Exam 28: Securing Computers
Exam 1: The Path of the PC Tech30 Questions
Exam 2: Operational Procedures48 Questions
Exam 3: The Visible Computer104 Questions
Exam 4: Microprocessors150 Questions
Exam 5: Ram148 Questions
Exam 6: Bios130 Questions
Exam 7: Motherboards94 Questions
Exam 8: Power Supplies120 Questions
Exam 9: Hard Drive Technologies99 Questions
Exam 10: Implementing Hard Drives106 Questions
Exam 11: Essential Peripherals100 Questions
Exam 12: Building a PC101 Questions
Exam 13: Windows Under the Hood113 Questions
Exam 14: Users, Groups, and Permissions120 Questions
Exam 15: Maintaining and Optimizing Operating Systems100 Questions
Exam 16: Working With the Command-Line Interface119 Questions
Exam 17: Troubleshooting Operating Systems107 Questions
Exam 18: Virtualization90 Questions
Exam 19: Display Technologies100 Questions
Exam 20: Essentials of Networking114 Questions
Exam 21: Local Area Networking90 Questions
Exam 22: Wireless Networking105 Questions
Exam 23: The Internet100 Questions
Exam 24: Portable Computing101 Questions
Exam 25: Understanding Mobile Devices100 Questions
Exam 26: Care and Feeding of Mobile Devices100 Questions
Exam 27: Printers and Multifunction Devices120 Questions
Exam 28: Securing Computers89 Questions
Select questions type
A hacker who goes through the garbage looking for information is engaging in _______________.
(Multiple Choice)
4.7/5
(46)
Classic _______________ (a form of malware) often sneaks onto systems by being bundled with legitimate software.
(Short Answer)
4.8/5
(34)
Sally is a member of multiple groups.A file has been granted different permissions to these different groups.What is Sally's effective permission?
(Multiple Choice)
4.8/5
(41)
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?
(Multiple Choice)
4.7/5
(36)
Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a(n) _____________.
(Multiple Choice)
4.9/5
(29)
Many security appliances include a context-based set of rules called _______________ to help companies avoid accidental leakage of data.
(Short Answer)
4.8/5
(40)
When configured to do so, Windows will create an entry in the Security Log when someone tries to access a certain file or folder-this is called _______________ auditing.
(Short Answer)
4.9/5
(31)
Showing 81 - 89 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)