COMP 129 Quiz 6 COMP 129 Quiz 6

COMP 129 Quiz 6 Click Below Link To Purchase www.foxtutor.com/product/comp-129-quiz-6 1. (TCO 8) What two things are needed in order to configure a computer for a proxy server? 2. (TCO 9) A(n) _____ is about the size of a credit card but thicker 3. (TCO 8) Which Windows tool do you use to view a recorded log of network activity? 4. (TCO 8) An antivirus application has found a file that states the file is part of a virus, but it cannot be deleted by the application. What should you do? 5. (TCO 8) A strong password should 6. (TCO 8) What security term describes a program written to collect information and store it on the hard drive? 7. (TCO 8) Technology that enables you to create a tunnel from one network device to another over the Internet is 8. (TCO 8) A _____ does not need a host program to work; rather, it substitutes itself for a legitimate program. 9. (TCO 8) Which technique provides more security for the clients on a wireless network? 10. (TCO 8) Which of the following is an example of social engineering?