Exam 28: Securing Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_______________ reduce the viewing angle of a monitor, making it impossible for anyone to read the screen except those directly in front of it.

(Short Answer)
4.9/5
(33)

To lock down security settings on an individual system on a network, what would you use?

(Multiple Choice)
4.9/5
(31)

A(n) _______________ is a program that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.

(Short Answer)
4.7/5
(30)

What is a polymorph virus?

(Essay)
4.9/5
(30)

What is a common LAN authentication protocol used today?

(Essay)
4.7/5
(39)

How does an anti-virus program act as a sword (i.e., in active seek-and-destroy mode) in protecting a PC?

(Essay)
4.8/5
(34)

Microsoft's encryption method of choice for a WAN is _______________.

(Multiple Choice)
4.9/5
(34)

Boot sector viruses that use various methods to hide from antivirus software are known as _______________ viruses.

(Short Answer)
4.9/5
(36)

Physical security, authentication, users and groups, and security policies are all aspects of _______________.

(Multiple Choice)
4.7/5
(33)

What are the benefits of incidence reporting?

(Essay)
4.7/5
(30)

What is a botnet?

(Essay)
4.7/5
(38)

Unwanted, unknown, or unplanned file downloads are called _______________ downloads.

(Short Answer)
4.9/5
(37)

A user has a credit card-sized card used to prove her identity with a PIN.What is this card called?

(Multiple Choice)
4.9/5
(37)

What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?

(Multiple Choice)
4.7/5
(31)

Define malware and list some types of malware.

(Essay)
4.9/5
(27)

What is contained in a digital certificate?

(Essay)
4.9/5
(40)

What activity involves simply observing someone's screen or keyboard to get information, often passwords?

(Multiple Choice)
4.9/5
(37)

A digital certificate is signed by a trusted _______________ that guarantees that the public key you are about to get is actually from the Web server and not from some evil person trying to pretend to be the Web server.

(Short Answer)
4.9/5
(39)

What is a form of authentication where a user must use two or more factors to prove his or her identity?

(Short Answer)
4.9/5
(40)

A hardware firewall _______________.

(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)