CIT-1112 (2,12-16)

Last update by Cynthia on 06/04/2013
389851 People have viewed this Quiz
  • Share

Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive.

Answer:
zero-fill utility

View CIT-1112 (2,12-16) as Flashcard Deck

Related Quiz Content
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.

    administrator
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    One job of a firewall is to ensure that incoming communications ________

    multipartite
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Don’t use the same password on more than one system (computer, network, or application).

    True
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

    social engineering
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

    macro
  • kissjoenow
    Answered in CIT-1112 (2,12-16)
    A network ____ map is one of the most powerful and versatile methods of communicating over a network.
    drive
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

    backdoor
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Individuals are always free to decide what security measures they want to use.

    False
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

    strong
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.

    limited
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    When implementing a security plan, the four steps are sometimes called the ____.

    Plan-Do-Study-Act
CIT 1112  2 12 16
CIT-1112 (2,12-16)
Total Views: 389851
“A+ Guide to Managing and Maintaining Your PC” by Jean Andrews Seventh Edition, ISBN 13-978-1-4354-9778-8 2. An addendum to the text entitled “Supporting Windows 7” by Jean Andrews. ISBN 13-978-1-111-31707-2
Teams This Deck Belongs To
Deck does not belong to any team.