Exam 15: Computer and Network Security
Exam 1: Introduction to Computer Repair163 Questions
Exam 2: On the Motherboard230 Questions
Exam 3: System Configuration121 Questions
Exam 4: Disassembly and Power180 Questions
Exam 5: Logical Troubleshooting81 Questions
Exam 6: Memory124 Questions
Exam 7: Storage Devices223 Questions
Exam 8: Multimedia Devices141 Questions
Exam 9: Other Peripherals245 Questions
Exam 10: Computing Design90 Questions
Exam 11: Basic Operating Systems187 Questions
Exam 12: Windows Xp, Vista, and 7140 Questions
Exam 13: Internet Connectivity101 Questions
Exam 14: Introduction to Networking219 Questions
Exam 15: Computer and Network Security132 Questions
Select questions type
Where could you see the people who have logged onto a computer in the past 48 hours?
(Multiple Choice)
4.8/5
(44)
What are the three possible Windows 7 network location settings shown when you configure Windows Firewall?
(Multiple Choice)
4.9/5
(35)
Why are words such as monkey, smile, and freedom not good to use as passwords?
(Multiple Choice)
4.7/5
(41)
A lot of email comes to you from xxxpharmacy.com. This is an example of
(Multiple Choice)
4.8/5
(27)
Which file system enables administrators to assign permissions to control access to network resources including encryption?
(Multiple Choice)
4.9/5
(33)
In a Windows domain environment, the userid and password are created, stored, and maintained on a centralized server.
(True/False)
4.9/5
(36)
What security term describes logging keystrokes to obtain passwords?
(Multiple Choice)
4.9/5
(38)
What security term defines what resources can be accessed and used?
(Multiple Choice)
4.7/5
(37)
To protect data so it cannot be easily read, what technology is used?
(Multiple Choice)
4.8/5
(35)
Showing 121 - 132 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)