Quiz: Intrusion defense in the era of Windows Vista


Quiz: Intrusion defense in the era of Windows Vista

@26777 This quiz is part of Intrusion Defense in the era of Windows Vista , a lesson in SearchSecurity.com's Intrusion Defense School.

Visit the Intrusion Defense in the era of Windows Vista lesson page for additional learning resources.

1. Windows Defender protects a computer against which types of threats?

  1. Viruses
  2. Spyware
  3. Rootkits
  4. All of the above

2. Which of the following statements about BitLocker drive encryption is true?

  1. BitLocker works with TPM hardware, but a USB key can be used as well.
  2. BitLocker requires TPM hardware only.
  3. BitLocker can be turned off by the end user.
  4. BitLocker works in conjunction with EFS.

3. How does IE7's Protected Mode work?

  1. The user is prompted before each ActiveX control is permitted to run.
  2. IE7 runs in non-privileged mode, even if the user is an administrator.
  3. IE7 utilizes User Access Control for approval of all ActiveX controls.
  4. ActiveX controls have limited file system and registry access.

4. How do Windows Vista services protect against rootkits?

  1. Kernel Patch Protection and Driver Signing, in all versions of Vista.
  2. Kernel Patch Protection and Driver Signing, but only in the 64-bit version of Vista.
  3. User Account Control.
  4. Windows Defender.

5 What is the best Vista strategy for virus protection?

  1. Windows Defender, IE7's Protected Mode and Windows Firewall.
  2. Third-party antivirus, along with Vista's other security features.
  3. Windows Defender, Windows Firewall and BitLocker drive encryption.
  4. Windows Defender and IE7's Protected Mode.

If you answered two or more questions incorrectly, revisit the materials from the lesson, Intrusion defense in the era of Windows Vista:

  • Webcast: Inside Vista's intrusion defense and antimalware capabilities
  • Tip: The keys to locking down Windows Vista User Account Control
  • Podcast: More or less: Browser security reloaded

    If you answered four or more questions correctly, return to SearchSecurity.com's Intrusion Defense School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • Email Alerts

    Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
    By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

    COMMENTS powered by Disqus  //  Commenting policy