Exam 28: Securing Computers
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
_______________ reduce the viewing angle of a monitor, making it impossible for anyone to read the screen except those directly in front of it.
(Short Answer)
4.9/5
(33)
To lock down security settings on an individual system on a network, what would you use?
(Multiple Choice)
4.9/5
(31)
A(n) _______________ is a program that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.
(Short Answer)
4.7/5
(30)
How does an anti-virus program act as a sword (i.e., in active seek-and-destroy mode) in protecting a PC?
(Essay)
4.8/5
(34)
Microsoft's encryption method of choice for a WAN is _______________.
(Multiple Choice)
4.9/5
(34)
Boot sector viruses that use various methods to hide from antivirus software are known as _______________ viruses.
(Short Answer)
4.9/5
(36)
Physical security, authentication, users and groups, and security policies are all aspects of _______________.
(Multiple Choice)
4.7/5
(33)
Unwanted, unknown, or unplanned file downloads are called _______________ downloads.
(Short Answer)
4.9/5
(37)
A user has a credit card-sized card used to prove her identity with a PIN.What is this card called?
(Multiple Choice)
4.9/5
(37)
What is the act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically?
(Multiple Choice)
4.7/5
(31)
What activity involves simply observing someone's screen or keyboard to get information, often passwords?
(Multiple Choice)
4.9/5
(37)
A digital certificate is signed by a trusted _______________ that guarantees that the public key you are about to get is actually from the Web server and not from some evil person trying to pretend to be the Web server.
(Short Answer)
4.9/5
(39)
What is a form of authentication where a user must use two or more factors to prove his or her identity?
(Short Answer)
4.9/5
(40)
Showing 41 - 60 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)