TCO 8) The protocols used to encrypt account names and
passwords are called authentication protocols. The two most popular protocols
are ______ and Kerberos.
CHAP (Challenge Handshake Authentication
Protocol)
CIPE (Crypto IP Encapsulation)
IPSec (Internet Protocol Security)
SSL (Secure Sockets Layer)
Question 2. Question
:
(TCO 9) When a notebook computer goes into ______ mode,
information in memory is saved to the hard disk. If there is an interruption in
power, the information is not lost.
hibernation
idle
ready
standby
Question 3. Question
:
(TCO 9) Addition of peripherals (such as wireless network
cards and hard drives) to notebooks can be accomplished with the use of ______.
EIDE
expansion slots
PC cards
USB
Question 4. Question
:
(TCO 8) One job of a firewall is to ensure that incoming
communications ______.
:
are blocked
contain no viruses
contain no spyware
were solicited by the PC
Question 5. Question
:
(TCO 9) What types of SO-DIMMS can NOT be used in a notebook
PC?
200-pin DDR SO-DIMMs
72-pin SO-DIMMs
144-pin SO-DIMMs
200-pin DDR2 SO-DIMMs
64-pin DDR2 SO-DIMMs
Question 6. Question
:
(TCO 9) A ______ provides the same functions as a port
replicator, but also adds secondary storage, such as an extra hard drive, a
floppy drive, or a DVD drive.
docking station
storage port
secondary station
drive bank
4
Comments:
Question 7. Question
:
(TCO 9) ______ let you specify which devices are to be
loaded on startup for a particular user or set of circumstances.
Hardware profiles
Folder redirections
Briefcase profiles
Startup profiles
Question 8. Question
:
(TCO 8) At a command prompt, you can use the _______ command
to control how user accounts can access files and folders.
Cacls
Perm
Cont
Acc
Question 9. Question
:
(TCO 8) A ______ does not need a host program to work;
rather, it substitutes itself for a legitimate program.
logic bomb
Trojan horse
virus
browser hijacker
Comments:
Question 10. Question
:
(TCO 8) A ______ tracks all of your keystrokes on a PC.
keylogger
worm
spyware
browser hijacker
)