Exam 18: Security Strategies
Exam 1: First Look at Computer Parts and Tools50 Questions
Exam 2: Working Inside Desktops and Laptops50 Questions
Exam 3: All About Motherboards50 Questions
Exam 4: Supporting Processors and Upgrading Memory50 Questions
Exam 5: Supporting the Power System and Troubleshooting Computers50 Questions
Exam 6: Supporting Hard Drives and Other Storage Devices51 Questions
Exam 7: Survey of Windows Features and Support Tools50 Questions
Exam 8: Installing Windows50 Questions
Exam 9: Supporting I/O Devices50 Questions
Exam 10: Maintaining Windows50 Questions
Exam 11: Optimizing Windows50 Questions
Exam 12: Supporting Customers and Troubleshooting Windows50 Questions
Exam 13: Troubleshooting Windows Startup50 Questions
Exam 14: Connecting To and Setting Up a Network50 Questions
Exam 15: Supporting Network Hardware50 Questions
Exam 16: Supporting Mobile Operating Systems49 Questions
Exam 17: Windows Resources on a Network50 Questions
Exam 18: Security Strategies50 Questions
Exam 19: Supporting Printers and Customizing a System50 Questions
Exam 20: Virtualization, Linux, and Mac OS X50 Questions
Select questions type
Matching
Match each item with a statement below.
- A type of malware that tricks you into opening it by substituting itself for a legitimate program
(Multiple Choice)
4.9/5
(30)
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
(Multiple Choice)
4.9/5
(39)
Matching
Match each item with a statement below.
-an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
(Multiple Choice)
4.8/5
(43)
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?
(Multiple Choice)
4.8/5
(30)
On a peer-to-peer network, authentication is the responsibility of the domain.
(True/False)
4.7/5
(39)
Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
(Essay)
4.9/5
(47)
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
(True/False)
4.8/5
(37)
Matching
Match each item with a statement below.
- A program that is potentially harmful or potentially unwanted
(Multiple Choice)
4.8/5
(27)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)