13.8.8 Practice Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goals?

Bitlocker

A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt the data on this drive?

Bitlocker To Go

Which of the following security solutions would prevent a user from reading a file which she did not create?

EFS

A user has file that contains sensitive data. Which of the following can be used to encrypt a single file?

EFS

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE)

L2TP IPSec PPTP

A VPN is used primary for what purpose?

Support secured communications over an untrusted network

Which of the following components is a special hardware ship included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys?

Trusted Platform Module (TPM)

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Which of the following provides the BEST security for wireless networks?

WPA2

Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly?

Wireless


संबंधित स्टडी सेट्स

American Government Ch. 13 Practice Test 1

View Set

Module 55. Biomedical Therapies and Preventing Psychological Disorders

View Set

intro to politics/gov quiz questions

View Set

Capstone Exam 2A strategic resource is an asset that is valuable, rare, difficult to imitate, and nonsubstitutable.

View Set

Bridge to Terabithia Ch 5-10 Vocabulary

View Set

RPA Associate Exam Learning Plan

View Set