Search Header Logo
chapter 5 1002 security

chapter 5 1002 security

Assessment

Presentation

Computers

University

Medium

Created by

earnest colvin

Used 5+ times

FREE Resource

44 Slides • 8 Questions

1

chapter 5 1002 security

Slide image

2

Slide image

3

Slide image

4

Slide image

5

Slide image

6

Slide image

7

Multiple Choice

Which of the following is NOT a Linux/Unix-based file permission?

1

B. Execute (x)

2

Archive (a)

8

Slide image

9

Slide image

10

Slide image

11

Slide image

12

Slide image

13

Slide image

14

Slide image

15

Slide image

16

Slide image

17

Multiple Choice

______ is a central configuration database that stores information about hardware, networking, and more.

1

System Administration

2

Windows Registry

18

Multiple Choice

The Windows Registry has a total of five subtrees. Which of the following is NOT one of them?

1

HKEY_USERS

2

HKEY_LOCAL_SECURITY

19

Slide image

20

Slide image

21

Slide image

22

Slide image

23

Slide image

24

Multiple Choice

________ is a notification utility that warns users when something is trying to make a change to Windows

1

Local Security Policy

2

User Account Control (UAC

25

Slide image

26

Slide image

27

Slide image

28

Multiple Choice

___________ enables administrators to setup one set of user profiles throughout an entire organization, rather than on each individual computer.

1

Active Directory

2

Group Policy

29

Slide image

30

Slide image

31

Slide image

32

Slide image

33

Slide image

34

Slide image

35

Slide image

36

Slide image

37

Slide image

38

Slide image

39

Slide image

40

Slide image

41

Slide image

42

Slide image

43

Slide image

44

Slide image

45

Slide image

46

Slide image

47

Slide image

48

Slide image

49

Slide image

50

Multiple Choice

A private firm works extensively with the federal government. Since they deal with top secret information, they need to ensure that their systems prevent accidently (or intentional) data leakage. What type of software could the firm setup to prevent sharing of files with outsiders

1

A. Data Loss Prevention

2

Local Security Policy

51

Multiple Select

Email filtering consists of what? Select all that apply.

1

A. Spam filtering

2

B. Filter by keywords

3

C. Redirect emails to different folders

4

Using multiple domains to send email

52

Multiple Choice

enables administrators to setup one set of user profiles throughout an entire organization, rather than on each individual computer

1

Active Directory

2

Group Policy

chapter 5 1002 security

Slide image

Show answer

Auto Play

Slide 1 / 52

SLIDE