Exam 18: Security Strategies
Exam 1: First Look at Computer Parts and Tools50 Questions
Exam 2: Working Inside Desktops and Laptops50 Questions
Exam 3: All About Motherboards50 Questions
Exam 4: Supporting Processors and Upgrading Memory50 Questions
Exam 5: Supporting the Power System and Troubleshooting Computers50 Questions
Exam 6: Supporting Hard Drives and Other Storage Devices51 Questions
Exam 7: Survey of Windows Features and Support Tools50 Questions
Exam 8: Installing Windows50 Questions
Exam 9: Supporting I/O Devices50 Questions
Exam 10: Maintaining Windows50 Questions
Exam 11: Optimizing Windows50 Questions
Exam 12: Supporting Customers and Troubleshooting Windows50 Questions
Exam 13: Troubleshooting Windows Startup50 Questions
Exam 14: Connecting To and Setting Up a Network50 Questions
Exam 15: Supporting Network Hardware50 Questions
Exam 16: Supporting Mobile Operating Systems49 Questions
Exam 17: Windows Resources on a Network50 Questions
Exam 18: Security Strategies50 Questions
Exam 19: Supporting Printers and Customizing a System50 Questions
Exam 20: Virtualization, Linux, and Mac OS X50 Questions
Select questions type
Under what circumstances can a blank password be more secure than a non-blank password?
(Essay)
4.8/5
(50)
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
(Multiple Choice)
4.8/5
(38)
Matching
Match each item with a statement below.
- a code used to identify and authenticate a person or organization sending data over a network
(Multiple Choice)
4.8/5
(40)
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?
(Multiple Choice)
4.9/5
(36)
What keystroke should you press to get a logon window if you don't use the welcome screen?
(Multiple Choice)
4.8/5
(39)
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?
(Multiple Choice)
4.8/5
(33)
When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)
(Multiple Choice)
4.8/5
(31)
What statement is true regarding the Guest account in Windows 7?
(Multiple Choice)
4.8/5
(33)
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
(Multiple Choice)
4.9/5
(32)
Using a PIN or password in addition to TPM is an example of what type of authentication?
(Multiple Choice)
4.7/5
(42)
What are the risks in using BitLocker to secure your system and how can you mitigate these risks?
(Essay)
4.7/5
(37)
What does the presence of the Cydia app on an iOS device indicate?
(Multiple Choice)
4.9/5
(28)
Matching
Match each item with a statement below.
- the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
(Multiple Choice)
4.9/5
(35)
What technology can be used to locate a device such as a laptop after it has been stolen?
(Multiple Choice)
4.8/5
(40)
Matching
Match each item with a statement below.
- type of spyware that tracks your keystrokes, including passwords
(Multiple Choice)
4.7/5
(46)
A person that secretly peaks at your monitor screen while you work may be doing what?
(Multiple Choice)
4.8/5
(44)
Matching
Match each item with a statement below.
- when someone who is unauthorized follows the employee through a secured entrance to a room or building
(Multiple Choice)
4.9/5
(43)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)