CIT-1112 (2,12-16)

Last update by Cynthia on 06/04/2013
392595 People have viewed this Quiz
  • Share

In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

Answer:
social engineering

View CIT-1112 (2,12-16) as Flashcard Deck

Related Quiz Content
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

    macro
  • kissjoenow
    Answered in CIT-1112 (2,12-16)
    A network ____ map is one of the most powerful and versatile methods of communicating over a network.
    drive
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

    backdoor
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Individuals are always free to decide what security measures they want to use.

    False
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

    strong
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.

    limited
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    When implementing a security plan, the four steps are sometimes called the ____.

    Plan-Do-Study-Act
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.

    Task Manager
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    The best way to change inherited permissions is to change the permissions of the ____.

    parent object
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.

    tasklist /SVC
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.

    root
CIT 1112  2 12 16
CIT-1112 (2,12-16)
Total Views: 392595
“A+ Guide to Managing and Maintaining Your PC” by Jean Andrews Seventh Edition, ISBN 13-978-1-4354-9778-8 2. An addendum to the text entitled “Supporting Windows 7” by Jean Andrews. ISBN 13-978-1-111-31707-2
Teams This Deck Belongs To
Deck does not belong to any team.