Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

Exam (elaborations) TestOut LabSim Chapter 14 - Security

Puntuación
-
Vendido
-
Páginas
13
Grado
A+
Subido en
28-08-2024
Escrito en
2024/2025

Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security Exam (elaborations) TestOut LabSim Chapter 14 - Security

Mostrar más Leer menos
Institución
TestOut LabSim Chapter 14 - Security
Grado
TestOut LabSim Chapter 14 - Security

Vista previa del contenido

TESTOUT LABSIM CHAPTER 14 –
SECURITY
EXAM
Which Windows feature can you use to encrypt a hard drive volume? - CORRECT
ANSWER-BitLocker

BitLocker was introduced in Windows Vista and is used to encrypt an entire volume (not
just individual files and folders). BitLocker is designed to protect all data on a volume,
even if the hard drive is moved to another computer.

Encrypting File System (EFS) - CORRECT ANSWER-a component of the NTFS file
system that allows file encryption. EFS is not a Windows feature that is used to encrypt
a hard drive volume.

NTFS - CORRECT ANSWER-file system that is used in modern Windows operating
systems. It is not a Windows feature that is used to encrypt a hard drive volume.

BitLocker to Go - CORRECT ANSWER-used to encrypt USB drives (not a hard drive
volume).

You are establishing a new security policy for user authentication and want to
implement multi-factor authentication.
Which of the following would BEST accomplish this? - CORRECT ANSWER-Fingerprint
and one-time code text message

During an airline flight, a laptop user makes last-minute changes to a presentation that
contains sensitive company information.
Which of the following would make it difficult for other passengers to view this
information on the laptop display? - CORRECT ANSWER-Privacy Filter

Which of the following are examples of a strong password? (Select two.) - CORRECT
ANSWER-I love the Linux P3ngu!n Tux

il0ve2EatIceCr3am!

Which database encryption method can you use to encrypt data at rest? - CORRECT
ANSWER-Transparent data encryption

One of the Windows workstations you manage has four user accounts defined on it.
Two of the users are Limited users, while the third (your account) is an Administrative

, user. The fourth account is the Guest user account, which has been enabled to allow
management employees convenient workstation access.
Each Limited and Administrative user has been assigned a strong password. File and
folder permissions have been assigned to prevent users from accessing each other's
files. Autorun has also been disabled on the system.
Which of the following actions is MOST likely to increase this system's security? -
CORRECT ANSWER-Disable the Guest account.

One of the Windows workstations you manage has three user accounts defined on it.
Two of the users are Limited users, while the third (your account) is an Administrative
user.
Each Limited and Administrative user has been assigned a strong password. File and
folder permissions have been assigned to prevent users from accessing each other's
files.
Which of the following would MOST likely increase this system's security? (Select two.)
- CORRECT ANSWER-Disable Autorun on the system.

Set a screen saver password.

You are working at the local hospital in the IT department. You have just received a
promotion to junior network technician. Part of your new role involves troubleshooting
network communication issues.
Which of the following user groups should your account be added to? - CORRECT
ANSWER-Network Configuration Operator

A technician assists Joe, an employee in the sales department who needs access to the
client database, by granting him Administrator privileges. Later, Joe discovers that he
has access to the salaries in the payroll database.
Which of the following security practices was violated? - CORRECT ANSWER-Principle
of least privilege

You are assisting the security administrator and discover that a user was logged in to
their workstation after hours. After further investigation, you discover that the user's
account was compromised, and someone used the account to steal sensitive data.
Which of the following could have BEST prevented this from happening? - CORRECT
ANSWER-Restrict the user's login times to work hours only.

As part of the response to a security incident on your company network, you have been
asked to draft a document related to evidence gathering that contains details about
personnel in possession and control of evidence from the time of discovery up to the
time of presentation in court.
Which document have been asked to draft? - CORRECT ANSWER-Chain of custody

You work for a company that offers their services through the internet. It is critical that
your website performs well.

Escuela, estudio y materia

Institución
TestOut LabSim Chapter 14 - Security
Grado
TestOut LabSim Chapter 14 - Security

Información del documento

Subido en
28 de agosto de 2024
Número de páginas
13
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.09
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
MARIESTOPES1

Conoce al vendedor

Seller avatar
MARIESTOPES1 Chamberlain College Of Nursng
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
1 año
Número de seguidores
0
Documentos
209
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes