tag:blogger.com,1999:blog-2184176255597764659.post296724045650973088..comments2024-03-27T08:33:19.532-05:00Comments on Ingeniería Systems: 01 | Information Protection - What’s New in Windows 8.1 Security - MVA - Microsoft Virtual Academy - Módulo 1 de 4El Guillehttp://www.blogger.com/profile/10504748824691594903noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-2184176255597764659.post-70863793724751218632014-07-17T21:05:04.383-05:002014-07-17T21:05:04.383-05:00Hola Victor Contreras, gracias por la visita y el ...Hola Victor Contreras, gracias por la visita y el aporte de tus conocimientos!!<br />Genial, mucho valor de mi parte a tus aportes!!<br />Éxitos!! Hasta cualquier momento...El Guillehttps://www.blogger.com/profile/10504748824691594903noreply@blogger.comtag:blogger.com,1999:blog-2184176255597764659.post-66352432482652360622014-06-23T18:32:41.521-05:002014-06-23T18:32:41.521-05:00--How does Windows 8.1 protect system memory from ...--How does Windows 8.1 protect system memory from attack? <br />TPM firmware <br />**Disabled DMA ports <br />A discrete TPM chip <br />PCR<br /><br />--What type of attack relies on accessing the memory of a system? <br />SYN Flood <br />**DMA Port attack <br />Port scanning <br />Smurfing<br /><br /><br />--Which of the following helps to reduce hardware costs associated with encryption? <br />A discrete TPM chip <br />FIPS <br />PTT <br />**TPM firmware<br /><br />True or False: When a Bitlocker-protected Windows 8.1 device is accidentally locked, all data will be automatically wiped.<br />Verdadero<br />**Falso<br /><br />Which of the following facilitates reboots of TPM-based systems in a data center? <br />TPM auto-provisioning {--}<br />Used Disk Space Only encryption <br />Network key protector <br />Remote business data removalAnonymoushttps://www.blogger.com/profile/05193405638835995404noreply@blogger.com