Details of this Paper

The protocols used to encrypt account names and passwords are called authentication protocols




TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The two most popular protocols are ______ and Kerberos.;CHAP (Challenge Handshake Authentication Protocol);CIPE (Crypto IP Encapsulation);IPSec (Internet Protocol Security);SSL (Secure Sockets Layer);Question 2. Question;(TCO 9) When a notebook computer goes into ______ mode, information in memory is saved to the hard disk. If there is an interruption in power, the information is not lost.;hibernation;idle;ready;standby;Question 3. Question;(TCO 9) Addition of peripherals (such as wireless network cards and hard drives) to notebooks can be accomplished with the use of ______.;EIDE;expansion slots;PC cards;USB;Question 4. Question;(TCO 8) One job of a firewall is to ensure that incoming communications ______.;are blocked;contain no viruses;contain no spyware;were solicited by the PC;Question 5. Question;(TCO 9) What types of SO-DIMMS can NOT be used in a notebook PC?;200-pin DDR SO-DIMMs;72-pin SO-DIMMs;144-pin SO-DIMMs;200-pin DDR2 SO-DIMMs;64-pin DDR2 SO-DIMMs;Question 6. Question;(TCO 9) A ______ provides the same functions as a port replicator, but also adds secondary storage, such as an extra hard drive, a floppy drive, or a DVD drive.;docking station;storage port;secondary station;drive bank;4;Comments;Question 7. Question;(TCO 9) ______ let you specify which devices are to be loaded on startup for a particular user or set of circumstances.;Hardware profiles;Folder redirections;Briefcase profiles;Startup profiles;Question 8. Question;(TCO 8) At a command prompt, you can use the _______ command to control how user accounts can access files and folders.;Cacls;Perm;Cont;Acc;Question 9. Question;(TCO 8) A ______ does not need a host program to work, rather, it substitutes itself for a legitimate program.;logic bomb;Trojan horse;virus;browser hijacker;Comments;Question 10. Question;(TCO 8) A ______ tracks all of your keystrokes on a PC.;keylogger;worm;spyware;browser hijacker


Paper#29096 | Written in 18-Jul-2015

Price : $34