Hardware Reference
In-Depth Information
Answers to Review Questions
1.
D. A pop-up is a browser window that opens automatically from another browser window.
Fingerprint readers are an example of biometric devices, which use physical characteristics
for access control.
2.
B. Active Directory is an application that Windows servers use to manage user identities
on the network.
3.
C. A strong password is long, varied, and unusual, containing no guessable words or
predictable number patterns.
4.
B. Smart cards contain microchips that can be read by a security system or another chip
reader.
5. D. A smart card does not read any biological characteristic of the person who holds it.
6.
C. When connecting to a public access point, use the Public option in Windows to turn off
fi le and printer sharing for that connection.
7.
A. WPA, or Wi-Fi Protected Access, is one form of wireless encryption for a network.
Another is WEP (Wired Equivalent Privacy), which is older and less secure.
8.
D. Firewalls prevent network ports from being used by unauthorized programs.
9.
A. Social engineering is the technique of tricking a person into providing information that
they should keep private.
10. D. All of those pieces of information can be used to steal your identity and should be kept
private.
11. D. A cookie stores information a website can reuse when you visit that site, such as your
country preferences, name, and buying history.
12. A. The prefi x https:// indicates that the secure HTTP protocol will be used for that
connection.
13. B. Certifi cates are certifi ed by an online authority, which is a company that maintains a
database of valid certifi cates and their identifying codes.
14. D. A phishing site is one that masquerades as a legitimate site in order to steal your private
information.
15. B. OS updates are the best way to patch vulnerabilities that can lead to exploits that harm
your system.
16. A. The SmartScreen fi lter is an antiphishing tool.
17. C. A Trojan horse, like its namesake from ancient Greek history, gains your trust by
appearing to be something good and then harms you.
Search WWH ::




Custom Search