ITE Chapter 12 Exam Answer 2018 - Skipzen. This exam will cover material from Chapter 12 of the ITE 6.0 curriculum. This exam will be scored using the Weighted Model where each MCSA (Multiple-Choice Single-Answer) is worth two points and each MCMA (Multiple-Choice Multiple-Answer) is worth one point for each correct option.
ITE Chapter 12 Exam Answer 2018
registering and escorting all visitors to the premises
ensuring that each use of an access card allows access to only one user at the time
2. Which two characteristics describe a worm? (Choose two.)
is self-replicating
travels to new computers without any intervention or knowledge of the user
3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
phishing
4. What is the primary goal of a DoS attack?
to prevent the target server from being able to handle additional requests
5. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
DNS poisoning
6. Which password is the strongest?
Gd^7123e!
7. Which three questions should be addressed by organizations developing a security policy? (Choose three.)
What assets require protection?
What is to be done in the case of a security breach?
What are the possible threats to the assets of the organization?
8. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?
Data wipe the hard drive.
9. Which two file-level permissions allow a user to delete a file? (Choose two.)
Modify
Full Control
10. What is the name given to the programming-code patterns of viruses?
signatures
11. What is the most effective way of securing wireless traffic?
WPA2
12. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
13. What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)
Implement biometric authentication.
Lock doors to telecommunications rooms.
14. What is the minimum level of Windows security required to allow a local user to restore backed up files?
Write
15. What is the purpose of the user account idle timeout setting?
to log a user out of a computer after a specified amount of time
16. Which two security procedures are best practices for managing user accounts? (Choose two.)
Limit the number of failed login attempts.
Restrict the time of day that users can log into a computer.
17. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
Manage Security Settings
18. Which two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)
Administrators*
Backup Operators*
19. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?
Limit the login times.
20. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
What symptoms are you experiencing?
21. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
Disconnect the host from the network.
22. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
Ensure the security policy is being enforced.
23. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
Set virus protection software to scan removable media when data is accessed.*
Disable the autorun feature in the operating system.*
24. A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?
Set the antivirus software to scan removable media.
25. A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?
Close the browser tab or window.
26. In what situation will a file on a computer using Windows 8.1 keep its original access permissions?
when it is moved to the same volume
27. What security measure can be used to encrypt the entire volume of a removable drive?
BitLocker To Go
28. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?
The laptop is infected by a virus.
ITE Chapter 12 Exam Answer 2018
Chapter 12 Exam 28 Part
1. Which two security precautions will help protect a workplace against social engineering? (Choose two.)registering and escorting all visitors to the premises
ensuring that each use of an access card allows access to only one user at the time
2. Which two characteristics describe a worm? (Choose two.)
is self-replicating
travels to new computers without any intervention or knowledge of the user
3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
phishing
4. What is the primary goal of a DoS attack?
to prevent the target server from being able to handle additional requests
5. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
DNS poisoning
6. Which password is the strongest?
Gd^7123e!
7. Which three questions should be addressed by organizations developing a security policy? (Choose three.)
What assets require protection?
What is to be done in the case of a security breach?
What are the possible threats to the assets of the organization?
8. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?
Data wipe the hard drive.
9. Which two file-level permissions allow a user to delete a file? (Choose two.)
Modify
Full Control
10. What is the name given to the programming-code patterns of viruses?
signatures
11. What is the most effective way of securing wireless traffic?
WPA2
12. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
13. What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)
Implement biometric authentication.
Lock doors to telecommunications rooms.
14. What is the minimum level of Windows security required to allow a local user to restore backed up files?
Write
15. What is the purpose of the user account idle timeout setting?
to log a user out of a computer after a specified amount of time
16. Which two security procedures are best practices for managing user accounts? (Choose two.)
Limit the number of failed login attempts.
Restrict the time of day that users can log into a computer.
17. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
Manage Security Settings
18. Which two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)
Administrators*
Backup Operators*
19. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?
Limit the login times.
20. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
What symptoms are you experiencing?
21. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
Disconnect the host from the network.
22. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
Ensure the security policy is being enforced.
23. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
Set virus protection software to scan removable media when data is accessed.*
Disable the autorun feature in the operating system.*
24. A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?
Set the antivirus software to scan removable media.
25. A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?
Close the browser tab or window.
26. In what situation will a file on a computer using Windows 8.1 keep its original access permissions?
when it is moved to the same volume
27. What security measure can be used to encrypt the entire volume of a removable drive?
BitLocker To Go
28. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?
The laptop is infected by a virus.
:)
:(
=(
^_^
:D
=D
|o|
@@,
;)
:-bd
:-d
:p