Exam 19: Security Essentials

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Internet Explorer includes the pop-up blocker,the ability to manage add-ons,the ability to block scripts and disable scripts embedded in Web pages,and the ability to set the general security level.

Free
(True/False)
4.7/5
(35)
Correct Answer:
Verified

True

For the health care industry,the ____ includes regulations to secure patient data that apply to all health care companies and professionals.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

D

Explain the purpose of authorization.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

Authorization determines what an individual can do in the system after he or she is authenticated.The rights or privileges assigned to an individual depend on how the individual is classified.Classifications are based on job needs.A user should be allowed the rights he needs to do his job.Other rights should not be available to him.For Windows,these classifications are generally implemented in two ways: Assigning rights to user accounts or user groups and assigning permissions to data folders and files.

Most encryption software products use a method called ____.

(Multiple Choice)
4.9/5
(46)

It's best to use three-factor authentication.

(True/False)
4.8/5
(31)

A(n)____________________ is a program that replicates by attaching itself to other programs.

(Short Answer)
5.0/5
(45)

Generally speaking,the weakest link in setting up security in a computer environment is ____.

(Multiple Choice)
4.9/5
(36)

Describe what adware is.

(Essay)
4.7/5
(35)

Explain a drive lock password.

(Essay)
4.8/5
(32)

____________________ is the default authentication protocol used by Windows Vista/XP.

(Short Answer)
4.8/5
(43)

Match each term with the correct statement below. -Proves that an individual is who he says he is and is accomplished by a variety of techniques

(Multiple Choice)
4.8/5
(35)

Match each term with the correct statement below. -Junk e-mail that you don't want,you didn't ask for,and that gets in your way

(Multiple Choice)
4.9/5
(36)

Match each term with the correct statement below. -The most common viruses spread by e-mail

(Multiple Choice)
4.8/5
(35)

Match each term with the correct statement below. -Hides in an executable program having an .exe,.com,.sys,.vbs,or other executable file extension,or in a word-processing document that contains a macro

(Multiple Choice)
4.8/5
(29)

Because of the problem of losing encrypted data and Internet passwords when a user password is reset,each new user should create a password ____ disk for use in the event the user forgets the password.

(Multiple Choice)
4.8/5
(30)

Explain the purpose of authentication.

(Essay)
4.8/5
(46)

A ____ is made of several words with spaces allowed.

(Multiple Choice)
4.8/5
(40)

List three ways to lock down your workstation each time you step away from your desk.

(Essay)
4.9/5
(35)

____ is any annoying and unwanted program that might or might not mean you harm.

(Multiple Choice)
4.9/5
(42)

As part of the authentication process,rather than proving a person is in possession of a token,some systems are set to use ____________________ data to validate the person's physical body.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)