Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1
What is the primary limitation of free versions of antivirus applications?


A. They don't protect in real time.

B. They only perform quick scans.

C. They cannot scan the Windows directory.

D. They only install on 64-bit operating systems.


Question 2
Which selection below lists two operating systems that include BitLocker?


A. Windows XP Professional and Windows 7 Professional

B. Vista Ultimate and Windows 8 Enterprise

C. Windows 7 Professional and Windows 8 Professional

D. Windows 7 Ultimate and Windows 8 Professional

 

Question 3
You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?


A. Use BitLocker with the new OS to copy and paste the files to a USB drive.

B. Use the Administrator account of the new OS to take ownership of the files.

C. Decrypt the files using the encryption key of the new OS on the system volume.

D. Decrypt the files using the newly installed certificate from the new OS.


Question 4
Your mom's computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?


A. A fragmented volume

B. Spyware

C. A bad printer driver

D. Not enough memory

Question 5
Your AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this?


A. CCleaner

B. Disk Cleanup

C. MalwareBytes

D. Auslogics Disk Defrag

Question 6
Why is it best to run AV scans when the computer isn't being utilized?


A. The scans consume resources and can impede computer performance.

B. Executable files can't be scanned if a user is using them within an application.

C. The Windows directory can't be scanned if the computer is being used.

D. AV applications can only do full scans if the computer is in safe mode.

Question 7
What type of hard drive does not require defragging?


A. A hard drive for a server

B. A hard drive for a 64-bit operating system

C. A solid-state drive hosting Windows 7

D. An SCSI drive hosting Server 2008

Question 8
Which statement below is not true about EFS?


A. It can only be implemented on an NTFS partition.

B. It requires a user to type in a PIN.

C. It is supported by the Windows operating system.

D. It doesn't require TPM compatibility.

Question 9
You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?


A. Inbound rules only

B. Outbound rules only

C. Neither inbound nor outbound rules

D. Both inbound and outbound rules

Question 10
Which of the events below would automatically create a new restore point on your Windows 8 computer?


A. Deleting the temporary files

B. Installing a new printer

C. Downloading music files

D. Creating a new Internet favorite


Question 11
What is a limiting factor of EFS when compared to BitLocker?


A. It only works on 32-bit operating systems.

B. It only works with a public certificate.

C. It only works under the Administrator account.

D. It only works at the file or folder level.


Question 12
Which of the actions below will not create more room on your hard drive?


A. Defragging your hard drive

B. Uninstalling an application

C. Deleting temporary Internet files

D. Deleting image and video files

Question 13
You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?


A. CHKDSK /f

B. CHKDSK /r

C. CHKDSK /e

D. CHKDSK /RD

Question 14
In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:


A. be 32-bit.

B. host a virtualized enabled BIOS.

C. be TPM-compatible.

D. have a USB 3.0 interface.


Question 15
A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?


A. From the Processes tool in the Control Panel

B. From the Process tab in Task Manager

C. From the Performance tab in Task Manager

D. From the Windows Defrag console

Question 16
Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?


A. Ccleaner

B. TreeSize

C. MalwareBytes

D. Auslogics Disk Defrag

Question 17
Which type of Windows updates below is strictly security-related?


A. Critical

B. Optional

C. Recommended

D. Service Pack


Question 18
You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?


A. CCleaner

B. ZoneAlarm

C. Microsoft Security Essential

D. MalwareBytes

 

Question 19
You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?


A. 3%

B. 5%

C. 10%

D. 15%


Question 20
Which of the instances below is an example of a Trojan horse?


A. An attachment in an email that is really a malicious file

B. A link in an email that downloads a virus

C. An executable file that replicates throughout the network

D. A computer game that creates a backdoor into your computer

 

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91525514
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Consider the following reactionccl4g 4 cl2g rarr ch4g 4

Consider the following reaction: CCl4(g) + 4 Cl2(g) → CH4(g) + 4 HCl(g) What mass of CCl4 is formed by the reaction of 2.00 g of methane with an excess of chlorine?

Recall the linked list data structure from previous week

Recall the linked list data structure from previous week, that follows a structure as given above. Purpose of this lab is to understanding the fundamentals of the Linked Lists. Please check the attached code and implemen ...

Shell scripting -- linuxpart-1 write a script that asks the

Shell Scripting -- Linux Part-1 Write a script that asks the user to enter his name. Read the name. Then asks the user to enter the phone number. Then read the phone number. Append the name and phone number (separated by ...

Show your steps of how you found your calculations please

Show your steps of how you found your calculations. Please type reponse. Suppose the daytime processing load consists of 60% CPU activity and 40% disk activity. Your customers are complaining that the system is slow. Aft ...

Question summarize the human-computer interface hci of

Question : Summarize the human-computer interface (HCI) of Microsoft Word 2013 and Visio 2013. Explain the importance of HCI and usability of the software. Be sure to note any commonalities between the applications and n ...

Please do it in c programrevisit the matrix addition

Please do it in C program Revisit the matrix addition function Write the program so that it would not need to take a third pointer for the result matrix Instead, have the function return a pointer to the results matrix P ...

Question how can the security vulnerabilities common with

Question : How can the security vulnerabilities common with wireless networking be handled to mitigate the risks? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the A ...

Question suppose you have to design a mobile application to

Question : Suppose you have to design a mobile application to control your microwave over internet. Define the objective, assumptions and Interface Metaphors of this application.

Need guidance on a c program that1 asks the user to input a

Need guidance on a C++ program that: 1. Asks the user to input a number of cents 2. Calculates and displays the number of quarters, dimes, nickels, and pennies that should be used to reach the value. EX: 67 cents would b ...

Research parallel computing and prepare an informal paper 2

Research parallel computing and prepare an informal paper 2 -3 pages in length, single spaced with a blank line beltween paragraphs. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As