Computer Organization 2

Created on By 52fd849a905aedf0249df9e69d61b55a?s=32&d=mm&r=gwefru

Computer Organization 2


1 / 10

1. Which one security
precautions will help protect a workplace against social engineering? (Choose two.)

2 / 10

  1. Which two characteristics describe a worm? 

3 / 10

  1. web site to a fake web site? Which type of attack involves the misdirection of a user from a legitimate

4 / 10

Which password is the strongest

5 / 10

Which three questions should be addressed by organizations developing a security policy?

6 / 10

  1. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?

7 / 10

Which two file-level permissions allow a user to delete a file

8 / 10

  1. What is the name given to the programming-code patterns of viruses?

9 / 10

  1. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

10 / 10

What are two physical security precautions that a business can take to protect its computers and systems?

Your score is

The average score is 40%


Leave a Reply

Your email address will not be published. Required fields are marked *