by default all users can access Remote Desktop What are the two most popular

By default all users can access remote desktop what

This preview shows page 57 - 60 out of 68 pages.

by default all users can access Remote Desktop What are the two most popular web server applications? Apache IIS If you want to be able to power up a computer remotely, what feature should you use? Wake-on LAN What two applications are an example of a mail server and a mail client application, respectively? Exchange Outlook CH18
Image of page 57
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? a TPM chip on the motherboard On a peer-to-peer network, authentication is the responsibility of the domain. False What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? rootkit A root certificate is the original certificate issued by the CA. True What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? degausser What inputs would be considered to be part of a biometric device? (Choose all that apply.) retina fingerprint voice What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer When using the Windows Encrypted File System, what statement is accurate? an encrypted file moved to an unencrypted folder remains encrypted Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? chain of custody What technology can be used to locate a device such as a laptop after it has been stolen? LoJack
Image of page 58
What command can be used to take full access of a file? icacls If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? the BIOS One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? smart card Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? malware signatures Match each item with a statement below. software installed on a computer that produces pop-up ads using your browser adware a code used to identify and authenticate a person or organization sending data over a network digital certificate A program that is potentially harmful or potentially unwanted grayware type of spyware that tracks your keystrokes, including passwords keylogger an attack that can be used to crack a long password by trying words and word combinations dictionary attack the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer social engineering when someone who is unauthorized follows the employee through a secured entrance to a room or building tailgating A type of malware that tricks you into opening it by substituting itself for a legitimate program trojan
Image of page 59
Image of page 60

You've reached the end of your free preview.

Want to read all 68 pages?

  • Fall '19
  • Personal computer, Windows Vista, Windows 2000, Hard disk drive, Solid-state drive

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture