Thursday, April 2, 2009

Tech Republic

Today, after the lecture, each of you will be reading an article from TECH REPUBLIC and sharing what you've learned.

Each of you will choose any article on the main page... Post the title for the article that you've chosen in a comment to this blog.


.

Wednesday, April 1, 2009

Chapter 24 ?s

Answer the following concerning Chapter 24
  • How could you physically control access to computer system?
  • What is password width? What is password depth?
  • List 3 'best practices' for passwords.
  • Describe how polarized screens work.
  • List 4 biometric qualities that could be used for authentication.
  • How should sensitive paper documents be disposed of?
  • Why is NTFS more secure than FAT?
  • How are user accounts different between workgroup and domain environments?
  • What is the purpose of user groups?
  • In workgroup environments, where is the user profile stored?
  • What is the name of the user profile file?
  • Are you infected with the Conficker virus?

.