Exam 19: Security Essentials
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
Internet Explorer includes the pop-up blocker,the ability to manage add-ons,the ability to block scripts and disable scripts embedded in Web pages,and the ability to set the general security level.
Free
(True/False)
4.7/5
(35)
Correct Answer:
True
For the health care industry,the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
D
Explain the purpose of authorization.
Free
(Essay)
4.9/5
(33)
Correct Answer:
Authorization determines what an individual can do in the system after he or she is authenticated.The rights or privileges assigned to an individual depend on how the individual is classified.Classifications are based on job needs.A user should be allowed the rights he needs to do his job.Other rights should not be available to him.For Windows,these classifications are generally implemented in two ways: Assigning rights to user accounts or user groups and assigning permissions to data folders and files.
A(n)____________________ is a program that replicates by attaching itself to other programs.
(Short Answer)
5.0/5
(45)
Generally speaking,the weakest link in setting up security in a computer environment is ____.
(Multiple Choice)
4.9/5
(36)
____________________ is the default authentication protocol used by Windows Vista/XP.
(Short Answer)
4.8/5
(43)
Match each term with the correct statement below.
-Proves that an individual is who he says he is and is accomplished by a variety of techniques
(Multiple Choice)
4.8/5
(35)
Match each term with the correct statement below.
-Junk e-mail that you don't want,you didn't ask for,and that gets in your way
(Multiple Choice)
4.9/5
(36)
Match each term with the correct statement below.
-The most common viruses spread by e-mail
(Multiple Choice)
4.8/5
(35)
Match each term with the correct statement below.
-Hides in an executable program having an .exe,.com,.sys,.vbs,or other executable file extension,or in a word-processing document that contains a macro
(Multiple Choice)
4.8/5
(29)
Because of the problem of losing encrypted data and Internet passwords when a user password is reset,each new user should create a password ____ disk for use in the event the user forgets the password.
(Multiple Choice)
4.8/5
(30)
List three ways to lock down your workstation each time you step away from your desk.
(Essay)
4.9/5
(35)
____ is any annoying and unwanted program that might or might not mean you harm.
(Multiple Choice)
4.9/5
(42)
As part of the authentication process,rather than proving a person is in possession of a token,some systems are set to use ____________________ data to validate the person's physical body.
(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)