Exam 18: Security Strategies
Exam 1: First Look at Computer Parts and Tools41 Questions
Exam 2: Working Inside a Computer41 Questions
Exam 3: Introducing Windows Operating Systems37 Questions
Exam 4: All About Motherboards41 Questions
Exam 5: Supporting Processors and Upgrading Memory41 Questions
Exam 6: Supporting Hard Drives41 Questions
Exam 7: Installing Windows37 Questions
Exam 8: Supporting Io and Storage Devices41 Questions
Exam 9: Satisfying Customer Needs41 Questions
Exam 10: Maintaining Windows37 Questions
Exam 11: Optimizing Windows37 Questions
Exam 12: Troubleshooting Windows and Applications37 Questions
Exam 13: Troubleshooting Hardware Problems41 Questions
Exam 14: Troubleshooting Windows Startup Problems37 Questions
Exam 15: Connecting to and Setting up a Network37 Questions
Exam 16: Networking Types, Devices, and Cabling41 Questions
Exam 17: Windows Resources on a Network37 Questions
Exam 18: Security Strategies37 Questions
Exam 19: Supporting Notebooks41 Questions
Exam 20: Mobile Devices and Client-Side Virtualization37 Questions
Exam 21: Supporting Printers41 Questions
Select questions type
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
C
Which type of malware hides in the MBR program of a hard drive?
Free
(Multiple Choice)
5.0/5
(26)
Correct Answer:
A
It's usually a good idea to run several anti-malware programs at the same time on your computer.
Free
(True/False)
4.8/5
(29)
Correct Answer:
False
Which of the following is true about the Windows Encrypted File System?
(Multiple Choice)
4.8/5
(26)
Which of the following is true about the Guest account in Windows 7?
(Multiple Choice)
4.9/5
(36)
Using Group Policy, you can set security policies to help secure a workstation.
(True/False)
4.8/5
(29)
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
(Multiple Choice)
4.9/5
(42)
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
(Multiple Choice)
4.9/5
(41)
What keystroke should you press to get a logon window if you don't use the welcome screen?
(Multiple Choice)
5.0/5
(38)
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
(True/False)
4.8/5
(37)
There are eight criteria for creating a strong password. List five of them.
(Essay)
4.9/5
(25)
Windows _______________ is antispyware included in Windows 7\Vista.
(Short Answer)
4.8/5
(36)
To prevent spread of malware, an infected computer should be ____________ by disconnecting it from the wired or wireless network.
(Short Answer)
4.8/5
(29)
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
(Essay)
4.8/5
(36)
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network.
(Short Answer)
4.8/5
(29)
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
(Multiple Choice)
4.9/5
(37)
To keep a system secure from tailgating, users need to practice the habit of ___________ their workstation when they step away from their desks.
(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 37
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)