• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back

On the IE General tab you can block cookies.

False

The default value of the security level in IE is Medium-high.

True

To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.

False

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.

False

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

True

Which of the following is a task you CAN’T do from the IE General tab?

disable file downloads

Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.

proxy server

Which of the following is NOT true about Remote Desktop?

by default all users can access Remote Desktop

If you want to be able to power up a computer remotely, what feature should you use?

WoL

Which of the following is NOT true about Group Policy?

all policies are applied before the logon screen appears

Which statements is true about controlling access to folders and files?

rights are assigned to accounts

Which of the following is NOT true about user accounts and groups?

a user account can belong to only one group at a time

Which built-in group might Windows automatically assign a user account to when determining its permissions?

Anonymous users

To which group does Windows give access to folders that you create which are not part of your user profile?

Authenticated Users

When all users on a network require the same access to all resources, what type of network model should you use?

Homegroup

Which of the following is true about which folders to use to hold shared data when working with a workgroup?

private data for each user should be kept in their C:\Users folder

Which type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only

Which is NOT true about using share and NTFS permissions?

if both permissions are used, the least restrictive permission between the two applies

Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.

Write, Read

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

\\server\sharedfolder

When troubleshooting a live network cable, what should you use?

a loopback plug

Which of the following must you do to configure Windows to provide QoS for applications? (Choose all that apply.)

enable QoS for the network connection adapter, set the QoS priority level for applications

Which of the following are options for configuring QoS with Group Policy? (Choose all that apply.)

the priority is a number from 0 and 63, outbound traffic can be throttled

What types of user accounts does Windows 7 support? (Choose all that apply.)

standard, administrator

Which of the following are true about NTFS permissions? (Choose all that apply.)

when a subfolder is created, it is assigned the permissions of its parent folder, by default, the owner of folder has full permissions to the folder

the folders that are shared by default on a network domain that administrator accounts can access

administrative shares

a TCP/IP command that enables you to resolve a connectivity problem when attempting to reach a destination host such as a web site

tracert

permissions assigned by Windows that are attained from a parent object

inherited permissions

a tool that can locate a Wi-Fi hotspot and tell you the strength of the RF signal

wireless locator

a TCP/IP command that gives statistics about TCP/IP and network activity and includes several parameters

netstat

configuring a computer so that it will respond to network activity when the computer is in a sleep state

Wake on LAN

command is used to display statistics about the NetBT (NetBIOS over TCP/IP) protocol

nbtstat

a method to control access to a folder or file and can apply to local users and
network users

NTFS permissions

a method to control access to a shared folder and can be assigned to NTFS or FAT volumes

share permissions

a TCP/IP command that lets you read information from the Internet name space by requesting information about domain name resolutions

nslookup