61. | Find out, select & uninstall all ________________ programs from your computer. |
Discuss |
Answer: (c).unwanted
|
62. | As a backup for securing your device, it is necessary to create a _____________ |
Discuss |
Answer: (d).restore point
|
63. | The _______________ is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them. |
Discuss |
Answer: (b).Windows Firewall
|
64. | _____________ are essential because they frequently comprises of critical patches to security holes. |
Discuss |
Answer: (d).Software updates
|
65. | The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference. |
Discuss |
Answer: (a).system, administrator
|
66. | ________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware. |
Discuss |
Answer: (b).Windows Defender
|
67. | ____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose. |
Discuss |
Answer: (c).BitLocker
|
68. | A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication. |
Discuss |
Answer: (d).Trusted Platform Module
|
69. | TPM is abbreviated as ____________ |
Discuss |
Answer: (b).Trusted Platform Module
|
70. | Which of the following is not an appropriate way of targeting a mobile phone for hacking? |
Discuss |
Answer: (d).Snatch the phone
|