Front | Back |
Which of the following types of malware self-replicates?
|
Worm
|
What type of malware is the abuse of electronic messaging systems?
|
Spam
|
Which of the following are symptoms of viruses?
|
Computer runs slowly
Computer locks up Unusual error messages are displayed |
Which if the following is the science if recognizing humans based on physical characteristics?
|
Biometrics
|
A hard drive needs to be disposed of in a way so that no one can access the data. Which method should you use?
|
Destruction
|
Which of the following is the best mode to use when scanning for viruses?
|
Safe Mode
|
Which of the following is one was to prevent spyware?
|
Adjust the Internet Explorer security settings
|
One of your customers tells you that a bank employee called and asked for the person's bank balance and telephone number. What is this an example of?
|
Social Engineering
|
Which of the following is the strongest password?
|
ThisIsV#ryS3cure
|
Which of these is a security component of Windows 7/Vista?
|
UAC
|
A customer complains that while away at at lunch someone used his somputer to send emails to other co-workers without his knowledge. What should you recommend?
|
Use the Windows lock feature
|
Which of the following best describes encryption?
|
Prevents unauthorized users from viewing or reading data?
|
One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user full control. But, NTFS permissions allow the user Read access. What will be the resulting access for the user?
|
Read
|
You are the administrator for your network. You set up an administrative share called Data$. What is necessary for another user to access this share?
|
The user must be part of the HomeGroup
The user must know the exact network path to the share |
Which is the following describes an attempt to guess a password by using a combination of letters and numbers?
|
Brute force
|