Create an account
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups.
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost.
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file.
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
The best way to change inherited permissions is to change the permissions of the ____.
Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.
If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box.
A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources.
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate.
To see a list of services managed by Svchost, enter this command in a command-prompt window: ____.
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together