Securing Your Computing Environment
7 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a potential risk of installing unsanctioned software and devices in a corporate environment?

  • Improved user training
  • Financial and legal penalties (correct)
  • Increased operational efficiency
  • Enhanced IT department control

Which of the following constraints might limit the usage of commercial software in a corporate environment?

  • Number of IT department staff
  • Number of supported devices (correct)
  • Number of user training sessions
  • Number of software updates

Which of the following is a consideration when deploying a complex application in a corporate environment?

  • Ongoing user training requirement (correct)
  • External software licensing
  • Availability of free technical support
  • Minimal impact on IT operations

Which of the following is a benefit of using Group Policy Objects (GPOs) to deploy applications?

<p>Prevents unauthorized modification of the computer (C)</p> Signup and view all the answers

What is the principal threat when selecting applications for installation on desktops?

<p>Infection with computer viruses (D)</p> Signup and view all the answers

How can security issues related to software installation be mitigated?

<p>All of the above (D)</p> Signup and view all the answers

Where should files created using an application or custom settings/preferences specific to a user be saved?

<p>The user's home folder/profile (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser