Mary should set up WPA2 on her Wi-Fi router.
Explanation
Computer SecurityIn this chapter, you will learn how to• Explain the threats to your computers and data• Describe how to control the local computing environment• Explain how to protect computers from network threats
Zander clearly installed a Trojan, a virus masquerading as a game.
Social engineering is the process of using or manipulating people to gain access to network resources.
Although it would take a little work, simple software tools can recover a lot of data, even after partitioning and formatting.
Use the following command to convert from FAT32 to NTFS: CONVERT D: /FS:NTFS
You can enable local auditing through Local Security Settings.
Of the choices here, MS-CHAP offers the most security.
Backing up the system state data gets the Registry, Active Directory files, and more.
Local Security Settings enable you stop someone from logging on to a local machine.