Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
The iOS Settings > General option is used to set a passcode lock.
(True/False)
4.9/5
(37)
If you have direct knowledge of organized software piracy, you should notify
(Multiple Choice)
4.9/5
(31)
An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?
(Multiple Choice)
4.9/5
(31)
What is the minimum number of characters a password should be?
(Multiple Choice)
4.9/5
(32)
What type of scripts are Internet programs to make a web page dynamic?
(Multiple Choice)
4.8/5
(30)
What security term describes a program written to collect information and store it on the hard drive?
(Multiple Choice)
4.8/5
(36)
The Ctrl+Alt+Del keys can be used to lock your Windows workstation.
(True/False)
4.7/5
(41)
A new file is created and stored in an encrypted folder. The file must be manually encrypted because it was added after the folder was encrypted.
(True/False)
4.8/5
(41)
When you have a personal incident of child exploitation, you should report it to the FBI.
(True/False)
4.8/5
(34)
Which technique provides more security for the clients on a wireless network?
(Multiple Choice)
4.8/5
(26)
The part of the security policy that defines what company resources can be accessed from home is
(Multiple Choice)
4.8/5
(34)
A _______ is a document that provides rules and guidelines for security.
(Multiple Choice)
4.9/5
(40)
When WEP is configured on the access point, all wireless clients must use WEP.
(True/False)
4.9/5
(33)
Showing 21 - 40 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)