Exam 28: Securing Computers
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
The scrambling code used to attempt to modify a(n) _______________ virus to prevent detection is actually used as the signature to detect the virus.
(Short Answer)
4.8/5
(35)
Not all __________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.
(Short Answer)
4.8/5
(35)
The tool used to set local policies on an individual system is _______________.
(Short Answer)
5.0/5
(34)
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
(Multiple Choice)
4.8/5
(30)
What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?
(Multiple Choice)
4.9/5
(40)
A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a(n) _______________.
(Short Answer)
4.7/5
(40)
Surprise browser windows that appear automatically when you visit a Web site are known as _______________.
(Short Answer)
4.8/5
(40)
A common _______________ attack is where an attacker uses the telephone and convinces a user to give up secure information.
(Short Answer)
4.8/5
(40)
Most computer attacks are accomplished through what type of attack?
(Multiple Choice)
4.9/5
(30)
The tool used to apply policy settings to multiple computers in an Active Directory domain is _______________.
(Short Answer)
4.9/5
(39)
What tool allows a computer to determine a user's identity with the most authority?
(Multiple Choice)
4.9/5
(46)
What can be used to set security policies for users or computers in a network?
(Essay)
4.8/5
(26)
Showing 21 - 40 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)