Exam 18: Security Strategies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

 Under what circumstances can a blank password be more secure than a non-blank password?

(Essay)
4.8/5
(50)

 CryptoLocker is an example of what type of malware?

(Multiple Choice)
4.9/5
(46)

 What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

(Multiple Choice)
4.8/5
(38)

Matching Match each item with a statement below. - a code used to identify and authenticate a person or organization sending data over a network

(Multiple Choice)
4.8/5
(40)

 When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

(Multiple Choice)
4.9/5
(36)

 What keystroke should you press to get a logon window if you don't use the welcome screen?

(Multiple Choice)
4.8/5
(39)

 What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software?

(Multiple Choice)
4.8/5
(33)

 When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.)

(Multiple Choice)
4.8/5
(31)

 What statement is true regarding the Guest account in Windows 7?

(Multiple Choice)
4.8/5
(33)

 You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

(Multiple Choice)
4.9/5
(32)

 List five of the different criteria that make up a secure password?

(Essay)
4.8/5
(37)

 Using a PIN or password in addition to TPM is an example of what type of authentication?

(Multiple Choice)
4.7/5
(42)

 What are the risks in using BitLocker to secure your system and how can you mitigate these risks?

(Essay)
4.7/5
(37)

 What does the presence of the Cydia app on an iOS device indicate?

(Multiple Choice)
4.9/5
(28)

Matching Match each item with a statement below. - the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer

(Multiple Choice)
4.9/5
(35)

 What technology can be used to locate a device such as a laptop after it has been stolen?

(Multiple Choice)
4.8/5
(40)

Matching Match each item with a statement below. - type of spyware that tracks your keystrokes, including passwords

(Multiple Choice)
4.7/5
(46)

 If you wish to monitor logon failures, what should you do?

(Essay)
4.8/5
(38)

 A person that secretly peaks at your monitor screen while you work may be doing what?

(Multiple Choice)
4.8/5
(44)

Matching Match each item with a statement below. - when someone who is unauthorized follows the employee through a secured entrance to a room or building

(Multiple Choice)
4.9/5
(43)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)