Preview

Computer Security: Prep Questions

Satisfactory Essays
Open Document
Open Document
293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security: Prep Questions
Final Exam (Chapters 11 – 16) Prep
Chapter 16 Questions

50. Which technology allows a user to securely access a company LAN across a public network? 16.2.1

51. Which authentication technology uses a physical characteristic of the user in conjunction with a password? 16.2.2

52. A student laptop is running slowly, and the student suspects rogue computers are accessing the laptop. Which control panel feature is used in Windows Vista to verify the firewall setting? 16.3.2

53. A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites? 16.3.3 phishing protection 54. In a networking class, the instructor tells the students to ping the other computers from the command prompt. Why do all pings in the class fail? 16.5.2

55. A temporary user is trying to log in to a computer that the same user used last month, but now is unable to complete the login process. What are two possible causes of the failed login? (Choose two.) 16.5.2

56. A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.) 16.5.2

57. After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files? 16.5.2

58. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?

You May Also Find These Documents Helpful

  • Good Essays

    NT 1330 Unit 2 Exercise 1

    • 363 Words
    • 2 Pages

    Make sure the address scope has enough addresses if not widen the scope range. Check to see if it is a router/firewall problem and makes sure you…

    • 363 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    4. You are managing a Windows Server 2008 Standard edition which has the File Server role added. You explicitly gave a user “Modify” access to a file. However, when this user tried to append data to that file, he got access denied message. What might be the problem?…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    In addition to removing programs and services network administrators should also restrict the accesses the users have on client systems limit what they can do to effect the security of the network. If users could change the security settings or download third party software from potentially unsafe websites they could very easily compromise the security of the network. By limiting user access and defining user roles network administrators can potentially prevent future system vulnerabilities that a user may introduce to the system either unwittingly or maliciously. Another system hardening measure that should be taken to help secure the client side of the network is disabling the default administrator account after you create additional administrator accounts assigned to different roles. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Question 3.3. (TCO 1) Which of the following Windows commands will shutdown and power down the computer FileServer in 2 minutes? (Points : 4)…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    6. Which of the following can be members of local groups? Local users, Domain users, Domain groups.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    W8 Comp

    • 898 Words
    • 4 Pages

    1) Which of the following Windows commands will restart the computer FileServer in 2 minutes? (Points : 5)…

    • 898 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Exam 1

    • 4986 Words
    • 20 Pages

    c. Describe two practices that could/should have been set up better within Hewlett-Packard to mitigate its agency problems.…

    • 4986 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Final Test

    • 3035 Words
    • 13 Pages

    __________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response.…

    • 3035 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cost Accounting Quiz

    • 806 Words
    • 4 Pages

    d. enable managers to control through a set of specific activities with defined corrective actions.…

    • 806 Words
    • 4 Pages
    Good Essays