Exam 18: Security Strategies

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching Match each item with a statement below. - A type of malware that tricks you into opening it by substituting itself for a legitimate program

(Multiple Choice)
4.9/5
(30)

 One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

(Multiple Choice)
4.9/5
(39)

Matching Match each item with a statement below. -an infestation designed to copy itself repeatedly to memory, on drive space, or on a network

(Multiple Choice)
4.8/5
(43)

 Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

(Multiple Choice)
4.8/5
(30)

 On a peer-to-peer network, authentication is the responsibility of the domain.

(True/False)
4.7/5
(39)

 Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.

(Essay)
4.9/5
(47)

 What is a rootkit and why is it so difficult to detect?

(Essay)
4.8/5
(31)

 Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.

(True/False)
4.8/5
(37)

Matching Match each item with a statement below. - A program that is potentially harmful or potentially unwanted

(Multiple Choice)
4.8/5
(27)

 What command can be used to take full access of a file?

(Multiple Choice)
4.8/5
(35)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)