- How could you physically control access to computer system?
- What is password width? What is password depth?
- List 3 'best practices' for passwords.
- Describe how polarized screens work.
- List 4 biometric qualities that could be used for authentication.
- How should sensitive paper documents be disposed of?
- Why is NTFS more secure than FAT?
- How are user accounts different between workgroup and domain environments?
- What is the purpose of user groups?
- In workgroup environments, where is the user profile stored?
- What is the name of the user profile file?
- Are you infected with the Conficker virus?
.
No comments:
Post a Comment