Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which tool would be used to check the parameters if a user continues to get an error message that states the password does not meet complexity requirements?

(Multiple Choice)
4.9/5
(29)

When you have a personal incident of phishing, you should report it to the FBI.

(True/False)
4.8/5
(42)

What is the difference between 40-bit and 64-bit WEP?

(Multiple Choice)
4.8/5
(35)

Applying operating system and application patches and updates is a good security practice.

(True/False)
4.8/5
(36)

What parameters are normally needed to configure a device or application for a proxy server?

(Multiple Choice)
4.7/5
(24)

Which security threat would be lessened by implementing a mantrap?

(Multiple Choice)
4.7/5
(36)

What command enables you to access the Windows firewall?

(Multiple Choice)
4.8/5
(32)

By making a subfolder private, it is not automatically shared when the parent folder is shared.

(True/False)
4.9/5
(38)

A virus has been detected and quarantined (but not removed). What do you do now?

(Multiple Choice)
4.8/5
(34)

Which two methods would be used to ensure corporate confidential data on a hard drive is removed before donating the hard drive to a school?

(Multiple Choice)
4.7/5
(30)

What are the two original types of authentication used in wireless network?

(Multiple Choice)
4.9/5
(26)

What security term describes scrambling data so that it cannot be read?

(Multiple Choice)
4.8/5
(27)

TKIP and AES improve WEP encryption.

(True/False)
4.8/5
(35)

What part of the network is a separate network that usually contains servers that are accessed by internal and external users?

(Multiple Choice)
4.9/5
(32)

Which of the following statements are true regarding encryption?

(Multiple Choice)
4.8/5
(36)

Windows XP supports a maximum of 25 people accessing the same network share on a computer.

(True/False)
4.7/5
(36)

What technology is used in Windows Vista and 7 to encrypt an entire hard disk volume?

(Multiple Choice)
4.9/5
(35)

A firewall is a hardware device, not software.

(True/False)
4.8/5
(36)

Which permission is a share permission on a Windows 7 computer?

(Multiple Choice)
4.9/5
(40)

A cookie is a special program written to collect information and store it on the hard drive.

(True/False)
4.8/5
(39)
Showing 41 - 60 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)