Chapter 19-21-22 reviewing the basics answers

Chapter 19-21-22 reviewing the basics answers - Chapter 19...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 19 REVIEWING THE BASICS 1. What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation? Kerberos 2. Which policy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows 2000/XP system? Audit policy 3. Define and explain the differences between viruses, worms, logic bombs, and Trojans. A virus is a program that can replicate by attaching itself to another program. A worm can spread copies of itself throughout a network without a host program. A Trojan horse, like a worm, does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program. A logic bomb is dormant code added to software and triggered by a predetermined event. 4. Where can viruses hide? Viruses can hide in the boot sector, in a file, in a macro within a file, or in a combination of the boot sector and a file (for a multipartite virus). 5. What is the best way to protect a computer or network against worms? Use a firewall. 6. What is the best way to determine if an e-mail message warning about a virus is a hoax? Check Web sites on the Internet that track virus hoaxes. 7. Are boot sector viruses limited to hard drives? Explain. No. On a floppy disk, a boot sector virus hides in the boot program of the boot sector. 8. Which feature must you disable in the Folders Options applet of Control Panel before you can control which user group or user has access to a shared file or folder? Simple file sharing 9. What is the most likely way that a virus will get access to your computer?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
From an e-mail message 10. List three products to remove malicious software that can deal with adware and spyware. Ad-Aware, Spybot Search and Destroy, Windows Defender 11. Why is it best to run AV software in Safe Mode? Because malware is less likely to be running in the background to prevent AV software from detecting it 12. Which Windows tool do you use to view a recorded log of network activity? Event Viewer 13. What registry key keeps information about services that run when a computer is booted into Safe Mode? HKLM\System\CurrentControlSet\Control\SafeBoot 14. What does AV software look for to determine that a program or a process is a virus? A virus signature 15. What Windows tool can you use to solve a problem of an error message displayed at startup just after your AV software has removed malware? Msconfig 16. What folder is used by Windows to hold System Restore restore points? \System Volume Information 17. How can you delete all restore points and clean up the restore points data storage area? Turn off System Restore and reboot the system. 18. What two methods does anti-rootkit software use to detect a rootkit? The software looks for running processes that do not match up with the underlying program
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 10

Chapter 19-21-22 reviewing the basics answers - Chapter 19...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online