a computer that has been hacked and the hacker is using the computer to run

A computer that has been hacked and the hacker is

This preview shows page 60 - 63 out of 68 pages.

a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge zombie an infestation designed to copy itself repeatedly to memory, on drive space, or on a network worm What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright What statement is true regarding the Guest account in Windows 7? it is disabled by default Using Group Policy, you can set security policies to help secure a workstation. True Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane What statement regarding passwords on Windows is accurate? by default, accounts with a blank password cannot logon remotely You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? tailgating What does the presence of the Cydia app on an iOS device indicate? The device has been jailbroken
Image of page 60
CryptoLocker is an example of what type of malware? ransomware A person that secretly peaks at your monitor screen while you work may be doing what? shoulder surfing When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) the password should be at least eight characters long You should not use adjacent keys on the keyboard, such as asdf. You should combine uppercase and lower case letters, numbers, and symbols. What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM What keystroke should you press to get a logon window if you don't use the welcome screen? Ctrl+Alt+Delete When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? man-in-the-middle After initially installing Windows 7, you need to disable the Guest account so nobody can use it. False CH19 What statement regarding the construction of a gaming computer is accurate? Gaming computers benefit from powerful multicore processors. What wireless methods exist for connecting to a printer? (Choose all that apply.) Bluetooth Wi-Fi infrastructure mode Wi-Fi ad-hoc mode Match each item with a statement below.
Image of page 61
designed to play and possibly record music, photos, movies, and video on a television or extra-large monitor screen Home Theater PC the act of printing to a printer on a network connection Remote Printing uses a print head that moves across the paper creating one line with each pass inkjet printer
Image of page 62
Image of page 63

You've reached the end of your free preview.

Want to read all 68 pages?

  • Fall '19
  • Personal computer, Windows Vista, Windows 2000, Hard disk drive, Solid-state drive

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture