How can we help?

You can also find more resources in our Help Center.

MXW - Computer - Chap 10

STUDY
PLAY
It's best to use three-factor authentication.
FALSE
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
ISO 17799 and ISO 27002
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.
Antivirus
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
FALSE
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
multipartite
Don't use the same password on more than one system (computer, network, or application).
TRUE
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.
Administrator
A ____ virus can hide in either of two boot areas of a hard drive.
Boot sector
Individuals are always free to decide what security measures they want to use.
FALSE
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users' data
Limited
____ is any annoying and unwanted program that might or might not mean you harm.
Grayware
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
digital certificate
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
strong
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
macro
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
ermissions
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
TRUE
When implementing a security plan, the four steps are sometimes called the ____.
Plan-Do-Study-Act
Generally speaking, the weakest link in setting up security in a computer environment is ____.
People
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
HIPAA
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
drive
A ____ is made of several words with spaces allowed.
passphrase
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
reset
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
backdoor
Most encryption software products use a method called ____.
Public Key Encryption
Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive.
Zero-fill utility
In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
Social Enginerring