Exam 28: Securing Computers
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
What tool is used to set security policies on an individual system?
Free
(Essay)
4.9/5
(39)
Correct Answer:
The Local Security Settings tool can be used to set local policies on an individual system.
Most Web sites today use _______________ to encrypt connections.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
When you open or install new software, you must agree to abide by the use and sharing guidelines stipulated by the software copyright holder.This agreement is called the _______________ Agreement.
Free
(Short Answer)
4.9/5
(38)
Correct Answer:
End User License
What term describes the process of cleaning up after a virus infection?
(Multiple Choice)
4.9/5
(31)
How does a computer determine who can or should access it, and once accessed, what that user can do?
(Multiple Choice)
4.9/5
(26)
The term _______________ refers to any program or code that's designed to do something on a system or a network that the user does not want done.
(Short Answer)
4.8/5
(38)
List the four interlinked topics that should be considered when implementing access control.
(Essay)
4.8/5
(30)
Which current authentication method is typically used over a LAN?
(Multiple Choice)
4.8/5
(32)
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
(Multiple Choice)
4.8/5
(32)
Following someone through the door is an example of _______________.
(Short Answer)
4.7/5
(36)
Access control is the process of implementing methods to ensure unauthorized users can't access your system.Two primary methods are physical security and _______________.
(Short Answer)
4.8/5
(35)
What type of virus attempts to change its signature to prevent detection by antivirus programs?
(Multiple Choice)
4.9/5
(35)
The authentication encryption used in Windows network operating systems is _______________.
(Short Answer)
4.8/5
(31)
Showing 1 - 20 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)