Professional Documents
Culture Documents
Score = ___________
Rating: ____________
SELF CHECK 1:
1. C
2. D
SELF CHECK 2:
1. B
2. D
3. B
4. B
5. C
SELF CHECK 3:
SELF CHECK 4:
1
Encrypting data uses codes and ciphers. Traffic between resources and computers on
the network can be protected from attackers monitoring or recording transactions by
implementing encryption.
SELF CHECK 6:
BIOS – Prevents BIOS settings from being changed without the appropriate password
Login – Prevents unauthorized access to the network