give to remi

docx

School

Utica College *

*We aren’t endorsed by this school

Course

333

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

11

Uploaded by JusticeDangerWolverine42

Report
Module 3 Student Study Guide - Part 1   1. What process identifies and grants access to a user who is trying to access a system? A. Credibility B. Authorization C. Authentication D. Encryption Ans: Authentication Proof: Authentication is the process of identifying and granting access to some user, usually a person, who is trying to access a system Page: 528       2. What process determines what a legitimate user can and cannot do on a system? A. Accessibility B. Authorization C. Permission propagation D. Inheritance Ans: Authorization Proof: authorization: the process that defines what resources an authenticated user may access and what he or she may do with those resources Page: 528    
  3. On every Windows system, each record in an encrypted database of usernames and passwords is called a(n) _______________. A. Group account B. Single account C. Specialized account D. Local user account Ans:  Local user account Proof: Every Windows system stores the user accounts as an encrypted database of usernames and passwords. Windows calls each record in this database a local user account. Page: 528   8. What type of group enables someone who does not have an account on the system to log on? A. Administrator B. Standard user C. Power user D. Guest Ans: Guest Proof: Guests group enables someone who does not have an account on the system to log on by using a guest account. Page: 532     10. A password _______________ policy forces users to select a new password periodically. A. permissions B. disabling
C. expiration D. anti-hack Ans: expiration Proof: password expiration policy that forces users to select a new password periodically Page: 530   11. Which character in a password is most helpful in defeating common word hacks? A. @ B. t C. x D. w Ans: @ Proof: Using non-alphanumeric  characters  makes  any  password  much  more  difficult  to  crack Page: 530   12. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. A. six B. eight C. 10 D. 256 Ans: Eight Proof: Make sure users have a strong password: at least eight characters in length, including letters, numbers, and nonalphanumeric symbols. Page: 530
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
  16. Which NTFS permission allows an account to seize control of a file or folder owned by another account? A. File permissions B. Take Ownership permission C. Folder permissions D. Change permission Ans: Take Ownership permission Proof: With the Take Ownership permission, anyone with the permission can seize control of a file or folder Page: 544   17. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. A. Change B. List C. Read & Execute D. Modify Ans: Change Proof: Change permission. An account with this permission can give or take away permissions for other accounts Page: 545   18. By default, who has complete control over a folder or file? A. Owner B. Administrator C. All users
D. Power users Ans: Owner Proof:  When you create a new file or folder on an NTFS partition, you become theowner of that file or folder. This is called ownership. Owners can do anything they want to the files or folders they own, including changing the permissions to prevent anybody, even administrators, from accessing them Page: 544   19. Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders? A. Full Control B. Modify C. List Folder Contents D. Read Ans: Modify Proof: Modify Enables you to read, write, and delete both files and subfolders Page: 546   23. What three letters are used in a Linux terminal to indicate permissions associated with a file or folder? A. omc B. rwx C. awk D. lsp Ans: rwx Proof: The letters r, w, and x represent the following permissions:•        r-Read the contents of a file•   w-Write or modify a file or folder•   x-Execute a file or list the folder contents Page: 551
  25. What command gives you more details about the chmod command? A. chmod help B. chmod info C. man chmod D. details chmod Ans: chmod help Proof: chmod gives more details about the chmod command Page: 553   27. What technique provides the only true way to protect your data from access by any other user? A. Regular backup B. Authorization C. Encryption D. Authentication Ans: encryption Proof: encryption techniques provides the only true way to secure your data  from  access  by  any  other  user Page: 559-560   28. What tool is offered by Windows Pro and better editions to encrypt entire hard drives? A. NTFS B. BitLocker C. TPMs D. TrueCrypt
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ans: BitLocker Proof: Windows Ultimate and Enterprise editions and Windows 8/8.1/10 Pro offer full drive encryption  through  BitLocker  Drive  Encryption.  BitLocker  encrypts  the  whole  drive,  including  every  user’s  files,  so  it’s  not  dependent  on  any  one  account. Page: 562   29. What does BitLocker require on a motherboard to validate on boot that a Windows computer has not been changed? A. EFS B. IPC$ C. Core i7 D. TPM Ans: TPM Proof: BitLocker  requires  a  special  Trusted  Platform  Module  (TPM)  chip  on  the  mother- board  to  function.  The  TPM  chip  (which  we  looked  at  earlier,  in  Chapter  5,  “Firm- ware”) validates on boot that the computer has not changed— Page: 562   —----------------   1. What tool identifies files that can be deleted to gain more hard drive space? 1. Disk Restore 2. Disk Defragmenter 3. System Restore 4. Disk Cleanup Ans: Disk Cleanup Proof: Disk  Cleanup  utility  regularly  to  make  sure  you’ve  cleared  out  the  junk  files  that  accumulate  from  daily  use. Page 584  
  2. Windows Task Scheduler divides tasks into actions, conditions, and ______________. A. schedules B. triggers C. executables D. switches Ans: triggers Proof: Task Scheduler divides tasks into triggers, actions, and conditions Page 589 3. Which Windows tool gives you a quick way to see the status (enabled or disabled) of each application and a handy guide to the startup impact that program has? A. Services Console B. Application Manager C. Task Manager D. cron Ans: Task manager Proof: Microsoft placed the Startup applications and services in the Task Manager (press ctrl-shift-esc) in Windows  8/8.1/10.  You can readily  see  the  status  (enabled  or  disabled)  of  each  application  and  a  handy  guide  to  the  startup  impact  that  program  has Page: 593-594   4. Most Windows applications distributed on removable media have a(n) ______________ file that calls up the installation program. 1. upgrade 2. update
3. restart 4. autorun Ans: autorun Proof: If you can’t download or access an application over the Internet, it’ll probably come on an optical disc.  Windows supports Autorun, a feature that enables the operating system to look for  and  read  a  special  file  called—wait  for  it—autorun.inf.  Immediately  after a removable media device (optical disc or thumb drive) is inserted into your com-puter,  whatever  program  is  listed  in  autorun.inf  runs  automatically. Page 600   5. The tabs on the Performance Options dialog box in Windows are Visual Effects, Advanced, and _______________. A. Normal B. Data Execution Prevention C. Non-Visual Effects D. On/Off Ans: Data Execution Prevention Proof: The Performance Options  dialog  box  has  three  tabs:  Visual  Effects,  Advanced,  and  Data  Execution  Prevention Page: 611     [QUESTION] 6. The options in the Advanced tab on the Performance Options dialog box in Windows are Processor scheduling and _______________. A. Disk cache B. RAM C. USB D. Virtual memory
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ans: Virtual Memory Proof: The Advanced tab, shown in Figure 14-42, has two sections: Processor scheduling and Virtual memory Page: 611       7. Time Machine in macOS creates full system backups that are known as _______________. A. restore points B. images C. local snapshots D. system copies Ans: local snapshots Proof: macOS provides the excellent Time Machine to create full system backups (see Figure 14-49).  These backups are called local snapshots. Page: 617     8. What does Ubuntu Linux use for backing up files, folders, and drives? A. Ubuntu BackIn B. Déjà Dup C. Linux Restore D. Save Images Ans: Déjà Dup
Proof: Different Linux distros offer different tools for backing up files, folders, and drives. Ubuntu Linux uses Déjà Dup, although it goes by the name Backups in System Settings Page: 619       9. The System Restore tool in Windows enables you to create a _______________, which is a snapshot of the computer’s configuration at a specific point in time. A. Time Snapshot B. Image C. Configuration Status D. Restore Point Ans: Restore Point Proof: The System Restore tool enables you to create a restore point, a snapshot of a computer’s configuration at a specific point in time. Page: 619