Wednesday, April 1, 2009

Chapter 24 ?s

Answer the following concerning Chapter 24
  • How could you physically control access to computer system?
  • What is password width? What is password depth?
  • List 3 'best practices' for passwords.
  • Describe how polarized screens work.
  • List 4 biometric qualities that could be used for authentication.
  • How should sensitive paper documents be disposed of?
  • Why is NTFS more secure than FAT?
  • How are user accounts different between workgroup and domain environments?
  • What is the purpose of user groups?
  • In workgroup environments, where is the user profile stored?
  • What is the name of the user profile file?
  • Are you infected with the Conficker virus?

.

No comments: