CIT-1112 (2,12-16)

Last update by Cynthia on 06/04/2013
389296 People have viewed this Quiz
  • Share

When you share folders on the network, the ____ permissions for remote users need to be set.

Answer:
share

View CIT-1112 (2,12-16) as Flashcard Deck

Related Quiz Content
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Allowing users full control of a folder is always required by job requirements.

    False
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.

    Effective Permissions
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file.

    simple
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    You can recognize a program as a counterfeit process if it’s not running under System, Local Service, or ____.

    Network Service
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.

    True
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

    user
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.

    HKLM\System\CurrentControlSet\Control\SafeBoot
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    The term ____ applies to a kit or set of tools used originally on UNIX computers.

    rootkit
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box.

    \\computername\Financial$
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate.

    recovery
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    ____ support requires more interaction with customers than any other type of PC support.

    Phone
CIT 1112  2 12 16
CIT-1112 (2,12-16)
Total Views: 389296
“A+ Guide to Managing and Maintaining Your PC” by Jean Andrews Seventh Edition, ISBN 13-978-1-4354-9778-8 2. An addendum to the text entitled “Supporting Windows 7” by Jean Andrews. ISBN 13-978-1-111-31707-2
Teams This Deck Belongs To
Deck does not belong to any team.