Sever Mode Security
Sever Mode Security
A. Web Server
B. File Server C. Mail
Server D. Application Server
10. ________
is a malicious program which is loaded into the user’s computer
without user’s knowledge.
A. Computer Virus B. Phishing C. Social Engineering D.
Hacker
11. ________ is a command that is specifically used to install active
directory.
A. gpupdate /force B. DCPROMO C. Dxdiag D. msinfo
12. The Most Secure computer is not connected to the internet and have
shielded from any interference. A. True B. False C.
A&B
13. _______are network devices that is used to identify and report on unwanted
traffic in a network.
14. Which of the following protocols are helpful for secure data
transmission?
A. IP Sec B. PPTP C. SSH D. SSL E. All
are correct
15. __________ is a trustworthy person or business that attempts to steal sensitive
financial or personal information through fake email or instant messages.
A. Computer virus B. rootkit C. Phishing D. keyloggers E.
All