ____ category monitor individual partitions and logical drives on a disk.
LogicalDisk
A Data Collector Set can monitor a(n) ____ to track when system events occur.
Event Trace
For performance counters, you can configure ____ instead of logging to disk.
Alerts
____ are used to process log file data and display it in a meaningful way.
Reports
To process the data in the log files, you specify rules. A rule is a(n) ____ file that contains instructions specifying how the data is to be processed.
XML
____ provides an overview of the current state of a computer.
Task Manager
The Windows Experience Index base score is the overall ranking of your system. The ranking is from 1 to ____ (the best possible).
7.9
The base score is determined by the ____ subscore.
Lowest
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.
Executive Services
An application’s view of the operating system is restricted to those methods and services exposed by the different ____.
Environment Subsystems
The Executive Services operate in ____ mode.
Kernel
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.
User
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.
ntvdm.exe
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.
Hives
The ____ hive contains global settings for the entire computer and the applications installed on it.
HKEY_LOCAL_MACHINE
The ____ hive contains details about the current hardware profile in use.
HKEY_CURRENT_CONFIG
The owner of the registry keys is usually listed as ____.
SYSTEM
UAC-aware applications can include a(n) ____ file called the application manifest.
XML
The Run As feature has been modified in Windows 7 to now be known as the ____ option.
Run As Administrator
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.
Program Compatibility Assistant
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.
XP Mode
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.
Kernel Patching
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.
Microsoft Application Compatibility Toolkit
The ____ tool scans the current state of the computer and reports its findings in a searchable tree format.
System Information
System Information files use the extension ____ and store data in a compressed binary format.
.NFO
The ____ console is used to view the recent and current status of tasks that are started automatically.
Task Scheduler
The ____ utility is an MMC console snap-in used to browse and manage the records of system events and messages stored in system event logs.
Event Viewer
Which of the following file formats can be used to save an event’s log data?
.CSV
The ____ console identifies what folders are shared on the current computer, who is connected to those shared folders, and what files in those shared folders are open.
Shared Folders
The ____ console reports the status of the currently attached computer hardware.
Device Manager
The ____ is a tool that provides you with a single location where you can identify and address any security issues, maintenance requirements, and errors that have arisen.
Action Center
The image data created by the Create a System Image wizard is stored as a virtual hard disk image, which is stored as a(n) ____ file.
.VHD
____ is a troubleshooting startup mode that is typically used when the regular startup mode for Windows 7 fails.
Safe Mode
The ____ tool is used to recover a Windows 7 installation when it is unable to start.
Startup Repair
____ allows the computer’s operating system to be restored from an image created earlier with the Windows Backup and Restore utility.
System Image Recovery
____ allows the computer state to be rolled back to a previous restore point.
System Restore
____ is used to protect both critical operating system files and registry keys by restricting permissions to these resources.
Windows Resource Protection
Since the early versions of x86 computers, the ____ has acted as an interface between hardware and the operating system.
BIOS
____ is the resume loader for Windows 7. It is responsible for starting the operating system from hibernation.
Winresume.exe