| Import Settings:
Base Settings: Brownstone Default
Information Field: Difficulty
Information Field: Link to
Information Field: Section Refs
Lesson: Lesson 8: Configuring Windows Vista Security
Multiple Choice
1. What term is most commonly used to collectively refer to a variety of technologies including viruses, Trojan horses, worms, spyware, and adware?
a) netware
b) virii
c) spam
d) malware
Ans: d
Difficulty: Easy
Section Ref: Defending Against Malware
2. What Windows Vista service ensures that your system is protected from malware intrusion if any of the Vista security mechanisms are not running properly?
a) Windows Defender
b) Windows Security Base
c) Windows Security Center
d) Microsoft Security Center
Ans: c
Difficulty: Medium
Section Ref: Defending Against Malware
3. By default, when a Widows Vista computer is a member of a domain, Windows Security Center is disabled. Where can you enable it?
a) Control Panel
b) Group Policy
c) System BIOS
d) Add/Remove Programs
Ans: b
Difficulty: Hard
Section Ref: Defending Against Malware
4. What program protects Windows Vista computers by blocking dangerous traffic, both incoming and outgoing?
a) Windows Vista Defender
b) Windows Firewall
c) Windows Security Center
d) Windows Anti-Virus
Ans: b
Difficulty: Easy
Section Ref: Defending Against Malware
5. On which of the following does Windows Firewall not base its filtering?
a) program names
b) IP addresses
c) protocol numbers
d) port numbers
Ans: a
Difficulty: Hard
Section Ref: Defending Against Malware
6. When configuring Windows Firewall rules, which parameter specifies the IP addresses of the local and remote systems to which the rule applies?
a) Rule Type
b) Scope
c) Action
d) Profile
Ans: b
Difficulty: Medium
Section Ref: Defending Against Malware
7. When dealing with Windows Firewall, what term is used to refer to a feature that enables you to display rules according to the profile they apply to, their current state, or the group to which they belong?
a) group
b) profile
c) filter
d) scope
Ans: c
Difficulty: Easy
Section Ref: Defending Against Malware
8. What is a collection of documents that defines a method for securing data while it is in transit over a TCP/IP network?
a) Advanced IP Security Standards
b) TCP/IP
c) IPSec
d) ISPec
Ans: c
Difficulty: Medium
Section Ref: Defending Against Malware
9. When configuring connection security rules, what parameter specifies the IP addresses of the computer that will establish a secured connection before transmitting any data?
a) Profile
b) Name
c) Requirements
d) Endpoints
Ans: d
Difficulty: Easy
Section Ref: Defending Against Malware
10. What day of the month does Microsoft typically release operating system updates?
a) 12th
b) 15th
c) 21st
d) 2nd
Ans: a
Difficulty: Medium
Section Ref: Defending Against Malware
11. What Windows Vista feature enables users to keep their computers current with no manual intervention?
a) Windows Defender
b) Windows Security Center
c) Complete PC
d) Automatic Update
Ans: d
Difficulty: Easy
Section Ref: Defending Against Malware
12. What new Windows Vista application prevents the infiltration of spyware into the system?
a) Windows Defender
b) Windows Firewall
c) Windows Security Center
d) Automatic Update
Ans: a
Difficulty: Easy
Section Ref: Defending Against Malware
13. What additional application, provided by Windows Defender, enables you to monitor details about specific applications running on a Windows Vista computer?
a) Windows Defender Plus
b) Defender Explorer
c) Windows Explorer
d) Software Explorer
Ans: d
Difficulty: Medium
Section Ref: Defending Against Malware
14. What is a one-time virus scanner program that Microsoft distributes with its monthly updates?
a) Windows Defender
b) Automatic Update
c) Windows Malicious Software Removal Tool
d) Windows Firewall
Ans: c
Difficulty: Easy
Section Ref: Defending Against Malware
15. What feature of NTFS encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it?
a) Windows Firewall
b) Encrypted File System
c) BitLocker
d) Windows Malicious Software Removal Tool
Ans: b
Difficulty: Easy
Section Ref: Protecting Sensitive Data
16. Which version of Windows Vista does not support EFS?
a) Business
b) Home Premium
c) Enterprise
d) Ultimate
Ans: b
Difficulty: Medium
Section Ref: Protecting Sensitive Data
17. What technology makes it possible to store the user keys required for access to EFS-encrypted files on what is essentially a credit card with a chip that stores data?
a) Smart chip
b) Smart card
c) SmartID
d) Smart pen
Ans: b
Difficulty: Easy
Section Ref: Protecting Sensitive Data
18. By default, in what color does Windows Explorer display the names of encrypted files?
a) blue
b) red
c) yellow
d) green
Ans: d
Difficulty: Hard
Section Ref: Protecting Sensitive Data
19. What enables parents to limit their children’s access to specific Internet sites, games, and applications?
a) Windows Defender
b) BitLocker
c) Parental Control
d) EFS
Ans: c
Difficulty: Easy
Section Ref: Configuring Parental Controls
20. Which version of Vista does not support parental controls?
a) Business
b) Ultimate
c) Home Premium
d) Home Basic
Ans: a
Difficulty: Medium
Section Ref: Configuring Parental Controls
True/False
21. Windows Firewall filters based on IP addresses, protocol numbers, and application names.
Ans: False
Difficulty: Medium
Section Ref: Defending Against Malware
22. Windows Defender is a feature that enables users to keep their computers current with no manual intervention.
Ans: False
Difficulty: Easy
Section Ref: Defending Against Malware
23. The Malicious Software Removal Tool is a one-time virus scanner program that Microsoft distributes with its monthly updates.
Ans: True
Difficulty: Medium
Section Ref: Defending Against Malware
24. Bitlocker is a feature of NTFS that encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it.
Ans: False
Difficulty: Medium
Section Ref: Protecting Sensitive Data
25. Parental controls are only available on the Home Basic, Home Premium, and Ultimate versions of Windows Vista.
Ans: True
Difficulty: Easy
Section Ref: Configuring Parental Controls
Fill-in-the-Blank
26. __________ is the term most commonly used to collectively refer to a variety of technologies including viruses, Trojan horses, worms, spyware, and adware.
Ans: Malware
Difficulty: Easy
Section Ref: Defending Against Malware
27. Windows __________ Center is a centralized console that enables users and administrators to access, monitor, and configure the various Windows Vista security mechanisms.
Ans: Security
Difficulty: Easy
Section Ref: Defending Against Malware
28. Windows __________ protects Windows Vista computers by blocking dangerous traffic, both incoming and outgoing.
Ans: Firewall
Difficulty: Easy
Section Ref: Defending Against Malware
29. There are times when users might want to modify the firewall settings, such as when a specific application requires access to a port not anticipated by the firewall’s preconfigured rules. This is done by creating a(n) __________.
Ans: exception
Difficulty: Hard
Section Ref: Defending Against Malware
30. For full access to the Windows Firewall configuration settings, you must use the Windows Firewall With Advanced __________ snap-in for the Microsoft Management Console.
Ans: Security
Difficulty: Hard
Section Ref: Defending Against Malware
31. The Windows Vista version of Windows Firewall enables you to create rules that call for the use of IPsec to encapsulate data packets within other packets. This process is called __________.
Ans: tunneling
Difficulty: Hard
Section Ref: Protecting Sensitive Data
32. __________ Updates is a Windows Vista features that enables users to keep their computers current with no manual intervention.
Ans: Automatic
Difficulty: Easy
Section Ref: Defending Against Malware
33. The ________ File System protects users’ data by encrypting and decrypting it on the fly as the user works.
Ans: Encrypted
Difficulty: Medium
Section Ref: Protecting Sensitive Data
34. By default, Windows Explorer displays the names of files that are encrypted in the color __________.
Ans: green
Difficulty: Hard
Section Ref: Protecting Sensitive Data
35. Parental __________ enable parents to limit their children’s access to specific Internet sites, games, and applications.
Ans: controls
Difficulty: Medium
Section Ref: Configuring Parental Controls
Short Answer
36. What Windows Vista feature ensures that your system is protected by malware intrusion if any of the Vista security mechanisms are not running properly?
Ans: Windows Security Center
Difficulty: Easy
Section Ref: Defending Against Malware
37. When creating Windows Firewall rules, what option specifies whether you want to create a program rule, port rule, variant on one of the predefined rules, or custom rule?
Ans: Rule Type
Difficulty: Medium
Section Ref: Defending Against Malware
38. When creating Windows Firewall connection security rules, which option specifies whether authentication between two computers should be requested or required in each direction?
Ans: Requirements
Difficulty: Hard
Section Ref: Defending Against Malware
39. What Windows Vista feature enables users to keep their computers current with no manual intervention?
Ans: Automatic Update
Difficulty: Easy
Section Ref: Defending Against Malware
40. What new Windows Vista application prevents the infiltration of spyware into the system?
Ans: Windows Defender
Difficulty: Medium
Section Ref: Defending Against Malware
41. What additional application, provided by Windows Defender, enables you to monitor details about specific applications running on a Windows Vista computer?
Ans: Software Explorer
Difficulty: Medium
Section Ref: Defending Against Malware
42. What does EFS utilize from a user to encrypt the files that the user creates?
Ans: public key
Difficulty: Hard
Section Ref: Protecting Sensitive Data
43. For parental controls to be effective, what must each child using the computer have?
Ans: user account
Difficulty: Medium
Section Ref: Configuring Parental Controls
44. In its Home Basic, Home Premium, and Ultimate editions, what feature does Windows Vista include that you can use to exercise restrictions over other users’ computing habits?
Ans: Parental Controls
Difficulty: Easy
Section Ref: Configuring Parental Controls
Essay
45. What does the term “malware” refer to?
Ans: Malware includes a variety of technologies including viruses, Trojan horses, worms, spyware, and adware.
Difficulty: Easy
Section Ref: Defending Against Malware
46. On what does the Windows Firewall base its filtering?
Ans: IP addresses, protocol numbers, and port numbers
Difficulty: Medium
Section Ref: Defending Against Malware
47. When configuring Windows Firewall connection security rules, to what does the Endpoints option pertain?
Ans: The Endpoints option specifies the IP addresses of the computer that will establish a secured connection before transmitting any data.
Difficulty: Hard
Section Ref: Defending Against Malware
48. What is the Malicious Software Removal Tool?
Ans: The Malicious Software Removal Tool is a single-user virus scanner that Microsoft supplies in each of its monthly operating system updates. The tool scans the system for viruses and other forms of malware immediately after its installation and removes any potentially damaging software that it finds.
Difficulty: Easy
Section Ref: Defending Against Malware
49. What are the two main restrictions when implementing EFS?
Ans: EFS is a feature of the NTFS file system, so you cannot use EFS on FAT drives. You cannot use EFS to encrypt files that have already been compressed using NTFS compression.
Difficulty: Hard
Section Ref: Protecting Sensitive Data
50. What is the first thing that parents must do to use the Windows Vista Parental Controls feature?
Ans: Windows Vista Parental Controls are keyed to user accounts, so the first thing parents must do is create separate accounts for their children and make sure the family becomes accustomed to logging on and off of their accounts whenever they use the computer.
Difficulty: Hard
Section Ref: Configuring Parental Controls
Share with your friends: |