Deck 15: Computer and Network Security

Full screen (f)
exit full mode
Question
A good password guideline is to use five characters with uppercase and lowercase letters and other characters.
Use Space or
up arrow
down arrow
to flip the card.
Question
In a Windows domain environment, the userid and password are created, stored, and maintained on a centralized server.
Question
The Ctrl+Alt+Del keys can be used to lock your Windows workstation.
Question
A benefit of electronic key cards is that they are cheaper than keys.
Question
You can encrypt someone elseʹs files for a different user.
Question
Keeping the File and Print Sharing enabled even if nothing is being shared on a computer is a good idea so that updates can be applied to this portion of the operating system in case they are ever reenabled.
Question
Another name for event logging is auditing.
Question
Antivirus and antispyware are not needed if a firewall is in place.
Question
A security policy is a policy written and recommended by IEEE.
Question
Applying operating system and application patches and updates is a good security practice.
Question
An RFID tag is commonly used for property security.
Question
A special laptop feature that enables a lock or alarm to be attached is known as a PC Card.
Question
A proxy server acts as an agent between a Web browser and a real server.
Question
A retinal scanner is a type of physical security device.
Question
Encryption is scrambling data so that it cannot be recognized.
Question
Authentication is the part of the operating system that determines what resources can be accessed and used across the network.
Question
By making a subfolder private, it is not automatically shared when the parent folder is shared.
Question
A firewall is a hardware device, not software.
Question
Another name for a DES card is a security token.
Question
Windows XP supports a maximum of 25 people accessing the same network share on a computer.
Question
Active scripts are used so that web pages stay static and do not change except for the data entered into textboxes or customer-driven scripts.
Question
PGP or S/MIME is used to protect email.
Question
When WEP is configured on the access point, all wireless clients must use WEP.
Question
A new file is created and stored in an encrypted folder. The file must be manually encrypted because it was added after the folder was encrypted.
Question
An email that comes from what appears to be your own bank, but actually is not, is an example of spyware.
Question
SSID broadcasting is when an access point sends out its WEP key to all wireless clients through the air. Those clients attached to the access point are allowed to transmit data.
Question
WEP is a type of wireless authentication technique.
Question
40-bit WEP and 64-bit WEP are the same thing.
Question
Phishing is controlled by using S/MIME.
Question
Mobile devices do not need antivirus software.
Question
A firewall cannot protect a wireless network.
Question
Grayware is a generic term for application or files that affect the computerʹs performance and cause it to act unusual.
Question
When you have a personal incident of child exploitation, you should report it to the FBI.
Question
Adware would show up as one or more pop-ups on a computer.
Question
A SPAN is a special type of security network.
Question
When you have a personal incident of phishing, you should report it to the FBI.
Question
A program that you have never used is trying to access your computer and the Windows firewall notices it. An alert comes up, and you use the Keep Blocking This Program option so that the program is effectively blocked.
Question
802.1x security standards can be applied to wireless networks.
Question
TKIP and AES improve WEP encryption.
Question
A cookie is a special program written to collect information and store it on the hard drive.
Question
The part of the security policy that defines what company resources can be accessed from home is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Question
A _______ is a document that provides rules and guidelines for security.

A) RFP
B) MSDS
C) Domain policy
D) Security policy
Question
Vista does not support private folders.
Question
The part of the security policy that defines the appropriate use of company data is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Question
What is an alternative to room keys for better security?

A) Key card
B) RFID
C) Hardware token
D) USS
Question
A remote lock would most likely be used on a netbook.
Question
Keeping the documentation for a new printer so that you are prepared when a problem occurs helps build customer trust.
Question
What keystrokes are used to lock a Windows computer?

A) F1
B) Ctrl+Alt+Esc
C) Ctrl+Alt+Del
D) Alt+F8
E) Shift+Ctrl+F8
Question
You can build customer trust by being honest.
Question
Port forwarding on a home router must be enabled for port 3389 for a technician to access a Windows 7 home computer using Remote Desktop.
Question
The part of the security policy that defines who has keys to the server room is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Question
What file system provides the best Windows security?

A) FAT16
B) FAT32
C) NTFS
D) OS2
Question
What technology is also known as a hardware token?

A) Key card
B) RFID
C) Hardware fob
D) USS
E) Security token
Question
An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?

A) Manually delete the file.
B) Repartition the hard drive.
C) Reload the operating system.
D) Use a better antivirus application.
Question
The iOS Settings > General option is used to set a passcode lock.
Question
What Windows XP control panel can be used so the computer cannot be seen through My Network Places?

A) Administrative Tools
B) Network Connections
C) System
D) Add/Remove Windows Components
Question
What technology is used to add hardware to protect laptops?

A) Key card
B) RFID
C) Hardware token
D) USS
Question
A fingerprint scanner is what type of device?

A) USS
B) Hardware token
C) Biometric
D) Key fob
Question
To protect data so it cannot be easily read, what technology is used?

A) Authentication
B) Encryption
C) Authorization
D) Firewalling
Question
What technology could be used to locate lost pets?

A) Key card
B) RFID
C) Hardware token
D) USS
Question
Where could you see the people who have logged onto a computer in the past 48 hours?

A) Event View security log
B) Device Manager security option
C) Computer Management toolʹs Local Users and Groups option
D) Boot to Safe Mode and select the Security boot option
Question
What security term defines what resources can be accessed and used?

A) Encryption
B) Authentication
C) Authorization
D) Access level security
Question
Which file system enables administrators to assign permissions to control access to network resources including encryption?

A) FAT32
B) EFS
C) CDFS
D) NTFS
Question
Which technique provides more security for the clients on a wireless network?

A) Disable SSID broadcasting
B) Enable WPA2
C) Enable infrastructure mode
D) Change the default password
Question
What type of userid and password is kept on a Windows XP computer?

A) Local
B) Domain
C) Active domain
D) Infrastructure
Question
A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as

A) A denial-of-service attack
B) Session hijacking
C) Spam
D) Phishing
Question
What should you do if someone is looking over your shoulder as you log onto your computer?

A) Type your password quickly.
B) Ask them to leave the room.
C) Type your password at your normal pace so that you donʹt make a mistake, but tap your thumb a couple of times as if you are typing a key.
D) Wait until they are not looking to type your password.
Question
Which of the following statements are true regarding encryption?

A) Windows files can be encrypted only if the NTFS partition is marked as active.
B) Windows uses USS for encrypting files and folders.
C) You can encrypt someone elseʹs files if you have the correct permissions.
D) Folders that are encrypted must be accessed using the UNC.
Question
A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?

A) Disable SSID broadcasting on the access point.
B) Enable WEP, TKIP, or AES on the access point.
C) Configure NTFS permissions on the shares.
D) Install a firewall for the networks.
Question
Which Windows 7 control panel is used to configure the firewall?

A) Network Connections
B) System and Security
C) Hardware
D) Computer Safety
Question
What network environment has centralized servers for authentication?

A) Local
B) Domain
C) Infrastructure
D) Ad hoc
Question
Another name for event logging is

A) Authentication
B) Authorization
C) Encryption
D) None of these are names for event logging.
Question
What security term describes a program written to collect information and store it on the hard drive?

A) Virus
B) Intrusion detection and alerts
C) Cookie
D) Authentication
Question
Why are words such as monkey, smile, and freedom not good to use as passwords?

A) They are in password crack dictionaries.
B) They are easy to guess.
C) They are easy to see when typing.
D) They are the three most commonly used passwords.
Question
What security term describes scrambling data so that it cannot be read?

A) Encryption
B) Authentication
C) Authorization
D) Auditing
Question
What is the minimum number of characters a password should be?

A) Five
B) Six
C) Seven
D) Eight
E) Nine
Question
What is the maximum number of simultaneous users that can access a Windows 7 share?

A) 20
B) 45
C) 60
D) 8
E) 10
Question
Which password would be most secure?

A) byteme
B) 1adyVol3
C) cAtchm3
D) Tennessee
Question
Which statement is true about network shares?

A) Network shares cannot be accessed locally on the computer doing the sharing.
B) A network share cannot contain encrypted files.
C) Windows network shares can be accessed only by Windows-based computers.
D) If a folder is shared, all subfolders are automatically shared.
Question
What Windows feature enables file and folder encryption?

A) PCI/E
B) EFS
C) USS
D) ENT
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/132
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Computer and Network Security
1
A good password guideline is to use five characters with uppercase and lowercase letters and other characters.
False
2
In a Windows domain environment, the userid and password are created, stored, and maintained on a centralized server.
True
3
The Ctrl+Alt+Del keys can be used to lock your Windows workstation.
True
4
A benefit of electronic key cards is that they are cheaper than keys.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
5
You can encrypt someone elseʹs files for a different user.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
6
Keeping the File and Print Sharing enabled even if nothing is being shared on a computer is a good idea so that updates can be applied to this portion of the operating system in case they are ever reenabled.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
7
Another name for event logging is auditing.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
8
Antivirus and antispyware are not needed if a firewall is in place.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
9
A security policy is a policy written and recommended by IEEE.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
10
Applying operating system and application patches and updates is a good security practice.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
11
An RFID tag is commonly used for property security.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
12
A special laptop feature that enables a lock or alarm to be attached is known as a PC Card.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
13
A proxy server acts as an agent between a Web browser and a real server.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
14
A retinal scanner is a type of physical security device.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
15
Encryption is scrambling data so that it cannot be recognized.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
16
Authentication is the part of the operating system that determines what resources can be accessed and used across the network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
17
By making a subfolder private, it is not automatically shared when the parent folder is shared.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
18
A firewall is a hardware device, not software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
19
Another name for a DES card is a security token.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
20
Windows XP supports a maximum of 25 people accessing the same network share on a computer.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
21
Active scripts are used so that web pages stay static and do not change except for the data entered into textboxes or customer-driven scripts.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
22
PGP or S/MIME is used to protect email.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
23
When WEP is configured on the access point, all wireless clients must use WEP.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
24
A new file is created and stored in an encrypted folder. The file must be manually encrypted because it was added after the folder was encrypted.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
25
An email that comes from what appears to be your own bank, but actually is not, is an example of spyware.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
26
SSID broadcasting is when an access point sends out its WEP key to all wireless clients through the air. Those clients attached to the access point are allowed to transmit data.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
27
WEP is a type of wireless authentication technique.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
28
40-bit WEP and 64-bit WEP are the same thing.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
29
Phishing is controlled by using S/MIME.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
30
Mobile devices do not need antivirus software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
31
A firewall cannot protect a wireless network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
32
Grayware is a generic term for application or files that affect the computerʹs performance and cause it to act unusual.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
33
When you have a personal incident of child exploitation, you should report it to the FBI.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
34
Adware would show up as one or more pop-ups on a computer.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
35
A SPAN is a special type of security network.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
36
When you have a personal incident of phishing, you should report it to the FBI.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
37
A program that you have never used is trying to access your computer and the Windows firewall notices it. An alert comes up, and you use the Keep Blocking This Program option so that the program is effectively blocked.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
38
802.1x security standards can be applied to wireless networks.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
39
TKIP and AES improve WEP encryption.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
40
A cookie is a special program written to collect information and store it on the hard drive.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
41
The part of the security policy that defines what company resources can be accessed from home is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
42
A _______ is a document that provides rules and guidelines for security.

A) RFP
B) MSDS
C) Domain policy
D) Security policy
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
43
Vista does not support private folders.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
44
The part of the security policy that defines the appropriate use of company data is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
45
What is an alternative to room keys for better security?

A) Key card
B) RFID
C) Hardware token
D) USS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
46
A remote lock would most likely be used on a netbook.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
47
Keeping the documentation for a new printer so that you are prepared when a problem occurs helps build customer trust.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
48
What keystrokes are used to lock a Windows computer?

A) F1
B) Ctrl+Alt+Esc
C) Ctrl+Alt+Del
D) Alt+F8
E) Shift+Ctrl+F8
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
49
You can build customer trust by being honest.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
50
Port forwarding on a home router must be enabled for port 3389 for a technician to access a Windows 7 home computer using Remote Desktop.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
51
The part of the security policy that defines who has keys to the server room is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
52
What file system provides the best Windows security?

A) FAT16
B) FAT32
C) NTFS
D) OS2
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
53
What technology is also known as a hardware token?

A) Key card
B) RFID
C) Hardware fob
D) USS
E) Security token
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
54
An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do?

A) Manually delete the file.
B) Repartition the hard drive.
C) Reload the operating system.
D) Use a better antivirus application.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
55
The iOS Settings > General option is used to set a passcode lock.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
56
What Windows XP control panel can be used so the computer cannot be seen through My Network Places?

A) Administrative Tools
B) Network Connections
C) System
D) Add/Remove Windows Components
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
57
What technology is used to add hardware to protect laptops?

A) Key card
B) RFID
C) Hardware token
D) USS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
58
A fingerprint scanner is what type of device?

A) USS
B) Hardware token
C) Biometric
D) Key fob
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
59
To protect data so it cannot be easily read, what technology is used?

A) Authentication
B) Encryption
C) Authorization
D) Firewalling
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
60
What technology could be used to locate lost pets?

A) Key card
B) RFID
C) Hardware token
D) USS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
61
Where could you see the people who have logged onto a computer in the past 48 hours?

A) Event View security log
B) Device Manager security option
C) Computer Management toolʹs Local Users and Groups option
D) Boot to Safe Mode and select the Security boot option
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
62
What security term defines what resources can be accessed and used?

A) Encryption
B) Authentication
C) Authorization
D) Access level security
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
63
Which file system enables administrators to assign permissions to control access to network resources including encryption?

A) FAT32
B) EFS
C) CDFS
D) NTFS
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
64
Which technique provides more security for the clients on a wireless network?

A) Disable SSID broadcasting
B) Enable WPA2
C) Enable infrastructure mode
D) Change the default password
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
65
What type of userid and password is kept on a Windows XP computer?

A) Local
B) Domain
C) Active domain
D) Infrastructure
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
66
A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as

A) A denial-of-service attack
B) Session hijacking
C) Spam
D) Phishing
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
67
What should you do if someone is looking over your shoulder as you log onto your computer?

A) Type your password quickly.
B) Ask them to leave the room.
C) Type your password at your normal pace so that you donʹt make a mistake, but tap your thumb a couple of times as if you are typing a key.
D) Wait until they are not looking to type your password.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following statements are true regarding encryption?

A) Windows files can be encrypted only if the NTFS partition is marked as active.
B) Windows uses USS for encrypting files and folders.
C) You can encrypt someone elseʹs files if you have the correct permissions.
D) Folders that are encrypted must be accessed using the UNC.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
69
A wireless access point connects to the wired network. What can you do to prevent unauthorized users from accessing shared files on the wired network?

A) Disable SSID broadcasting on the access point.
B) Enable WEP, TKIP, or AES on the access point.
C) Configure NTFS permissions on the shares.
D) Install a firewall for the networks.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
70
Which Windows 7 control panel is used to configure the firewall?

A) Network Connections
B) System and Security
C) Hardware
D) Computer Safety
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
71
What network environment has centralized servers for authentication?

A) Local
B) Domain
C) Infrastructure
D) Ad hoc
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
72
Another name for event logging is

A) Authentication
B) Authorization
C) Encryption
D) None of these are names for event logging.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
73
What security term describes a program written to collect information and store it on the hard drive?

A) Virus
B) Intrusion detection and alerts
C) Cookie
D) Authentication
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
74
Why are words such as monkey, smile, and freedom not good to use as passwords?

A) They are in password crack dictionaries.
B) They are easy to guess.
C) They are easy to see when typing.
D) They are the three most commonly used passwords.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
75
What security term describes scrambling data so that it cannot be read?

A) Encryption
B) Authentication
C) Authorization
D) Auditing
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
76
What is the minimum number of characters a password should be?

A) Five
B) Six
C) Seven
D) Eight
E) Nine
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
77
What is the maximum number of simultaneous users that can access a Windows 7 share?

A) 20
B) 45
C) 60
D) 8
E) 10
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
78
Which password would be most secure?

A) byteme
B) 1adyVol3
C) cAtchm3
D) Tennessee
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
79
Which statement is true about network shares?

A) Network shares cannot be accessed locally on the computer doing the sharing.
B) A network share cannot contain encrypted files.
C) Windows network shares can be accessed only by Windows-based computers.
D) If a folder is shared, all subfolders are automatically shared.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
80
What Windows feature enables file and folder encryption?

A) PCI/E
B) EFS
C) USS
D) ENT
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 132 flashcards in this deck.