Check answers here:
IT Essentials (Version 8.0) Chapter 13 Exam Answers
Quiz-summary
0 of 35 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
Information
IT Essentials (ITE v6.0 + v7.0) Chapter 13 Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 35 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- Answered
- Review
-
Question 1 of 35
1. Question
1 pointsWhich two items are used in asymmetric encryption? (Choose two.)Correct
Incorrect
Hint
A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key. -
Question 2 of 35
2. Question
1 pointsWhich two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)Correct
Incorrect
-
Question 3 of 35
3. Question
1 pointsA high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)Correct
Incorrect
Hint
A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area. -
Question 4 of 35
4. Question
1 pointsA user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?Correct
Incorrect
Hint
Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering. -
Question 5 of 35
5. Question
1 pointsThe IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?Correct
Incorrect
Hint
Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware consists, typically, of annoying popup windows. Unlike a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict access to network services. -
Question 6 of 35
6. Question
1 pointsAfter confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?Correct
Incorrect
Hint
After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process. -
Question 7 of 35
7. Question
1 pointsA system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?Correct
Incorrect
Hint
Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data. -
Question 8 of 35
8. Question
1 pointsWhen would a PC repair person want to deploy the idle timeout feature?Correct
Incorrect
Hint
The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off. -
Question 9 of 35
9. Question
1 pointsWhich type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?Correct
Incorrect
Hint
There are several types of firewall configurations: Packet filter – Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port. Stateful packet inspection (SPI) – This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped. Application layer – All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices. Proxy – This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet. -
Question 10 of 35
10. Question
1 pointsWhat would cause a Microsoft Windows update to fail?Correct
Incorrect
Hint
Two things commonly cause a Windows update to fail: 1. A required older update was not installed. 2. There was a problem with the downloaded update. -
Question 11 of 35
11. Question
1 pointsA user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?Correct
Incorrect
Hint
Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution. -
Question 12 of 35
12. Question
1 pointsHow can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?Correct
Incorrect
Hint
When a computer user browses the web in private mode, the following occurs:Cookies are disabled. Temporary Internet files are removed after closing the window. Browsing history is removed after closing the window. -
Question 13 of 35
13. Question
1 pointsA retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation?Correct
Incorrect
Hint
Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door. -
Question 14 of 35
14. Question
1 pointsRefer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?Correct
Incorrect
Hint
The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity. -
Question 15 of 35
15. Question
1 pointsA user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?Correct
Incorrect
Hint
Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software. -
Question 16 of 35
16. Question
1 pointsA group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?Correct
Incorrect
Hint
A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data. -
Question 17 of 35
17. Question
1 pointsWhat are signatures as they relate to security threats?Correct
Incorrect
Hint
Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands. -
Question 18 of 35
18. Question
1 pointsA college student logs onto a college computer for the first time. Which security policy category should be presented to the student?Correct
Incorrect
Hint
The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated. -
Question 19 of 35
19. Question
1 pointsA technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?Correct
Incorrect
Hint
A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker. -
Question 20 of 35
20. Question
1 pointsWhich security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes?Correct
Incorrect
Hint
A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds. -
Question 21 of 35
21. Question
1 pointsRefer to the exhibit. Which type of workstation password is being used?Correct
Incorrect
Hint
A BIOS password is configured by entering the BIOS Setup program. -
Question 22 of 35
22. Question
1 pointsA customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?Correct
Incorrect
Hint
In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on. -
Question 23 of 35
23. Question
1 pointsA SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name?Correct
Incorrect
Hint
The Password must meet complexity requirements option requires that the user not make their own user account name or part of their user account name as their password. This option also requires that the password have at least three of the following: uppercase letter, lowercase letter, number, and symbol. -
Question 24 of 35
24. Question
1 pointsA technician is configuring rights and permissions in Windows 7. Which tool will the technician use?Correct
Incorrect
Hint
Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions. -
Question 25 of 35
25. Question
1 pointsAn IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?Correct
Incorrect
Hint
Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules. -
Question 26 of 35
26. Question
1 pointsA newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?Correct
Incorrect
Hint
Only disable Windows Firewall if other firewall software is installed. Use the Windows Firewall (Windows 7 or 8) or the Windows Defender Firewall (Windows 10) Control Panel to enable or disable the Windows Firewall. -
Question 27 of 35
27. Question
1 pointsWhich two statements characterize wireless network security? (Choose two.)Correct
Incorrect
Hint
The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network. -
Question 28 of 35
28. Question
1 pointsA manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?Correct
Incorrect
Hint
The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users. -
Question 29 of 35
29. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?Correct
Incorrect
-
Question 30 of 35
30. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?Correct
Incorrect
-
Question 31 of 35
31. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?Correct
Incorrect
-
Question 32 of 35
32. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?Correct
Incorrect
-
Question 33 of 35
33. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?Correct
Incorrect
-
Question 34 of 35
34. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?Correct
Incorrect
-
Question 35 of 35
35. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?Correct
Incorrect
Quiz have problems to start =(