IT Essentials (Version 7.00) – ITE 7.0 Certification Checkpoint Exam Chapters 12 – 13 Answers
1. Which two security precautions will help protect a workplace against social engineering? (Choose two.)
- performing daily data backups
- encrypting all sensitive data stored on the servers
- registering and escorting all visitors to the premises
- ensuring that all operating system and antivirus software is up to date
- ensuring that each use of an access card allows access to only one user at the time
2. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
- Set virus protection software to scan removable media when data is accessed.
- Configure the Windows Firewall to block the ports that are used by viruses.
- Disable the autorun feature in the operating system.
- Repair, delete, or quarantine the infected files.
- Enable the TPM in the CMOS settings.
3. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)
- The user interface can be extensively customized.
- The operating system can be fine-tuned to improve the speed of the device.
- The root directory of the device is blocked.
- The operation of the carrier cellular network may be affected.
- A custom OS may reduce sandboxing features.
4. Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)
- The device must be powered on.
- The device must be connected to a network.
- The passcode must be disabled.
- The GPS locator must be enabled.
- Sandboxing must be enabled.
5. What is the most effective way of securing wireless traffic?
- WPA2
- SSID hiding
- WEP
- wireless MAC filtering
6. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
- Disconnect the host from the network.
- Log on to the host as a different user.
- Disable ActiveX and Silverlight on the host.
- Install rogue antivirus software on the host.
7. The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
- MD5
- VPN
- WEP
- WPA
8. A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?
- CPU
- hard drive
- motherboard
- power supply
- RAM
9. A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?
- All remote access is blocked.
- The share and NTFS permissions will be added.
- The most restrictive share or NTFS permission will be applied.
- Only the original owner can modify the file either locally or from a remote location.
10. A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?
- Deny the request and require a certificate of destruction.
- Use a degausser before turning the drive over to the second technician.
- Perform a drive wipe before turning the drive over to the second technician.
- Turn the drive over to the second technician with a request to format the drive first as exFAT and then as NTFS.
11. What are two benefits of using an ext4 partition instead of ext3? (Choose two.)
- compatibility with CDFS
- compatibility with NTFS
- decreased load time
- improved performance
- an increase in the number of supported devices
- increase in the size of supported files
12. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?
- SYN flood
- zero-day
- DNS poisoning
- dictionary
13. Users in a company have complained about network performance. After investigation, the IT staff has determined that the DNS server was sent with an enormous amount of false requests, thus overwhelming the server. What is the type of network attack?
- DoS
- zero-day
- SYN flood
- dictionary
14. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack?
- zero-day
- SYN flood
- DDoS
- DNS poisoning
15. Users in a company have complained about network performance. After investigation, the IT staff has determined that zombies were used to attack the firewall. What is the type of network attack?
- DDoS
- SYN flood
- DNS poisoning
- zero-day
16. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a table of words that potentially could be used as passwords. What is the type of network attack?
- dictionary
- DNS poisoning
- DDoS
- SYN flood
17. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?
- DNS poisoning
- SYN flood
- DDoS
- zero-day
18. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a technique that compares hashed passwords to potential hashes the hacker has. What is the type of network attack?
- rainbow table
- zero-day
- SYN flood
- DNS poisoning
19. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack?
- zero-day
- SYN flood
- DNS poisoning
- dictionary
20. A PC technician has been asked by a supervisor to recommend a security solution for phishing. Which security technique should the technician recommend?
- Provide security awareness training.
- Use a mantrap.
- Use Windows Safe Mode.
- Implement dual authentication.
21. A PC technician has been asked by a supervisor to recommend a security solution for protecting a computer used to log in at a dental clinic from someone using a bootable disk containing hacking tools. Which security technique should the technician recommend?
- Disable ports.
- Use a mantrap.
- Use Windows Safe Mode.
- Employ ping sweeps.
22. A PC technician has been asked by a supervisor to recommend a security solution for a manager traveling who needs access to internal corporate resources. Which security technique should the technician recommend?
- Use a VPN.
- Use Windows Safe Mode.
- Buy an IPS.
- Run vulnerability scanners.
23. A PC technician has been asked by a supervisor to recommend a security solution for a company that wants a device to monitor incoming and outgoing traffic and stop any malicious activity. Which security technique should the technician recommend?
- Buy an IPS.
- Use Windows Safe Mode.
- Buy an ASA.
- Use SSL.
24. A PC technician has been asked by a supervisor to recommend a security solution for a machine where the antimalware software cannot remove all of the malware. Which security technique should the technician recommend?
- Use Windows Safe Mode.
- Buy an IPS.
- Buy an ASA.
- Use SSL.
25. A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?
- Use a mantrap.
- Buy an IPS.
- Buy an ASA.
- Use encryption.
Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)
thanks for your web site because iam all exams are prepare with your site so thank you so much
Thanks so much!
whitch one is the rigth one?