Exam 15: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What keystrokes are used to lock a Windows computer?

(Multiple Choice)
4.9/5
(36)

Where could you see the people who have logged onto a computer in the past 48 hours?

(Multiple Choice)
4.8/5
(44)

What are the three possible Windows 7 network location settings shown when you configure Windows Firewall?

(Multiple Choice)
4.9/5
(35)

Why are words such as monkey, smile, and freedom not good to use as passwords?

(Multiple Choice)
4.7/5
(41)

A lot of email comes to you from xxxpharmacy.com. This is an example of

(Multiple Choice)
4.8/5
(27)

Which file system enables administrators to assign permissions to control access to network resources including encryption?

(Multiple Choice)
4.9/5
(33)

In a Windows domain environment, the userid and password are created, stored, and maintained on a centralized server.

(True/False)
4.9/5
(36)

You can build customer trust by being honest.

(True/False)
4.9/5
(39)

What security term describes logging keystrokes to obtain passwords?

(Multiple Choice)
4.9/5
(38)

What security term defines what resources can be accessed and used?

(Multiple Choice)
4.7/5
(37)

To protect data so it cannot be easily read, what technology is used?

(Multiple Choice)
4.8/5
(35)

What file system provides the best Windows security?

(Multiple Choice)
4.7/5
(34)
Showing 121 - 132 of 132
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)