CIT-1112 (2,12-16)

Last update by Cynthia on 06/04/2013
395488 People have viewed this Quiz
  • Share

Individuals are always free to decide what security measures they want to use.

Answer:
False

View CIT-1112 (2,12-16) as Flashcard Deck

Related Quiz Content
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

    strong
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data.

    limited
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    When implementing a security plan, the four steps are sometimes called the ____.

    Plan-Do-Study-Act
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.

    Task Manager
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    The best way to change inherited permissions is to change the permissions of the ____.

    parent object
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software.

    tasklist /SVC
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____.

    root
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    Permissions manually set for a subfolder or file cannot override inherited permissions.

    False
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources.

    quarantined
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    ____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip.

    BIOS
  • kissjoenow
    Answered in CIT-1112 (2,12-16)

    A $ at the end of the folder name creates a(n) ____ share.

    hidden
CIT 1112  2 12 16
CIT-1112 (2,12-16)
Total Views: 395488
“A+ Guide to Managing and Maintaining Your PC” by Jean Andrews Seventh Edition, ISBN 13-978-1-4354-9778-8 2. An addendum to the text entitled “Supporting Windows 7” by Jean Andrews. ISBN 13-978-1-111-31707-2
Teams This Deck Belongs To
Deck does not belong to any team.