Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need

  1. A network administrator has a user that is changing the rights to files in a folder for other users. What rights does the administrator need to remove from the user?
    1. Full Control
    2. Modify
    3. Read and Write
    4. Read and Execute
  2. Which of the following are considered to be the right steps to change the computer name?
    1. Right click on start button, Control Panel, Appearance, Computer description, Save
    2. Double click on My Computer, View, Options, Change Name, Save
    3. Right click on My Computer, Properties, Advanced System Settings, Computer Name, and Change.
    4. Right click on start button, Device manager, Right Click Computer, Rename, Save before restart, Yes.
  3. Which among the below attacks is used to steal information transmitted through a network by intercepting communications between connected computers?
    1. Denial of Service
    2. SYN Flood
    3. Man in the middle
    4. Spoofing
  4. What is the main concern that you have to be aware of in order to apply file sharing between two hosts?
    1. You need to have limited network connectivity between your peers.
    2. You need to turn off firewall
    3. You need to enable Network Discovery Protocol
    4. You need to make sure that you are using only static IP address
  5. The following tool will let you connect to a computer running Windows from another computer running Windows that's connected to the same network or to the Internet.
    1. Online Support Tool
    2. Virtual Private Network
    3. Remote Desktop
    4. Computer Management
  6. The following tool shows a log of application and system messages errors, information messages, and warnings.
    1. Windows Task Scheduler
    2. Windows Event Viewer
    3. Windows Rights Assignment
    4. Windows Task Manager
  7. This tool is used to let the computer perform an automatic action after a specific failure or event occurs.
    1. Windows Event Viewer
    2. Windows Task Manager
    3. Windows Firewall
    4. Windows Task Scheduler
  8. Which software tool will protect against viruses and spyware on a Windows PC?
    1. Windows 8 Action Center
    2. Scandisk
    3. Windows Defender
    4. System File Checker
  9. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
    1. if the TCP/IP stack is functioning on the PC without putting traffic on the wire
    2. if there is connectivity with the destination device
    3. the path that traffic will take to reach the destination
    4. what type of device is at the destination
  10. Which of the following is an example of Social Engineering attack?
    1. A computer displaying unauthorized pop-ups and adware.
    2. The infection of a computer by a virus carried by a Trojan
    3. An anonymous programmer directing a DDoS attack on a data center.
    4. An unidentified person claiming to be a technician collecting user information from employees.
  11. Which among the below is not a security threat?
    1. Denial of service
    2. Key fob
    3. Trojan horse
    4. Worm

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Instant Reference

Authors: Gruber, Martin Gruber

2nd Edition

0782125395, 9780782125399

More Books

Students also viewed these Databases questions

Question

What has changed between the two versions of the Audit Plan file?

Answered: 1 week ago