Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
What are the two most likely causes for Windows 7 -based devices to frequently disconnect from a newly installed home wireless network?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A, B
A benefit of electronic key cards is that they are cheaper than keys.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
B
Sara has access to a shared folder. Sara has been issued the Change permission. What can Sara do to files in the folder?
(Multiple Choice)
4.7/5
(31)
What type of userid and password is kept on a Windows XP computer?
(Multiple Choice)
4.9/5
(41)
Which Windows 7 control panel is used to configure the firewall?
(Multiple Choice)
4.8/5
(33)
Authentication is the part of the operating system that determines what resources can be accessed and used across the network.
(True/False)
4.7/5
(28)
An interactive game uses ports 26000 to 26050 for connecting to other players. A chat client for this game uses port 56. What security feature would you configure on the firewall that whenever ports 26000 to 26050 are being used, port 56 is also allowed through the firewall for the same duration of time as the higher numbered ports?
(Multiple Choice)
4.8/5
(34)
SSID broadcasting is when an access point sends out its WEP key to all wireless clients through the air. Those clients attached to the access point are allowed to transmit data.
(True/False)
4.9/5
(36)
What is the best way to protect against data loss on a stolen Windows 7 business laptop?
(Multiple Choice)
4.9/5
(39)
Keeping the File and Print Sharing enabled even if nothing is being shared on a computer is a good idea so that updates can be applied to this portion of the operating system in case they are ever reenabled.
(True/False)
4.9/5
(42)
Match the security policy element with the description.
Physical access _______
Antivirus ________
Acceptable use _______
Password _______
Email usage _________
Remote access _______
Emergency procedures ______
A. Everyone has the H: dive virtual storage to access at work.
B. Eight characters required with at least one special character.
C. The Infrastructure AVP will travel to the redundant site at the direction of the CIO.
D. Citrix must be used to access employee records from home.
E. Only security, network staff, and PC support have keys to the wiring closets.
F. Outlook storage is 2GB maximum.
G. Software to prevent the MBR from being changed must be updated whenever the PC attaches to the network or Internet.
(Short Answer)
4.8/5
(32)
Showing 1 - 20 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)