Exam 20: Security Practices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain the Authenticated Users group.

(Essay)
4.8/5
(30)

A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

(Multiple Choice)
4.8/5
(27)

If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates,you might be able to recover the file using a(n)____ certificate.

(Multiple Choice)
4.8/5
(32)

Discuss the Anonymous users group.

(Essay)
4.8/5
(28)

Match each term with the correct statement below. -Includes the Authenticated Users group as well as the Guest account

(Multiple Choice)
4.8/5
(28)

List the steps to add a certificate to an encrypted file.

(Essay)
4.9/5
(43)

____________________shares are the folders that are shared by default on a network that administrator accounts can access.

(Short Answer)
4.7/5
(30)

Use ____ to search for malware processes,especially those that mask themselves as core Windows processes and elude AV software.

(Multiple Choice)
4.8/5
(36)

A(n)____ computer is not allowed to use the network,is put on a different network dedicated to them,or is only allowed to access certain network resources.

(Multiple Choice)
4.8/5
(36)

____ on a motherboard offers security features including power-on passwords,support for intrusion-detection devices,and support for a TPM chip.

(Multiple Choice)
4.8/5
(26)

Match each term with the correct statement below. -Permissions that are attained from a parent object

(Multiple Choice)
4.7/5
(29)

When controlling access to data folders or files,permissions to these resources are assigned to individual user accounts or user groups.

(True/False)
4.8/5
(30)

Permissions manually set for a subfolder or file cannot override inherited permissions.

(True/False)
4.8/5
(28)

If you need to change the rights of a user account to the administrator's level,use the ____________________ console and add the user to the administrators group.

(Short Answer)
4.9/5
(36)

It is necessary that all computers belong to the same workgroup in order to share resources.

(True/False)
4.8/5
(32)

If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work,try searching for suspicious entries in the subkeys under ____.

(Multiple Choice)
4.8/5
(31)

Explain why sharing all the drives on all computers is not a good security practice.

(Essay)
4.8/5
(34)

A virus is often programmed to attempt to hide from ____________________ software.

(Short Answer)
4.8/5
(26)

Describe one method that can be used to decrypt a file or folder.

(Essay)
4.9/5
(32)

Certificates are managed using the ____ console.

(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)