Securing Your Computing Environment
7 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a potential risk of installing unsanctioned software and devices in a corporate environment?

  • Improved user training
  • Financial and legal penalties (correct)
  • Increased operational efficiency
  • Enhanced IT department control
  • Which of the following constraints might limit the usage of commercial software in a corporate environment?

  • Number of IT department staff
  • Number of supported devices (correct)
  • Number of user training sessions
  • Number of software updates
  • Which of the following is a consideration when deploying a complex application in a corporate environment?

  • Ongoing user training requirement (correct)
  • External software licensing
  • Availability of free technical support
  • Minimal impact on IT operations
  • Which of the following is a benefit of using Group Policy Objects (GPOs) to deploy applications?

    <p>Prevents unauthorized modification of the computer</p> Signup and view all the answers

    What is the principal threat when selecting applications for installation on desktops?

    <p>Infection with computer viruses</p> Signup and view all the answers

    How can security issues related to software installation be mitigated?

    <p>All of the above</p> Signup and view all the answers

    Where should files created using an application or custom settings/preferences specific to a user be saved?

    <p>The user's home folder/profile</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser