1. Which of the following can be used to kill a running process?
A. Task Manager
B. Computer Management
C. Control Panel
D. Tasklist
2. Which of the following file systems is suited specifically for USB flash drives?
A. FAT32
B. exFAT
C. NTFS
D. FAT16
3. A program has been detected collecting information such as the computer name and IP address and sending that information to a specific IP address on the Internet. Which kind of threat is this an example of?
A. Spyware
B. Virus
C. Rootkit
D. Spam
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here