Exam 20: Security Practices
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
The ____ command can be used to encrypt,decrypt,or recover an encrypted file when the certificates are lost.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
The best way to change inherited permissions is to change the permissions of the ____.
Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
C
To see a list of services managed by Svchost,enter this command in a command-prompt window: ____.
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
C
You can recognize a program as a counterfeit process if it's not running under System,Local Service,or ____.
(Multiple Choice)
4.8/5
(32)
Match each term with the correct statement below.
-A program that uses unusually complex methods to hide itself on a system,and many spyware and adware programs are also rootkits
(Multiple Choice)
4.9/5
(35)
Windows XP uses ____ file sharing by default,which means you have no control over who has access to a shared folder or file.
(Multiple Choice)
4.8/5
(33)
List three methods for protecting a system against malicious software.
(Essay)
4.7/5
(36)
If an infected computer will not boot,it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted.
(True/False)
4.8/5
(34)
When you share folders on the network,the ____ permissions for remote users need to be set.
(Multiple Choice)
4.9/5
(36)
Match each term with the correct statement below.
-Folders on a computer that are shared with others on the network using a folder's Properties box
(Multiple Choice)
4.7/5
(38)
In UNIX,the lowest and most powerful level of UNIX accounts is called the ____ account.
(Multiple Choice)
4.9/5
(36)
For a stand-alone computer that is not part of a Windows domain,the EFS encrypting process generates a ____ digital certificate to be used for the encryption.
(Multiple Choice)
4.9/5
(37)
If you name a shared folder Financial$,in order to access the folder,a user must enter ____ in the Vista Start Search box.
(Multiple Choice)
4.9/5
(40)
Match each term with the correct statement below.
-Stored on the hard drive so that it will still control access to the drive in the event the drive is removed from the computer and installed in another system
(Multiple Choice)
4.7/5
(32)
Discuss the methods to deal with infected or damaged boot sectors or corrupted BIOS code.
(Essay)
4.8/5
(35)
Many notebook computers have a chip on the motherboard called the ____.
(Multiple Choice)
4.7/5
(38)
AV software detects a known virus by looking for distinguishing characteristics called ____ signatures.
(Multiple Choice)
4.7/5
(34)
A(n)____________________ is placed in a special directory and cannot be opened.
(Short Answer)
4.7/5
(34)
Match each term with the correct statement below.
-Those users who have not been authenticated on a remote computer
(Multiple Choice)
4.9/5
(26)
The term ____ applies to a kit or set of tools used originally on UNIX computers.
(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)