Practice Exam Flashcards

1
Q

____ is a threat to privacy and often makes systems unstable.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.

A

Unhealthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To address the risks to data stored on workstations and laptops, ____ is available on Windows 7.

A

BitLocker Drive Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows 7 includes a(n) ____ policy, which can be used to control many facets of Windows.

A

Local Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The local security policy is part of a larger Windows management system called ____, which can be implemented on a local computer, but is typically part of a domain-based network.

A

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ____ policy controls password characteristics for local user accounts.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Using the ____ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts.

A

Account Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ rule condition identifies software by file location. You can specify a single file or a folder path from which software can be run.

A

Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is the security process that records the occurrence of specific operating system events in the Security log.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit ____ tracks when tasks are performed that require a user rights assignment, such as changing the system time.

A

Privilege Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You can eliminate an error generated by Applications that are not designed for Windows 7 and which require administrative privileges by using the ____.

A

Application Compatibility Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

While ____ is a great source of information, it is also the biggest source of malware (malicious software).

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most basic level of data security in Windows 7 is ____ permissions.

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ is the process of taking data and making it unreadable.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ allows you to configure the security settings for each location type differently.

A

Network Location Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ____ location type is used when the computer is connected as part of a peer-to-peer network in a trusted location.

A

Home Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ____ location type is used when the computer is connected in an untrusted public location such as an airport.

A

Public Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ define how much data can be sent and the format of the data as it crosses the network.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____ is an updated version of TCP/IPv4 with a larger address space and additional features.

A

TCP/IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ____ protocol is responsible for discovering network devices on the network, such as computers and routers.

A

Link-Layer Topology Discovery Mapper I/O Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ____ interface supports communication between applications and the TCP/IP protocol.

A

Windows Sockets (Winsock) user mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ____ interface supports communication between clients or services and protocols, including TCP/IP.

A

Transport Device Interface (TDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ____ interface is a replacement for TDI and supports communication between services or clients and protocols, including TCP/IP.

A

WInsock Kernel (WSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The ____ interface supports communication between protocols and network drivers.

A

Network Driver Interface Specification (NDIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The most common use for ____ is resolving host names to IP addresses.

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

____ is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices.

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If Windows 7 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use a(n) ____ address.

A

APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DSL connections usually use ____ to secure connections.

A

PPPoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The two most common mechanisms for sharing an IP address are a router or ____.

A

ICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The ____ in Windows 7 allows you to connect two separate networks, with Windows 7 acting as a bridge between them.

A

Network Bridge

32
Q

____ allows some disk access to be designated as low priority.

A

Low-priority I/O

33
Q

____ allows Windows 7 to use flash memory embedded directly in hard disks.

A

Windows ReadyDrive

34
Q

A ____ occurs when a limitation in a single computer system component slows down the entire system.

A

Bottleneck

35
Q

Most ____ bottlenecks occur when the applications you are running require more memory than is physically available in the computer.

A

Memory

36
Q

A ____ bottleneck occurs when there is too much work for a processor to do.

A

Processor

37
Q

Counters in the ____ category monitor individual partitions and logical drives on a disk.

A

LogicalDisk

38
Q

A Data Collector Set can monitor a(n) ____ to track when system events occur.

A

Event Trace

39
Q

For performance counters, you can configure ____ instead of logging to disk.

A

Alerts

40
Q

____ are used to process log file data and display it in a meaningful way.

A

Reports

41
Q

To process the data in the log files, you specify rules. A rule is a(n) ____ file that contains instructions specifying how the data is to be processed.

A

XML

42
Q

____ provides an overview of the current state of a computer.

A

Task Manager

43
Q

The Windows Experience Index base score is the overall ranking of your system. The ranking is from 1 to ____ (the best possible).

A

7.9

44
Q

The base score is determined by the ____ subscore.

A

Lowest

45
Q

____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.

A

Executive Services

46
Q

An application’s view of the operating system is restricted to those methods and services exposed by the different ____.

A

Environment Subsystems

47
Q

The Executive Services operate in ____ mode.

A

Kernel

48
Q

Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.

A

User

49
Q

In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.

A

ntvdm.exe

50
Q

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.

A

Hives

51
Q

The ____ hive contains global settings for the entire computer and the applications installed on it.

A

HKEY_LOCAL_MACHINE

52
Q

The ____ hive contains details about the current hardware profile in use.

A

HKEY_CURRENT_CONFIG

53
Q

The owner of the registry keys is usually listed as ____.

A

SYSTEM

54
Q

UAC-aware applications can include a(n) ____ file called the application manifest.

A

XML

55
Q

The Run As feature has been modified in Windows 7 to now be known as the ____ option.

A

Run As Administrator

56
Q

The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.

A

Program Compatibility Assistant

57
Q

Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.

A

XP Mode

58
Q

____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.

A

Kernel Patching

59
Q

The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.

A

Microsoft Application Compatibility Toolkit

60
Q

The ____ tool scans the current state of the computer and reports its findings in a searchable tree format.

A

System Information

61
Q

System Information files use the extension ____ and store data in a compressed binary format.

A

.NFO

62
Q

The ____ console is used to view the recent and current status of tasks that are started automatically.

A

Task Scheduler

63
Q

The ____ utility is an MMC console snap-in used to browse and manage the records of system events and messages stored in system event logs.

A

Event Viewer

64
Q

Which of the following file formats can be used to save an event’s log data?

A

.CSV

65
Q

The ____ console identifies what folders are shared on the current computer, who is connected to those shared folders, and what files in those shared folders are open.

A

Shared Folders

66
Q

The ____ console reports the status of the currently attached computer hardware.

A

Device Manager

67
Q

The ____ is a tool that provides you with a single location where you can identify and address any security issues, maintenance requirements, and errors that have arisen.

A

Action Center

68
Q

The image data created by the Create a System Image wizard is stored as a virtual hard disk image, which is stored as a(n) ____ file.

A

.VHD

69
Q

____ is a troubleshooting startup mode that is typically used when the regular startup mode for Windows 7 fails.

A

Safe Mode

70
Q

The ____ tool is used to recover a Windows 7 installation when it is unable to start.

A

Startup Repair

71
Q

____ allows the computer’s operating system to be restored from an image created earlier with the Windows Backup and Restore utility.

A

System Image Recovery

72
Q

____ allows the computer state to be rolled back to a previous restore point.

A

System Restore

73
Q

____ is used to protect both critical operating system files and registry keys by restricting permissions to these resources.

A

Windows Resource Protection

74
Q

Since the early versions of x86 computers, the ____ has acted as an interface between hardware and the operating system.

A

BIOS

75
Q

____ is the resume loader for Windows 7. It is responsible for starting the operating system from hibernation.

A

Winresume.exe