Last Updated on October 26, 2019 by Admin
IT Essentials Chapter 12 Exam Online 2019
ITE -- Chapter 12
Time limit: 0
Quiz-summary
0 of 27 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
Information
ITE — Chapter 12
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 27 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- Answered
- Review
-
Question 1 of 27
1. Question
2 pointsWhich two security precautions will help protect a workplace against social engineering? (Choose two.)Correct
Incorrect
Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes.Hint
Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes. -
Question 2 of 27
2. Question
2 pointsWhich two characteristics describe a worm? (Choose two.)Correct
Incorrect
Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.Hint
Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside. -
Question 3 of 27
3. Question
1 pointsWhich type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?Correct
Incorrect
Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.Hint
Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites. -
Question 4 of 27
4. Question
1 pointsWhat is the primary goal of a DoS attack?Correct
Incorrect
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.Hint
A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones. -
Question 5 of 27
5. Question
1 pointsWhich type of attack involves the misdirection of a user from a legitimate web site to a fake web site?Correct
Incorrect
-
Question 6 of 27
6. Question
1 pointsWhich password is the strongest?Correct
Incorrect
Longer passwords are more secure than passwords with fewer characters. A strong password should also contain a combination of uppercase and lower case letters, numbers, symbols, and punctuation marks. Strong passwords should be difficult to guess.Hint
Longer passwords are more secure than passwords with fewer characters. A strong password should also contain a combination of uppercase and lower case letters, numbers, symbols, and punctuation marks. Strong passwords should be difficult to guess. -
Question 7 of 27
7. Question
3 pointsWhich three questions should be addressed by organizations developing a security policy? (Choose three.)Correct
Incorrect
A security policy is made up of several elements in the form of rules, guidelines and checklists. It not only addresses computer usage, but extends to processes involving employees in respect of operational expectations, breaches to security, emergency procedures, and other pertinent factors governing the company.Hint
A security policy is made up of several elements in the form of rules, guidelines and checklists. It not only addresses computer usage, but extends to processes involving employees in respect of operational expectations, breaches to security, emergency procedures, and other pertinent factors governing the company. -
Question 8 of 27
8. Question
1 pointsThe XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?Correct
Incorrect
High-level formatting does not erase data securely. Therefore data wiping software can be used to make any data on the drives unreadable. The CPU, monitor, and RAM do not permanently store information.Hint
High-level formatting does not erase data securely. Therefore data wiping software can be used to make any data on the drives unreadable. The CPU, monitor, and RAM do not permanently store information. -
Question 9 of 27
9. Question
2 pointsWhich two file-level permissions allow a user to delete a file? (Choose two.)Correct
Incorrect
The only set of permissions that will allow a user to delete a file are Modify and Full Control. The Read and Execute permissions only allow access to the file; while the Write permission will allow deletion of file content, but the file itself cannot be removed.Hint
The only set of permissions that will allow a user to delete a file are Modify and Full Control. The Read and Execute permissions only allow access to the file; while the Write permission will allow deletion of file content, but the file itself cannot be removed. -
Question 10 of 27
10. Question
1 pointsWhat is the name given to the programming-code patterns of viruses?Correct
Incorrect
Antivirus programs scan against known code patterns, also known as signatures, to determine if a given piece of software is a threat or not, and then takes the appropriate action. This is why it is essential for signatures to be kept up to date to detect the latest threats.Hint
Antivirus programs scan against known code patterns, also known as signatures, to determine if a given piece of software is a threat or not, and then takes the appropriate action. This is why it is essential for signatures to be kept up to date to detect the latest threats. -
Question 11 of 27
11. Question
1 pointsWhat is the most effective way of securing wireless traffic?Correct
Incorrect
SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic.Hint
SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic. -
Question 12 of 27
12. Question
1 pointsPort triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?Correct
Incorrect
Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device.Hint
Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device. -
Question 13 of 27
13. Question
2 pointsWhat are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)Correct
Incorrect
Firewalls (software and hardware), up to date software, and backing up data are all security measures designed to protect data. However, these are not physical security precautions. Physical security precautions prevent theft, damage, or unauthorized access to physical computer equipment.Hint
Firewalls (software and hardware), up to date software, and backing up data are all security measures designed to protect data. However, these are not physical security precautions. Physical security precautions prevent theft, damage, or unauthorized access to physical computer equipment. -
Question 14 of 27
14. Question
1 pointsWhat is the minimum level of Windows security required to allow a local user to restore backed up files?Correct
Incorrect
For local users, the Read permission is required to backup files, but the Write permission, at a minimum, is required to restore files.Hint
For local users, the Read permission is required to backup files, but the Write permission, at a minimum, is required to restore files. -
Question 15 of 27
15. Question
1 pointsWhat is the purpose of the user account idle timeout setting?Correct
Incorrect
The Idle Timeout and Screen Lock setting accessed through the Local Users and Groups Manager is used for logging the computer out and locking the screen if the user has not interacted with the computer for a specified amount of time. The user must log back in to recommence work.Hint
The Idle Timeout and Screen Lock setting accessed through the Local Users and Groups Manager is used for logging the computer out and locking the screen if the user has not interacted with the computer for a specified amount of time. The user must log back in to recommence work. -
Question 16 of 27
16. Question
2 pointsWhich two security procedures are best practices for managing user accounts? (Choose two.)Correct
Incorrect
Two best security practices for managing user accounts include limiting the time of day that users can log into a computer and limiting the number of times an incorrect password can be entered. Additionally, enabling idle timeout and screen lock for when users walk away from their computers is considered a best practice. The AutoRun feature allows executables to start automatically when external media is inserted into a drive or attached to a port. Disabling AutoRun is a security feature. Port forwarding is only to be enabled when a specific application needs it. Authentication is the act of logging in with a password, fingerprint, or facial scan and should be required.Hint
Two best security practices for managing user accounts include limiting the time of day that users can log into a computer and limiting the number of times an incorrect password can be entered. Additionally, enabling idle timeout and screen lock for when users walk away from their computers is considered a best practice. The AutoRun feature allows executables to start automatically when external media is inserted into a drive or attached to a port. Disabling AutoRun is a security feature. Port forwarding is only to be enabled when a specific application needs it. Authentication is the act of logging in with a password, fingerprint, or facial scan and should be required. -
Question 17 of 27
17. Question
1 pointsWhich Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?Correct
Incorrect
There are two ways to manage the Windows firewall–through the Automatically setting and with the Manage Security Settings. The latter one is the manual method.Hint
There are two ways to manage the Windows firewall–through the Automatically setting and with the Manage Security Settings. The latter one is the manual method. -
Question 18 of 27
18. Question
1 pointsA manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?Correct
Incorrect
The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users.Hint
The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users. -
Question 19 of 27
19. Question
1 pointsWhich question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?Correct
Incorrect
Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.Hint
Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback. -
Question 20 of 27
20. Question
1 pointsWhich action would help a technician to determine if a denial of service attack is being caused by malware on a host?Correct
Incorrect
If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack.Hint
If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack. -
Question 21 of 27
21. Question
1 pointsA technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?Correct
Incorrect
As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking.Hint
As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking. -
Question 22 of 27
22. Question
2 pointsIt has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)Correct
Incorrect
Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections.Hint
Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections. -
Question 23 of 27
23. Question
1 pointsA virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?Correct
Incorrect
To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses.Hint
To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses. -
Question 24 of 27
24. Question
1 pointsA user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?Correct
Incorrect
Rogue antimalware software attempts to fool the user by issuing a warning about malware infection. When the user activates the rouge program, the program infects the computer with malware. Because the rogue antimalware software can be activated by clicking in the warning message menu, the user should should attempt to close the browser tab or window instead of trying to close the message box by clicking it.Hint
Rogue antimalware software attempts to fool the user by issuing a warning about malware infection. When the user activates the rouge program, the program infects the computer with malware. Because the rogue antimalware software can be activated by clicking in the warning message menu, the user should should attempt to close the browser tab or window instead of trying to close the message box by clicking it. -
Question 25 of 27
25. Question
1 pointsIn what situation will a file on a computer using Windows 8.1 keep its original access permissions?Correct
Incorrect
n Windows 8.1, the location of the data and the action performed on the data determine how the permissions are propagated:
- When the data is moved to the same volume, it will keep the original permissions.
- When the data is copied to the same volume, it will inherit new permissions.
- When the data is moved to a different volume, it will inherit new permissions.
- When the data is copied to a different volume, it will inherit new permissions.
Hint
n Windows 8.1, the location of the data and the action performed on the data determine how the permissions are propagated:
- When the data is moved to the same volume, it will keep the original permissions.
- When the data is copied to the same volume, it will inherit new permissions.
- When the data is moved to a different volume, it will inherit new permissions.
- When the data is copied to a different volume, it will inherit new permissions.
-
Question 26 of 27
26. Question
1 pointsWhat security measure can be used to encrypt the entire volume of a removable drive?Correct
Incorrect
Removable drives can be encrypted by using BitLocker To Go. BitLocker To Go does not use a TPM chip. Encrypting File System (EFS) can encrypt data at file and folder level, but not for an entire drive. NTFS is used for access permission control. It does not encrypt data.Hint
Removable drives can be encrypted by using BitLocker To Go. BitLocker To Go does not use a TPM chip. Encrypting File System (EFS) can encrypt data at file and folder level, but not for an entire drive. NTFS is used for access permission control. It does not encrypt data. -
Question 27 of 27
27. Question
1 pointsA user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?Correct
Incorrect
Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution.Hint
Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution.