Exam 18: Security Strategies
Exam 1: First Look at Computer Parts and Tools41 Questions
Exam 2: Working Inside a Computer41 Questions
Exam 3: Introducing Windows Operating Systems37 Questions
Exam 4: All About Motherboards41 Questions
Exam 5: Supporting Processors and Upgrading Memory41 Questions
Exam 6: Supporting Hard Drives41 Questions
Exam 7: Installing Windows37 Questions
Exam 8: Supporting Io and Storage Devices41 Questions
Exam 9: Satisfying Customer Needs41 Questions
Exam 10: Maintaining Windows37 Questions
Exam 11: Optimizing Windows37 Questions
Exam 12: Troubleshooting Windows and Applications37 Questions
Exam 13: Troubleshooting Hardware Problems41 Questions
Exam 14: Troubleshooting Windows Startup Problems37 Questions
Exam 15: Connecting to and Setting up a Network37 Questions
Exam 16: Networking Types, Devices, and Cabling41 Questions
Exam 17: Windows Resources on a Network37 Questions
Exam 18: Security Strategies37 Questions
Exam 19: Supporting Notebooks41 Questions
Exam 20: Mobile Devices and Client-Side Virtualization37 Questions
Exam 21: Supporting Printers41 Questions
Select questions type
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
(True/False)
5.0/5
(35)
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
(Multiple Choice)
4.9/5
(34)
An RFID badge is related to which type of authentication method?
(Multiple Choice)
5.0/5
(34)
With respect to the default users and password settings, how can you use Group Policy to make your system more secure?
(Essay)
4.9/5
(37)
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
(Multiple Choice)
4.8/5
(34)
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
(Essay)
4.9/5
(41)
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
(Multiple Choice)
4.7/5
(44)
The best protection against attacks is ________________ protection, for example when multiple firewalls protect the network's computers.
(Short Answer)
4.9/5
(38)
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
(Multiple Choice)
4.9/5
(31)
On a peer-to-peer network, authentication is the responsibility of the domain.
(True/False)
5.0/5
(36)
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
(Multiple Choice)
4.7/5
(43)
Under what circumstances can a blank password be more secure than a non-blank password?
(Essay)
4.7/5
(34)
Describe file and folder encryption in Windows (not how you encrypt a file).
(Essay)
4.7/5
(36)
Showing 21 - 37 of 37
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)