Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The iOS Settings > General option is used to set a passcode lock.

(True/False)
4.9/5
(37)

Phishing is controlled by using S/MIME.

(True/False)
4.7/5
(28)

If you have direct knowledge of organized software piracy, you should notify

(Multiple Choice)
4.9/5
(31)

An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?

(Multiple Choice)
4.9/5
(31)

What encryption is used with wireless networks?

(Multiple Choice)
4.8/5
(37)

What is the minimum number of characters a password should be?

(Multiple Choice)
4.9/5
(32)

A remote lock would most likely be used on a netbook.

(True/False)
4.8/5
(41)

What type of scripts are Internet programs to make a web page dynamic?

(Multiple Choice)
4.8/5
(30)

What security term describes a program written to collect information and store it on the hard drive?

(Multiple Choice)
4.8/5
(36)

PGP or S/MIME is used to protect email.

(True/False)
4.7/5
(28)

The Ctrl+Alt+Del keys can be used to lock your Windows workstation.

(True/False)
4.7/5
(41)

40-bit WEP and 64-bit WEP are the same thing.

(True/False)
4.7/5
(33)

A new file is created and stored in an encrypted folder. The file must be manually encrypted because it was added after the folder was encrypted.

(True/False)
4.8/5
(41)

When you have a personal incident of child exploitation, you should report it to the FBI.

(True/False)
4.8/5
(34)

Which technique provides more security for the clients on a wireless network?

(Multiple Choice)
4.8/5
(26)

Encryption is scrambling data so that it cannot be recognized.

(True/False)
4.9/5
(28)

The part of the security policy that defines what company resources can be accessed from home is

(Multiple Choice)
4.8/5
(34)

A _______ is a document that provides rules and guidelines for security.

(Multiple Choice)
4.9/5
(40)

When WEP is configured on the access point, all wireless clients must use WEP.

(True/False)
4.9/5
(33)

What is the purpose of WPAD?

(Multiple Choice)
4.9/5
(30)
Showing 21 - 40 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)