Exam 28: Securing Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A hacker who goes through the garbage looking for information is engaging in _______________.

(Multiple Choice)
4.7/5
(46)

What does Stateful Packet Inspection (SPI) involve?

(Essay)
4.9/5
(39)

Classic _______________ (a form of malware) often sneaks onto systems by being bundled with legitimate software.

(Short Answer)
4.8/5
(34)

Sally is a member of multiple groups.A file has been granted different permissions to these different groups.What is Sally's effective permission?

(Multiple Choice)
4.8/5
(41)

What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS settings)?

(Multiple Choice)
4.7/5
(36)

What is the correct humidity range for computer equipment?

(Multiple Choice)
4.9/5
(33)

Port forwarding enables you to open a port in a firewall and direct incoming traffic on that port to a(n) _____________.

(Multiple Choice)
4.9/5
(29)

Many security appliances include a context-based set of rules called _______________ to help companies avoid accidental leakage of data.

(Short Answer)
4.8/5
(40)

When configured to do so, Windows will create an entry in the Security Log when someone tries to access a certain file or folder-this is called _______________ auditing.

(Short Answer)
4.9/5
(31)
Showing 81 - 89 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)