answersLogoWhite

0


Best Answer

Chapter 19

1.) Kerberos

2.) /

3.) Virus=A program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run. Most of the time a system file or a program that you use occasionally. Logic Bomb=Dormant code added to software and triggered at a predetermined time or by a predetermined event. Trojan horse=Does not need a host program to work; rather, it substitutes itself for a legit program. Likely to introduce one or more Viruses into your system. Sometimes called downloaders. Worm=Program that copies itself throughout a network or the internet without a host program. Creates problems by overloading the network as it replicates. Damaging just by their presence. Overloads memory or hard drive space by replicating repeatedly.

4.) A virus can hide in a boot sector, in a executable program, in a macro, in a script that hides when you click on a link on the web page, in a HTML e-mail message or when you open a e-mail attachmen

5.) Use antivirus software and firewall

6.) By checking web sites that track virus hoaxes before sending the e-mail on.

7.) No. It hides in the boot sector program of a hard drive or floppy disk or in the master boot program in the Master Boot Record (MBR).

8.) simple file sharing

9.) A virus is normally acquired as part of a file or program.

10.) Spybot S&D, Microsoft Security Essentials, SUPER Antispyware.

11.) Normal viruses don't run in safe mode.

12.) Event Viewer is used to view log on with a standalone computer or a computer in a workgroup, but Windows firewallis used to view log on in a network.

13.) HKLM\System\CurrentControlSet\Control\Safeboot is the registry key that keeps this information

14.) It looks for distinguishing characteristics called virus signatures

15.) Regedit

16.) C:\System Volume Information\_ Restore folder

17.) Turn off System Restore, reboot the computer, and turn System Restore back on.

18.) The software looks for running processes that don't match up with the underlying program filename, and the software compares files, registry entries, and processes provided by the OS to the list it generates from the raw data.

19.) Rootkit revealer and backlight

20.) Because there are probably updates that are not included on the installation disk, so there will be viruses, etc. that will not be detected.

21.) Users are less likely to be tricked by a virus masquerading as pictures or web link

22.) might cause Task Manager to display a different name for this process

23.) Spyware is software that installs itself on your computer to spy on you, Adware produces all those unwanted popup ads. It is secretly installed when you download and install shareware or freeware.

24.) wscript.exe

25.) any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability

26.) Backup utility for Home Edition is not included by default. It must be installed manually. Go to \VALUEADD\MSFT\NTBACKUP and double-click the Ntbackup.msi.

27.) Fire Fox

28.) Windows Live Mail and Hotmail by Microsoft Eudora by QUALCOMM and thunderbird by Mozilla

29.) .js, .jse, .vbe, .vbs, and .wsf

30.) Because Internet Explorer is the most popular browser so people send malware to it more often than other lesser popular browsers

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the answers to chapter 19 for a plus guide to managing and maintainging your PC?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the answers to chapter 12 for a plus guide to hardware?

They can be found by reading Chapter 12


What website is chapter 7 study guide for content mastery answers are on?

moonians.webs.com


A plus Guide to Hardware fourth edition chapter summary answers?

aa


Where can you find answers to civics and economics chapter 9 study guide?

Internet


What are the answers to chapter 2 review for A Guide to Managing and Maintaining your PC seventh edition?

Stop trying to cheat your way through school. When the real world hits you, you will be knocked off your feet by not doing very much in school.


Chapter 17 answers guide to maintaining PC?

If you have a look at the back of the book that has Chapter 17 questions you should be able to find the answers guide. If you want to learn more than anyone else it is best to answer as many questions for yourself before you look up the answers


Where are the answers for chapter 7 reviewing the basics of the comptia a plus guide to hardware?

in the book


What are the answers to Howard Zinn chapter 2 study guide questions?

Read the book


What actors and actresses appeared in A Guide to Managing Diabetes - 2007?

The cast of A Guide to Managing Diabetes - 2007 includes: Carol Guber as Herself - Spokesperson


What key on the keyboard prevents autoplay from starting?

According to Chapter 8, page 507 of "A+ Guide To Managing and Maintaining Your PC, 7th Edition", the SHIFT KEY is pressed to prevent autoplay.


What are the answers to guide to Microsoft office 2007 Chapter 2?

Which security feature in Windows 7 prevents malware by limiting user privelege levels


Lord of the Flies chapter 1 short answer study guide questions?

Answers for In Lord Of The Flies Chapter 3 At The Beginning where are all the boys