Computer Security
In this chapter, you will learn how to
• Explain the threats to your computers and data
• Describe how to control the local computing environment
• Explain how to protect computers from network threats
Registry
System state data
My Computer
My Server
Rate this question:
Completely secured. The drive is blank after partitioning and formatting.
Mostly secured. Only super skilled professionals have the tools to recover data after partitioning and formatting.
Very unsecured. Simple software tools can recover a lot of data, even after partitioning and formatting.
Completely unsecured. The data on the drive will show up in the Recycle Bin as soon as someone installs it on a system.
Rate this question:
Cracking
Hacking
Network engineering
Social engineering
Rate this question:
CONVERT D: /FS:NTFS
CONVERT D: NTFS
CONVERT /FS:NTFS D:
CONVERT NTFS D:
Rate this question:
AD Policy
Group Policy
Local Security Settings
User Settings
Rate this question:
MS-CHAP
PAP
POP3
SMTP
Rate this question:
He installed spyware.
He installed a Trojan.
He broke the Group Policy.
He broke the Local Security Settings.
Rate this question:
NTFS
WEP
WPA
WPA2
Rate this question:
AD Policy
Group Policy
Local Security Settings
User Settings
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.