Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
Which tool would be used to check the parameters if a user continues to get an error message that states the password does not meet complexity requirements?
(Multiple Choice)
4.9/5
(29)
When you have a personal incident of phishing, you should report it to the FBI.
(True/False)
4.8/5
(42)
Applying operating system and application patches and updates is a good security practice.
(True/False)
4.8/5
(36)
What parameters are normally needed to configure a device or application for a proxy server?
(Multiple Choice)
4.7/5
(24)
Which security threat would be lessened by implementing a mantrap?
(Multiple Choice)
4.7/5
(36)
By making a subfolder private, it is not automatically shared when the parent folder is shared.
(True/False)
4.9/5
(38)
A virus has been detected and quarantined (but not removed). What do you do now?
(Multiple Choice)
4.8/5
(34)
Which two methods would be used to ensure corporate confidential data on a hard drive is removed before donating the hard drive to a school?
(Multiple Choice)
4.7/5
(30)
What are the two original types of authentication used in wireless network?
(Multiple Choice)
4.9/5
(26)
What security term describes scrambling data so that it cannot be read?
(Multiple Choice)
4.8/5
(27)
What part of the network is a separate network that usually contains servers that are accessed by internal and external users?
(Multiple Choice)
4.9/5
(32)
Which of the following statements are true regarding encryption?
(Multiple Choice)
4.8/5
(36)
Windows XP supports a maximum of 25 people accessing the same network share on a computer.
(True/False)
4.7/5
(36)
What technology is used in Windows Vista and 7 to encrypt an entire hard disk volume?
(Multiple Choice)
4.9/5
(35)
Which permission is a share permission on a Windows 7 computer?
(Multiple Choice)
4.9/5
(40)
A cookie is a special program written to collect information and store it on the hard drive.
(True/False)
4.8/5
(39)
Showing 41 - 60 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)