Exam 19: Security Essentials
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
As a defensive and offensive measure to protect against malicious software,install and run ____ software and keep it current.
(Multiple Choice)
5.0/5
(33)
Match each term with the correct statement below.
-A type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
(Multiple Choice)
4.9/5
(28)
A(n)____________________ virus is a virus that hides in a script,which might execute when you click a link on a Web page or in an HTML e-mail message or when you attempt to open an e-mail attachment.
(Short Answer)
5.0/5
(41)
List and describe four rules that can help you use the Internet responsibility.
(Essay)
4.9/5
(35)
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
(Multiple Choice)
4.8/5
(39)
A(n)____ account has complete access to the system and can make changes that affect the security of the system and other users.
(Multiple Choice)
4.8/5
(33)
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
(Multiple Choice)
4.9/5
(42)
In the computer arena,____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
(Multiple Choice)
4.8/5
(22)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)