Exam 28: Securing Computers
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
A(n) _______________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.
(Short Answer)
4.8/5
(28)
Antimalware programs can passively monitor your computer's activity.What are they called when operating in this mode?
(Multiple Choice)
4.8/5
(37)
In a(n) _______________ attach, an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems.
(Short Answer)
4.8/5
(38)
Security _______________ are devices that store some unique information that the user carries on his or her person.
(Short Answer)
4.8/5
(25)
What has occurred when a user accesses resources in an unauthorized way?
(Multiple Choice)
4.7/5
(35)
What encryption mechanism can be used for WAN connections (such as T1s and Metro Ethernet) and VPNs?
(Essay)
4.7/5
(35)
What is the difference between a man-in-the-middle (MITM) attack and session hijacking?
(Essay)
4.7/5
(34)
A(n) _______________ is an attack on a vulnerability that wasn't already known to software developers.
(Short Answer)
4.8/5
(31)
Some free anti-malware applications are actually malware and are commonly referred to as _______________.
(Short Answer)
4.9/5
(36)
A device that can prove who you are based on your fingerprint is known as a(n) _______________ device.
(Short Answer)
4.7/5
(36)
What can be used to create entries in the Security Log whenever a user logs on?
(Multiple Choice)
4.8/5
(33)
Those who configure permissions to accounts must follow the principle of _______________.
(Short Answer)
4.8/5
(28)
_______________ is a form of malware that encrypts all the data it can get access to on a system, and then asks for money to decrypt your data.
(Short Answer)
4.9/5
(28)
The list of virus signatures that your antivirus program can recognize is called the _______________.
(Short Answer)
4.8/5
(28)
Showing 61 - 80 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)