Term
The Malicious Software Removal Tool is updated __________. |
|
Definition
|
|
Term
A __________ scan checks only those areas most likely to contain malicious software |
|
Definition
|
|
Term
Which Internet options tab contains the Pop-Up blocker settings? |
|
Definition
|
|
Term
What is the default blocking level for the pop-up blocker? |
|
Definition
|
|
Term
Identify the filter setting for Pop-Up Blocker that will "Block most automatic pop-ups". |
|
Definition
|
|
Term
A pop-up blocker can be configured to always allow pop-ups from a particular website. This practice is sometimes referred to as ____. |
|
Definition
|
|
Term
When using a pop-up blocker, the user is free to configure it to do which of the following? |
|
Definition
Allow popups on a particular site Block popups on a particular site Set blocker to a preconfigured level such as medium or high and Block all popups at all times |
|
|
Term
Using the DLP system of security tools, data is examined in any of three states. Which of the following is NOT one of those states?
a. Data-in-use b. Data-in-storage c. Data-in-transit d. Data-at-rest |
|
Definition
|
|
Term
Of the security control methods listed, which would occur before an attack? |
|
Definition
|
|
Term
When examining the available deterrent options to prevent fence climbing, which would be considered the LEAST aggressive? |
|
Definition
|
|
Term
Which technology would most effectively eliminate bottlenecks within the corporate environment? |
|
Definition
|
|
Term
In order to create a secure trusted OS, which technique would remove all Administrator and Supervisor accounts? |
|
Definition
|
|