Exam 19: Security Essentials
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
(Multiple Choice)
4.8/5
(40)
A ____ virus can hide in either of two boot areas of a hard drive.
(Multiple Choice)
4.9/5
(33)
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.
(Multiple Choice)
4.7/5
(33)
The International Organization for Standardization has developed two documents (____),which describe,in detail,the recommended standards to secure computer resources.
(Multiple Choice)
4.8/5
(32)
A(n)____ account has read-write access only on its own folders,read-only access to most system folders,and no access to other users' data.
(Multiple Choice)
4.7/5
(38)
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
(Multiple Choice)
4.9/5
(39)
As a part of managing the security of a computer or network,your organization might make you accountable to fill out a(n)____________________ report of unusual or atypical events.
(Short Answer)
4.8/5
(37)
When you are responsible for the security of a computer or small network,make it a habit to check every computer for which you are responsible every day.
(True/False)
4.8/5
(43)
A ____ is assigned by a Certification Authority,and is used to prove you are who you say you are.
(Multiple Choice)
4.8/5
(38)
Individuals are always free to decide what security measures they want to use.
(True/False)
4.7/5
(34)
Match each term with the correct statement below.
-Malware that loads itself before the OS boot is complete
(Multiple Choice)
4.8/5
(36)
Match each term with the correct statement below.
-Dormant code added to software and triggered at a predetermined time or by a predetermined event
(Multiple Choice)
4.9/5
(31)
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
(Multiple Choice)
4.9/5
(33)
When implementing a security plan,the four steps are sometimes called the ____.
(Multiple Choice)
4.7/5
(35)
Don't use the same password on more than one system (computer,network,or application).
(True/False)
4.8/5
(32)
Match each term with the correct statement below.
-Determines what an individual can do in the system
(Multiple Choice)
5.0/5
(30)
A Trojan sometimes installs a ____ in the system,which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
(Multiple Choice)
4.7/5
(34)
Match each term with the correct statement below.
-Substitutes itself for a legitimate program
(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)