Your computer has been showing signs of a malware infection, and it started up in Safe Mode.
Because your computer is not a member of an Active Directory domain, what powerful built-in
account can you log on with to try to resolve the problem? - Answers Administrator
What term describes a password cracker that tries a huge number of possible passwords? -
Answers brute-force
What is the generic term for a mode or method of malware infection? - Answers vector
Use this feature of your Microsoft account to group together other accounts as family and
protect children via activity reporting, screen time limits, and content restrictions. - Answers
microsoft family
A set of these should exist in both document form and software form for any organization. -
Answers security policies
Once installed, this type of malware becomes a vector giving other malware administrative
access to a computer. - Answers rootkit
It is a good idea to install or enable one of these on your computer, even if your network has
similar protection between it and other networks. - Answers personal firewall
This method of malware infection installs malware through use of a separate browser window
that opens uninvited from a Web page. If you click within the window, you may unknowingly
agree to install malware. - Answers pop-up download
After several failed attempts to log on/sign in to your Windows computer you see a message
stating that your account has been locked out. What caused this problem? - Answers Too many
failed attempts
What term describes unsolicited instant messages? - Answers spim
also called an application-layer gateway, this software will watch for application-specific traffic,
acting as a stand-in for internal computers.pop-up blocker - Answers proxy service
Use this type of program to guard against an especially annoying type of adware that appears in
your browser and blocks the content you want to see. - Answers pop up blocker
What type of malware is also a vector and gets its name from Virgil's famous epic poem, The
Aeneid, which described how Greek warriors gained access to the City of Troy? - Answers trojan
horse
What type of threat points your browser's home page to a website you did not chose, and may
even keep you from changing the browser's default home page? - Answers browser hijacking
, What term describes a group of networked computers infected with malware that forward
information to other computers? - Answers botnet
You must use data wiping software on a hard drive before installing a new operating system. -
Answers false
HTTPS uses a private key to encrypt data between a client and an e-commerce server. -
Answers false
When you access a Web page to pay for an online purchase, it should show HTTPS as the
protocol in the address line. - Answers true
A Windows computer that is a member of a domain will have a local account named
Administrator that you can access when your computer starts up in Safe Mode. - Answers false
FileVault is a data encryption feature in macOS. - Answers true
All popular mobile devices require a user account associated with the operating system. -
Answers true
An administrator can turn off the broadcasting of a network's SSID. - Answers true
Even with the Lock Screen password turned on you can make an emergency call from a
smartphone. - Answers true
Employers who require the use of personal mobile devices in the workplace must also
reimburse the employees for cellular voice and data usage. - Answers false
BYOD is practiced by employees in many organizations, with or without the employers' approval
of this practice. - Answers true
Open this iOS feature by swiping up from the bottom of the Home screen. From here you can
control sound, brightness, the clock, and the camera. You can also quickly turn many options on
or off, such as Airplane mode, Wi-Fi, Bluetooth, Do Not Disturb, and Mute. - Answers control
center
This service can be enabled on some mobile devices with an extra service fee to the cellular
provider. It shares a cellular data connection with other devices via Wi-Fi. - Answers mobil
hotspot
This mobile device feature prevents accidental touch actions. - Answers lock screen
Mobile device peripherals like headsets or keyboards often use this type of wireless connection.
- Answers bluetooth
What extreme measure can you take when a mobile device is lost or stolen, and you want to
ensure that your personal or work information on the device is not available to anyone? -