Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
What network environment has centralized servers for authentication?
(Multiple Choice)
4.8/5
(40)
Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
(Multiple Choice)
4.8/5
(36)
Antivirus and antispyware are not needed if a firewall is in place.
(True/False)
4.8/5
(26)
A proxy server acts as an agent between a Web browser and a real server.
(True/False)
4.7/5
(41)
What should you do if someone is looking over your shoulder as you log onto your computer?
(Multiple Choice)
4.8/5
(36)
A person cannot change the web browser to her favorite gaming site. Instead, the web browser goes to a particular website that the user does not want to see. What type of program caused this issue?
(Multiple Choice)
4.7/5
(39)
Grayware is a generic term for application or files that affect the computerʹs performance and cause it to act unusual.
(True/False)
4.7/5
(35)
A folder has both NTFS and shared folder permissions applied. What is the result of this action?
(Multiple Choice)
4.8/5
(34)
What Windows XP control panel can be used so the computer cannot be seen through My Network Places?
(Multiple Choice)
4.9/5
(39)
Which of the following cannot help when dealing with an irate customer?
(Multiple Choice)
4.9/5
(33)
A home wireless access point has been recently installed. The technician created an SSID, installed WPA2 with a passphrase, and configured DHCP pool information. What else is needed before attaching the Windows 7 wireless client?
(Multiple Choice)
4.9/5
(32)
What technology is used to add hardware to protect laptops?
(Multiple Choice)
4.9/5
(30)
You access a movie someone sends you a link through email. Now, email spam is rampant. This is an example of _______.
(Multiple Choice)
4.9/5
(34)
Showing 81 - 100 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)