Skip to content Skip to sidebar Skip to footer

What Are Some of the Ways You Can Use Bitlocker Encryption? (Choose All That Apply)

focusNode

Didn't know it?
click beneath

Knew information technology?
click below

share

Embed Code - If you would like this activity on your web folio, copy the script below and paste information technology into your web page.

Normal Size     Small Size evidence me how

Information technology 122 Chapter xviii

Question Respond
On a peer-to-peer network, authentication is the responsibleness of the domain. Fake
Requiring users to printing Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True
After initially installing Windows 7, you need to disable the Guest account and then nobody can apply information technology. Simulated
Using Grouping Policy, you can fix security policies to help secure a workstation. True
It's usually a adept thought to run several anti-malware programs at the same time on your computer. False
What keystroke should you press to get a logon window if you don't use the welcome screen? Ctrl+Alt+Delete
Which of the following is true about the Invitee account in Windows 7? information technology is disabled past defaul
Which of the following is truthful near passwords. by default, accounts with a blank password cannot logon remotely
Which of the following is true about the Windows Encrypted File Arrangement? an encrypted file moved to an unencrypted binder remains encrypted
Which of the following is NOT true about using Group Policy on business and professional editions of Windows? you can use gpedit.msc to see if whatsoever policies conflict
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your estimator have? a TPM flake on the motherboard
If you don't want to use BitLocker to protect your computer, you tin notwithstanding configure a power-on password using which of the following? the BIOS
One fashion to authenticate users on a figurer is to utilise a modest device that contains hallmark information. What is this device chosen? smart carte
An RFID badge is related to which type of authentication method? smart card
A privacy filter is used for what attribute of security? screen viewing
Which of the following provides a strong magnetic field used to completely erase information on a hard drive or tape drive? degausser
You should beware of a person attempting to use your calculator after you step away from information technology, a term referred to as which of the following? tailgating
Which blazon of malware hides in the MBR program of a difficult bulldoze? boot sector virus
Which blazon of malware can hijack internal Windows components and often goes undetected considering information technology is already loaded when the antivirus software loads? adware
Which command can you perform at the Windows RE control prompt to repair the OS kick record on Windows 7? bootrec /fixboot
If you need to understand the parent-child relationships between running processes and view parent processes every bit they call other processes, what tool should yous use? Process Explorer
Which of the following are methods to lock down a workstation in Windows seven? (Choose all that apply.) printing Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
Which of the following are true near Windows Firewall? (Choose all that apply.) information technology is a personal firewall it is configured when you lot gear up your network location
Which are among the ways y'all tin use BitLocker Encryption? (Cull all that apply.) figurer authentication using TPM user authentication using a USB flash drive calculator and user authentication using a Pin and TPM
Which of the following would exist considered an input to a biometric device? (Choose all that apply.) retina fingerprint vox
The best protection confronting attacks is ________________ protection, for example when multiple firewalls protect the network's computers. layered
To continue a system secure from tailgating, users need to practise the addiction of ___________ their workstation when they stride away from their desks. locking or locking downward
The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network. Guest
To prevent spread of malware, an infected computer should exist ____________ by disconnecting it from the wired or wireless network. quarantined
Windows _______________ is antispyware included in Windows vii/Vista. Defender
the do of tricking people into giving out private information or assuasive unsafe programs into the network or figurer social engineering
an infestation designed to copy itself repeatedly to retention, on drive infinite, or on a network worm
A blazon of malware that tricks y'all into opening it by substituting itself for a legitimate program Trojan
a plan that AV software recognizes to be potentially harmful or potentially unwanted grayware
a code used to place and authenticate a person or organisation sending information over a network digital certificate
type of smart card that contains authentication information RSA tokens
a set of distinguishing characteristics of a virus used by antivirus software to place new viruses every bit they go into the wild virus signature
when someone who is unauthorized follows the employee through a secured archway to a room or building tailgating
software installed on a calculator that produces pop-upwardly ads using your browser adware
type of spyware that tracks your keystrokes, including passwords keylogger

mcgeetorgartor59.blogspot.com

Source: https://www.studystack.com/flashcard-1824402

Post a Comment for "What Are Some of the Ways You Can Use Bitlocker Encryption? (Choose All That Apply)"