Windows 7 Security Essentials

4
Homework Chapter 7 Windows 7 Security Essentials TruelFalse Indicate whether the statement is true orfalse. E l. r:L 2. -r 3. -- r.r: 4. /L 5. The most critical effect of malware is degraded system performance. The most commonly used method for authentication is a username and password. NTFS permissions can be easily circumvented when you have physical access to a computer. In Windows 7, advanced audit policies can only be edited at a command-line. Every object in Windows 7 has audit events related to it. Multiple Choice Identify the choice that best completes the statement or answers the question. ,--~ 6. __ is a threat to privacy and often makes systems unstable. a. Windows Defender c. Macro script b. EFS d. Spyware 7. A(n) __ computer is one that has outdated antivirus signatures or is missing security updates. a. unhealthy c. safe b. healthy d. authorized 8. To address the risks to data stored on workstations and laptops, __ is available on Windows 7. a. NAP c. BitLocker Drive Encryption b. Dual Locked Hard Drive d. TPM 9. Windows 7 includes a(n) __ policy, which can be used to control many facets of Windows. a. NAP c. EFS security b. local security d. remote / fA... 10. The local security policy is part of a larger Windows management system called __ ' which can be implemented on a local computer, but is typically part of a domain-based network. a. Group Policy c. Network Policy b. Local Policy d. Domain Policy /b 11. A(n) __ policy controls password characteristics for local user accounts. a. account lockout c. domain b. password d. user control <L-= 12. Using the __ policy, you can configure an account to be temporarily disabled after a number of incorrect log-on attempts. a. domain c. account lockout b. group d. password

description

wind

Transcript of Windows 7 Security Essentials

Page 1: Windows 7 Security Essentials

Homework Chapter 7 Windows 7 Security Essentials

TruelFalseIndicate whether the statement is true or false.

E l.

r:L 2.

-r 3.--r.r: 4.

/L 5.

The most critical effect of malware is degraded system performance.

The most commonly used method for authentication is a username and password.

NTFS permissions can be easily circumvented when you have physical access to a computer.

In Windows 7, advanced audit policies can only be edited at a command-line.

Every object in Windows 7 has audit events related to it.

Multiple ChoiceIdentify the choice that best completes the statement or answers the question.

,--~ 6. __ is a threat to privacy and often makes systems unstable.a. Windows Defender c. Macro scriptb. EFS d. Spyware

7. A(n) __ computer is one that has outdated antivirus signatures or is missing security updates.a. unhealthy c. safeb. healthy d. authorized

8. To address the risks to data stored on workstations and laptops, __ is available on Windows 7.a. NAP c. BitLocker Drive Encryptionb. Dual Locked Hard Drive d. TPM

9. Windows 7 includes a(n) __ policy, which can be used to control many facets of Windows.a. NAP c. EFS securityb. local security d. remote

/ fA... 10. The local security policy is part of a larger Windows management system called __ ' which can beimplemented on a local computer, but is typically part of a domain-based network.a. Group Policy c. Network Policyb. Local Policy d. Domain Policy

/b 11. A(n) __ policy controls password characteristics for local user accounts.a. account lockout c. domainb. password d. user control

<L-= 12. Using the __ policy, you can configure an account to be temporarily disabled after a number of incorrectlog-on attempts.a. domain c. account lockoutb. group d. password

Page 2: Windows 7 Security Essentials

Name: -----------------------

J 13.

1115.

-V-/lL 16.

~rA.. 17.

.....J 18.

I 1

ID: A

____ is(are) used to define which programs are allowed or disallowed in the system.a. Software restriction policies c. Local policiesb. A network zone d. AppLocker

14. A rule condition identifies software by file location. You can specify a single file or a folder path fromwhich software can be run.a. network zoneb. path

c. hashcertificated.

____ is the security process that records the occurrence of specific operating system events in the Securitylog.a. Encryptingb. Hashing

c.d.

FilteringAuditing

Audit tracks when tasks are performed that require a user rights assignment, such as changing thesystem time.a. logon eventsb. account management

c.d.

privilege useprocess tracking

Newer Windows applications use an application to describe the structure of an application.a. manifest c. recordb. log d. hash

You can eliminate an error generated by Applications that are not designed for Windows 7 and which requireadministrative privileges by using the .a. Administrative Privileges Toolkitb. Private Toolkit

c. Secure ToolkitApplication Compatibility Toolkitd.

19. While is a great source of information, it is also the biggest source of malware (malicious software).a. the Internet c. a hard diskb. a cloud library d. a router

20. ____ is software that is silently installed on your computer, monitors your behavior, and performs actionsbased on your behavior.a. Adwareb. Worm

c. SpywareVirusd.

21. The most basic level of data security in Windows 7 is permissions.a. EFS c. FATb. NTFS d. NAP

22. is the process of taking data and making it unreadable.a. Encryption c. Signingb. Decryption d. Verifying

23. A(n) encryption algorithm uses the same key to encrypt data and decrypt data.a. asymmetric c. signingb. symmetric d. hash

2

Page 3: Windows 7 Security Essentials

1 Name:

.L;».ID: A

l~.A(n) __ encryption algorithm uses two keys to encrypt and decrypt data.a. signing c. asymmetricb. symmetric d. hash

A(n) __ encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannotbe decrypted.a. signingb. symmetric

c. asymmetrichashd.

A(n) __ is part of the motherboard in your computer and is used to store encryption keys and certificates.a. NTFS c. EFSb. TPM d. NAP

CompletionComplete each statement.

27. Internet Explorer has been modified to run in a limited state, called _+?----'f o=--"'-_~,-t--,c+~J_--,--__ mode, in whichuser files cannot be modified. \"

29.

Windows 7 is protected ~etor)<.s by an enhanced firewall andIV eJ.uo r K Ac Ce55 +-i0 ,e.CJ\. l() Y\ .

The Account Policies category contains the =t>6 s..s ~or~ policy and the account lockout policy.

~Uf; t'7'jeb~~cjC>are .inffiles that contain settings that correspond with the Account Policies andLocal Policies in the local security policy.

28.

30.

is a method for protecting data on removable storage such as USB drives.

Matching

Match each term with the correct statement below:~ Malware Y. BitLocker Drive Encryption~ User Account Control (UAC) .% Auditingr Windows Defender /1.' Path rule conditiony. Phishing filter /. Password Policy~ Network Access Protection (NAP)

~/ 32. prevents unauthorized Web sites from stealing log-on credentials and other personal information

'I /" 33. controls password characteristics for local user accounts.

AI" 34. malicious software designed to perform unauthorized acts on your computer

U 35. a real-time spyware monitor to prevent the installation of and remove spyware

~ 36. lets you track when users log on and which resources are used

~ I 37. encrypts the entire volume of a partition and protects the system partition

3

Page 4: Windows 7 Security Essentials

Name: ID:A

~L 38. prevents unhealthy computers from accessing the network

~39. identifies software by file location

b./40. prompts administrative user if an administrative action is initiated by a program

4