Which compatibility settings should you select if you notice problems...
System Protection uses restore points, which are created just before...
If your machine does not have a TPM chip, how can you still use...
What do you call a device driver that converts the print jobs...
There are some Windows XP applications that will not run on Windows 7...
When you connect to a site that is secured using SSL, what icon...
Which type of printer is connected directly to the network?
Which Power Saving Plan is the best for most users on a Laptop...
No matter what technology you use to secure your laptop, social...
If a program written for an earlier version of Windows doesn't...
How do you enable auditing on a Windows server?
With Windows, the physical printer is known as a?
What is a term for computers, that is used for the protection of...
The Program Compatibility Troubleshooter is essentially a wizard that...
Which of the following ports does SMB use?
If full control is assigned to a parent object for a user, the full...
What is the default path for the print spool folder?
What component can BitLocker use to store cryptographic information...
Which power saving plan uses the most energy and can quickly drain a...
If Internet Explorer recognizes a webpage that isn't compatible,...
The logical printer that users can access in Windows is known as:
Where are Permissions assigned to an NTFS file and stored?
To make Internet Explorer more flexible, Internet Explorer allows you...
What is a technology and framework that enables powerful applications...
What is a term sometimes called malware, and is software designed to...
TCP/IP printers use port ___________ .
What other feature is included with System Protection?
You are configuring a program using the Program Compatibility...
As with many Windows computers, you can use group policies to...
To print to a printer, you need the _____ permission.
What is is a software product from Microsoft that prevents, removes,...
What is the minimum permission needed to take ownership of a file...
What does System Restore create when it is used on a regular basis?
What is a feature that helps prevent unauthorized changes to your...
Instead of always going to a search engine web page, you can search...
To view who has printed on a printer, you would look in which 2...
What is a tool that enables you to configure, to collect, and to...
Bing is the default search provider if you use the express setup for...
What is a form of selection-based searching that allows you to start...
What component in Windows 7 provides a centralized console that...
Why is most programs blocked by Windows Firewall, to help make your...
The average disk queue length should not be more than ______________.
For 32-bit systems, your paging file should not typically be _______...
The primary function of the Action Center is to provide what...
What permission always wins out?
Before you can receive RSS feeds with IE, you must subscribe to them.
If the disk queue length is consistently above _________, your disk...
What is a software shim?
A virus hoax is a message warning the recipient of a nonexistent...
When you use a browser to surf the Internet, a lot can be revealed...
A page fault occurs when a process attempts to access virtual memory...
What do you call the set of commands that a printer understands in...
After installing Windows, what should be the next step in the...
Sometimes by relieving one bottleneck, you may trigger another...
Which type of browsing can prevent websites from gathering personal...
To use the Internet Explorer Compatibility Test Tool, you simply run...
The Setup Analysis Tool (SAT) automates the running of application...
Service Packs:A tested, cumulative set of hotfixes, security updates,...
NTFS permissions allow you to control which __________ and ________...
What do you call a program that grabs some memory but does not release...
The Standard User Analyzer (SUA) tool enables you to test your...
Encryption is the process of converting data into a format that cannot...
You encrypted a file using EFS. The next day, you decide to compress...
If you have an application that you cannot get to run on Windows 7...
Encrypting File System (EFS) can encrypt files on an NTFS volume that...
What is included with Windows 7 as a tool to measure performance so...
Groups or users granted Full Control permission on a folder can delete...
Along with InPrivate browsing, and you enable this option; what other...
What are two types of permissions used in NTFS?
What can you run for programs that were designed for Windows XP on...
BitLocker Drive Encryption is the feature in Windows 7 that makes use...
When you copy a folder or file, the new folder or file will...
A data recovery agent (DRA) is a user account that an administrator...
When you move a folder or file within the same volume, the folder or...
To use Windows XP Mode, you need to download and install Windows XP...
To run Windows XP Mode, you need a computer that is capable of...
To help protect your computer, Internet Explorer has the capability to...
BitLocker To Go is a new feature in Windows 7 that enables users to...
When you move a folder or file from one volume to another volume, the...
The owner of the object controls how permissions are set on the object...
All administrators automatically have the Take Ownership permission of...
Trusted Sites Zone:Contains trusted sites that you believe you can...
A worm is a self-replicating program that replicates itself to other...
Restricted Sites Zone:Contains sites that you do not trust from which...
Software restriction policies, which have been included in Windows...
Local Intranet Zone:Computers that are part of the organization's...
What MMC snap-in provides tools in analyzing system performance?
To create rules, you must open which software feature in Computer...
Internet Zone:Anything that is not assigned to any other zone and...
What is the default security level of the Internet zone setting in...
What program allows you to view information about the use of hardware...
Which type of encryption uses one key to encrypt and another key to...
If you have multiple rules that apply to a single application, you may...
AppLocker creates rules based the following...
Dynamic security is a set of tools and technology that protects your...
What do you call permissions that flow from a parent object to a child...
To help protect against phishing, Internet Explorer 8 includes which...
AppLocker helps reduce administrative overhead and the organization's...
The primary disadvantage of AppLocker is that you can only apply the...
By default, AppLocker blocks all executables, installer packages, and...
What is a cryptographic system that uses two keys to encrypt data uses...
What technology is used to configure power settings?
What technology is used to encrypt an individual file or folder?
Which of the following is not typically a bottleneck in a computer...
The encrypting technology included in NTFS is _____.
What is the minimum share permission needed to modify files and...
What is a single virtual printer with a single print queue that...
You have computer with 2GB of memory. If the paging file used on a...
If you have a high volume of print jobs, the printer can become...
You can create a group of printers called a printer pool to act as a...
System Protection is a feature that regularly creates and saves...
What are the two objects needed to create a printer pool?
You are an administrator on a computer.Unfortunately, there is a...
If an application cannot communicate over the network, you should...
Windows 7 provides three levels of printer permissions: they are?
If you have Windows 7 and Windows Server 2008 machines, what should...
What is required to run protected mode on Internet Explorer?
One advantage of using logical printers that point to a physical...
A printer does not stop processing a job it is already working on,...
Performance is the overall effectiveness of how data moves through the...
A software program is a sequence of instructions written to perform a...
If your computer lacks the RAM needed to run a program or perform an...
As mentioned earlier, security can be divided into three areas....
When RAM runs low, virtual memory moves data from RAM to space...
Since printers are considered objects, auditing of printers is similar...
What are the two file extensions that can be used fpr running a...
Auditing is not enabled by default.
To look at spooler and printer activity, look at the logs shown in the...
The more RAM you have, the less frequently virtual memory will have to...
Inherited permissions are permissions that are granted to a folder...
The default paging file size is equal to how much ram you already have...
Task Manager gives you a quick glance at performance and provides...
What type of printer when one of the basic network services is network...
Which permission takes precedence?
A(n) _____________ is a software program that protects a computer by...
When a program will not run under Windows 7 under compatibility...
The best protection to protect your system is to use an up-to-date...
When calculating the NTFS and share permissions, you would apply the...
For Windows 7, you can use the Control Panel's Programs and Features...
If the program you want to uninstall isn't listed, it might not have...
When a printer is requested, where does the print job sent to, for...
Power management is the process of balancing battery life against...
Which feature gives the user an easy method to use and get an older...
To assist in resolving compatibility issues, Microsoft has introduced...
What happens to a file's permissions if you copy it from one...
In Windows 7, there are four types of file sharing: what are they?
What file format used by the Windows operating system, when a document...
What is a good place to start when troubleshooting a machine...
BitLocker requires a TPM chip.
A ____________ firewall is a firewall that keeps track of the state of...
AppLocker is configured using _________ ________ .
To manage other people's print jobs, you need to assign the...
What shares are usually hidden and are used for administrative...
What is used to grant access to objects such as NTFS files or...
What do you call it when multiple printers share the same print...
What is the minimum permission needed to print to a printer and...
What do you call permissions that is actually granted to a user,...
What is the minimum permission needed to change the attributes of...
What permissions are directly assigned to a file or folder?
When files and folders are created on an NTFS volume, a security...
A computer virus is a program that can copy itself and infect a...
What happens to those permissions of a file if you move to a...
What tool allows you to detect potential compatibility issues due to...
What is the standard NTFS permission needed to change attributes?
What is one of the handiest programs you can use to view performance...
What Windows Microsoft Management Console (MMC) snap-in, that provides...
Virtualization must also be enabled in the BIOS Setup program for...
A power plan is a collection of hardware and system settings that...
Match the following
Match the type of sharing with a descriptor: