devry comp 129 week 6 quiz

| March 14, 2016

TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The two most popular protocols are ______ and Kerberos.

CHAP (Challenge Handshake Authentication Protocol)

CIPE (Crypto IP Encapsulation)

IPSec (Internet Protocol Security)

SSL (Secure Sockets Layer)

Question 2. Question :

(TCO 9) When a notebook computer goes into ______ mode, information in memory is saved to the hard disk. If there is an interruption in power, the information is not lost.

hibernation

idle

ready

standby

Question 3. Question :

(TCO 9) Addition of peripherals (such as wireless network cards and hard drives) to notebooks can be accomplished with the use of ______.

EIDE

expansion slots

PC cards

USB

Question 4. Question :

(TCO 8) One job of a firewall is to ensure that incoming communications ______.

: are blocked

contain no viruses

contain no spyware

were solicited by the PC

Question 5. Question :

(TCO 9) What types of SO-DIMMS can NOT be used in a notebook PC?

200-pin DDR SO-DIMMs

72-pin SO-DIMMs

144-pin SO-DIMMs

200-pin DDR2 SO-DIMMs

64-pin DDR2 SO-DIMMs

Question 6. Question :

(TCO 9) A ______ provides the same functions as a port replicator, but also adds secondary storage, such as an extra hard drive, a floppy drive, or a DVD drive.

docking station

storage port

secondary station

drive bank

4

Comments:

Question 7. Question :

(TCO 9) ______ let you specify which devices are to be loaded on startup for a particular user or set of circumstances.

Hardware profiles

Folder redirections

Briefcase profiles

Startup profiles

Question 8. Question :

(TCO 8) At a command prompt, you can use the _______ command to control how user accounts can access files and folders.

Cacls

Perm

Cont

Acc

Question 9. Question :

(TCO 8) A ______ does not need a host program to work; rather, it substitutes itself for a legitimate program.

logic bomb

Trojan horse

virus

browser hijacker

Comments:

Question 10. Question :

(TCO 8) A ______ tracks all of your keystrokes on a PC.

keylogger

worm

spyware

browser hijacker

)

Order your essay today and save 20% with the discount code: ESSAYHELP
Order your essay today and save 20% with the discount code: ESSAYHELPOrder Now