Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the two most likely causes for Windows 7 -based devices to frequently disconnect from a newly installed home wireless network?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A, B

A benefit of electronic key cards is that they are cheaper than keys.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

B

Sara has access to a shared folder. Sara has been issued the Change permission. What can Sara do to files in the folder?

(Multiple Choice)
4.7/5
(31)

What Windows feature enables file and folder encryption?

(Multiple Choice)
4.9/5
(29)

What command enables access to view the local policy?

(Multiple Choice)
4.8/5
(35)

What type of userid and password is kept on a Windows XP computer?

(Multiple Choice)
4.9/5
(41)

Which wireless security procedure is least effective?

(Multiple Choice)
4.9/5
(42)

Which Windows 7 control panel is used to configure the firewall?

(Multiple Choice)
4.8/5
(33)

Authentication is the part of the operating system that determines what resources can be accessed and used across the network.

(True/False)
4.7/5
(28)

If you have a phishing incident, you should report it to

(Multiple Choice)
4.8/5
(23)

An interactive game uses ports 26000 to 26050 for connecting to other players. A chat client for this game uses port 56. What security feature would you configure on the firewall that whenever ports 26000 to 26050 are being used, port 56 is also allowed through the firewall for the same duration of time as the higher numbered ports?

(Multiple Choice)
4.8/5
(34)

What is an alternative to room keys for better security?

(Multiple Choice)
4.7/5
(39)

SSID broadcasting is when an access point sends out its WEP key to all wireless clients through the air. Those clients attached to the access point are allowed to transmit data.

(True/False)
4.9/5
(36)

A security policy is a policy written and recommended by IEEE.

(True/False)
4.7/5
(38)

What is the best way to protect against data loss on a stolen Windows 7 business laptop?

(Multiple Choice)
4.9/5
(39)

Vista does not support private folders.

(True/False)
4.8/5
(29)

Keeping the File and Print Sharing enabled even if nothing is being shared on a computer is a good idea so that updates can be applied to this portion of the operating system in case they are ever reenabled.

(True/False)
4.9/5
(42)

What character(s) are used to hide a folder?

(Multiple Choice)
4.8/5
(46)

Match the security policy element with the description. Physical access _______ Antivirus ________ Acceptable use _______ Password _______ Email usage _________ Remote access _______ Emergency procedures ______ A. Everyone has the H: dive virtual storage to access at work. B. Eight characters required with at least one special character. C. The Infrastructure AVP will travel to the redundant site at the direction of the CIO. D. Citrix must be used to access employee records from home. E. Only security, network staff, and PC support have keys to the wiring closets. F. Outlook storage is 2GB maximum. G. Software to prevent the MBR from being changed must be updated whenever the PC attaches to the network or Internet.

(Short Answer)
4.8/5
(32)
Showing 1 - 20 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)