Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A fingerprint scanner is what type of device?

(Multiple Choice)
4.9/5
(23)

What type of unsolicited message type is designed to damage your computer?

(Multiple Choice)
4.7/5
(32)

Which of the following cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques?

(Multiple Choice)
4.7/5
(31)

Which technology will help Karl when he loses his cell phone (again) to prevent the person who picked up the left cell phone from viewing Karl's contact information?

(Multiple Choice)
4.9/5
(36)

What technology is also known as a hardware token?

(Multiple Choice)
4.8/5
(32)

The part of the security policy that defines who has keys to the server room is

(Multiple Choice)
4.9/5
(39)

A person with a Windows 7 Home laptop cannot connect to the other networked computers at his home? What is the most likely problem?

(Multiple Choice)
4.7/5
(32)

Which statement is true about network shares?

(Multiple Choice)
4.8/5
(27)

A program that you have never used is trying to access your computer and the Windows firewall notices it. An alert comes up, and you use the Keep Blocking This Program option so that the program is effectively blocked.

(True/False)
4.9/5
(36)

Active scripts are used so that web pages stay static and do not change except for the data entered into textboxes or customer-driven scripts.

(True/False)
4.9/5
(35)

Another name for event logging is auditing.

(True/False)
4.9/5
(35)

Keeping the documentation for a new printer so that you are prepared when a problem occurs helps build customer trust.

(True/False)
4.9/5
(25)

A Windows folder has been shared to Joe. Joe has been assigned the Full Control NTFS permission. Joe is part of a group called Staff, and the Staff users have been assigned the Modify NTFS permission to the same folder. What can Joe do to the files located in the shared folder?

(Multiple Choice)
4.8/5
(35)

The part of the security policy that defines the appropriate use of company data is

(Multiple Choice)
4.9/5
(44)

Another name for a DES card is a security token.

(True/False)
4.9/5
(41)

802.1x security standards can be applied to wireless networks.

(True/False)
4.9/5
(37)

A good password guideline is to use five characters with uppercase and lowercase letters and other characters.

(True/False)
4.7/5
(28)

If you have direct knowledge of child exploitation, you should

(Multiple Choice)
4.9/5
(37)

Match the physical device with the description. Smart card _______ Key fob _______ RFID ________ Security token _______ TPM _______ A. Used to track the location of heart monitor units B. Swipe card entry into wiring closet C. Keyless entry into an office space D. Generates a PIN to access Microsoftʹs internal network E. Chip on the motherboard for encryption

(Short Answer)
4.7/5
(43)

An RFID tag is commonly used for property security.

(True/False)
4.8/5
(37)
Showing 61 - 80 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)