Exam 28: Securing Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What tool is used to set security policies on an individual system?

Free
(Essay)
4.9/5
(39)
Correct Answer:
Verified

The Local Security Settings tool can be used to set local policies on an individual system.

Most Web sites today use _______________ to encrypt connections.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A

When you open or install new software, you must agree to abide by the use and sharing guidelines stipulated by the software copyright holder.This agreement is called the _______________ Agreement.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

End User License

What is the difference between a virus and a worm?

(Essay)
4.8/5
(30)

A(n) _______________ is the code pattern of a known virus.

(Short Answer)
4.8/5
(34)

What term describes the process of cleaning up after a virus infection?

(Multiple Choice)
4.9/5
(31)

How does a computer determine who can or should access it, and once accessed, what that user can do?

(Multiple Choice)
4.9/5
(26)

How can rogue applications (rogue anti-malware) be avoided?

(Essay)
4.9/5
(42)

The term _______________ refers to any program or code that's designed to do something on a system or a network that the user does not want done.

(Short Answer)
4.8/5
(38)

List the four interlinked topics that should be considered when implementing access control.

(Essay)
4.8/5
(30)

What is spoofing?

(Essay)
4.8/5
(42)

Describe a smart card.

(Essay)
4.9/5
(40)

Which current authentication method is typically used over a LAN?

(Multiple Choice)
4.8/5
(32)

What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?

(Multiple Choice)
4.8/5
(32)

Following someone through the door is an example of _______________.

(Short Answer)
4.7/5
(36)

Access control is the process of implementing methods to ensure unauthorized users can't access your system.Two primary methods are physical security and _______________.

(Short Answer)
4.8/5
(35)

Unsolicited e-mail is more commonly known as _______________.

(Short Answer)
4.9/5
(34)

What type of virus attempts to change its signature to prevent detection by antivirus programs?

(Multiple Choice)
4.9/5
(35)

The authentication encryption used in Windows network operating systems is _______________.

(Short Answer)
4.8/5
(31)

What is a Trojan horse?

(Essay)
5.0/5
(33)
Showing 1 - 20 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)