Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

International Academy of Design & Technology IT IT110 Chapter 19 REVIEWING THE BASICS 1)What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?   Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system?   3

Computer Science Aug 04, 2021

International Academy of Design & Technology

IT IT110

Chapter 19

REVIEWING THE BASICS

1)What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?

 

  1. Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system?

 

3. Define and explain the differences between viruses, worms, logic bombs, and Trojans.

 

4. Where can viruses hide?

 

  1. What is the best way to protect a computer or network against worms?

 

 

6. What is the best way to determine if an e-mail message warning about a virus is a hoax?

 

 

7. Are boot sector viruses limited to hard drives? Explain.

 

 

  1. Which feature must you disable in the Folders Options applet of Control Panel before you can control which user group or user has access to a shared file or folder?

 

9. What is the most likely way that a virus will get access to your computer?

 

 

10. List three products to remove malicious software that can deal with adware and spyware.

 

 

  1. Why is it best to run AV software in Safe Mode?

 

12. Which Windows tool do you use to view a recorded log of network activity?

 

 

13. What registry key keeps information about services that run when a computer is booted into Safe Mode?

 

  1. What does AV software look for to determine that a program or a process is a virus?

 

 

15. What Windows tool can you use to solve a problem of an error message displayed at startup just after your AV software has removed malware?

 

16. What folder is used by Windows to hold System Restore restore points?

 

 

  1. How can you delete all restore points and clean up the restore points data storage area?

 

 

  1. What two methods does anti-rootkit software use to detect a rootkit?

 

  1. Name two anti-rootkit products.

 

 

 

  1. What is the major disadvantage of using an AV software installation CD to install the AV software to rid a system of viruses?
  2. Why does having Windows display known file extensions help prevent a system from being infected with malware?
  3. How does a rootkit running in user mode normally hide?

 

 

  1. What is the difference between spyware and adware?

 

  1. For what is the Windows Scripting Host utility used, and what is the command line to execute it?
  2. Why is using an ActiveX control considered a security risk?

 

  1. What must you do before you can use the Windows Backup utility on a Windows XP Home Edition PC?

 

 

  1. Name one browser other than Internet Explorer by Microsoft.

 

 

  1. Name two e-mail clients other than Outlook or Outlook Express by Microsoft.

 

 

  1. What are five file extensions that might be used for scripts?

 

 

  1. Why might someone see better security when using a browser other than Internet Explorer?

THINKING CRITICALLY

 

  1. A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes and you see a "blue screen of death" (an error message on a blue background). You have extremely important document files on the drive that you cannot afford to lose. What do you do first?
    1. Try a data recovery service even though it is very expensive.

 

    1. Remove the hard drive from the computer case and install it in another computer.

 

    1. Try GetDataBack by Runtime Software (www.runtime.org) to recover the data.

 

    1. Use Windows utilities to attempt to fix the Windows boot problem.

 

    1. Run antivirus software to remove the virus.

 

 

 

  1. Just after you reboot after running AV software, an error message is displayed that contains a reference to a strange DLL file that is missing. What do you do first?
    1. Run the AV software again.

 

    1. Run Msconfig and look for startup entries that are launching the DLL.

 

    1. Run Regedit and look for keys that refer to the DLL.

 

    1. Search the Internet for information about the DLL.

 

  1. Suppose a user has encrypted important data files and now is no longer working for your company. How do you decrypt these files so they can be read?

 

 

 

 

 

 

 

 

 

 

 

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment