Test Answers on Windows 7 configuration

Unlock all answers in this set

Unlock answers
question
A protocol that provides for the encription of data tranmitted using the Internet.
answer
SSL
question
A wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism.
answer
program compatibility troubleshooter
question
specialized program collects compatibility inforomation for web pages and web based applications
answer
internet explore compatibility test tool
question
Group policy settings that enable administrators to specify the programs that are allowed to run on workstations by creating rules of various types.
answer
software restriction policies
question
A collection of compatibility fixes.
answer
compatibility mode
question
A feature in Internet Explorer 8 that enables the browser to properly display web pages designed to older standards.
answer
compatibility view
question
IE 8 feature that enables surfing the Internet without leaving any record of your activities
answer
inprivate filtering
question
when using ssl communications the public key is stored here
answer
digital certificate
question
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
answer
social engineering
question
Software Restriction policies and AppLocker are configured through __________.
answer
group policies
question
A feature of Internet Explorer that divides the addresses accessible with the web browser into different security zones, each of which has a different set of privileges.
answer
security zones
question
Which security zone used in Internet Explorer and usually used by local Web sites does not run in protected mode and has significant access to the system, including the ability to run certain scripts?
answer
local intranet
question
Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog?
answer
accelerators
question
A new feature in Windows 7 and Windows Server 2008 R2, and it is the replacement for Software Restriction Policies. Allows you to configure a Denied list and an Accepted list for Applications. Applications that are configured on the Denied list will not run on the system, whereas applications on the Accepted list will operate properly.
answer
applocker
question
which security zone used in internet explorer is used for all web sites that are not listed in the other three zones
answer
internet
question
you open internet options in internet explore 8.0 which tab do you use to enable or disable the pop up blocker
answer
privàcy
question
used in internet explore and is a text file that contains information about you and your web surfing habits that a web site maintains on your computer
answer
cookie
question
A software component that sits between an application and the operating system.
answer
shim
question
A means of pushing frequently changing content to internet subscribers
answer
rss feeds
question
The process of ensuring that a program or application written for a previous Windows operating system will function properly within Windows 7.
answer
application compatibility
question
trusted service, whether software or commercial,that issues digital certificates to other entities
answer
CA
question
A collection of programs that enables administrators to gather information about incompatibilities between specific applications and Windows 7, and create customized solutions that enable those applications to run.
answer
Application Compatibility Toolkit (ACT)
question
a secure communication method that requires two encryption keys a public one and a private one
answer
PKI
question
A free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native Windows XP application.
answer
windows xp mode
question
An operational state that is designed to prevent attackers that do penetrate the computer's defenses from accessing vital system components.
answer
protected mode
question
can provide an interface between browser and another software product or between the browser and a specific set on the internet
answer
addons
question
An identity theft tool that appears in the form of an E-mail or pop-up message; usually looks like it's from a legitimate financial institution and prompts you to provide your personal information in order to fix a "problem" with your account.
answer
phishing
question
Which security zone used in Internet Explorer provides the most elevated set of privileges?
answer
trusted sites
question
The combination of permissions affecting a security principal's access to a protected resource, whether derived from explicit permission assignments, permission inheritance, or group memberships.
answer
effective permissions
question
control access to the files and folders stored on disk volumes formatted with the NTFS file system. you must have the appropriate permissions to access a file whether on the local system or over a network.
answer
NTFS permissions
question
virtualized folders enable users to access files from different locations as if they were all in the same place
answer
libraries
question
which ntfs permission allows you to take ownership of a folder on a ntfs volume
answer
full control
question
permissions that run downward through hierarchy
answer
inheritance
question
A computer or stand-alone device that receives print jobs from clients and sends them to print devices that are either locally attached or connected over a network
answer
print server
question
device driver that converts the print jobs generated by applications into a string of commands for a specific print device.
answer
print driver
question
Printer Control Language. A common language used by printers to describe how a page is printed.,
answer
PCL
question
permission is the minnimum that allows you to add files to a shared folder
answer
change
question
a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device
answer
printer driver
question
The combination of allow permissions and deny permissions that a security principal receives for a given system element.
answer
effective permissions
question
an individual permission assignment in an access control list consisting of a security principle and the specific permissions assigned to that security principal
answer
ACE
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New