Securing Your Computing Environment

LucrativeMagenta avatar
LucrativeMagenta
·
·
Download

Start Quiz

Study Flashcards

7 Questions

Which of the following is a potential risk of installing unsanctioned software and devices in a corporate environment?

Financial and legal penalties

Which of the following constraints might limit the usage of commercial software in a corporate environment?

Number of supported devices

Which of the following is a consideration when deploying a complex application in a corporate environment?

Ongoing user training requirement

Which of the following is a benefit of using Group Policy Objects (GPOs) to deploy applications?

Prevents unauthorized modification of the computer

What is the principal threat when selecting applications for installation on desktops?

Infection with computer viruses

How can security issues related to software installation be mitigated?

All of the above

Where should files created using an application or custom settings/preferences specific to a user be saved?

The user's home folder/profile

Test your knowledge on maintaining a secure computing environment and mitigating potential impacts from deploying new applications. Learn about the importance of IT department control and oversight, and the risks associated with unsanctioned software and devices.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser