Time limit: 0
Quiz-summary
0 of 31 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
Information
IT Essentials (Version 7.0) Chapters 12-13 Checkpoint #5 Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 31 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- Answered
- Review
-
Question 1 of 31
1. Question
1 pointsWhich two security precautions will help protect a workplace against social engineering? (Choose two.)Correct
Incorrect
Hint
Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes. -
Question 2 of 31
2. Question
1 pointsIt has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)Correct
Incorrect
Hint
Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections. -
Question 3 of 31
3. Question
1 pointsWhat are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)Correct
Incorrect
Hint
Rooting or jailbreaking a mobile device usually enables extensive customization of the user interface and can enable performance enhancement. The three incorrect options are all considered potential risks to the user, the device, and the network that may result from rooting or jailbreaking a mobile device. -
Question 4 of 31
4. Question
1 pointsWhich two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)Correct
Incorrect
Hint
Successful mobile device remote security measures require the device to be powered on and connected to a network. The device passcode and GPS status do not affect the operation of remote security measures. Mobile devices run apps within a sandbox by default. -
Question 5 of 31
5. Question
1 pointsWhat is the most effective way of securing wireless traffic?Correct
Incorrect
Hint
SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic. -
Question 6 of 31
6. Question
1 pointsWhich action would help a technician to determine if a denial of service attack is being caused by malware on a host?Correct
Incorrect
Hint
If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack. -
Question 7 of 31
7. Question
1 pointsThe corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?Correct
Incorrect
Hint
A VPN (virtual private network) provides an encrypted tunnel for data communications across the Internet. WEP and WPA are wireless encryption protocols. MD5 is a data hashing algorithm. -
Question 8 of 31
8. Question
1 pointsA user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?Correct
Incorrect
Hint
Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T or SMART) is a feature built into hard drives to detect and report drive issues. -
Question 9 of 31
9. Question
1 pointsA user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?Correct
Incorrect
Hint
If a shared folder has been given the full control NTFS permission and the read share permission, the effective permission will be the most restrictive one which is read in this case. -
Question 10 of 31
10. Question
1 pointsA hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?Correct
Incorrect
Hint
Drives can be recycled or repurposed as long as best practices are adhered to. Drive wiping software can be used to overwrite existing data multiple times so that the original data cannot be read. -
Question 11 of 31
11. Question
1 pointsWhat are two benefits of using an ext4 partition instead of ext3? (Choose two.)Correct
Incorrect
Hint
Based on the ex3 file system, an ext4 partition includes extensions that improve performance and an increase in the of supported files. An ext4 partition also supports journaling, a file system feature that minimizes the risk of file system corruption if power is suddenly lost to the system. -
Question 12 of 31
12. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?Correct
Incorrect
-
Question 13 of 31
13. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the DNS server was sent with an enormous amount of false requests, thus overwhelming the server. What is the type of network attack?Correct
Incorrect
-
Question 14 of 31
14. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack?Correct
Incorrect
-
Question 15 of 31
15. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the DNS server was sent with an enormous amount of false requests, thus overwhelming the server. What is the type of network attack?Correct
Incorrect
-
Question 16 of 31
16. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that zombies were used to attack the firewall. What is the type of network attack?Correct
Incorrect
-
Question 17 of 31
17. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a table of words that potentially could be used as passwords. What is the type of network attack?Correct
Incorrect
-
Question 18 of 31
18. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?Correct
Incorrect
-
Question 19 of 31
19. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?Correct
Incorrect
-
Question 20 of 31
20. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a technique that compares hashed passwords to potential hashes the hacker has. What is the type of network attack?Correct
Incorrect
-
Question 21 of 31
21. Question
1 pointsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack?Correct
Incorrect
-
Question 22 of 31
22. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for phishing. Which security technique should the technician recommend?Correct
Incorrect
-
Question 23 of 31
23. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for phishing. Which security technique should the technician recommend?Correct
Incorrect
-
Question 24 of 31
24. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for protecting a computer used to log in at a dental clinic from someone using a bootable disk containing hacking tools. Which security technique should the technician recommend?Correct
Incorrect
-
Question 25 of 31
25. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for protecting a computer used to log in at a dental clinic from someone using a bootable disk containing hacking tools. Which security technique should the technician recommend?Correct
Incorrect
-
Question 26 of 31
26. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for a manager traveling who needs access to internal corporate resources. Which security technique should the technician recommend?Correct
Incorrect
-
Question 27 of 31
27. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for a company that wants a device to monitor incoming and outgoing traffic and stop any malicious activity. Which security technique should the technician recommend?Correct
Incorrect
-
Question 28 of 31
28. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for a machine where the antimalware software cannot remove all of the malware. Which security technique should the technician recommend?Correct
Incorrect
-
Question 29 of 31
29. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for a machine where the antimalware software cannot remove all of the malware. Which security technique should the technician recommend?Correct
Incorrect
-
Question 30 of 31
30. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?Correct
Incorrect
-
Question 31 of 31
31. Question
1 pointsA PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?Correct
Incorrect