What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

It 122 Chapter 18

Question Answer
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? adware
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7? bootrec /fixboot

What statement regarding passwords on Windows is accurate quizlet?

What statement regarding passwords on Windows is accurate? -letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’

What does the presence of the Cydia app on an IOS device indicate?

The presence of the Cydia app on an IOS Device indicates that the iPhone is jailbroken.

What command can be used to take full access of a file?

icacls is the answer.

What type of IP address is configured by a server when a device first initiates?

35 Cards in this Set

The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. False
How are IP addresses available to the Internet classified? public
Which type of IP address is configured by a server when a device first initiates a connection to the network? dynamic

What hardware components are needed for BitLocker encryption?

What hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? Motherboard chip called the TPM Trusted Platform Module chip.

What types of events are logged by Windows and can be viewed using the event viewer?

Event Viewer displays these types of events:

  • Error: A significant problem, such as loss of data or loss of functionality.
  • Warning: An event that is not necessarily significant, but may indicate a possible future problem.
  • Information: An event that describes the successful operation of an application, driver, or service.

When creating a strong password What are some valid criteria the password should meet?

Characteristics of strong passwords

  • At least 8 characters—the more characters, the better.
  • A mixture of both uppercase and lowercase letters.
  • A mixture of letters and numbers.
  • Inclusion of at least one special character, e.g., ! @ #? ] Note: do not use < or > in your password, as both can cause problems in Web browsers.

Which of the following data encryption tools can be used to secure a Windows workstation?

In Windows, files and folders can be encrypted using the Windows Encrypted File System (EFS). This encryption works only with the NTFS file system and business and professional editions of Windows.

What is the output of who command?

Explanation: who command output the details of the users who are currently logged in to the system. The output includes username, terminal name (on which they are logged in), date and time of their login etc. 11.

What type of IP address remains the same until reconfigured in a device?

static IP address
A static IP address is simply an address that doesn’t change. Once your device is assigned a static IP address, that number typically stays the same until the device is decommissioned or your network architecture changes. Static IP addresses generally are used by servers or other important equipment.