Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / International Academy of Design & Technology IT IT110 Chapter 19 REVIEWING THE BASICS 1)What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?   Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system?   3

International Academy of Design & Technology IT IT110 Chapter 19 REVIEWING THE BASICS 1)What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?   Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system?   3

Computer Science

International Academy of Design & Technology

IT IT110

Chapter 19

REVIEWING THE BASICS

1)What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?

 

  1. Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system?

 

3. Define and explain the differences between viruses, worms, logic bombs, and Trojans.

 

4. Where can viruses hide?

 

  1. What is the best way to protect a computer or network against worms?

 

 

6. What is the best way to determine if an e-mail message warning about a virus is a hoax?

 

 

7. Are boot sector viruses limited to hard drives? Explain.

 

 

  1. Which feature must you disable in the Folders Options applet of Control Panel before you can control which user group or user has access to a shared file or folder?

 

9. What is the most likely way that a virus will get access to your computer?

 

 

10. List three products to remove malicious software that can deal with adware and spyware.

 

 

  1. Why is it best to run AV software in Safe Mode?

 

12. Which Windows tool do you use to view a recorded log of network activity?

 

 

13. What registry key keeps information about services that run when a computer is booted into Safe Mode?

 

  1. What does AV software look for to determine that a program or a process is a virus?

 

 

15. What Windows tool can you use to solve a problem of an error message displayed at startup just after your AV software has removed malware?

 

16. What folder is used by Windows to hold System Restore restore points?

 

 

  1. How can you delete all restore points and clean up the restore points data storage area?

 

 

  1. What two methods does anti-rootkit software use to detect a rootkit?

 

  1. Name two anti-rootkit products.

 

 

 

  1. What is the major disadvantage of using an AV software installation CD to install the AV software to rid a system of viruses?
  2. Why does having Windows display known file extensions help prevent a system from being infected with malware?
  3. How does a rootkit running in user mode normally hide?

 

 

  1. What is the difference between spyware and adware?

 

  1. For what is the Windows Scripting Host utility used, and what is the command line to execute it?
  2. Why is using an ActiveX control considered a security risk?

 

  1. What must you do before you can use the Windows Backup utility on a Windows XP Home Edition PC?

 

 

  1. Name one browser other than Internet Explorer by Microsoft.

 

 

  1. Name two e-mail clients other than Outlook or Outlook Express by Microsoft.

 

 

  1. What are five file extensions that might be used for scripts?

 

 

  1. Why might someone see better security when using a browser other than Internet Explorer?

THINKING CRITICALLY

 

  1. A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes and you see a "blue screen of death" (an error message on a blue background). You have extremely important document files on the drive that you cannot afford to lose. What do you do first?
    1. Try a data recovery service even though it is very expensive.

 

    1. Remove the hard drive from the computer case and install it in another computer.

 

    1. Try GetDataBack by Runtime Software (www.runtime.org) to recover the data.

 

    1. Use Windows utilities to attempt to fix the Windows boot problem.

 

    1. Run antivirus software to remove the virus.

 

 

 

  1. Just after you reboot after running AV software, an error message is displayed that contains a reference to a strange DLL file that is missing. What do you do first?
    1. Run the AV software again.

 

    1. Run Msconfig and look for startup entries that are launching the DLL.

 

    1. Run Regedit and look for keys that refer to the DLL.

 

    1. Search the Internet for information about the DLL.

 

  1. Suppose a user has encrypted important data files and now is no longer working for your company. How do you decrypt these files so they can be read?

 

 

 

 

 

 

 

 

 

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions