Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An email that comes from what appears to be your own bank, but actually is not, is an example of spyware.

(True/False)
4.9/5
(37)

A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?

(Multiple Choice)
4.7/5
(37)

Adware would show up as one or more pop-ups on a computer.

(True/False)
4.8/5
(25)

What security breach occurs when an unauthorized person follows an authorized person through a security door?

(Multiple Choice)
4.7/5
(31)

Another name for event logging is

(Multiple Choice)
4.7/5
(28)

A firewall cannot protect a wireless network.

(True/False)
4.8/5
(35)

Which option secures a wireless access point the most for a Windows 7 client?

(Multiple Choice)
4.8/5
(34)

What statement is true regarding a firewall on a computer that attaches to the network wirelessly? Note that the wireless network connects to the wired network for Internet access.

(Multiple Choice)
4.7/5
(38)

An application is not working properly, and you suspect a firewall issue. No dialog box has appeared. What Windows Firewall tab enables you to create a rule to allow the application to run?

(Multiple Choice)
4.9/5
(38)

What is the maximum number of simultaneous users that can access a Windows 7 share?

(Multiple Choice)
5.0/5
(28)

Technology that enables you to create a tunnel from one network device to another over the Internet is:

(Multiple Choice)
4.8/5
(39)

What is the best way to protect against data loss on a stolen Windows 7 personal laptop?

(Multiple Choice)
4.9/5
(35)

Mobile devices do not need antivirus software.

(True/False)
4.9/5
(34)

Port forwarding on a home router must be enabled for port 3389 for a technician to access a Windows 7 home computer using Remote Desktop.

(True/False)
4.9/5
(40)

A special laptop feature that enables a lock or alarm to be attached is known as a PC Card.

(True/False)
4.9/5
(36)

WEP is a type of wireless authentication technique.

(True/False)
4.8/5
(44)

What is the most likely problem if the Windows Firewall is turned off (disabled) every time the computer restarts?

(Multiple Choice)
4.9/5
(26)

Which of the following is an example of social engineering?

(Multiple Choice)
4.8/5
(40)

After installing a free antivirus program from the Internet, the Windows 7 computer has tons of pop-ups that appear. So many pop-ups are apparent that the computer cannot be used. The application

(Multiple Choice)
4.9/5
(38)

Which password would be most secure?

(Multiple Choice)
5.0/5
(27)
Showing 101 - 120 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)