The best way to change inherited permissions is to change the permissions of the ____.
You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
Certificates are managed using the ____ console.
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
ISO 17799 and ISO 27002
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
____ is any annoying and unwanted program that might or might not mean you harm.
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.
A $ at the end of the folder name creates a(n) ____ share.
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.
The term ____ applies to a kit or set of tools used originally on UNIX computers.