old  protecting your assets ( correlates to technology guide 5) practice quiz

1.
Content filtering software logs keystrokes, e-mails, Web sites, and chat conversations.
A. True
B. False


2.
Monitoring software blocks access to undesirable Web sites.
A. True
B. False


3.
Two-factor authentication would consist of fingerprint scanner and then a personal password.
A. True
B. False


4.
When an attacker compromises your computer, he or she typically leaves one or more new files on your hard drive, so it is important that you know how to look for such files.
A. True
B. False


5.
When you compute wirelessly, you should use the WPA2 encryption standard.
A. True
B. False



STOP This is the end of the test. When you have completed all the questions and reviewed your answers, press the button below to grade the test.

Hit Counter