If you want to roll back or undo an action, what shortcut should you use?
6. Question 6 If you want to roll back or undo an action, what shortcut should you use? 1 point Ctrl-W Ctrl-C Ctrl-Z Ctrl-V
6. Question 6 If you want to roll back or undo an action, what shortcut should you use? 1 point Ctrl-W Ctrl-C Ctrl-Z Ctrl-V
2. Question 2 What does Windows create every time an applications is started in user mode? 1 point A kernel. A process. A task. A shell.
1. Question 1 What Windows mode do users interact with directly? 1 point Shell mode User mode Kernel mode Desktop mode
7. Question 7 Which type of method would include something you are, such as a fingerprint? 1 point Accountability Authorization Authentication Identification
6. Question 6 Hamid has access to certain resources because he is a Quality Control Inspector and he has access to other resources because he is the manager of that…
5. Question 5 Which of the following is NOT an authentication method? 1 point Something you get Something you know Something you are Something you have
3. Question 3 Which is an example of technical uses of physcial security controls? 1 point Tokens Tramps Lists and logs All of the above.
2. Question 2 Which statement best describes DAC (Discretionary Access Control)? 1 point Limits access to campuses, buildings, rooms. Uses labels to regulate the access. Each object (folder or file)…
1. Question 1 Identify the three (3) security functions associated with AAA. 1 point Accountability (Accounting) Authentication Authorization Access Control
3. Question 3 If Trudy intercepts and reads a message that Alice is sending to Bob, and then she deletes it without allowing it to be delivered, which 2 aspects…