dimanche 25 novembre 2018

IT Essentials (ITE v6.0) Chapter 12 Exam Answers 2018

  1. Which two security precautions will help protect a workplace against social engineering? (Choose two.)
    • performing daily data backups
    • encrypting all sensitive data stored on the servers
    • registering and escorting all visitors to the premises*
    • ensuring that all operating system and antivirus software is up to date
    • ensuring that each use of an access card allows access to only one user at the time*
  2. Which two characteristics describe a worm? (Choose two.)
    • executes when software is run on a computer
    • is self-replicating*
    • hides in a dormant state until needed by an attacker
    • infects computers by attaching to software code
    • travels to new computers without any intervention or knowledge of the user*
  3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
    • adware
    • phishing*
    • stealth virus
    • worm
  4. What is the primary goal of a DoS attack?
    • to facilitate access to external networks
    • to prevent the target server from being able to handle additional requests*
    • to obtain all addresses in the address book within the server
    • to scan the data on the target server
  5. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
    • SYN flooding
    • DDoS
    • DNS poisoning*
    • spoofing
  6. Which password is the strongest?
    • qwerty
    • Abc123
    • Im4ging!
    • Gd^7123e!*
    • pAssword
  7. Which three questions should be addressed by organizations developing a security policy? (Choose three.)
    • What assets require protection?*
    • How should future expansion be done?
    • What is to be done in the case of a security breach?*
    • When do the assets need protecting?
    • What insurance coverage is required?
    • What are the possible threats to the assets of the organization?*
  8. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?
    • Perform a high-level format of the hard drive.
    • Remove the RAM from the motherboard.
    • Data wipe the hard drive.*
    • Destroy the monitor.
    • Remove the CPU.
  9. Which two file-level permissions allow a user to delete a file? (Choose two.)
    • Read
    • Modify*
    • Read and Execute
    • Write
    • Full Control*
    • List Contents
  10. What is the name given to the programming-code patterns of viruses?
    • grayware
    • mirrors
    • signatures*
    • virus definition tables
  11. What is the most effective way of securing wireless traffic?
    • WPA2*
    • SSID hiding
    • WEP
    • wireless MAC filtering
  12. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    • Any traffic that comes into port 25 allows outgoing port 113 to be used.
    • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
    • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
    • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.*
  13. What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)
    • Perform daily data backups.
    • Implement biometric authentication.*
    • Lock doors to telecommunications rooms.*
    • Replace software firewalls with hardware firewalls.
    • Ensure that all operating system and antivirus software is up to date.
  14. What is the minimum level of Windows security required to allow a local user to restore backed up files?
    • Write*
    • Read
    • Create
    • Full
  15. What is the purpose of the user account idle timeout setting?
    • to log a user out of a computer after a specified amount of time*
    • to display a timeout message if a user has not typed a keystroke in a particular amount of time
    • to turn the computer off if the user has not typed anything after a specified amount of time
    • to create a log message of how long the computer was not used
  16. Which two security procedures are best practices for managing user accounts? (Choose two.)
    • Disable authentication.
    • Limit the number of failed login attempts.*
    • Restrict the time of day that users can log into a computer.*
    • Enable AutoRun.
    • Enable port forwarding.
  17. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
    • Manage Security Settings*
    • Automatically
    • Turn off Windows firewall
    • Turn on Windows firewall
  18. Which two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)
    • Administrators*
    • Power Users
    • Backup Operators*
    • Access Control Assistants
    • Cryptographic Operators
  19. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?
    • Limit the login times.*
    • Use Event View to document the times logged in and out of the computer.
    • Use Device Manager to limit access to the computer.
    • Enable power on passwords in the BIOS.
  20. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
    • Is your security software up to date?
    • Have you scanned your computer recently for viruses?
    • Did you open any attachments from a suspicious email message?
    • What symptoms are you experiencing?*
  21. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
    • Disconnect the host from the network.*
    • Log on to the host as a different user.
    • Disable ActiveX and Silverlight on the host.
    • Install rogue antivirus software on the host.
  22. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
    • Check the computer for the latest OS patches and updates.
    • Verify the physical security of all offices.
    • Ensure the security policy is being enforced.*
    • Scan the computer with protection software.
  23. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
    • Set virus protection software to scan removable media when data is accessed.*
    • Configure the Windows Firewall to block the ports that are used by viruses.
    • Disable the autorun feature in the operating system.*
    • Repair, delete, or quarantine the infected files.
    • Enable the TPM in the CMOS settings.
  24. A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?
    • Destroy the USB drive.
    • Activate Windows Firewall.
    • Change the passwords on the computers.
    • Set the antivirus software to scan removable media.*
  25. A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?
    • Allow the software to remove the threats.
    • Click the warning window to close it.
    • Update the current antimalware software.
    • Close the browser tab or window.*
  26. In what situation will a file on a computer using Windows 8.1 keep its original access permissions?
    • when it is copied to the same volume
    • when it is moved to the same volume*
    • when it is copied to a different volume
    • when it is moved to a different volume
  27. What security measure can be used to encrypt the entire volume of a removable drive?
    • EFS
    • TPM
    • BitLocker To Go*
    • NTFS permission
  28. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?
    • The file system is corrupted.
    • The laptop is infected by a virus.*
    • The display driver is corrupted.
    • The file system has been encrypted.

      Older Version

  29. Which two operating systems can be upgraded to Windows XP Home? (Choose two.)
    • Windows 95
    • Windows 3.1
    • Windows 98*
    • Windows 98 SE
    • Windows NT workstation*
  30. A customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not detect any problems. What are two possible solutions to the problem with the XP computer? (Choose two.)
    • Install additional RAM.
    • Modify the options in the BIOS.
    • Install the driver from the CD provided with the card reader.*
    • Download and install the driver from the manufacturer of the card reader.*
    • Update the CMOS firmware.
  31. A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the new hardware and powering up the computer, an “OS not found” error message is displayed. What is the most probable cause for that error message?
    • The power supply is faulty.
    • The hard drive jumper is set incorrectly.*
    • The motherboard needs replacing to be able to support the new hard drive.
    • The USB port has too many attached devices to supply adequate power.
    • The BIOS needs updating.
  32. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph. What is the most probable solution to this problem?
    • Replace the HDD with a higher capacity hard drive.
    • Overclock the CPU.
    • Increase the amount of RAM available.
    • Update the BIOS firmware to support the dual core CPU.*
  33. A laptop that is running Windows XP displays “Missing NTLDR” after the POST. What are the two most probable reasons for this problem? (Choose two.)
    • Boot.ini is missing or damaged.*
    • There is a conflict with a newly installed device.
    • BOOTMGR has been corrupted.
    • The boot order is not set correctly in the BIOS.*
    • The index service is not indexing in the correct locations.
  34. Several times during the last few days, a user has experienced the Blue Screen of Death when plugging an external hard drive into a laptop via USB. What is a possible solution for this problem?
    • Reinstall the operating system.
    • Upgrade the operating system.
    • Research the STOP error and the name of the module that produced the error.*
    • Research the boot error beep code to identify the source of the error.
  35. A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)
    • The UAC has been turned off.
    • The user has breached the user security policy.
    • The computer has a virus.*
    • The index service is not running.
    • The CPU needs to be upgraded.
    • An update has corrupted the operating system.*
  36. What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)
    • Upgrade the processor.
    • Upgrade the video card.
    • Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure.*
    • Reset the hard drive jumpers.
    • Run chkdsk /F /R from the recovery console.*
    • Access the BIOS and change the boot order options.
  37. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?
    • The network switch is faulty.
    • The gateway needs to be fixed.
    • The network cable is faulty.*
    • The PC has an incorrect IP address for the DNS server.
  38. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)
    • The wireless signal is too weak.*
    • The DHCP server is faulty.
    • There is interference from outside sources.*
    • The antenna on the access point is too powerful.
    • The network passwords need to be reissued to the users.
  39. A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?
    • The DNS server is not operational.
    • The Internet connectiion is down.
    • The gateway address is incorrect.
    • The DHCP server is not operational.*
  40. A technician is working on a laptop that has a dark display. After attaching an external display and verifying that it works, the technician now has a better idea as to the problem. What could be the problem?
    • The display driver is incorrect.
    • The motherboard has failed.
    • The CPU has failed.
    • The power inverter of the LCD screen or backlight lamp has failed.*
  41. A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process?
    • Ask a list of closed-ended questions.
    • Research the problem.
    • Document all findings, actions, and outcomes.*
    • Implement preventive measures.
  42. A user complains that when a page is printed on a laser printer, the page smears when touched. What is a possible cause of this issue?
    • The laser assembly is faulty.
    • The EP drum is damaged.
    • The pickup rollers are defective.
    • The fuser has failed.*
  43. A technician finds that occasionally when a network printer is restarted, clients are unable to print to it, receiving a “Document failed to print” message. What is a probable cause of this?
    • The drum is damaged.
    • The printer does not have enough memory.
    • The toner level in the EP cartridge is low.
    • The power supply on the printer is failing.
    • The printer is configured to get an IP address using DHCP.*
  44. A user complains that a printer is outputting random characters instead of the desired document. What is a probable cause of this?
    • There is dirt or debris in the printer.
    • The printer does not have enough memory.
    • The pickup rollers are defective.
    • An incorrect print driver is installed.*
  45. A freshly installed Windows 7 laptop is plugged into the network and configured with an IP address. The technician then attempts to ping the laptop from another computer. While the laptop is able to connect to other devices, the ping requests fail. What is the likely cause?
    • The network drivers for the NIC are out of date.
    • The port speed for the NIC is incorrect.
    • TPM must be enabled.
    • The Windows Firewall is blocking ping requests.*
  46. A computer displays this message when the computer boots: “MBR has been changed or modified.” What could cause this problem?
    • The CMOS battery has failed.
    • A RAM module is not fully inserted into the memory slot.
    • A virus has altered the Windows kernel.
    • A boot sector virus has altered the master boot record.*
  47. Users are complaining that they are receiving spam from the email account that belongs to a co-worker. What could cause this problem?
    • A virus has damaged the master boot record on the system that is used by the co-worker.
    • The network adapter on the computer that is used by the co-worker is malfunctioning.
    • The email account belonging to the co-worker was hijacked because of malware.*
    • The email client belonging to the co-worker is not configured properly.
  48. A technician is troubleshooting a laptop that has the power light on and the hard drive spinning. However, the laptop only displays vertical lines that change color. What is the problem?
    • The BIOS is corrupt.
    • The LCD screen has failed.*
    • The backlight lamp has failed.
    • The LCD screen inverter has failed.
  49. A technician is troubleshooting a laser printer that outputs blank paper for all print jobs including printer test pages. What is a probable cause?
    • The laser printer does not have adequate memory.
    • The drum is failing to hold a charge.*
    • The drum wiper blade is worn.
    • The fuser has failed.
  50. A technician arrives and asks a customer, “Can you describe the problem?” The customer replies, “All email messages that I send have the wrong date. I have restarted the computer several times, but this does not seem to help.”
    What could be the problem?
    • The MBR is corrupted.
    • The CPU voltage is set too low.
    • The CMOS battery has failed.*
    • The hard drive is beginning to fail.
  51. A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which two commands can the technician use to repair the corrupt master boot record? (Choose two.)
    • regedit
    • chkdsk
    • regedt32
    • bootrec /fixboot*
    • bootrec /fixmbr*

Aucun commentaire:

Enregistrer un commentaire

CCNA Security v2.0 Final Exam Answers 2018

Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA f...