Describe how you can control how a user logs on to a Windows system and how doing so can make a system more secure.
What will be an ideal response?
Normally, when a computer is first booted or comes back from a sleep state, Windows displays a lock screen that can be dismissed by pressing a key on the keyboard or clicking anywhere on the screen, which then takes the user to the sign-in screen showing all active user accounts. From here, a user clicks his account name and enters his password. Malware can sometimes display a false sign-in screen to trick users into providing user account passwords. A more secure method of sign in, called secure sign in or secure logon, requires the user to press Ctrl+Alt+Delete to get to a sign-in screen.
You might also like to view...
Match the following field properties with their description or something true about the property:
I. Caption II. Format III. Required IV. Indexed V. Result Type A. Does not affect the stored value B. Increases efficiency during searches C. Used for calculated fields only D. More understandable than field names E. Cannot be Null
Microsoft Office for Mac 2011 offers ____ as a feature that lets you easily create professional looking business diagrams, such as organizational charts, process diagrams, and timelines.
A. SmartArt B. Draw Table C. Clip Gallery D. Table Styles Gallery
A sans serif font contains thin lines on its characters
Indicate whether the statement is true or false
The Remove Duplicates button is found on the ____ tab.
A. Table Tools Design B. Data C. Home D. File