Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need
- A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?
- Full Control
- Modify
- Read and Write
- Read and Execute
- Which of the following are considered to be the right steps to change the computer name?
- Right click on start button, Control Panel, Appearance, Computer description, Save
- Double click on My Computer, View, Options, Change Name, Save
- Right click on My Computer, Properties, Advanced System Settings, Computer Name, and Change.
- Right click on start button, Device manager, Right Click Computer, Rename, Save before restart, Yes.
- Which among the below attacks is used to steal information transmitted through a network by intercepting communications between connected computers?
- Denial of Service
- SYN Flood
- Man in the middle
- Spoofing
- What is the main concern that you have to be aware of in order to apply file sharing between two hosts?
- You need to have limited network connectivity between your peers.
- You need to turn off firewall
- You need to enable Network Discovery Protocol
- You need to make sure that you are using only static IP address
- The following tool will let you connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet.
- Online Support Tool
- Virtual Private Network
- Remote Desktop
- Computer Management
- The following tool shows a log of application and system messages errors, information messages, and warnings.
- Windows Task Scheduler
- Windows Event Viewer
- Windows Rights Assignment
- Windows Task Manager
- This tool is used to let the computer perform an automatic action after a specific failure or event occurs.
- Windows Event Viewer
- Windows Task Manager
- Windows Firewall
- Windows Task Scheduler
- Which software tool will protect against viruses and spyware on a Windows PC?
- Windows 8 Action Center
- Scandisk
- Windows Defender
- System File Checker
- What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
- if the TCP/IP stack is functioning on the PC without putting traffic on the wire
- if there is connectivity with the destination device
- the path that traffic will take to reach the destination
- what type of device is at the destination
- Which of the following is an example of Social Engineering attack?
- A computer displaying unauthorized pop-ups and adware.
- The infection of a computer by a virus carried by a Trojan
- An anonymous programmer directing a DDoS attack on a data center.
- An unidentified person claiming to be a technician collecting user information from employees.
- Which among the below is not a security threat?
- Denial of service
- Key fob
- Trojan horse
- Worm
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started