Windows 7 Enterprise Help Desk 4 Part.2

170 Questions | Attempts: 377
Share
Please wait...
Question 1 / 170
0 %
0/100
Score 0/100
1. Which compatibility settings should you select if you notice problems with menus or buttons on the title bar of the program?
Submit
Please wait...
About This Quiz
Windows 7 Enterprise Help Desk 4 Part.2 - Quiz

Enterprise is a version of Windows 7 that is only available to businesses through volume licensing. It consists of all the features of Windows 7 Professional, as well as more features to enhance security and network.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. System Protection uses restore points, which are created just before significant system events, such as the installation of a program or device driver.
Submit
3. If your machine does not have a TPM chip, how can you still use BitLocker? 
Submit
4. What do you call a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device?
Submit
5. There are some Windows XP applications that will not run on Windows 7 or require some extra configuration to make the application work.
Submit
6. When you connect to a site that is secured using SSL, what icon appears in the address bar, along with the name of the organization to which the CA issued the certificate.
Submit
7. Which type of printer is connected directly to the network?
Submit
8. Which Power Saving Plan is the best for  most users on a Laptop or Mobile device?
Submit
9. No matter what technology you use to secure your laptop, social engineering can still bypass that security.
Submit
10.  If a program written for an earlier version of Windows doesn't run correctly, you can try changing which feature try and make it work?
Submit
11. How do you enable auditing on a Windows server?
Submit
12. With Windows, the physical printer is known as a?
Submit
13. What is a term for computers, that is used for the protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
Submit
14. The Program Compatibility Troubleshooter is essentially a wizard that simplifies the process of selecting compatibility mode settings for an executable file. 
Submit
15.  Which of the following ports does SMB use?
Submit
16. If full control is assigned to a parent object for a user, the full control permission will overwrite explicit permissions at a child object.
Submit
17. What is the default path for the print spool folder? 
Submit
18. What component can BitLocker use to store cryptographic information and which is usually built into a laptop computer?
Submit
19. Which power saving plan uses the most energy and can quickly drain a mobile battery?
Submit
20. If Internet Explorer recognizes a webpage that isn't compatible, you'll see the Compatibility View button on the address bar? 
Submit
21. The logical printer that users can access in Windows is known as:
Submit
22. Where are Permissions assigned to an NTFS file and stored?
Submit
23. To make Internet Explorer more flexible, Internet Explorer allows you to add add-ons such as extra toolbars, animated mouse pointers, stock tickers, and pop-up add blockers to your web browser.
Submit
24. What is a technology and framework that enables powerful applications with rich user interfaces to run within a web browser?
Submit
25. What is a term sometimes called malware, and is software designed to infiltrate or affect a computer system without the owner's informed consent.It is usually associated with viruses, worms, Trojan horses, spyware, rootkits, and dishonest adware.
Submit
26. TCP/IP printers use port ___________   .
Submit
27. What other feature is included with System Protection?
Submit
28. You are configuring a program using the Program Compatibility settings. What option allows the application to run as an administrator?
Submit
29. As with many Windows computers, you can use group policies to configure compatibility mode settings including suppressing application compatibility warnings. 
Submit
30. To print to a printer, you need the _____ permission. 
Submit
31. What is is a software product from Microsoft that prevents, removes, and quarantines spyware in Microsoft Windows.It protects your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer.
Submit
32. What is the minimum permission needed to take ownership of a file or folder?
Submit
33. What does System Restore create when it is used on a regular basis?
Submit
34. What is a feature that helps prevent unauthorized changes to your computer in Windows 7?
Submit
35. Instead of always going to a search engine web page, you can search information from the search box via a search provider.
Submit
36. To view who has printed on a printer, you would look in  which 2 places to see and find the user?
Submit
37. What is a tool that enables you to configure, to collect, and to analyze your data, so that you can fix any issues prior to deploying a new operating system in your organization? 
Submit
38. Bing is the default search provider if you use the express setup for Internet Explorer.
Submit
39. What is a form of selection-based searching that allows you to start an online service from any other page using only the mouse, and can be used in IE8?
Submit
40. What component in Windows 7 provides a centralized console that enables users and administrators to access, monitor, and configure the various Windows 7 security mechanism?
Submit
41. Why is most programs blocked by Windows Firewall, to help make your computer more secure?
Submit
42. The average disk queue length should not be more than ______________.
Submit
43. For 32-bit systems, your paging file should not typically be _______ times the amount of RAM.
Submit
44. The primary function of the Action Center is to provide what information immediatley?Select 2 options:
Submit
45. What permission always wins out?
Submit
46. Before you can receive RSS feeds with IE, you must subscribe to them.
Submit
47. If the disk queue length is consistently above _________, your disk system is being over utilized ?
Submit
48. What  is a software shim?
Submit
49. A virus hoax is a message warning the recipient of a nonexistent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone he or she knows.
Submit
50. When you use a browser to surf the Internet, a lot can be revealed about a person's personality and personal information, what type of file, that is stored with IE8, and gathers this information?
Submit
51. A page fault occurs when a process attempts to access virtual memory page that is not available in its working set of RAM.
Submit
52. What do you call the set of commands that a printer understands in order to print content?
Submit
53. After installing Windows, what should be the next step in the installation process?
Submit
54. Sometimes by relieving one bottleneck, you may trigger another bottleneck.
Submit
55. Which type of browsing can prevent websites from gathering personal information about you, location and other data?
Submit
56. To use the Internet Explorer Compatibility Test Tool, you simply run the program, click enable, and use Internet Explorer to access the sites you want to test.
Submit
57. The Setup Analysis Tool (SAT) automates the running of application installations while monitoring the actions taken by each application's installer.
Submit
58. Service Packs:A tested, cumulative set of hotfixes, security updates, critical updates, and updates, as well as additional fixes for problems found internally since the release of the product.
Submit
59. NTFS permissions allow you to control which __________ and ________ can gain access to files and folders on an NTFS volume.
Submit
60. What do you call a program that grabs some memory but does not release it when done with it?
Submit
61. The Standard User Analyzer (SUA) tool enables you to test your applications and monitor API calls to detect potential compatibility issues due to the User Account Control (UAC) feature in both Windows Vista and Windows 7.
Submit
62. Encryption is the process of converting data into a format that cannot be read by another user.
Submit
63. You encrypted a file using EFS. The next day, you decide to compress the file because of its large size. Later you notice that it was not encrypted anymore. What is the problem?
Submit
64. If you have an application that you cannot get to run on Windows 7 using the Compatibility settings or ACT, what mode can you use to create a virtual machine? 
Submit
65. Encrypting File System (EFS) can encrypt files on an NTFS volume that cannot be used unless the user has access to the keys required to decrypt the information.
Submit
66. What is included with Windows 7 as a tool to measure performance so that you can determine what software you can run?
Submit
67. Groups or users granted Full Control permission on a folder can delete any files in that folder regardless of the permissions protecting the file.
Submit
68. Along with InPrivate browsing, and you enable this option; what other feature helps prevent website content providers from collecting information about sites you visit?
Submit
69. What are two types of permissions used in NTFS?
Submit
70. What can you run for programs that were designed for Windows XP on computers running Windows 7 Professional, Enterprise, or Ultimate editions?
Submit
71. BitLocker Drive Encryption is the feature in Windows 7 that makes use of a computer's TPM. A Trusted Platform Module (TPM) is a microchip that is built into a computer.
Submit
72. When you copy a folder or file, the new folder or file will automatically acquire the permissions of the drive or folder that the folder or file is being copied to.
Submit
73. A data recovery agent (DRA) is a user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card.
Submit
74. When you move a folder or file within the same volume, the folder or file will retain the same permissions that were originally assigned to it.
Submit
75. To use Windows XP Mode, you need to download and install Windows XP Mode, which is a fully licensed version of Windows XP with Service Pack 3.
Submit
76. To run Windows XP Mode, you need a computer that is capable of hardware virtualization (Intel-VT or AMD-V virtualization) and BIOS that supports hardware virtualization.
Submit
77. To help protect your computer, Internet Explorer has the capability to suppress what type of annoyance that can occur frequently when visiting a website?
Submit
78. BitLocker To Go is a new feature in Windows 7 that enables users to encrypt removable USB devices, such as flash drives and external hard disks.
Submit
79. When you move a folder or file from one volume to another volume, the folder or file will automatically acquire the permissions of the drive or folder that the folder or file is being copied to.
Submit
80. The owner of the object controls how permissions are set on the object and to whom permissions are granted.
Submit
81. All administrators automatically have the Take Ownership permission of all NTFS objects.
Submit
82. Trusted Sites Zone:Contains trusted sites that you believe you can download or run files from without damaging your computer or data, or sites that you do not consider security risks.
Submit
83. A worm is a self-replicating program that replicates itself to other computers over the network without any user intervention
Submit
84. Restricted Sites Zone:Contains sites that you do not trust from which downloading or running files may damage your computer or data, or sites that you consider security risks.
Submit
85. Software restriction policies, which have been included in Windows since Windows XP and Windows Server 2003, are rules that specify which applications users can run.
Submit
86. Local Intranet Zone:Computers that are part of the organization's network (intranet) that do not require a proxy server, as defined by the system administrator.
Submit
87. What MMC snap-in provides tools in analyzing system performance?
Submit
88. To create rules, you must open which software feature in Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies?
Submit
89. Internet Zone:Anything that is not assigned to any other zone and anything that is not on your computer, or your organization's network (intranet).
Submit
90. What is the default security level of the Internet zone setting in IE8, after installling this application?
Submit
91. What program allows you to view information about the use of hardware including processor, memory, disk, and network and software resources in real time?
Submit
92. Which type of encryption uses one key to encrypt and another key to decrypt?
Submit
93. If you have multiple rules that apply to a single application, you may have a conflict. Therefore, the more specific rule takes precedence over the less specific. what is the top 3 levels of precedance in order? 
Submit
94. AppLocker creates rules based the following except_______________________?
Submit
95. Dynamic security is a set of tools and technology that protects your computer as you browse the Internet with Internet Explorer.
Submit
96. What do you call permissions that flow from a parent object to a child object?
Submit
97. To help protect against phishing, Internet Explorer 8 includes which feature in its software package?
Submit
98. AppLocker helps reduce administrative overhead and the organization's cost of managing computing resources by decreasing the number of help desk calls that result from users running unapproved applications.
Submit
99. The primary disadvantage of AppLocker is that you can only apply the policies to computers running Windows 7 and Windows Server 2008 R2. 
Submit
100. By default, AppLocker blocks all executables, installer packages, and scripts, except for those specified in Allow rules.
Submit
101. What is a cryptographic system that uses two keys to encrypt data uses a public key known to everyone and a private or secret key known only to the recipient of the message.
Submit
102. What technology is used to configure power settings?
Submit
103. What technology is used to encrypt an individual file or folder?
Submit
104. Which of the following is not typically a bottleneck in a computer running Windows 7?
Submit
105. The encrypting technology included in NTFS is _____.
Submit
106. What is the minimum share permission needed to modify files and its attributes?
Submit
107. What is a single virtual printer with a single print queue that consist of two or more printers?
Submit
108. You have computer with 2GB of memory. If the paging file used on a Windows 7 machine is 4GB, what kind of bottleneck are you dealing with?
Submit
109. If you have a high volume of print jobs, the printer can become congested, and users will have to wait for their documents to print.
Submit
110. You can create a group of printers called a printer pool to act as a single virtual printer with a single print queue.
Submit
111. System Protection is a feature that regularly creates and saves information about your computer's system files and settings.
Submit
112. What are the two objects needed to create a printer pool?
Submit
113. You are an administrator on a computer.Unfortunately, there is a folder that you cannot access because you do not have permissions to the folder.What can you do?
Submit
114. If an application cannot communicate over the network, you should check the firewalls.
Submit
115. Windows 7 provides three levels of printer permissions: they are?
Submit
116. If you have Windows 7 and Windows Server 2008 machines, what should you use to restrict applications?
Submit
117. What is required to run protected mode on Internet Explorer?
Submit
118. One advantage of using logical printers that point to a physical printer/printer device is that you can use multiple logical printers that point to a single physical printer.
Submit
119. A printer does not stop processing a job it is already working on, even when the spooler receives a higher priority job, directed to a higher priority printer on the same port. 
Submit
120. Performance is the overall effectiveness of how data moves through the system.
Submit
121. A software program is a sequence of instructions written to perform a specified task for a computer.
Submit
122. If your computer lacks the RAM needed to run a program or perform an operation, Windows uses virtual memory to compensate.
Submit
123. As mentioned earlier, security can be divided into three areas. Authentication is used to prove the identify of a user. Authorization gives access to the user that was authenticated. To complete the security picture, you need to enable ___________ so that you can have a record of the users who have logged in and what the user accessed or tried to access. 
Submit
124.  When RAM runs low, virtual memory moves data from RAM to space called a paging file.
Submit
125. Since printers are considered objects, auditing of printers is similar to auditing file and folder access.
Submit
126. What are the two file extensions that can be used fpr running a program on a Windows desktop computer?
Submit
127. Auditing is not enabled by default.
Submit
128. To look at spooler and printer activity, look at the logs shown in the Event Viewer that pertain to the printer and spooler activity.
Submit
129. The more RAM you have, the less frequently virtual memory will have to be utilized.
Submit
130. Inherited permissions are permissions that are granted to a folder (parent object or container) that flow into that folder's child objects (subfolders or files inside the parent folder).
Submit
131. The default paging file size is equal to how much ram you already have installed?
Submit
132. Task Manager gives you a quick glance at performance and provides information about programs and processes running on your computer.
Submit
133. What type of printer when one of the basic network services is network printing, where multiple users can share the same printer?
Submit
134. Which permission takes precedence?
Submit
135. A(n) _____________ is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.
Submit
136. When a program will not run under Windows 7 under compatibility settings, you should then try Windows XP Mode.
Submit
137. The best protection to protect your system is to use an up-to-date antivirus and to keep your system up-to-date with the newest security patches.
Submit
138. When calculating the NTFS and share permissions, you would apply the more restrictive permissions between the NTFS and shared permission.
Submit
139. For Windows 7, you can use the Control Panel's Programs and Features to uninstall programs or to change a program's configuration by adding or removing certain options. 
Submit
140. If the program you want to uninstall isn't listed, it might not have been or registered with Windows.
Submit
141. When a printer is requested, where does the print job sent to, for completion?
Submit
142. Power management is the process of balancing battery life against performance.Windows 7 includes extensive power management capabilities, including support for the Advanced Configuration and Power Interface (ACPI) and the ability to configure these power settings for mobile computers.
Submit
143. Which feature gives the user an easy method to use and get an older application to work on a computer running Windows 7; by configuring various compatibility mechanisms that are part of Windows 7. 
Submit
144. To assist in resolving compatibility issues, Microsoft has introduced a new feature in its OS, it is aimed at the corporate environment and is to be used to determine before software deployment whether the software is compatible with Windows 7, it can also be used by individuals.What is it called? 
Submit
145. What happens to a file's permissions if you copy it from one volume to another?
Submit
146. In Windows 7, there are four types of file sharing: what are they?
Submit
147. What file format used by the Windows operating system, when a document has been set to the spooler for printing?.
Submit
148. What is a  good place to start when troubleshooting a machine that is running with poor perfromance?
Submit
149. BitLocker requires a TPM chip.
Submit
150. A ____________ firewall is a firewall that keeps track of the state of network connections.
Submit
151. AppLocker is configured using _________   ________   .
Submit
152. To manage other people's print jobs, you need  to assign the ________   ________ permission for a user!
Submit
153. What shares are usually hidden and are used for administrative purposes?
Submit
154. What is used to grant access to objects such as NTFS files or Active Directory user accounts?
Submit
155. What do you call it when multiple printers share the same print queue? 
Submit
156. What is the minimum permission needed to print to a printer and to manage your own print jobs?
Submit
157. What do you call permissions that is actually granted to a user, when a user logs on and accesses the particular file or folder? 
Submit
158. What is the minimum permission needed to change the attributes of a file?
Submit
159. What permissions are directly assigned to a file or folder?
Submit
160. When files and folders are created on an NTFS volume, a security descriptor known as and is created, what is this object?
Submit
161.  A computer virus is a program that can copy itself and infect a computer without the user's consent or knowledge.
Submit
162. What happens to those permissions of a file if you move to a folder within the same volume?
Submit
163. What tool allows you to detect potential compatibility issues due to the User Account Control (UAC) feature?
Submit
164. What is the standard NTFS permission needed to change attributes?
Submit
165. What is one of the handiest programs you can use to view performance to see which programs are using the most resources on your computer?
Submit
166. What Windows Microsoft Management Console (MMC) snap-in, that provides tools for analyzing system and it is included in the Computer Management console?
Submit
167. Virtualization must also be enabled in the BIOS Setup program for running Windows XP mode.What is also recommended for you to run Widows XP mode for memory and hard disk space requirements per virtual Windows environment? 
Submit
168. A power plan is a collection of hardware and system settings that manage how your computer uses power. You can use power plans to reduce the amount of power your computer uses, maximize performance, or balance the two.Match the following. 
Submit
169. Match the following
Submit
170. Match the type of sharing with a descriptor:
Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 12, 2016
    Quiz Created by
    Jamestiger
Cancel
  • All
    All (170)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which compatibility settings should you select if you notice problems...
System Protection uses restore points, which are created just before...
If your machine does not have a TPM chip, how can you still use...
What do you call a device driver that converts the print jobs...
There are some Windows XP applications that will not run on Windows 7...
When you connect to a site that is secured using SSL, what icon...
Which type of printer is connected directly to the network?
Which Power Saving Plan is the best for  most users on a Laptop...
No matter what technology you use to secure your laptop, social...
 If a program written for an earlier version of Windows doesn't...
How do you enable auditing on a Windows server?
With Windows, the physical printer is known as a?
What is a term for computers, that is used for the protection of...
The Program Compatibility Troubleshooter is essentially a wizard that...
 Which of the following ports does SMB use?
If full control is assigned to a parent object for a user, the full...
What is the default path for the print spool folder? 
What component can BitLocker use to store cryptographic information...
Which power saving plan uses the most energy and can quickly drain a...
If Internet Explorer recognizes a webpage that isn't compatible,...
The logical printer that users can access in Windows is known as:
Where are Permissions assigned to an NTFS file and stored?
To make Internet Explorer more flexible, Internet Explorer allows you...
What is a technology and framework that enables powerful applications...
What is a term sometimes called malware, and is software designed to...
TCP/IP printers use port ___________   .
What other feature is included with System Protection?
You are configuring a program using the Program Compatibility...
As with many Windows computers, you can use group policies to...
To print to a printer, you need the _____ permission. 
What is is a software product from Microsoft that prevents, removes,...
What is the minimum permission needed to take ownership of a file...
What does System Restore create when it is used on a regular basis?
What is a feature that helps prevent unauthorized changes to your...
Instead of always going to a search engine web page, you can search...
To view who has printed on a printer, you would look in  which 2...
What is a tool that enables you to configure, to collect, and to...
Bing is the default search provider if you use the express setup for...
What is a form of selection-based searching that allows you to start...
What component in Windows 7 provides a centralized console that...
Why is most programs blocked by Windows Firewall, to help make your...
The average disk queue length should not be more than ______________.
For 32-bit systems, your paging file should not typically be _______...
The primary function of the Action Center is to provide what...
What permission always wins out?
Before you can receive RSS feeds with IE, you must subscribe to them.
If the disk queue length is consistently above _________, your disk...
What  is a software shim?
A virus hoax is a message warning the recipient of a nonexistent...
When you use a browser to surf the Internet, a lot can be revealed...
A page fault occurs when a process attempts to access virtual memory...
What do you call the set of commands that a printer understands in...
After installing Windows, what should be the next step in the...
Sometimes by relieving one bottleneck, you may trigger another...
Which type of browsing can prevent websites from gathering personal...
To use the Internet Explorer Compatibility Test Tool, you simply run...
The Setup Analysis Tool (SAT) automates the running of application...
Service Packs:A tested, cumulative set of hotfixes, security updates,...
NTFS permissions allow you to control which __________ and ________...
What do you call a program that grabs some memory but does not release...
The Standard User Analyzer (SUA) tool enables you to test your...
Encryption is the process of converting data into a format that cannot...
You encrypted a file using EFS. The next day, you decide to compress...
If you have an application that you cannot get to run on Windows 7...
Encrypting File System (EFS) can encrypt files on an NTFS volume that...
What is included with Windows 7 as a tool to measure performance so...
Groups or users granted Full Control permission on a folder can delete...
Along with InPrivate browsing, and you enable this option; what other...
What are two types of permissions used in NTFS?
What can you run for programs that were designed for Windows XP on...
BitLocker Drive Encryption is the feature in Windows 7 that makes use...
When you copy a folder or file, the new folder or file will...
A data recovery agent (DRA) is a user account that an administrator...
When you move a folder or file within the same volume, the folder or...
To use Windows XP Mode, you need to download and install Windows XP...
To run Windows XP Mode, you need a computer that is capable of...
To help protect your computer, Internet Explorer has the capability to...
BitLocker To Go is a new feature in Windows 7 that enables users to...
When you move a folder or file from one volume to another volume, the...
The owner of the object controls how permissions are set on the object...
All administrators automatically have the Take Ownership permission of...
Trusted Sites Zone:Contains trusted sites that you believe you can...
A worm is a self-replicating program that replicates itself to other...
Restricted Sites Zone:Contains sites that you do not trust from which...
Software restriction policies, which have been included in Windows...
Local Intranet Zone:Computers that are part of the organization's...
What MMC snap-in provides tools in analyzing system performance?
To create rules, you must open which software feature in Computer...
Internet Zone:Anything that is not assigned to any other zone and...
What is the default security level of the Internet zone setting in...
What program allows you to view information about the use of hardware...
Which type of encryption uses one key to encrypt and another key to...
If you have multiple rules that apply to a single application, you may...
AppLocker creates rules based the following...
Dynamic security is a set of tools and technology that protects your...
What do you call permissions that flow from a parent object to a child...
To help protect against phishing, Internet Explorer 8 includes which...
AppLocker helps reduce administrative overhead and the organization's...
The primary disadvantage of AppLocker is that you can only apply the...
By default, AppLocker blocks all executables, installer packages, and...
What is a cryptographic system that uses two keys to encrypt data uses...
What technology is used to configure power settings?
What technology is used to encrypt an individual file or folder?
Which of the following is not typically a bottleneck in a computer...
The encrypting technology included in NTFS is _____.
What is the minimum share permission needed to modify files and...
What is a single virtual printer with a single print queue that...
You have computer with 2GB of memory. If the paging file used on a...
If you have a high volume of print jobs, the printer can become...
You can create a group of printers called a printer pool to act as a...
System Protection is a feature that regularly creates and saves...
What are the two objects needed to create a printer pool?
You are an administrator on a computer.Unfortunately, there is a...
If an application cannot communicate over the network, you should...
Windows 7 provides three levels of printer permissions: they are?
If you have Windows 7 and Windows Server 2008 machines, what should...
What is required to run protected mode on Internet Explorer?
One advantage of using logical printers that point to a physical...
A printer does not stop processing a job it is already working on,...
Performance is the overall effectiveness of how data moves through the...
A software program is a sequence of instructions written to perform a...
If your computer lacks the RAM needed to run a program or perform an...
As mentioned earlier, security can be divided into three areas....
 When RAM runs low, virtual memory moves data from RAM to space...
Since printers are considered objects, auditing of printers is similar...
What are the two file extensions that can be used fpr running a...
Auditing is not enabled by default.
To look at spooler and printer activity, look at the logs shown in the...
The more RAM you have, the less frequently virtual memory will have to...
Inherited permissions are permissions that are granted to a folder...
The default paging file size is equal to how much ram you already have...
Task Manager gives you a quick glance at performance and provides...
What type of printer when one of the basic network services is network...
Which permission takes precedence?
A(n) _____________ is a software program that protects a computer by...
When a program will not run under Windows 7 under compatibility...
The best protection to protect your system is to use an up-to-date...
When calculating the NTFS and share permissions, you would apply the...
For Windows 7, you can use the Control Panel's Programs and Features...
If the program you want to uninstall isn't listed, it might not have...
When a printer is requested, where does the print job sent to, for...
Power management is the process of balancing battery life against...
Which feature gives the user an easy method to use and get an older...
To assist in resolving compatibility issues, Microsoft has introduced...
What happens to a file's permissions if you copy it from one...
In Windows 7, there are four types of file sharing: what are they?
What file format used by the Windows operating system, when a document...
What is a  good place to start when troubleshooting a machine...
BitLocker requires a TPM chip.
A ____________ firewall is a firewall that keeps track of the state of...
AppLocker is configured using _________   ________   .
To manage other people's print jobs, you need  to assign the...
What shares are usually hidden and are used for administrative...
What is used to grant access to objects such as NTFS files or...
What do you call it when multiple printers share the same print...
What is the minimum permission needed to print to a printer and...
What do you call permissions that is actually granted to a user,...
What is the minimum permission needed to change the attributes of...
What permissions are directly assigned to a file or folder?
When files and folders are created on an NTFS volume, a security...
 A computer virus is a program that can copy itself and infect a...
What happens to those permissions of a file if you move to a...
What tool allows you to detect potential compatibility issues due to...
What is the standard NTFS permission needed to change attributes?
What is one of the handiest programs you can use to view performance...
What Windows Microsoft Management Console (MMC) snap-in, that provides...
Virtualization must also be enabled in the BIOS Setup program for...
A power plan is a collection of hardware and system settings that...
Match the following
Match the type of sharing with a descriptor:
Alert!

Advertisement