
- Testout pc pro 220 801 and 220 802 quizlet 3.4 how to#
- Testout pc pro 220 801 and 220 802 quizlet 3.4 software#
She has turned Num Lock on causing the numbers to be sent from the keyboard instead of letters She enters the correct password for her user account, but the system won’t let her authenticate, claiming the wrong password has been entered. What is the main difference between a worm and a virus?Ī worm can replicate itself and does not need a host for distributionĪ user is trying to log into her notebook computer. Which of the following are biometric devices? (select two) What is the best countermeasure against social engineering?
Testout pc pro 220 801 and 220 802 quizlet 3.4 software#
Use data wiping software to clear the HDDs What should you do prior to getting rid of the computers? These computers were previously used for storing sensitive information. Instead of recycling the computers, you decide to resell them by placing an ad on the internet. You have purchased new computers and will be disposing of your old computers. Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state? * Omni-directional access points are positioned around the periphery of the buildingīased on this information, what should you recommend your client do to increase their wireless network security?

* The wireless network uses WPA2 with AES security * The wireless network SSID is set to BWLAN As you analyze their facility, you note the following: has hired you to evaluate their wireless network security practices. What else could you do to increase the security of this system? (select two)ġ) Disable autorun on the system 2) Set a screensaver passwordĪ small business named BigBikes, Inc. File and folder permissions have been assigned to prevent users from accessing each other’s files.


Each limited and administrative user has been assigned a strong password. Two of the users are limited users while the third (your account) is an administrative user. One of the Windows 7 workstations you manage has three user accounts defined on it.
Testout pc pro 220 801 and 220 802 quizlet 3.4 how to#
Teach users how to recognize and respond to social engineering attacks What should you recommend they do to mitigate the risk? They are chiefly concerned that they could become victim of a social engineering attack. You are a security consultant and an organization has hired you to review their security measures. Which of the following security solutions would prevent a user from reading a file which she did not create?
