Clock
Invite Icon
Visitors
Members
Total Pageviews
About Me
- Unknown
Wednesday, May 23, 2012
Mudah mudahan terbantu ya kawan dan mendapatkan nilai 100 aminn..
Kunjungi dan selamat mencoba :
Follow @myshare06
Salam Blogger lovers Sejati
Blogger Loverz sedang membaca artikel tentang Chapter 16 Exam - IT Essentials:PC Hardware and Software(Vesion 4.1).Saya sebagai Admint Blog MYSHARE, Mari kita menghargai sesama blog jika menurut Blogger lovers artikel ini bermanfaat, silahkan share di mana saja dan jika berkenan mohon mencantumkan link sumbernya.Sukses buat Blogger lovers sejati!!,Terimakasih atas perhatiannya.
1. Which two advanteges are attributed to a hardware firewall when compared to a software firewall?(chose two.)
• It does not impact the processing performance of the equipment it protects;
• It is designed to protect more than one computer;
• It does not impact the processing performance of the equipment it protects;
• It is designed to protect more than one computer;
2.Why would security application software be implemented on a network?
• To protect the operating system;
• To protect the operating system;
3.Which important feature is offered by the USB standard?
• It can supply power from the computer to devices.
• It can supply power from the computer to devices.
4.Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (choose two.)
• MD5
• SHA
• MD5
• SHA
5.What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
• Infrastructure;
• Network access;
• Infrastructure;
• Network access;
6.After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (choose two.)
• The manufacturer FAQ for network devices;
• Technical websites.
• Technical websites.
7.Which data security technology takes form of an object which must be close to a computer before the user can successfully submit a username and password?
• Security key fob;
• Security key fob;
8.Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
• Smart card;
• Smart card;
9.What are two features of Windows Vista Backup? (choose two.)
• The backup files have the extension .zip;
• The backup files can be saved to another connected computer or server;
• The backup files have the extension .zip;
• The backup files can be saved to another connected computer or server;
10.Why should the default username and password be changed as soon as an access point is powered on an accessed?
• The change provides a minimum level of security to the access point;
• The change provides a minimum level of security to the access point;
11.A customer has a web server for a small business. The business uses both wired and wireless networking. A Liksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
• Port forwarding;
• Port forwarding;
12.What is a feature of the firewall capability when Windows Vista is the operating system?
• The firewall can be managed manually by permiting or allowing specific ports;
• The firewall can be managed manually by permiting or allowing specific ports;
13.A user reports that the antivirus software on a computer is always turned off when the computer is restarded, despite being reactivated each time the computer starts up. Futher investigation by the technician shows that the Internet browser also display an incorrect homepage?
• The computer has been infected with spyware;
• The computer has been infected with spyware;
14.What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
• Disable SSID broadcast;
• Disable SSID broadcast;
15.A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
• The administrator does not have the correct permissions to take the change;
• The administrator does not have the correct permissions to take the change;
16.After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (choose two.)
• Give the person rights to the CIW folder;
• Add the user to a group that has the rights to the CIW folder.;
• Give the person rights to the CIW folder;
• Add the user to a group that has the rights to the CIW folder.;
17.Which issue should be addressed in the detailed information that is provided by a security policy?
• The priority of services to be restored after an emergency is over.
• The priority of services to be restored after an emergency is over.
18.Which two factors should management consider when developing a security policy? (choose two.)
• Expense of the security protection;
• The costs that are associated with data loss;
• Expense of the security protection;
• The costs that are associated with data loss;
19.Which Windows XP command initiates a backup from the command line?
• Ntbackup;
• Ntbackup;
20.Windows XP should be updated on a regular basis. In wich situation should automatic updates be disabled?
• Users accesing the network using a dial-up connection need to control when the updates are downloaded and installed;
• Users accesing the network using a dial-up connection need to control when the updates are downloaded and installed;
Kunjungi dan selamat mencoba :
Follow @myshare06
Ditulis Oleh : Unknown|Admint MYSHARE
Sebagai GUEST yang baik di harapkan meninggalkan KOMENTAR atau sedikit Bantuan LIKE pada Artikel yang Blogger lovers Baca,TERIMAKASIH..!!
Subscribe to:
Post Comments (Atom)
Chat Box
Serch
Blog Archive
-
2012
(57)
- July(12)
-
May(21)
- Cisco IT Essentials Practice v.4.1 Final exam 1-10
- Chapter 16 Exam - IT Essentials:PC Hardware and So...
- Chapter 15 Exam - IT Essentials:PC Hardware and So...
- Chapter 14 Exam - IT Essentials:PC Hardware and So...
- Chapter 13 Exam - IT Essentials:PC Hardware and So...
- USB Safely Remove v5.1.2.1185 Final
- Uniblue + Cara mendapatkan serial activation
- Webcam max v.7.6.2.2 + Keygen (Full version)
- Artister v.3.0.0 + keygen
- CISCO IT Essentials Practice v.4.1 Final exam 11-16
- Chapter 12 Exam - IT Essentials:PC Hardware and So...
- Chapter 11 Exam - IT Essentials:PC Hardware and So...
- CClean v.3.18
- Spiderman 3 Theme windows7
- Mozila firefox v.14.0 (Aurora)
- Angry Bird Rio v.1.1.0 + Activation Serial
- The avengers theme windows7
- Cara Membuat slide show pada blog menggunakan Picasa
- Fairy tail Tema Windows 7
- Smadav 8.9.2 + Key Pro
- Iggle Pop
- April(15)
- March(5)
- February(1)
- January(3)
All Categories
- antivirus (6)
- game (5)
- sofware (18)
- Tema windows (4)
- Template Blogger (1)
- Tips designt/widget blogger (8)
0 comments:
Post a Comment
Komentar jika perlu gan , Komentar kalian semua adalah motifasi buat saya