dimanche 25 novembre 2018

IT Essentials (ITE v6.0) Chapter 10 Exam Answers 2018

  1. What are two ways that iOS differs from Android? (Choose two.)
    • iOS uses an All Apps button whereas Android uses a Home button.
    • iOS has a physical Home button, but Android uses navigation icons.*
    • In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app.*
    • In iOS, apps can only appear on screens, whereas in Android, apps can appear on screens and in folders.
    • In iOS, folders are created by dragging one app on top of another app, but in Android folders must be created from the home screen menu.
  2. What is a good source for safely downloading Android apps?
    • iTunes
    • Google Play*
    • freeware sites
    • the Apple App Store
  3. Refer to the exhibit. What two statements are true about the operating system screen shown? (Choose two.)
    • The area that is highlighted contains navigation icons.
    • The area that is highlighted displays background processes and indicators.
    • The area that is highlighted contains the system icons.
    • This is an Android screen.*
    • This is an iOS screen.
    • This is a Windows Phone screen.
  4. A small number has appeared on one of the apps on a user’s iOS home screen. What does this mean?
    • It is an alert badge that indicates the number of items requiring attention for that app.*
    • It indicates the number of instances of the app that are running on the device.
    • It indicates how frequently the app has been used within a period of time.
    • It indicates the number of items in the app folder.
  5. What represents apps in the Windows Phone interface?
    • buttons
    • icons
    • tiles*
    • widgets
  6. What is the name of the Windows Phone 8.1 digital, or virtual, assistant?
    • Bing
    • Cortana*
    • Nova Launcher
    • Spotlight
  7. What is Wi-Fi calling?
    • a method used to push apps to smartphones
    • a convenient way to securely and digitally make payments with mobile devices
    • a government emergency alert service for smartphones
    • a way to make mobile phone calls over a wireless data network*
    • a method for sharing data between two mobile devices
  8. What is a benefit of the WEA system?
    • It can save lives by sending emergency text messages to mobile phones.*
    • It can simplify commerce by allowing payments to be made from a mobile phone.
    • It is a method of securing a mobile device that has been lost or stolen.
    • It allows a user to search for resources that are located near the current location.
  9. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
    • to help prevent theft of private information*
    • to prevent unauthorized use of the device*
    • to erase all personal data from the device
    • to return the device to the default factory state
    • to restore and re-synchronize the device
    • to remotely lock the device if it is stolen
  10. Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)
    • The device must be powered on.*
    • The device must be connected to a network.*
    • The passcode must be disabled.
    • The GPS locator must be enabled.
    • Sandboxing must be enabled.
  11. Which two location data sources can locator apps use to determine the position of a mobile device? (Choose two.)
    • cellular towers*
    • WiFi hotspots*
    • the sandbox
    • remote lock
    • an app source
  12. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)
    • The user interface can be extensively customized.*
    • The operating system can be fine-tuned to improve the speed of the device.*
    • The root directory of the device is blocked.
    • The operation of the carrier cellular network may be affected.
    • A custom OS may reduce sandboxing features.
  13. Which statement is true about wireless connectivity on an Android mobile device?
    • If the network SSID is not being broadcast, the device will not be able to connect to the network.
    • When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.*
    • If a Wi-Fi network is secured with a password, the network must be manually configured on the device.
    • The Android OS does not support wireless connectivity that uses WPA2 security.
  14. In the context of mobile devices, what does the term tethering involve?
    • connecting a mobile device to another mobile device or computer to share a network connection*
    • connecting a mobile device to a hands-free headset
    • connecting a mobile device to a 4G cellular network
    • connecting a mobile device to a USB port on a computer in order to charge the mobile device
  15. Which statement is true about industry standards for cellular networks?
    • Cell phones that use a single standard can often only be used in specific geographic areas.*
    • Cellular standards have made it more difficult and expensive to make calls to people that are on a different network.
    • First generation cellular standards are mostly digital standards.
    • Third generation cellular standards require a maximum of 1 Gb/s for devices moving slowly, such as when a user has a mobile device and is walking.
  16. What will allow someone to use a cell phone for entertainment without connecting to any networks?
    • a hotspot
    • Bluetooth
    • Airplane Mode*
    • 4G
    • WiMax
  17. What technology enables a cell phone to be used as a hands-free device?
    • Wi-Fi
    • Bluetooth*
    • 4G
    • Yosemite
  18. A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?
    • POP3
    • IMAP*
    • MIME
    • SMTP
  19. What is the code name used for the OS X 10.10 operating system?
    • Ubuntu
    • Lollipop
    • Aqua
    • Yosemite*
    • Unity
  20. What is a purpose of the boot manager program?
    • It manages antivirus signature files, encryption keys, and certificates when a device boots.
    • It automates the POST and checks the disk for bad sectors during a boot.
    • It checks the validity of hardware and software on the device after a factory reset.
    • It allows the user to select the OS to use to boot the device.*
    • It allows the user to determine which apps are automatically opened during the boot process.
  21. What is the purpose of signature files used to secure mobile devices and operating systems?
    • They contain a record of historical and pending firmware and software updates.
    • They contain a list of all user passwords.
    • They contain a log of digital certificates and encryption keys associated with the user.
    • They contain sample code from known viruses and malware that is used by security software to identify malicious software. *
  22. A file called new_resume has the following file permissions: rw-r-x–x What two facts can be determined from these permissions? (Choose two.)
    • The user has full access to the file.
    • Members of the group have read and execute access to the file.*
    • Other people have read and execute access to the file.
    • Group members are able to modify the file.
    • The user is able to read and modify the file.*
    • Other people have no access to the file.
  23. What is the result of doing a factory reset on a mobile device?
    • The operating system will be updated with the most recent updates and patches.
    • All user data and settings will be deleted.*
    • The operating system will be deleted and all user data is transferred to the Cloud.
    • A complete backup of the device is done and all viruses and malware are removed.
  24. What tool can be used on a mobile device to display available cellular networks, location of networks, and signal strength?
    • Wi-Fi analyzer
    • loopback adapter
    • cell tower analyzer*
    • toner generator and probe
  25. An administrator is re-imaging a large number of Mac OS X machines. What built-in tool or command can be used to remotely boot the computers?
    • mstsc
    • Netboot*
    • Time Machine
    • Finder
  26. What tool or command is used in the Mac OS X to navigate the file system?
    • File Explorer
    • Task Manager
    • Finder*
    • mstsc
  27. What command is used to open a text editor in Unix-like systems?
    • grep
    • ifconfig
    • ls
    • vi *
  28. Fill in the blank.
    Both Linux and OS X devices have a service called cron* that runs in the background and is responsible for executing scheduled tasks.

    Older Version

  29. A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
    • social engineering*
    • anonymous keylogging
    • spam
    • DDoS
  30. Which two security precautions will help protect a workplace against social engineering? (Choose two.)
    • ensuring that each use of an access card allows access to only one user at the time*
    • ensuring that all operating system and antivirus software is up to date
    • encrypting all sensitive data stored on the servers
    • performing daily data backups
    • registering and escorting all visitors to the premises*
  31. What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)
    • Perform daily data backups.
    • Replace any software firewalls with a hardware firewall.
    • Implement biometric authentication.*
    • Ensure that all operating system and antivirus software is up to date.
    • Disable the autorun feature in the operating system.*
  32. Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?
    • biometric authentication
    • Trusted Platform Module (TPM)*
    • card key access
    • two-factor security
  33. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
    • Set virus protection software to scan removable media when data is accessed.*
    • Configure the Windows Firewall to block the ports that are used by viruses.
    • Enable the TPM in the CMOS settings.
    • Repair, delete, or quarantine the infected files.
    • Disable the autorun feature in the operating system.*
  34. In which situation would a computer technician use the fixmbr command at the command prompt of a Windows XP computer to resolve a security issue?
    • when unauthorized users have changed the CMOS settings and the CMOS password must be reset
    • when a virus has damaged the master boot record of the system disk*
    • when a virus has damaged the boot sector of the system disk
    • when the folder permissions for user members of a group are incorrect
  35. All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?
    • Set the user folder permissions to Deny.
    • Disable the users’ accounts.
    • Change the user file permissions to Read Only.
    • Enable UAC on the computer.*
  36. You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?
    • Use data wiping.
    • Drill through the HDD.
    • Smash the platters with a hammer.*
    • Immerse the HDD in a weak solution of bicarbonate of soda.
  37. What is the most effective way of securing wireless traffic?
    • WPA2*
    • SSID hiding
    • WEP
    • wireless MAC filtering
  38. Which two items are used in asymmetric encryption? (Choose two.)
    • a token
    • a TPM
    • a private key*
    • a DES key
    • a public key*
  39. Which two characteristics describe a worm? (Choose two.)
    • hides in a dormant state until needed by an attacker
    • infects computers by attaching to software code
    • executes when software is run on a computer
    • is self-replicating*
    • travels to new computers without any intervention or knowledge of the user*
  40. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
    • worm
    • phishing*
    • adware
    • stealth virus
  41. Which three questions should be addressed by organizations developing a security policy? (Choose three.)
    How should future expansion be done?
    • What are the possible threats to the assets of the organization?*
    • What is to be done in the case of a security breach?*
    • When do the assets need protecting?
    • What assets require protection?*
    • What insurance coverage is required?
  42. What does a malware detection program look for when running a scan?
    • a service pack
    • patterns in the programming code of the software on a computer*
    • mirror sites
    • patches that prevent a newly discovered virus or worm from making a successful attack
  43. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
    • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
    • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.*
    • Any traffic that comes into port 25 allows outgoing port 113 to be used.
  44. Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
    • packet size
    • physical addresses
    • protocols*
    • packet speed
    • ports*
  45. What is the primary goal of a DoS attack?
    • to facilitate access to external networks
    • to prevent the target server from being able to handle additional requests*
    • to scan the data on the target server
    • to obtain all addresses in the address book within the server
  46. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
    • Have you scanned your computer recently for viruses?
    • What symptoms are you experiencing?*
    • Did you open any attachments from a suspicious email message?
    • Is your security software up to date?
  47. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
    • Install rogue antivirus software on the host.
    • Log on to the host as a different user.
    • Disable ActiveX and Silverlight on the host.
    • Disconnect the host from the network.*
  48. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
    • Ensure the security policy is being enforced.*
    • Check the computer for the latest OS patches and updates.
    • Scan the computer with protection software.
    • Verify the physical security of all offices.
  49. A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?
    • A virus has damaged the boot sector of the system disk.
    • The computer has been infected with spyware.*
    • UAC has been disabled on the computer.
    • Folder permissions have been changed from Deny to Allow.
  50. What is the name given to the programming-code patterns of viruses?
    • mirrors
    • signatures*
    • virus definition tables
    • grayware

Aucun commentaire:

Enregistrer un commentaire

CCNA Security v2.0 Final Exam Answers 2018

Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA f...