Filters
Question type

Study Flashcards

You must use data wiping software on a hard drive before installing a new operating system.

A) True
B) False

Correct Answer

verifed

verified

After encrypting a file using the Windows Encrypting File System (EFS)you move the file to another NTFS-formatted volume. Is the file still encrypted? Explain your answer.

Correct Answer

verifed

verified

The file is still encrypted after moving...

View Answer

Which of the following is among the symptoms of a possible malware infection?


A) adware
B) unsolicited e-mail
C) sudden computer slowdown
D) an error message when you enter your password

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Combine this technology with a firewall for a very safe way to connect two private networks over the Internet.


A) proxy service
B) DMZ
C) firewall
D) VPN

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Cookies are always a threat.

A) True
B) False

Correct Answer

verifed

verified

You receive an e-mail message from a friend claiming that she is in another country, in trouble, and urgently needs money wired to her. You call the friend and discover that she is safe at home and did not know about the message. This scenario is an example of a/an ________.


A) spam
B) browser hijacking
C) hoax
D) war driving

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What term is used for a computer that belongs to a group of networked computers, all working mindlessly to serve the person who installed the program on the computers?


A) Trojan horse
B) worm
C) botnet
D) zombie

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What type of security software can you use to both protect from malware infections and to scan disk space and RAM looking for installed malware?


A) antivirus
B) anti-spam
C) firewall
D) proxy service

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A set of these should exist in both document form and software form for any organization.


A) cookies
B) account lockout policy
C) anti-spyware
D) security policies

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

It is a good idea to install or enable one of these on your computer, even if your network has similar protection between it and other networks.


A) Administrator
B) secret key
C) DMZ
D) personal firewall

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer