Exam 20: Security Practices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each term with the correct statement below. -Includes all user accounts that can access the system except the Guest account

(Multiple Choice)
4.8/5
(31)

A $ at the end of the folder name creates a(n)____ share.

(Multiple Choice)
4.8/5
(41)

List the two methods used by antirootkit software to remove rootkits after they are installed.

(Essay)
4.8/5
(35)

Match each term with the correct statement below. -Designed to do varying degrees of damage to data and software,although it does not damage PC hardware

(Multiple Choice)
5.0/5
(22)

A(n)____________________ running in kernel mode actually interferes with the Windows kernel and substitutes its own information in place of the raw data read by the Windows kernel.

(Short Answer)
4.7/5
(34)

Allowing users full control of a folder is always required by job requirements.

(True/False)
4.9/5
(38)

Discuss encrypting files and folders.

(Essay)
4.7/5
(28)

Match each term with the correct statement below. -Is when permissions are passed from parent to child

(Multiple Choice)
4.8/5
(26)

To know for sure exactly which permissions for a file or folder are in effect,see the ____ tab of the Advanced Security Settings box.

(Multiple Choice)
4.7/5
(33)

Discuss how to get the best results when scanning for rootkits.

(Essay)
4.8/5
(37)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)