Reference no: EM133940739
Question
1. Which of the following is not commonly implemented as a good security practice?
1. Account lockout after 5 consecutive failed login attempts
2. Disabling unused accessible USB ports in a client system
3. Reducing the amount of RAM in a client system
4. Using a firewall
5. Requiring complex passwords
2. Which of the following is not a type of malicious software that is detected by most anti-virus software?
1. Master boot record virus
2. Rootkit
3. Worm
4. Quantum virus
5. Trojan horse
3. What component's capabilities and features can include "ranks"?
1. Memory modules
2. Laser printers
3. Laptop processors
4. Power supplies
5. Hard drive interfaces
4. There are many ways to ensure that sensitive data previously stored on a typical SATA mechanical hard drive can't later be recovered. Which of the following is not a good way to do that?
1. Physically destroying/shredding the hard drive
2. Running the format command from an OS boot disk
3. Using a program like DBAN to overwrite the drive repeatedly
4. Using a degaussing machine to degauss the hard drive
5. Many IT departments now insist on using multi-factor authentication. Multi-factor authentication usually includes two out of three of:
1. Something you believe, something you carry and something you know
2. Something you are, something you have and something you know
3. Something you are, something you were and something you will be
4. Something you said, something you heard and something you touched
5. Something you suspect, something you know and something you can prove
6. Under tight tolerance, +4.8 volts would be acceptable on:
1. A blue wire
2. A white wire
3. A red wire
4. A yellow wire
5. None of the above
7. When choosing paper for an inkjet printer, which of the following is true?
1. You should get paper that's very highly absorbent
2. You should get paper that briefly resists absorption
3. You should get paper that will hold a large charge
4. You should get paper that holds a lot of humidity well
5. All of the above
8. The certification for efficiency in PC power supplies is called:
1. Energy Plus
2. Bronze Plus
3. 55 Plus
4. 80 Plus
5. Green Plus
|
Heaven retirement community
: The Almost Heaven Retirement Community is a low cost assisted living community for retirees who want some independence
|
|
Our listinterface defines two constructors
: Even though our lists will be generic, our ListInterface is not generic. Our ListInterface defines two constructors.
|
|
Considering how quickly technology changes
: Considering how quickly technology changes, do you think this talk is still applicable to life and technology today? Why or why not?
|
|
Database contains information about more than one entity
: Two disadvantages to database processing are its complexity and its size. Typically, a database contains information about more than one entity.
|
|
What components capabilities and features can include ranks
: What component's capabilities and features can include ranks? Which of the following is not commonly implemented as a good security practice?
|
|
Define Human-Computer Interaction
: Define Human-Computer Interaction. Describe Types of User Interfaces. What are the best practices for Designing Queries?
|
|
Relational operators union of two sets
: Consider relational operators "union of two sets", "intersection of two sets", "x", "Pi","o","infinite" and tables with a valid primary key
|
|
Some systems analysts maintain that source documents
: Some systems analysts maintain that source documents are unnecessary. They say that all input can be entered directly into the system,
|
|
Consider transaction processing
: Consider transaction processing. Can deadlocks happen with 2-phase locking (2PL)?, can dead-locks happen with timestamping?
|