Preview

Computers: Quiz

Satisfactory Essays
Open Document
Open Document
382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computers: Quiz
A term that describes a non-technical kind of intrusion that relies heavily on human interaction and trickery. A) Social Engineering B) Phishing C) Brute Force D) Hacking E) Cracking
Points Earned: 1.0/1.0
Correct Answer(s): A

2.
You are working on a computer, which of the following activities are restricted according to our Acceptable Use Policy: A) Creating a folder on your desktop B) Using a USB device on the computer C) Saving child pornography on the hard drive D) Adding a screensaver that comes with Windows E) Installation of approved software
Points Earned: 1.0/1.0
Correct Answer(s): C

3.
Two or maybe three students may have the same username but a different password. A) True B) False
Points Earned: 1.0/1.0
Correct Answer(s): False

4.
Which of the following methods IS NOT a way to distribute or notify users of the Acceptable Use Policy? A) E-mail Notifications B) Signed Document C) A training session with signed attendance form D) Welcome banner on web sites E) Pop-up Click-through
Points Earned: 1.0/1.0
Correct Answer(s): A

5.
System attacks or viruses sometimes play on computer weaknesses. Which of the following is the most common requirement for a virus to run? A) It is a fresh installation of the operating system B) The computer is using a Windows operating system C) The computer system is unpatched or not updated D) The operating system installed came with the computer E) The computer system is owned by a new operator
Points Earned: 1.0/1.0
Correct Answer(s): C

6.
The password "0urDayWillC0me" is a strong password. A) True B) False
Points Earned: 1.0/1.0
Correct Answer(s): True

7.
A document that defines technologies used at an organization, who owns them and how they are used. A) End User License Agreement (EULA) B) Acceptable Use Policy C) Student Handbook D) Technology Plan
Points Earned: 1.0/1.0
Correct

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 6

    • 953 Words
    • 4 Pages

    3. You want to view log files to get information about a problem you are having. In which directory will you likely find the log files?…

    • 953 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Itm/6015 Week 3 Quiz

    • 806 Words
    • 4 Pages

    3. All of the following led to an unprecedented level of IT investments in the 1990s…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT542 Assignment Unit1 1

    • 421 Words
    • 3 Pages

    a. This screenshot demonstrate that the only port left open is the remote desktop port tcp 3389. All other open ports are been removed from Window 2003.…

    • 421 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz on Computers

    • 2372 Words
    • 16 Pages

    (TCO 1) _____ has a granular, inheritable access control structure that allows each folder and file to have an access control list.…

    • 2372 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Abolish Quiz

    • 5046 Words
    • 21 Pages

    B) The wood is tight-grained, strong, and resilient and can be worked into the curved shapes needed for barrels…

    • 5046 Words
    • 21 Pages
    Satisfactory Essays
  • Good Essays

    Intro to Computers

    • 609 Words
    • 3 Pages

    | Allows users to organize data in rows and columns and perform calculations and recalculate when data changes.…

    • 609 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 18 WOS review

    • 590 Words
    • 3 Pages

    Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the anti software loads?…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 1 2 NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 3 Oral Assessments Skills Assessment Interview • 15% of the course total The questionnaire consists of • 15 sets of questions • 3 questions in each set…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    6. Similar to viruses except they do not need a host application to function or reproduce…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    This: Windows Server

    • 7254 Words
    • 30 Pages

    D. The IT director should have checked to see if the computer hardware and BIOS were…

    • 7254 Words
    • 30 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week Cja/354

    • 1919 Words
    • 8 Pages

    Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 1919 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    You must respect the integrity of computing and network systems; for example, you shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or damage or alter the software components of a computer, computing system or network.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays