Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
What type of unsolicited message type is designed to damage your computer?
(Multiple Choice)
4.7/5
(32)
Which of the following cannot be prevented through firewall, antivirus, antispyware, antigrayware, encryption, and domain authentication techniques?
(Multiple Choice)
4.7/5
(31)
Which technology will help Karl when he loses his cell phone (again) to prevent the person who picked up the left cell phone from viewing Karl's contact information?
(Multiple Choice)
4.9/5
(36)
The part of the security policy that defines who has keys to the server room is
(Multiple Choice)
4.9/5
(39)
A person with a Windows 7 Home laptop cannot connect to the other networked computers at his home? What is the most likely problem?
(Multiple Choice)
4.7/5
(32)
A program that you have never used is trying to access your computer and the Windows firewall notices it. An alert comes up, and you use the Keep Blocking This Program option so that the program is effectively blocked.
(True/False)
4.9/5
(36)
Active scripts are used so that web pages stay static and do not change except for the data entered into textboxes or customer-driven scripts.
(True/False)
4.9/5
(35)
Keeping the documentation for a new printer so that you are prepared when a problem occurs helps build customer trust.
(True/False)
4.9/5
(25)
A Windows folder has been shared to Joe. Joe has been assigned the Full Control NTFS permission. Joe is part of a group called Staff, and the Staff users have been assigned the Modify NTFS permission to the same folder. What can Joe do to the files located in the shared folder?
(Multiple Choice)
4.8/5
(35)
The part of the security policy that defines the appropriate use of company data is
(Multiple Choice)
4.9/5
(44)
A good password guideline is to use five characters with uppercase and lowercase letters and other characters.
(True/False)
4.7/5
(28)
If you have direct knowledge of child exploitation, you should
(Multiple Choice)
4.9/5
(37)
Match the physical device with the description.
Smart card _______
Key fob _______
RFID ________
Security token _______
TPM _______
A. Used to track the location of heart monitor units
B. Swipe card entry into wiring closet
C. Keyless entry into an office space
D. Generates a PIN to access Microsoftʹs internal network
E. Chip on the motherboard for encryption
(Short Answer)
4.7/5
(43)
Showing 61 - 80 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)