Exam 20: Security Practices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ command can be used to encrypt,decrypt,or recover an encrypted file when the certificates are lost.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

The best way to change inherited permissions is to change the permissions of the ____.

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

C

To see a list of services managed by Svchost,enter this command in a command-prompt window: ____.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

C

You can recognize a program as a counterfeit process if it's not running under System,Local Service,or ____.

(Multiple Choice)
4.8/5
(32)

Match each term with the correct statement below. -A program that uses unusually complex methods to hide itself on a system,and many spyware and adware programs are also rootkits

(Multiple Choice)
4.9/5
(35)

Windows XP uses ____ file sharing by default,which means you have no control over who has access to a shared folder or file.

(Multiple Choice)
4.8/5
(33)

List three methods for protecting a system against malicious software.

(Essay)
4.7/5
(36)

If an infected computer will not boot,it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.

(True/False)
4.8/5
(34)

When you share folders on the network,the ____ permissions for remote users need to be set.

(Multiple Choice)
4.9/5
(36)

Match each term with the correct statement below. -Folders on a computer that are shared with others on the network using a folder's Properties box

(Multiple Choice)
4.7/5
(38)

In UNIX,the lowest and most powerful level of UNIX accounts is called the ____ account.

(Multiple Choice)
4.9/5
(36)

For a stand-alone computer that is not part of a Windows domain,the EFS encrypting process generates a ____ digital certificate to be used for the encryption.

(Multiple Choice)
4.9/5
(37)

If you name a shared folder Financial$,in order to access the folder,a user must enter ____ in the Vista Start Search box.

(Multiple Choice)
4.9/5
(40)

Match each term with the correct statement below. -Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system

(Multiple Choice)
4.7/5
(32)

Discuss the methods to deal with infected or damaged boot sectors or corrupted BIOS code.

(Essay)
4.8/5
(35)

Many notebook computers have a chip on the motherboard called the ____.

(Multiple Choice)
4.7/5
(38)

AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.

(Multiple Choice)
4.7/5
(34)

A(n)____________________ is placed in a special directory and cannot be opened.

(Short Answer)
4.7/5
(34)

Match each term with the correct statement below. -Those users who have not been authenticated on a remote computer

(Multiple Choice)
4.9/5
(26)

The term ____ applies to a kit or set of tools used originally on UNIX computers.

(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)