give to remi
docx
keyboard_arrow_up
School
Utica College *
*We aren’t endorsed by this school
Course
333
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
11
Uploaded by JusticeDangerWolverine42
Module 3 Student Study Guide - Part 1
1. What process identifies and grants access to a user who is trying to access a system?
A. Credibility
B. Authorization
C. Authentication
D. Encryption
Ans: Authentication
Proof: Authentication is the process of identifying and granting access to some user, usually a person, who is trying to access a system
Page: 528
2. What process determines what a legitimate user can and cannot do on a system?
A. Accessibility
B. Authorization
C. Permission propagation
D. Inheritance
Ans: Authorization
Proof: authorization: the process that defines what resources an authenticated user may access and what he or she may do with those resources
Page: 528
3. On every Windows system, each record in an encrypted database of usernames and passwords is called a(n) _______________.
A. Group account
B. Single account
C. Specialized account
D. Local user account
Ans: Local user account
Proof: Every Windows system stores the user accounts as an encrypted database of usernames and passwords. Windows calls each record in this database a local user account.
Page: 528
8. What type of group enables someone who does not have an account on the system to log on?
A. Administrator
B. Standard user
C. Power user
D. Guest
Ans: Guest
Proof: Guests group enables someone who does not have an account on the system to log on by using a guest account.
Page: 532
10. A password _______________ policy forces users to select a new password periodically.
A. permissions
B. disabling
C. expiration
D. anti-hack
Ans: expiration
Proof:
password expiration policy that forces users to select a new password periodically
Page: 530
11. Which character in a password is most helpful in defeating common word hacks?
A. @
B. t
C. x
D. w
Ans: @
Proof: Using non-alphanumeric characters makes any password much more difficult to crack
Page: 530
12. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.
A. six
B. eight
C. 10
D. 256
Ans: Eight
Proof: Make sure users have a strong password: at least eight characters in length, including letters, numbers, and nonalphanumeric symbols.
Page: 530
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
16. Which NTFS permission allows an account to seize control of a file or folder owned by another account?
A. File permissions
B. Take Ownership permission
C. Folder permissions
D. Change permission
Ans: Take Ownership permission
Proof: With the Take Ownership permission, anyone with the permission can seize control of a file or folder
Page: 544
17. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts.
A. Change
B. List
C. Read & Execute
D. Modify
Ans: Change
Proof: Change permission. An account with this permission can give or take away permissions for other accounts
Page: 545
18. By default, who has complete control over a folder or file?
A. Owner
B. Administrator
C. All users
D. Power users
Ans: Owner
Proof: When you create a new file or folder on an NTFS partition, you become theowner of that file or folder. This is called ownership. Owners can do anything they want to the files or folders they own, including changing the permissions to prevent anybody, even administrators, from accessing them
Page: 544
19. Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders?
A. Full Control
B. Modify
C. List Folder Contents
D. Read
Ans: Modify
Proof: Modify Enables you to read, write, and delete both files and subfolders
Page: 546
23. What three letters are used in a Linux terminal to indicate permissions associated with a file or folder?
A. omc
B. rwx
C. awk
D. lsp
Ans: rwx
Proof: The letters r, w, and x represent the following permissions:• r-Read the contents of
a file• w-Write or modify a file or folder• x-Execute a file or list the folder contents
Page: 551
25. What command gives you more details about the chmod command?
A. chmod help
B. chmod info
C. man chmod
D. details chmod
Ans: chmod help
Proof: chmod gives more details about the chmod command
Page: 553
27. What technique provides the only true way to protect your data from access by any other user?
A. Regular backup
B. Authorization
C. Encryption
D. Authentication
Ans: encryption
Proof: encryption techniques provides the only true way to secure your data from access by any other user
Page: 559-560
28. What tool is offered by Windows Pro and better editions to encrypt entire hard drives?
A. NTFS
B. BitLocker
C. TPMs
D. TrueCrypt
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Ans: BitLocker
Proof: Windows Ultimate and Enterprise editions and Windows 8/8.1/10 Pro offer full drive encryption through BitLocker Drive Encryption. BitLocker encrypts the whole drive, including every user’s files, so it’s not dependent on any one account.
Page: 562
29. What does BitLocker require on a motherboard to validate on boot that a Windows computer has not been changed?
A. EFS
B. IPC$
C. Core i7
D. TPM
Ans: TPM
Proof: BitLocker requires a special Trusted Platform Module (TPM) chip on the mother-
board to function. The TPM chip (which we looked at earlier, in Chapter 5, “Firm-
ware”) validates on boot that the computer has not changed—
Page: 562
—----------------
1.
What tool identifies files that can be deleted to gain more hard drive space?
1.
Disk Restore
2.
Disk Defragmenter
3.
System Restore
4.
Disk Cleanup
Ans: Disk Cleanup
Proof:
Disk Cleanup utility regularly to make sure you’ve cleared out the junk files that accumulate from daily use.
Page 584
2. Windows Task Scheduler divides tasks into actions, conditions, and ______________.
A. schedules
B. triggers
C. executables
D. switches
Ans: triggers
Proof: Task Scheduler divides tasks into triggers, actions, and conditions
Page 589
3. Which Windows tool gives you a quick way to see the status (enabled or disabled) of each application and a handy guide to the startup impact that program has?
A. Services Console
B. Application Manager
C. Task Manager
D. cron
Ans: Task manager
Proof: Microsoft placed the Startup applications and services in the Task Manager (press ctrl-shift-esc) in Windows 8/8.1/10. You can readily see the status (enabled or disabled) of each application and a handy guide to the startup impact that program has
Page: 593-594
4. Most Windows applications distributed on removable media have a(n) ______________ file that calls up the installation program.
1.
upgrade
2.
update
3.
restart
4.
autorun
Ans: autorun
Proof: If you can’t download or access an application over the Internet, it’ll probably come on an
optical disc. Windows supports Autorun, a feature that enables the operating system to look for and read a special file called—wait for it—autorun.inf. Immediately after a removable media device (optical disc or thumb drive) is inserted into your com-puter, whatever program is listed in autorun.inf runs automatically.
Page 600
5. The tabs on the Performance Options dialog box in Windows are Visual Effects, Advanced, and _______________.
A. Normal
B. Data Execution Prevention
C. Non-Visual Effects
D. On/Off
Ans: Data Execution Prevention
Proof: The Performance Options dialog box has three tabs: Visual Effects, Advanced, and Data Execution Prevention
Page: 611
[QUESTION]
6. The options in the Advanced tab on the Performance Options dialog box in Windows are Processor scheduling and _______________.
A. Disk cache
B. RAM
C. USB
D. Virtual memory
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Ans: Virtual Memory
Proof: The Advanced tab, shown in Figure 14-42, has two sections: Processor scheduling and Virtual memory
Page: 611
7. Time Machine in macOS creates full system backups that are known as _______________.
A. restore points
B. images
C. local snapshots
D. system copies
Ans: local snapshots
Proof: macOS provides the excellent Time Machine to create full system backups (see Figure 14-49). These backups are called local snapshots.
Page: 617
8. What does Ubuntu Linux use for backing up files, folders, and drives?
A. Ubuntu BackIn
B. Déjà Dup
C. Linux Restore
D. Save Images
Ans: Déjà Dup
Proof: Different Linux distros offer different tools for backing up files, folders, and drives. Ubuntu Linux uses Déjà Dup, although it goes by the name Backups in System Settings
Page: 619
9. The System Restore tool in Windows enables you to create a _______________, which is a snapshot of the computer’s configuration at a specific point in time.
A. Time Snapshot
B. Image
C. Configuration Status
D. Restore Point
Ans: Restore Point
Proof: The System Restore tool enables you to create a restore point, a snapshot of a computer’s configuration at a specific point in time.
Page: 619