IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsA hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which two items are used in asymmetric encryption? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What are signatures as they relate to security threats?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What would cause a Microsoft Windows update to fail?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?ITExamAnswers asked 4 years ago • IT Essentials, CCNA, CCNA CyberOps, Introduction to Cybersecurity, IT Essentials 8How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?ITExamAnswers asked 4 years ago • IT Essentials, Introduction to Cybersecurity, IT Essentials 8A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8