Exam 20: Security Practices
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
Match each term with the correct statement below.
-Includes all user accounts that can access the system except the Guest account
(Multiple Choice)
4.8/5
(31)
List the two methods used by antirootkit software to remove rootkits after they are installed.
(Essay)
4.8/5
(35)
Match each term with the correct statement below.
-Designed to do varying degrees of damage to data and software,although it does not damage PC hardware
(Multiple Choice)
5.0/5
(22)
A(n)____________________ running in kernel mode actually interferes with the Windows kernel and substitutes its own information in place of the raw data read by the Windows kernel.
(Short Answer)
4.7/5
(34)
Allowing users full control of a folder is always required by job requirements.
(True/False)
4.9/5
(38)
Match each term with the correct statement below.
-Is when permissions are passed from parent to child
(Multiple Choice)
4.8/5
(26)
To know for sure exactly which permissions for a file or folder are in effect,see the ____ tab of the Advanced Security Settings box.
(Multiple Choice)
4.7/5
(33)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)