Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A SPAN is a special type of security network.

(True/False)
4.9/5
(35)

What network environment has centralized servers for authentication?

(Multiple Choice)
4.8/5
(40)

Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?

(Multiple Choice)
4.8/5
(36)

Antivirus and antispyware are not needed if a firewall is in place.

(True/False)
4.8/5
(26)

A proxy server acts as an agent between a Web browser and a real server.

(True/False)
4.7/5
(41)

A retinal scanner is a type of physical security device.

(True/False)
4.8/5
(35)

In which scenario would a rootkit be used?

(Multiple Choice)
4.9/5
(32)

What should you do if someone is looking over your shoulder as you log onto your computer?

(Multiple Choice)
4.8/5
(36)

What command enables viewing open firewall ports?

(Multiple Choice)
4.7/5
(41)

A person cannot change the web browser to her favorite gaming site. Instead, the web browser goes to a particular website that the user does not want to see. What type of program caused this issue?

(Multiple Choice)
4.7/5
(39)

You can encrypt someone elseʹs files for a different user.

(True/False)
4.9/5
(29)

Grayware is a generic term for application or files that affect the computerʹs performance and cause it to act unusual.

(True/False)
4.7/5
(35)

A folder has both NTFS and shared folder permissions applied. What is the result of this action?

(Multiple Choice)
4.8/5
(34)

What Windows XP control panel can be used so the computer cannot be seen through My Network Places?

(Multiple Choice)
4.9/5
(39)

Which of the following cannot help when dealing with an irate customer?

(Multiple Choice)
4.9/5
(33)

A home wireless access point has been recently installed. The technician created an SSID, installed WPA2 with a passphrase, and configured DHCP pool information. What else is needed before attaching the Windows 7 wireless client?

(Multiple Choice)
4.9/5
(32)

What technology is used to add hardware to protect laptops?

(Multiple Choice)
4.9/5
(30)

You access a movie someone sends you a link through email. Now, email spam is rampant. This is an example of _______.

(Multiple Choice)
4.9/5
(34)

What technology could be used to locate lost pets?

(Multiple Choice)
4.8/5
(31)

What is SSID broadcasting?

(Multiple Choice)
5.0/5
(32)
Showing 81 - 100 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)