IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT Essentials 8A worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What should a level two technician do immediately after receiving an escalated work order from a level one technician?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is a reason to escalate a problem from a level one technician to a level two technician?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which two security precautions will help protect a workplace against social engineering? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is the most effective way of securing wireless traffic?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What are two benefits of using an ext4 partition instead of ext3? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, IT Essentials 8A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8