PC Repair 12-22

Last update by Latonya on 02/23/2013
747871 People have viewed this Quiz
  • Share

Most encryption software products use a method called ____.

Answer:
Public Key Encryption

View PC Repair 12-22 as Flashcard Deck

Related Quiz Content
  • Exam Study Guide
    Answered in PC Repair 12-22
    ____ is any annoying and unwanted program that might or might not mean you harm.
    Grayware
  • Exam Study Guide
    Answered in PC Repair 12-22
    A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach
    the system in secret even after the Trojan has been removed.
    backdoor
  • Exam Study Guide
    Answered in PC Repair 12-22
    A ____ virus can hide in either of two boot areas of a hard drive.
    boot sector
  • Exam Study Guide
    Answered in PC Repair 12-22
    A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
    multipartite
  • Exam Study Guide
    Answered in PC Repair 12-22
    A ____ is a small program contained in a document that can be automatically executed either when
    the document is first loaded or later by pressing a key combination.
    macro
  • Exam Study Guide
    Answered in PC Repair 12-22
    Generally speaking, the weakest link in setting up security in a computer environment is ____.
    people
  • Exam Study Guide
    Answered in PC Repair 12-22
    Windows XP uses ____ file sharing by default, which means you have no control over who has access
    to a shared folder or file.
    simple
  • Exam Study Guide
    Answered in PC Repair 12-22
    To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the
    Advanced Security Settings box.
    Effective Permissions
  • Exam Study Guide
    Answered in PC Repair 12-22
    If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the
    Vista Start Search box.
    \\computername\Financial$
  • Exam Study Guide
    Answered in PC Repair 12-22
    The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates
    are lost.
    Cipher