Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
An email that comes from what appears to be your own bank, but actually is not, is an example of spyware.
(True/False)
4.9/5
(37)
A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?
(Multiple Choice)
4.7/5
(37)
What security breach occurs when an unauthorized person follows an authorized person through a security door?
(Multiple Choice)
4.7/5
(31)
Which option secures a wireless access point the most for a Windows 7 client?
(Multiple Choice)
4.8/5
(34)
What statement is true regarding a firewall on a computer that attaches to the network wirelessly? Note that the wireless network connects to the wired network for Internet access.
(Multiple Choice)
4.7/5
(38)
An application is not working properly, and you suspect a firewall issue. No dialog box has appeared. What Windows Firewall tab enables you to create a rule to allow the application to run?
(Multiple Choice)
4.9/5
(38)
What is the maximum number of simultaneous users that can access a Windows 7 share?
(Multiple Choice)
5.0/5
(28)
Technology that enables you to create a tunnel from one network device to another over the Internet is:
(Multiple Choice)
4.8/5
(39)
What is the best way to protect against data loss on a stolen Windows 7 personal laptop?
(Multiple Choice)
4.9/5
(35)
Port forwarding on a home router must be enabled for port 3389 for a technician to access a Windows 7 home computer using Remote Desktop.
(True/False)
4.9/5
(40)
A special laptop feature that enables a lock or alarm to be attached is known as a PC Card.
(True/False)
4.9/5
(36)
What is the most likely problem if the Windows Firewall is turned off (disabled) every time the computer restarts?
(Multiple Choice)
4.9/5
(26)
Which of the following is an example of social engineering?
(Multiple Choice)
4.8/5
(40)
After installing a free antivirus program from the Internet, the Windows 7 computer has tons of pop-ups that appear. So many pop-ups are apparent that the computer cannot be used. The application
(Multiple Choice)
4.9/5
(38)
Showing 101 - 120 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)