What Are Some of the Ways You Can Use Bitlocker Encryption? (Choose All That Apply)
focusNode
Didn't know it?
click beneath
Knew information technology?
click below
Embed Code - If you would like this activity on your web folio, copy the script below and paste information technology into your web page.
Normal Size Small Size evidence me how
Information technology 122 Chapter xviii
| Question | Respond |
|---|---|
| On a peer-to-peer network, authentication is the responsibleness of the domain. | Fake |
| Requiring users to printing Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. | True |
| After initially installing Windows 7, you need to disable the Guest account and then nobody can apply information technology. | Simulated |
| Using Grouping Policy, you can fix security policies to help secure a workstation. | True |
| It's usually a adept thought to run several anti-malware programs at the same time on your computer. | False |
| What keystroke should you press to get a logon window if you don't use the welcome screen? | Ctrl+Alt+Delete |
| Which of the following is true about the Invitee account in Windows 7? | information technology is disabled past defaul |
| Which of the following is truthful near passwords. | by default, accounts with a blank password cannot logon remotely |
| Which of the following is true about the Windows Encrypted File Arrangement? | an encrypted file moved to an unencrypted binder remains encrypted |
| Which of the following is NOT true about using Group Policy on business and professional editions of Windows? | you can use gpedit.msc to see if whatsoever policies conflict |
| If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your estimator have? | a TPM flake on the motherboard |
| If you don't want to use BitLocker to protect your computer, you tin notwithstanding configure a power-on password using which of the following? | the BIOS |
| One fashion to authenticate users on a figurer is to utilise a modest device that contains hallmark information. What is this device chosen? | smart carte |
| An RFID badge is related to which type of authentication method? | smart card |
| A privacy filter is used for what attribute of security? | screen viewing |
| Which of the following provides a strong magnetic field used to completely erase information on a hard drive or tape drive? | degausser |
| You should beware of a person attempting to use your calculator after you step away from information technology, a term referred to as which of the following? | tailgating |
| Which blazon of malware hides in the MBR program of a difficult bulldoze? | boot sector virus |
| Which blazon of malware can hijack internal Windows components and often goes undetected considering information technology is already loaded when the antivirus software loads? | adware |
| Which command can you perform at the Windows RE control prompt to repair the OS kick record on Windows 7? | bootrec /fixboot |
| If you need to understand the parent-child relationships between running processes and view parent processes every bit they call other processes, what tool should yous use? | Process Explorer |
| Which of the following are methods to lock down a workstation in Windows seven? (Choose all that apply.) | printing Windows key + L press Ctrl+Alt+Delete and click Lock this Computer |
| Which of the following are true near Windows Firewall? (Choose all that apply.) | information technology is a personal firewall it is configured when you lot gear up your network location |
| Which are among the ways y'all tin use BitLocker Encryption? (Cull all that apply.) | figurer authentication using TPM user authentication using a USB flash drive calculator and user authentication using a Pin and TPM |
| Which of the following would exist considered an input to a biometric device? (Choose all that apply.) | retina fingerprint vox |
| The best protection confronting attacks is ________________ protection, for example when multiple firewalls protect the network's computers. | layered |
| To continue a system secure from tailgating, users need to practise the addiction of ___________ their workstation when they stride away from their desks. | locking or locking downward |
| The ______________ account is disabled by default and should be replaced by a standard account for infrequent users of your network. | Guest |
| To prevent spread of malware, an infected computer should exist ____________ by disconnecting it from the wired or wireless network. | quarantined |
| Windows _______________ is antispyware included in Windows vii/Vista. | Defender |
| the do of tricking people into giving out private information or assuasive unsafe programs into the network or figurer | social engineering |
| an infestation designed to copy itself repeatedly to retention, on drive infinite, or on a network | worm |
| A blazon of malware that tricks y'all into opening it by substituting itself for a legitimate program | Trojan |
| a plan that AV software recognizes to be potentially harmful or potentially unwanted | grayware |
| a code used to place and authenticate a person or organisation sending information over a network | digital certificate |
| type of smart card that contains authentication information | RSA tokens |
| a set of distinguishing characteristics of a virus used by antivirus software to place new viruses every bit they go into the wild | virus signature |
| when someone who is unauthorized follows the employee through a secured archway to a room or building | tailgating |
| software installed on a calculator that produces pop-upwardly ads using your browser | adware |
| type of spyware that tracks your keystrokes, including passwords | keylogger |
Source: https://www.studystack.com/flashcard-1824402
Post a Comment for "What Are Some of the Ways You Can Use Bitlocker Encryption? (Choose All That Apply)"