Exam 18: Security Strategies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

C

Which type of malware hides in the MBR program of a hard drive?

Free
(Multiple Choice)
5.0/5
(26)
Correct Answer:
Verified

A

It's usually a good idea to run several anti-malware programs at the same time on your computer.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

False

Which of the following is true about the Windows Encrypted File System?

(Multiple Choice)
4.8/5
(26)

Describe Windows Firewall.

(Essay)
4.9/5
(28)

Which of the following is true about the Guest account in Windows 7?

(Multiple Choice)
4.9/5
(36)

Using Group Policy, you can set security policies to help secure a workstation.

(True/False)
4.8/5
(29)

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

(Multiple Choice)
4.9/5
(42)

If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?

(Multiple Choice)
4.9/5
(41)

What keystroke should you press to get a logon window if you don't use the welcome screen?

(Multiple Choice)
5.0/5
(38)

A privacy filter is used for what aspect of security?

(Multiple Choice)
4.8/5
(28)

After initially installing Windows 7, you need to disable the Guest account so nobody can use it.

(True/False)
4.8/5
(37)

There are eight criteria for creating a strong password. List five of them.

(Essay)
4.9/5
(25)

Windows _______________ is antispyware included in Windows 7\Vista.

(Short Answer)
4.8/5
(36)

To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network.

(Short Answer)
4.8/5
(29)

What are the risks in using BitLocker to secure your system and how can you mitigate these risks?

(Essay)
4.8/5
(36)

The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.

(Short Answer)
4.8/5
(29)

Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?

(Multiple Choice)
4.9/5
(37)

To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.

(Short Answer)
4.8/5
(38)

What is a rootkit and why is it so difficult to detect?

(Essay)
4.8/5
(36)
Showing 1 - 20 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)