Exam 20: Security Practices
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.
(Multiple Choice)
4.8/5
(27)
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates,you might be able to recover the file using a(n)____ certificate.
(Multiple Choice)
4.8/5
(32)
Match each term with the correct statement below.
-Includes the Authenticated Users group as well as the Guest account
(Multiple Choice)
4.8/5
(28)
____________________shares are the folders that are shared by default on a network that administrator accounts can access.
(Short Answer)
4.7/5
(30)
Use ____ to search for malware processes,especially those that mask themselves as core Windows processes and elude AV software.
(Multiple Choice)
4.8/5
(36)
A(n)____ computer is not allowed to use the network,is put on a different network dedicated to them,or is only allowed to access certain network resources.
(Multiple Choice)
4.8/5
(36)
____ on a motherboard offers security features including power-on passwords,support for intrusion-detection devices,and support for a TPM chip.
(Multiple Choice)
4.8/5
(26)
Match each term with the correct statement below.
-Permissions that are attained from a parent object
(Multiple Choice)
4.7/5
(29)
When controlling access to data folders or files,permissions to these resources are assigned to individual user accounts or user groups.
(True/False)
4.8/5
(30)
Permissions manually set for a subfolder or file cannot override inherited permissions.
(True/False)
4.8/5
(28)
If you need to change the rights of a user account to the administrator's level,use the ____________________ console and add the user to the administrators group.
(Short Answer)
4.9/5
(36)
It is necessary that all computers belong to the same workgroup in order to share resources.
(True/False)
4.8/5
(32)
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work,try searching for suspicious entries in the subkeys under ____.
(Multiple Choice)
4.8/5
(31)
Explain why sharing all the drives on all computers is not a good security practice.
(Essay)
4.8/5
(34)
A virus is often programmed to attempt to hide from ____________________ software.
(Short Answer)
4.8/5
(26)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)