News

Quiz: Intrusion defense in the era of Windows Vista

@26777 This quiz is part of Intrusion Defense in the era of Windows Vista , a lesson in SearchSecurity.com's Intrusion Defense School.

Visit the Intrusion Defense in the era of Windows Vista lesson page for additional learning resources.

1. Windows Defender protects a computer against which types of threats?

  1. Viruses
  2. Spyware
  3. Rootkits
  4. All of the above

2. Which of the following statements about BitLocker drive encryption is true?

  1. BitLocker works with TPM hardware, but a USB key can be used as well.
  2. BitLocker requires TPM hardware only.
  3. BitLocker can be turned off by the end user.
  4. BitLocker works in conjunction with EFS.

3. How does IE7's Protected Mode work?

  1. The user is prompted before each ActiveX control is permitted to run.
  2. IE7 runs in non-privileged mode, even if the user is an administrator.
  3. IE7 utilizes User Access Control for approval of all ActiveX controls.
  4. ActiveX controls have limited file system and registry access.

4. How do Windows Vista services protect against rootkits?

  1. Kernel Patch Protection and Driver Signing, in all versions of Vista.
  2. Kernel Patch Protection and Driver Signing, but only in the 64-bit version of Vista.
  3. User Account Control.
  4. Windows Defender.

5 What is the best Vista strategy for virus protection?

  1. Windows Defender, IE7's Protected Mode and Windows Firewall.
  2. Third-party antivirus, along with Vista's other security features.
  3. Windows Defender, Windows Firewall and BitLocker drive encryption.
  4. Windows Defender and IE7's Protected Mode.

If you answered two or more questions incorrectly, revisit the materials from the lesson, Intrusion defense in the era of Windows Vista:

  • Webcast: Inside Vista's intrusion defense and antimalware capabilities
  • Tip: The keys to locking down Windows Vista User Account Control
  • Podcast: More or less: Browser security reloaded

    If you answered four or more questions correctly, return to SearchSecurity.com's Intrusion Defense School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.


  • Email Alerts

    Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
     

    COMMENTS powered by Disqus  //  Commenting policy