Tech Data



Security TrainingWhat best defines the term MALWARE?A term to refer to SPAMA term to define illegally downloaded softwareA term used to refer to a security applianceA term used to refer to a virus, worm or trojanWhat are two consequences of security attacks? (Select two)Loss of reputationIncreased stock pricePossible LawsuitsDecrease in fines from regulatory agenciesWhat best defines a UTM?Controls the internetAll-inclusive security applianceProvides Antispam protectionControls access to and from a networkTrue or False? Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers.TFWhat type of encryption would protect all the content on a laptop if lost?File Share EncryptionNetwork EncryptionFull Disk EncryptionEmail EncryptionWhat security offering can monitor how confidential data is being used and where it is going?AntimalwareFirewallData Loss PreventionIntrusion PreventionTrue or False. If you let your antimalware support and maintenance expire you will always continue to receive updates to your malware software.TFTrue or False. Web and URL Filtering solutions are used to monitor web usage and block inappropriate destinations.TFMalware has multiple points of entry. (Select three).EmailUSB DriveVoicemailInternetThe term Physical Security includes which type of products? (Select three).Video Surveillance CamerasBiometric DevicesAccess ControlsAntivirus Software ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download