IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT Essentials 8A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?IT Administrator asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8Which action could be used to determine if a host is compromised and flooding traffic onto the network?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which is an example of social engineering?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8A company is creating a new website to be hosted on a Linux server. The system administrator creates the group “webteam” and assigns team members to it. The administrator then creates the directory “webpages” for storing files. Later that day, one of the team members reports of being unable to create files in the “webpages” directory or subdirectories. The administrator uses the ls -l command to view the file permissions. The result displayed is drwxr-xr–. What should the administrator do to allow team members to add and edit files?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A system administrator is using the crontab command to edit an entry on a Linux server. Which service is the administrator configuring?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A user has an iOS device. What will happen if the user forgets the passcode to unlock the device?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8Which two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8What two preventive maintenance tasks should be scheduled to occur automatically? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8A person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on. What was this person doing to the device?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8True of False? Android and OS X are based on the Unix operating system.ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8