Network Chapter 13 110

Chapter 13  

20 cards   |   Total Attempts: 182
  

Cards In This Set

Front Back
The best way to change inherited permissions is to change the permissions of the ____.
parent object
You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.
Network Service Network Service
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
digital certificate digital certificate
Certificates are managed using the ____ console.
Certificate Manager Certificate Manager
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.
BIOS BIOS
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
permissions permissions
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
drive drive
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
backdoor backdoor
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
strong strong
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
Effective Permissions
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
multipartite multipartite
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
user user
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
reset reset
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
ISO 17799 and ISO 27002
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
HKLM\System\CurrentControlSet\Control\SafeBoot