Computer Organization 2

3
Created on By wefru

Computer Organization 2

TEST YOUR SKILLS

1 / 10

1. Which one security
precautions will help protect a workplace against social engineering? (Choose two.)

2 / 10

  1. Which two characteristics describe a worm? 

3 / 10

  1. web site to a fake web site? Which type of attack involves the misdirection of a user from a legitimate

4 / 10

Which password is the strongest

5 / 10

Which three questions should be addressed by organizations developing a security policy?

6 / 10

  1. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?

7 / 10

Which two file-level permissions allow a user to delete a file

8 / 10

  1. What is the name given to the programming-code patterns of viruses?

9 / 10

  1. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

10 / 10

What are two physical security precautions that a business can take to protect its computers and systems?

Your score is

The average score is 40%

0%

Leave a Reply