Wiley Flashcards
Computer operating systems can be open source, meaning the OS can be examined and modified by ______.
Anyone
A multitasking method that depends on the application itself to be responsible for using and then freeing access to the processor is known as ______.
Cooperative multitasking
Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the ______.
Boot process
The ability of a single application to have multiple requests in to the processor at one time is known as what?
Multithreading
Can you mix 64-bit software with 32-bit hardware?
No
What is the minimum amount of memory recommended for Windows Vista Home Premium?
1 GB
What is the minimum amount of free hard drive space recommended for installing a Windows 7 32-bit version?
16 GB
In Windows, a primary mouse click is typically a single click of which mouse button?
Left
The Taskbar contains two major items, the Start menu and the ______.
System Tray
A ______ is a copy of your system configuration at a given point in time.
Restore point
Which Control Panel applet is used to configure screensavers, colors, display options, and monitor devices?
Display
What is the name of the desktop interface available in Windows Vista?
Aero
The ability to support so many languages is provided through the use of the ______ standard.
Unicode
A group of computers that are tightly connected or associated and share a common domain name will have a single authority that manages security for all the computers know as the ______.
Domain Controller
In Windows 7, Vista, and XP, every user is automatically given a user ______ when they log on to the workstation that contains information about their settings and preferences.
Profile
True/False: Remote Assistance is enabled by default.
True
The ______ command indicates whether the host can be reached and how long it took for the host to send a return packet.
Ping
Which option is used with NETSTAT to display all connections and listening ports?
-a
What switch is used with IPCONFIG to obtain a new IP address from a DHCP server?
/renew
The ______ utility can be used to schedule a shutdown (complete or a restart) locally or remotely.
Shutdown.exe
With Windows 7, there are 32-bit and 64-bit versions for each of the editions you must know for the exam except ______.
Starter
What feature of WIndows 7 and Windows Vista is intended to prevent unintentional/unauthorized changes to the computer by either prompting for a permission to continue or requiring the administrator password before continuing?
User Account Control (UAC)
The ______ feature of Windows 7/Vista allows you to use drive encryption to protect files, including those needed for startup and logon.
BitLocker
In Windows 7, the ______ feature allows you to use free space on a removable drive to speed up a system by caching content.
ReadyBoost
Windows 7 includes the ______ antispyware program.
Windows Defender
Windows 7 has a quick way to access files you’ve been working on through their association with the application that has been using them. This feature is known as ______.
Jump Lists
A simplified way to setup a home network was added to Windows 7. It is known as ______.
HomeGroup
In Windows 7, ______ allow you to logically (as opposed to physically) group files and folders that are not in the same location and make them appear as if they are.
Libraries
Microsoft Windows ______ allows you to migrate user file settings related to the applications, desktop configuration, and accounts.
User State Migration Tool (USMT)
During the startup of Windows 7, what holds information about OSs installed on the computer, such as the location of the OS files?
Boot Configuration Data (BCD)
What is the maximum number of CPUs supported by Windows Vista Home Premium?
One
Which edition of Windows Vista supports BitLocker and is not available through the retail channel?
Enterprise
In Windows Vista, what is the name for mini programs that can be palced on the Sidebar, allowing them to run quickly and personalize the PC?
Gadgets
In Windows Vista, the ______ provides a single interface for firewall settings, automatic updating, malware protection, and other security settings.
Windows Security Center
True/False: In Windows Vista, you can turn off the UAC feature.
True; while turning UAC off is not recommended, you can do so by choosing Start > Control Panel > user Accounts and clicking Turn User Account Control On or Off
To what versions of Windows Vista can Windows XP Professional be upgraded?
Windows Vista Business and Windows Vista Ultimate
What file in Windows serves as the hardware abstraction layer?
HAL.DLL
Windows Firewall has been a component of Windows ever since ______.
Windows XP Service Pack 2
The default setting for Enforce Password History is 0. How high can this value go?
24
What Control Panel applet in Windows Vista can be used to configure the device on which the operating system is installed to function as a true tablet?
Tablet PC Settings applet
Setup Manager is not an unattended installation method in and of itself but is used to create ______ files.
Answer
What type of operating system installation installs the most commonly used components of the software but not all of the components?
Typical
Older Windows Server Operating Systems have a feature called Remote Installation Service (RIS), which allows you to perform several network installations at one time. Beginning with Windows Server 2003 SP2, RIS was replaced by ______.
Windows Deployment Service (WDS)
______ is the process of dividing part or all of a hard drive into sections, or partitions, for use by the computer.
Partitioning
On each hard drive, the ______ contains the partition information for the hard drive and includes the beginning and end of each partition that has been defined on the drive.
Master Boot Record (MBR)
Windows XP includes a utility known as the ______ that will transfer most of your files and individual application settings from an old computer to a new one.
File and Settings Transfer Wizard
With Windows XP, what file starts the loading of an OS on the computer?
NTLDR
With Windows XP, to access Safe Mode, you must press what key when the OS menu is displayed during the boot process?
F8
True/False: Windows XP Home edition does not have Remote Desktop, only Remote Desktop Connection.
True; Therefore, Windows XP Home computers can connect to other computers but cannot be connected to by other computers.
What Control Panel applet is unique to Windows XP and can be used to add or remove network connections?
Network Connections
Ideally, your system should have a minimum of ______ physical barriers.
3
______ is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device.
Tailgating
______ is a common physical access method that involves digging through dumpsters or recycle bins looking for more information that is highly sensitive in nature (such as passwords written down after a change and before the user has the new one memorized).
Dumpster diving
______ devices such as hand scanners and retinal scanners use physical characteristics to identify the user.
Biometric security
What is the name of file or glass add-ons that are placed over a monitor and prevent the data on the screen from being readable when viewed from the sides?
Privacy filter
A firewall operating as a ______ passes or blocks traffic to specific addresses based on the type of application.
Packet filter
The concept of ______ is a simple one: When assigning permissions, give users only the permissions they need to do their work and no more.
Least Privilege
______ is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization.
Social engineering
What is a type of malicious software that acts on behalf of a third part (rather than self-replicating, like viruses and worms, it is spread to machines by users who inadvertently ask for it)?
Spyware
______ is a form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.
Phishing
If you’re running into a software problem on a computer, the first step (after understanding what the problem is and getting any relevant error messages written down) should always be to ______.
Reboot
True/False: When trying solutions to fix a problem, make only one change to the computer at a time.
True. This allows you to determine the exact cause.
What is BSOD?
Blue Screen of Death; another way of describing the blue-screen error condition that occurs when Windows fails to boot properly or quits unexpectedly.
When troubleshooting in Safe Mode, you can uninstall a driver you think is causing the problem. Another option is to boot into the ______ configuration.
last known good
What is the name of the file that is the Windows OS kernel?
NTOSKRNL.EXE
A RAID array was not detected during the installation of Windows 7. What is a likely reason?
A likely possibility is that the correct drivers for the version of Windows being used is not located.
Device ______ are software programs that tell the operating system how to work with the hardware.
Drivers
True/False: In Windows 7/Vista, the User Account Control (UAC) feature has the sole purpose of keeping the user from running programs that could pose a potential threat by escalating privileges to that of Administrator.
True
True/False: When a file fails to open, it is often due to compatibility.
False. When a file fails to open, it is often due to corruption.
What command must you use to install the Recovery Console?
WINNT32 /CMDCONS
If all computers on the network are in the same office, then the office is a ______.
local area network (LAN)
Computers dedicated to providing resources to other computers are called ______.
servers
A network where there are no dedicated servers is called a ______ network.
peer-to-peer
A network topology where all computers are connected to a central device such as a switch is called a .
Star
Ethernet uses ______ to send information on the network.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
The layer of the OSI model that manages the “look” of the data including encryption and compression is the ______ layer.
Presentation
The layer of the OSI model responsible for establishing and maintaining communications between computers is the ______ layer.
Session
The OSI layer responsible for error-checking is ______ .
Transport
The cable type with the longest range is ______.
fiber optic
As opposed to a WLAN, a Bluetooth network is referred to as a ______.
wireless personal area network (WPAN)
The network connectivity device that can connect multiple networks to each other is a ______.
router
The OSI model layer responsible for putting frames on the wire is called the ______ layer.
Physical
The seven layers of the OSI model from top down are ______.
Application Presentation Session Transport Network Data Link Physical
The language of communication spoken between computers on a network is called a ______.
protocol
TCP/IP is based on the ______ model.
United States Department of Defense (DoD)
TCP is a ______ protocol that operates at the ______layer of the OSI model.
connection-oriented, Transport
Which protocol in TCP/IP is responsible for resolving IP addresses to MAC addresses?
ARP (Address Resolution Protocol)
To communicate on a network, TCP/IP hosts must have a unique ______ and valid ______.
IP address, subnet mask