Jawaban | Soal |
1- spyware 2- grayware | What are two examples of malware? (Choose two.) |
1- Enable WEP. 2- Enable MAC filtering | Which two actions improve security on a wireless network? (Choose two.) |
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system. | Which best practice should be included in a password protection policy? |
1- What items need to be protected? 2- What is to be done in the case of a security breach? 3- What are the possible threats to the items? | Which three questions should be addressed by organizations developing a security policy? (Choose three.) |
Download the latest signature files on a regular basis | What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses? |
Create a restore point | A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? |
The update will be installed as soon as the computer is powered on | A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown? |
guiding visitors within the premises and escorting them personally when they leave | Which precaution helps protect against social engineering in the workplace? |
spam | A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail? |
replay | A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used networksniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy? |
by installing unwanted programs on a computer | How can web tools, such as Java or ActiveX, be used for a malicious attack? |
a biometric sensor | Which security device stores user physical characteristics to provide a user level of facility access? |
poor wireless device security | What condition can allow unauthorized access to a network for users who are not physically connected to the network? |
because everyone can be affected by computer and network security problems | Why should everyone in an organization give high priority to computer and network security? |
1- keep equipment functioning 2- provide access only to authorized users | What are two important outcomes of good computer and network security? (Choose two.) |
a programming code pattern | What is a signature as the term is used in antivirus and antispyware software development? |
2.5.4.3.6.1 | Refer to the exhibit. What is the correct order for the steps in the troubleshooting process? |
1- What problems are you experiencing? 2- What websites have you visited recently? | Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.) |
Establish a plan of action for resolution. | For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined? |
Identify the problem | At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions? |
Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1)
Labels:
Informasi
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Pada artikel terdahulu, kami membahas bagaimana cara burning file ISO di Windows 7, kali ini kami akan memberikan tutorial bagaimana melakuk...
-
Sesuai namanya sharing yang berarti berbagi, sharing folder/drive adalah suatu folder/drive tertentu pada suatu komputer yang sengaja di bua...
-
OK gan kita lansung aja,. Seperti biasa login FB terus cari mainin NS. Masuk ke Clan. Akan muncul gambar seperti dibawah ini lalu klik ...
-
Barang/benda Sebagai Alat Pemenuhan Kebutuhan Manusia 1. Jenis-Jenis Dan Kegunaan Benda Pemuas Kebutuhan Manusia Barang atau benda adalah s...
-
Ok kawan-kawan sekalian kali ini saya akan posting tentang caranya membuat efek asap pada Photoshop(PS). Nah langsung aja berikut ini adalah...
-
Facebook, sebuah situs jejaring sosial yang sudah mulai mendarah daging dikalangan penggunanya. Tiada hari tanpa akses account facebook. Saa...
-
APA SIH "LAN" ITU??? LAN merupakan singkatan dari Lokal Area Network . LAN merupakan jaringan komputer yang jaringannya hanya me...
-
Berikut adalah tutor untuk membuat Like Box di Facebook, Ok chek This Out: Jika anda ingin memiliki Like Box syarat yang pertama anda harus ...
-
Sesuai namanya sharing yang berarti berbagi, sharing folder/drive adalah suatu folder/drive tertentu pada suatu komputer yang sengaja di bua...
-
Pada artikel sebelumnya, kami pernah membahas bagaimana cara meng-convert video ke format 3GP dengan menggunakan Pazera Converter, kali ini ...
Blogger templates
Labels
- BAB II
- BAB III
- BAB IV
- Cheat
- Cheat Plant VS Zombie Cheat Engine
- Download Plant VS Zombie
- Game
- Game English Version
- GPS
- Informasi
- Internet
- IPS
- Jaringan
- Kelas X
- Kelas XI
- Kelas XII
- Komputer
- Linux
- Modul 1
- MS. Word
- PhotoShop
- Plant VS Zombie
- PVZ
- Semester 1
- Semester 2
- technology
- Windows



No comments:
Post a Comment