Computer Organization 2 November 27, 2020wefru 3 Created on November 27, 2020 By wefru Computer Organization 2 TEST YOUR SKILLS 1 / 10 1. Which one securityprecautions will help protect a workplace against social engineering? (Choose two.) performing daily data backups encrypting all sensitive data stored on the servers registering and escorting all visitors to the premises* ensuring that all operating system and antivirus software is up to date 2 / 10 Which two characteristics describe a worm? o executes when software is run on a computer o is self-replicating o hides in a dormant state until needed by an attacker 3 / 10 web site to a fake web site? Which type of attack involves the misdirection of a user from a legitimate o SYN flooding o DDoS o DNS poisoning 4 / 10 Which password is the strongest Im4ging! Gd^7123e! pAssword abcd123 5 / 10 Which three questions should be addressed by organizations developing a security policy? What assets require protection o How should future expansion be done o When do the assets need protecting o What insurance coverage is required 6 / 10 The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers? Perform a high-level format of the hard drive. Remove the RAM from the motherboard. Data wipe the hard drive Destroy the monitor 7 / 10 Which two file-level permissions allow a user to delete a file Read Modify Read and Execute Write 8 / 10 What is the name given to the programming-code patterns of viruses? grayware mirrors signatures* virus definition tables 9 / 10 Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic? Any traffic that comes into port 25 allows outgoing port 113 to be used All traffic that is sent into port 25 to the internal network will also be allowed to use port 113. Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113. o All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.* 10 / 10 What are two physical security precautions that a business can take to protect its computers and systems? Perform daily data backups Implement biometric authentication.* and antivirus software is up to date. o What insurance coverage is required Your score isThe average score is 40% LinkedIn Facebook Twitter VKontakte 0% Restart quiz