IT Essentials – ITE Chapter 12 Exam Answers v6.0 2018 2019

Last Updated on October 23, 2019 by Admin

IT Essentials – ITE Chapter 12 Exam Answers v6.0 2018 2019

Cisco ITE v6.0 latest or IT Essentials v6.0 Chapter 12 Exam Answers PC hardware and software (ITE Version 6.00) collection year 2017, 2018 and 2019 Full 100%. IT Essentials has been know as ITE v6. The following are the questions exam answers. Guarantee Passed. ITE v6.0 Chapter 12 exam answers has some new update from the old version 5. You can review all Chapter 12 Exam Answers. You will get passed scored 100% with this version 6.0. Good Luck for ITE v6.0 Exam!

CCNA7.COM is helping you to collect Cisco IT Essentials Chapter 12 Exam Answers v6 2018 & 2019 or ITE Chapter 12 Exam to show you on this page. ITE Chapter 12 Exam is almost 28 questions. While you take exam online with Cisco, you will meet 28 questions with duration 1 hours to 2 hours depend on your instructor activate. To pass ITE v6 Chapter 12 Exam, you should review all these question. We provide you accurate answer 100%.

Click here go to ITE Chapter 12 Exam – Online Test

  1. Which two security precautions will help protect a workplace against social engineering? (Choose two.)

    • performing daily data backups
    • encrypting all sensitive data stored on the servers
    • registering and escorting all visitors to the premises
    • ensuring that all operating system and antivirus software is up to date
    • ensuring that each use of an access card allows access to only one user at the time

      Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes.
  2. Which two characteristics describe a worm? (Choose two.)

    • executes when software is run on a computer
    • is self-replicating
    • hides in a dormant state until needed by an attacker
    • infects computers by attaching to software code
    • travels to new computers without any intervention or knowledge of the user

      Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.
  3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

    • adware
    • phishing
    • stealth virus
    • worm

      Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.
  4. What is the primary goal of a DoS attack?

    • to facilitate access to external networks
    • to prevent the target server from being able to handle additional requests
    • to obtain all addresses in the address book within the server
    • to scan the data on the target server

      A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.
  5. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?

    • SYN flooding
    • DDoS
    • DNS poisoning
    • spoofing
  6. Which password is the strongest?

    • qwerty
    • Abc123
    • Im4ging!
    • Gd^7123e!
    • pAssword

      Longer passwords are more secure than passwords with fewer characters. A strong password should also contain a combination of uppercase and lower case letters, numbers, symbols, and punctuation marks. Strong passwords should be difficult to guess.
  7. Which three questions should be addressed by organizations developing a security policy? (Choose three.)

    • What assets require protection?
    • How should future expansion be done?
    • What is to be done in the case of a security breach?
    • When do the assets need protecting?
    • What insurance coverage is required?
    • What are the possible threats to the assets of the organization?

      A security policy is made up of several elements in the form of rules, guidelines and checklists. It not only addresses computer usage, but extends to processes involving employees in respect of operational expectations, breaches to security, emergency procedures, and other pertinent factors governing the company.
  8. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?

    • Perform a high-level format of the hard drive.
    • Remove the RAM from the motherboard.
    • Data wipe the hard drive.
    • Destroy the monitor.
    • Remove the CPU.

      High-level formatting does not erase data securely. Therefore data wiping software can be used to make any data on the drives unreadable. The CPU, monitor, and RAM do not permanently store information.
  9. Which two file-level permissions allow a user to delete a file? (Choose two.)

    • Read
    • Modify
    • Read and Execute
    • Write
    • Full Control
    • List Contents

      The only set of permissions that will allow a user to delete a file are Modify and Full Control. The Read and Execute permissions only allow access to the file; while the Write permission will allow deletion of file content, but the file itself cannot be removed.
  10. What is the name given to the programming-code patterns of viruses?

    • grayware
    • mirrors
    • signatures
    • virus definition tables

      Antivirus programs scan against known code patterns, also known as signatures, to determine if a given piece of software is a threat or not, and then takes the appropriate action. This is why it is essential for signatures to be kept up to date to detect the latest threats.
  11. What is the most effective way of securing wireless traffic?

    • WPA2
    • SSID hiding
    • WEP
    • wireless MAC filtering

      SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic.
  12. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

    • Any traffic that comes into port 25 allows outgoing port 113 to be used.
    • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
    • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
    • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

      Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device.
  13. What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)

    • Perform daily data backups.
    • Implement biometric authentication.
    • Lock doors to telecommunications rooms.
    • Replace software firewalls with hardware firewalls.
    • Ensure that all operating system and antivirus software is up to date.

      Firewalls (software and hardware), up to date software, and backing up data are all security measures designed to protect data. However, these are not physical security precautions. Physical security precautions prevent theft, damage, or unauthorized access to physical computer equipment.
  14. What is the minimum level of Windows security required to allow a local user to restore backed up files?

    • Write
    • Read
    • Create
    • Full

      For local users, the Read permission is required to backup files, but the Write permission, at a minimum, is required to restore files.
  15. What is the purpose of the user account idle timeout setting?

    • to log a user out of a computer after a specified amount of time
    • to display a timeout message if a user has not typed a keystroke in a particular amount of time
    • to turn the computer off if the user has not typed anything after a specified amount of time
    • to create a log message of how long the computer was not used

      The Idle Timeout and Screen Lock setting accessed through the Local Users and Groups Manager is used for logging the computer out and locking the screen if the user has not interacted with the computer for a specified amount of time. The user must log back in to recommence work.
  16. Which two security procedures are best practices for managing user accounts? (Choose two.)

    • Disable authentication.
    • Limit the number of failed login attempts.
    • Restrict the time of day that users can log into a computer.
    • Enable AutoRun.
    • Enable port forwarding.

      Two best security practices for managing user accounts include limiting the time of day that users can log into a computer and limiting the number of times an incorrect password can be entered. Additionally, enabling idle timeout and screen lock for when users walk away from their computers is considered a best practice. The AutoRun feature allows executables to start automatically when external media is inserted into a drive or attached to a port. Disabling AutoRun is a security feature. Port forwarding is only to be enabled when a specific application needs it. Authentication is the act of logging in with a password, fingerprint, or facial scan and should be required.
  17. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?

    • Manage Security Settings
    • Automatically
    • Turn off Windows firewall
    • Turn on Windows firewall

      There are two ways to manage the Windows firewall–through the Automatically setting and with the Manage Security Settings. The latter one is the manual method.
  18. Which two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)

    • Administrators
    • Power Users
    • Backup Operators
    • Access Control Assistants
    • Cryptographic Operators
  19. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?

    • Limit the login times.
    • Use Event View to document the times logged in and out of the computer.
    • Use Device Manager to limit access to the computer.
    • Enable power on passwords in the BIOS.

      The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users.
  20. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

    • Is your security software up to date?
    • Have you scanned your computer recently for viruses?
    • Did you open any attachments from a suspicious email message?
    • What symptoms are you experiencing?

      Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.
  21. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

    • Disconnect the host from the network.
    • Log on to the host as a different user.
    • Disable ActiveX and Silverlight on the host.
    • Install rogue antivirus software on the host.

      If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack.
  22. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

    • Check the computer for the latest OS patches and updates.
    • Verify the physical security of all offices.
    • Ensure the security policy is being enforced.
    • Scan the computer with protection software.

      As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking.
  23. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

    • Set virus protection software to scan removable media when data is accessed.
    • Configure the Windows Firewall to block the ports that are used by viruses.
    • Disable the autorun feature in the operating system.
    • Repair, delete, or quarantine the infected files.
    • Enable the TPM in the CMOS settings.

      Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections.
  24. A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?

    • Destroy the USB drive.
    • Activate Windows Firewall.
    • Change the passwords on the computers.
    • Set the antivirus software to scan removable media.

      To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses.
  25. A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?

    • Allow the software to remove the threats.
    • Click the warning window to close it.
    • Update the current antimalware software.
    • Close the browser tab or window.

      Rogue antimalware software attempts to fool the user by issuing a warning about malware infection. When the user activates the rouge program, the program infects the computer with malware. Because the rogue antimalware software can be activated by clicking in the warning message menu, the user should should attempt to close the browser tab or window instead of trying to close the message box by clicking it.
  26. In what situation will a file on a computer using Windows 8.1 keep its original access permissions?

    • when it is copied to the same volume
    • when it is moved to the same volume
    • when it is copied to a different volume
    • when it is moved to a different volume

      Windows 8.1, the location of the data and the action performed on the data determine how the permissions are propagated:

      • When the data is moved to the same volume, it will keep the original permissions.
      • When the data is copied to the same volume, it will inherit new permissions.
      • When the data is moved to a different volume, it will inherit new permissions.
      • When the data is copied to a different volume, it will inherit new permissions.
  27. What security measure can be used to encrypt the entire volume of a removable drive?

    • EFS
    • TPM
    • BitLocker To Go
    • NTFS permission

      Removable drives can be encrypted by using BitLocker To Go. BitLocker To Go does not use a TPM chip. Encrypting File System (EFS) can encrypt data at file and folder level, but not for an entire drive. NTFS is used for access permission control. It does not encrypt data.
  28. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?

    • The file system is corrupted.
    • The laptop is infected by a virus.
    • The display driver is corrupted.
    • The file system has been encrypted.

      Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution.

Click here go to