Book Exam Essentials Flashcards

1
Q

What is the most commonly used file system on Windows hard drives?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAT32

A

Hard drive file system that is older and quicker for smaller drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does NTFS add that FAT32 does not

A

Security, auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Location of the Recycle Bin in Windows XP

A

\RECYCLER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Location of the Recycle bin in Windows 7, Vista, above

A

$Recycle.bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jump List

A

This is a quick way to access files you’ve been working on through their association
with the application that has been using them. Right-click on the application and a
list of current files appears

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Snap

A

This is a quick way to resize windows on the Desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HomeGroup

A

This is a simplified way to set up a home network. It allows you to share
files and prevent changes from being made to those files by those sharing them (unless you
give them permission to do so).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What control panel utilities are unique to Windows 7

A

HomeGroup
RemoteApp and Desktop Connections
Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RemoteApp and Desktop Connections

A

access remote computers and virtual machines made available
over the network through port 3389. RemoteApp can be used directly to the host and can
also be used through Remote Desktop Web Access which uses HTTPS as a transport at the
client end. T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Troubleshooting control panel application

A

provide a simple interface to use to attack many common problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A custom installation results in what?

A

Either wipes the old system or replaces the existing system putting the old files into WINDOWS.OLD. Applications must be reinstalled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An upgrade installation results in what?

A

User data is migrated. Applications are migrated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bootmgr / BOOTMGR

A

A replacement for the Windows NTLDR, bootmgr is the Windows boot sequence manager first introduced in Microsoft Vista that reads the boot configuration data and displays the operating systems selection menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTLDR

A

Short for NT loader, NTLDR is a program loaded from the hard drive boot sector that displays the Microsoft Windows NT startup menu and helps Microsoft Windows NT/2000/XP load. This portion of the boot sequence was replaced by Bootmgr in Windows Vista and later versions of Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BCD

A

Boot Configuration Data (BCD) is a firmware-independent database for boot-time configuration data. It is used by Microsoft’s new Windows Boot Manager and replaces the boot.ini that was used by NTLDR.

17
Q

BCDedit.exe

A

command-line tool modifies the boot configuration data store.

18
Q

boot.ini

A

The “boot.ini” is a Microsoft initialization file found on the Microsoft Windows NT, Microsoft Windows 2000, and Microsoft Windows XP operating systems. This file is always located on the root directory of the primary hard drive. In other words, it is located at C:\ directory or the C Drive. This file is used by Microsoft Windows as a method of displaying a menu of operating systems currently on the computer and allowing the user to select what operating system to load. In addition, this file is also used to point to the locations of each of the operating systems.

19
Q

NTDETECT.COM

A

checks the system for installed
devices and device configurations and initializes the devices it finds. It passes the infor-
mation to NTLDR , which collects this information and passes it to NTOSKRNL.EXE

20
Q

NTOSKRNL.EXE

A

Windows OS kernel. The solution to a corrupted NTOSKRNL.EXE file is
to boot from a startup disk and replace the file from the setup media.

21
Q

Armored virus

A

An armored virus is designed to make itself difficult to detect or ana-
lyze. Armored viruses cover themselves with protective code that stops debuggers or
disassemblers from examining critical elements of the virus. The virus may be written
in such a way that some aspects of the programming act as a decoy to distract analysis
while the actual code hides in other areas in the program.

22
Q

Companion virus

A

attaches itself to legitimate programs and then cre-
ates a program with a different filename extension. This file may reside in your system’s
temporary directory. When a user types the name of the legitimate program, the com-
panion virus executes instead of the real program

23
Q

Macro virus

A

Programmers can expand the capability of applications such as Microsoft Word
and Excel.

24
Q

Multipartite virus

A

attacks your system in multiple ways. It may
attempt to infect your boot sector, infect all of your executable files, and destroy your
application files. The hope here is that you won’t be able to correct all the problems and
will allow the infestation to continue.`

25
Q

Phage virus

A

alters other programs and databases. The virus infects all of
these files. The only way to remove this virus is to reinstall the programs that are infected.

26
Q

Polymorphic virus

A

change form to avoid detection. The virus will attempt to hide from your antivirus software. Frequently, the virus will
encrypt parts of itself to avoid detection

27
Q

Retrovirus

A

attacks or bypasses the antivirus software installed on a computer. You can consider a retrovirus to be an anti-antivirus.

28
Q

Stealth virus

A

A stealth virus attempts to avoid detection by masking itself from applications.