Selamat Datang di Bendrat Forum !!
Selamat Datang di Bendrat Forum Tips & Trick.
Daftar/Log in Untuk Melihat Isi Forum.

Selamat Datang di Bendrat Forum !!

Daftar / Log In Untuk Melihat Isi Forum
 
IndeksPendaftaranLogin
Login
Username:
Password:
Login otomatis: 
:: Lupa password?
Similar topics
Latest topics
» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:04 pm by batikseo

» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:04 pm by batikseo

» Poker Online, Poker Facebook, Judi Online, Nagapoker
Tue Apr 22, 2014 10:03 pm by batikseo

» SEAL OFFLINE JOB 2
Sat Aug 31, 2013 8:26 pm by andre1234

» minta link seal offline
Sun Apr 15, 2012 3:56 pm by Admin

» Margot Mariano
Thu Oct 20, 2011 5:23 pm by Admin

» BANTUIN DONK....!!!!!!!!!!!!
Wed Sep 07, 2011 11:10 pm by rendy

» Smack Down Vs RAW PS2 ( Mediafire )
Mon Aug 22, 2011 3:20 am by Admin

» Akses Internet Cepat Menggunakan DNS Alternatif
Sat Jun 18, 2011 7:48 am by Admin

Chat Box Online
 Here
SMS Online Free
 Here
Facebook Bendrat Forum
 Here

Share | 
 

 Chapter 16 V4.1 - IT Essentials: PC Hardware and Software

Topik sebelumnya Topik selanjutnya Go down 
PengirimMessage
Admin
Admin
Admin


Jumlah posting : 32
Reputasi : 0
Join date : 14.01.11
Age : 21
Lokasi : Salatiga,Jawa Tengah,Indonesia

PostSubyek: Chapter 16 V4.1 - IT Essentials: PC Hardware and Software   Thu Jun 16, 2011 2:57 pm

1
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
– It does not impact the processing performance of the equipment it protects.
– It is designed to protect more than one computer.


2
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
– Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

3
Which important feature is offered by the USB standard?
– It can supply power from the computer to devices.

4
Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)
– MD5
– SHA


5
Which Windows XP command initiates a backup from the command line?
– NTBACKUP

6
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
– the manufacturer FAQ for network devices
– technical websites


7
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
– security key fob

8
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
– smart card

9
What are two features of Windows Vista Backup? (Choose two.)
– The backup files have the extension .zip.
– The backup files can be saved to another connected computer or server.


10
Why should the default username and password be changed as soon as an access point is powered on and accessed?
– The change provides a minimum level of security to the access point.

11
A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
– port forwarding

12
What is a feature of the firewall capability when Windows Vista is the operating system?
– The firewall can be managed manually by permitting or allowing specific ports.

13
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
– The computer has been infected with spyware.

14
What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?
– Disable SSID broadcast.

15
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
– The administrator does not have the correct permissions to make the change.

16
After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)
– Give the person rights to the CIW folder.
– Add the user to a group that has the rights to the CIW folder.


17
Which issue should be addressed in the detailed information that is provided by a local security policy?
– the types of intrusions that are covered by the policy

18
Which two factors should management consider when developing a security policy? (Choose two.)
– expense of the security protection
– the costs that are associated with data loss


19
What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
– infrastructure
– type of Layer 2 devices that are used within the network


20
Why would security application software be implemented on a network?
– to protect the operating system
Kembali Ke Atas Go down
http://bendrat.forumid.net
 
Chapter 16 V4.1 - IT Essentials: PC Hardware and Software
Topik sebelumnya Topik selanjutnya Kembali Ke Atas 
Halaman 1 dari 1
 Similar topics
-
» cara mudah donlod video youtube tanpa software!
» Touring subang chapter bandung...
» Pembentukan chapter Ninja 250 Balikpapan
» Usulan Kopdar Chapter Bandung
» JUAL Wireless System merk ICON [untuk Guitar BASS]

Permissions in this forum:Anda tidak dapat menjawab topik
Selamat Datang di Bendrat Forum !! :: Others :: Cisco-
Navigasi: