True or False. If an EFS encrypted folder is copied to a diffe
rent computer the EFS encryption will
remain enabled and still function. Assume you are NOT working in an Active Directory network.
a.
True
b.
False
Answer: a. True
If an EFS encrypted folder is copied to a different computer the EFS encryption will remain enabled and still function. Assume you are NOT working in an Active Directory network.
True or False. If an EFS encrypted folder is copied to a diffe rent computer the...
Encryption true or false true false - passwords can be encrypted by non decryptable algorithms true false - traffic over a network can be encrypted by a non decryptable algorithm true false - passwords can be encrypted and salted several times true Ofalse - non decryptable algorithms do not have a rainbow
Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...
Computer Networks help: True/False questions and a reason (if applicable) as to why it is true or flase: 1. The TCP receiver sends an acknowledgment of sequence number n if it has correctly received byte n. T/F 2. The main motivation of TCP flow control at the sender is to avoid network congestion. T/F 3. When losses are present, Selective Repeat schemes are more efficient than Go-Back-N schemes. T/F 4. Congestion control can be implemented on an end-to-end basis or...
Class: Business Telecommunication and Networking Answer the following question with either True or False 1. Assume computers A and B are operating in an older version of Microsoft Windows-based network environment which accepts the below- mentioned subnet mask address. (Ensure that you carefully apply the termination criteria of subnet mask algorithm) Computer A (IP: 200.100.50.25; subnet mask: 255.255.255.193) is on the same subnet as Computer B (IP: 200.100.50.26). True/False? 2. A maximum of 256 IP addresses are available to a...
its
true or false questions
1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...
True / False & MCQ 1. Which of the following is true? there are 8 bits in a byte there are 8 bytes in a bit there are 8 tracks in a sector there are 8 sectors in a track none of the above A disk drive writes data from RAM onto a disk storage medium. Computer software can be divided into two categories; the operating system and the applications system. The microprocessors used on personal computers can only understand...
12. Regulatory compliance benefits organizationsl oAtrvrand SA0CS True/False Questions (1 point each) 13. An IT assessment is concerned about past results and performance, whereas an IT audit considers previous and current results as well as expected performance. A. True B. False 14. You use an audit to assess the presence and effectiveness of IT controls and to ensure that those controls are compliant with stated policies. A. True B. False 15. The TIX credit card breach initially occurred as a...
Question 21 In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs? a. root guard b. BPDU filter c. BPDU drop d. BPDU guard 1.25 points Question 22 In regards to the use of local authentication, what statement is accurate? a. Local authentication is scalable for large networks. b. Local authentication is network and server failure tolerant. c. Local authentication does not allow for strong enough passwords....
CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions) Question 58. Which among the following are the best practices for enhancing Disk FT? Select one or more: a. Verify hardware and firmware components b. Retain some un-allocated space c. Replace failed disk immediately d. Design complete FT storage pool Question 66. What are Group Policy Objects? Select one: a. Collection of settings that define what a system will look like and how it...
Question 6 After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. True False 1.25 points Question 7 An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-tolerant b. fail-close c. fail-open d. fail-dynamic 1.25 points Question 8 At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport...