Exam 19: Security Essentials

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

(Multiple Choice)
4.8/5
(40)

A ____ virus can hide in either of two boot areas of a hard drive.

(Multiple Choice)
4.9/5
(33)

Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.

(Multiple Choice)
4.7/5
(33)

The International Organization for Standardization has developed two documents (____),which describe,in detail,the recommended standards to secure computer resources.

(Multiple Choice)
4.8/5
(32)

A(n)____ account has read-write access only on its own folders,read-only access to most system folders,and no access to other users' data.

(Multiple Choice)
4.7/5
(38)

A network ____ map is one of the most powerful and versatile methods of communicating over a network.

(Multiple Choice)
4.9/5
(39)

As a part of managing the security of a computer or network,your organization might make you accountable to fill out a(n)____________________ report of unusual or atypical events.

(Short Answer)
4.8/5
(37)

When you are responsible for the security of a computer or small network,make it a habit to check every computer for which you are responsible every day.

(True/False)
4.8/5
(43)

A ____ is assigned by a Certification Authority,and is used to prove you are who you say you are.

(Multiple Choice)
4.8/5
(38)

Discuss what is involved in the Plan step of the PDSA cycle.

(Essay)
4.7/5
(35)

Individuals are always free to decide what security measures they want to use.

(True/False)
4.7/5
(34)

Match each term with the correct statement below. -Malware that loads itself before the OS boot is complete

(Multiple Choice)
4.8/5
(36)

Match each term with the correct statement below. -Dormant code added to software and triggered at a predetermined time or by a predetermined event

(Multiple Choice)
4.9/5
(31)

Discuss what is involved in the Study step of the PDSA cycle.

(Essay)
4.9/5
(38)

A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

(Multiple Choice)
4.9/5
(33)

When implementing a security plan,the four steps are sometimes called the ____.

(Multiple Choice)
4.7/5
(35)

Don't use the same password on more than one system (computer,network,or application).

(True/False)
4.8/5
(32)

Match each term with the correct statement below. -Determines what an individual can do in the system

(Multiple Choice)
5.0/5
(30)

A Trojan sometimes installs a ____ in the system,which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

(Multiple Choice)
4.7/5
(34)

Match each term with the correct statement below. -Substitutes itself for a legitimate program

(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)