Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
What is the default format for text in a word 2016 document?
True or False: When you apply highlight to text, the highlight is only visible on screen and does not print
True or False:Pressing [F4] repeats the last step you took
Which feature allows you to copy multiple format settings at once?
Why is Challenge Handshake Authentication Protocol (CHAP) considered to be legacy and no longer acceptable for general use?
Which of the following authentication protocols should NOT be used in a production environment?
New Technology LAN Manager (NTLM) is which type of authentication protocol?
Which of the following authentication protocols should one NEVER use due to it lacking encryption of any kind?
True or False: A single line of text can be considered a paragraph in Word
You have been asked to provide authentication, authorization, and accounting for dial-up users.Which solution will you consider?
You have been tasked with securing your company's internal, private web server, and authenticating users who access it using a secure, industry-standard method.What method will you use?
Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, access, etc.) of a Windows network, but has since been identified as vulnerable to brute force and pass the hash attacks?
If you want to encrypt all authorization information as it passes through your network, what could you use?
Which identity federation method is usually coupled with another to further strengthen security?
Which protocol would best serve to authorize users to access directory services?
Which protocol would you use to periodically authenticate a user or network host to an authenticating entity?
What type of line connects multiple physical switches in a VLAN environment?
Entries in an Imhosts file resolve IP addresses to _______ names on devices
What powershell command is used for remoting into a machine on the network and use commands on it?
What does IPv6 provide on data to help secure data transmission?