Tea, Earl Grey, Hot
Which of these security threats is designed to replicate itself without any user intervention?
Which of these security threats is designed to replicate itself without any user intervention?
Which of these security threats are invisible to a computer’s operating system?
These aren’t the security threats you’re looking for Read More »
Your company has just digitally imaged a year of corporate tax documents. Which of these would be the best way to dispose of the paper copies?
Which of these would be the best description of a security vulnerability that modifies core system files and can be invisible to the operating system?
Which of these threats would be the best choice to describe a fake email or web site that convinces users to willingly provide private information?
Can you use that security threat in a sentence, please? Read More »
Malware has become a common occurrence on our home and business computers. In this video, you’ll learn the best approaches for identifying and eradicating malware from our PCs.
Best Practices for Malware Removal – CompTIA A+ 220-802: 4.7 Read More »
If you are experiencing a security-related problem, then you’re going to need the right tools to get your systems up and running again. In this video, you’ll learn about anti-virus software, the Windows Recovery Console and Command Prompt, System Restore, pre-installation environments, and the Windows Event Viewer.
Tools for Security Troubleshooting – CompTIA A+ 220-802: 4.7 Read More »
Security problems can cause significant downtime and put all of your data at risk. In this video, you’ll learn about browser security issues, malware symptoms, virus hoaxes, and email security.
Troubleshooting Common Security Issues – CompTIA A+ 220-802: 4.7 Read More »
If you’re looking to keep your workstations secure, then you have to be constantly vigilant. In this video, you’ll learn about best practices dealing with password complexity, user permissions, account availability, and desktop security.
Workstation Security Best Practices – CompTIA A+ 220-802: 2.3 Read More »
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.
Common Security Threats – CompTIA A+ 220-802: 2.2 Read More »