IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers

I
ITExamAnswers.netITExamAnswers.net

Full link: https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html

Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
[Updated Constantly]
IT Essentials (ITE v6.0 + v7.0) Chapter 13 Exam Answers 100%
1. Which two items are used in asymmetric encryption? (Choose two.)
 a token
 a DES key
 a private key *
 a public key *
 a TPM
Explanation: A token is something that is used to provide two-factor authentication. DES is
using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key
associated with a public key.
2. Which two algorithms are used for hash encoding to guarantee the integrity of data?
(Choose two.)
 MD5 *
 chap checksum
 SHA *
 VPN
 SSL
3. A high technology company has an issue with unauthorized people gaining access into the
company by following an authorized employee through the secure entrance. Which two
measures could help with this security breach? (Choose two.)
 biometrics
 employee smart ID
 mantrap *
 multifactor authentication
 security guard that checks IDs *
Explanation: A guard checking IDs or a mantrap can help prevent someone following a
legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor
authentication being used, once the door is accessed by someone having the correct
credentials, unauthorized people could still trail the legitimate person into the building or area.
4. A user receives a phone call from a person who claims to represent IT services and then
asks that user for confirmation of username and password for auditing purposes. Which
security threat does this phone call represent?
 DDoS
 spam
 social engineering *
 anonymous keylogging
Explanation: Social engineering attempts to gain the confidence of an employee and convince
that person to divulge confidential and sensitive information, such as usernames and
passwords. DDoS attacks, spam, and keylogging are all examples of software based security
threats, not social engineering.
HERE
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
5. The IT department is reporting that a company web server is receiving an abnormally high
number of web page requests from different locations simultaneously. Which type of security
attack is occurring?
 adware
 DDoS *
 phishing
 social engineering
 spyware
Explanation: Phishing, spyware, and social engineering are security attacks that collect
network and user information. Adware consists, typically, of annoying popup windows. Unlike
a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict
access to network services.
6. After confirming the removal of a virus from a computer, how should the technician ensure
and verify the full functionality of the system?
 Check for the latest OS patches and updates. *
 Document the problem and the procedures performed to solve it.
 Talk with the user to determine the cause of the problem.
 Gather information from a number of sources to clearly identify the problem.
Explanation: After resolving a computer problem, the next step is to verify full functionality by
ensuring that the OS is up to date and by testing the operation of the computer and the
network that it is connected to. Documenting the issue and solution is the final step, whereas
gathering information from the user and other sources are earlier steps in the troubleshooting
process.
7. A system administrator has been asked to protect the sensitive data on the Windows 7
computers of all management employees. Which Windows feature can be used to selectively
encrypt individual files within the user accounts of each manager?
 BitLocker
 EFS *
 TPM
 Windows Update
Explanation: Encrypting File System (EFS) is a Windows feature that can be used to encrypt
files and folders linked to a specific user account. BitLocker is a Windows feature that can be
used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard
that stores information specific to the computer system such as encryption keys, digital
certificates, and passwords. Windows Update is used to update the operating system, not to
encrypt data.
8. When would a PC repair person want to deploy the idle timeout feature?
 when users are inserting media and running applications not sanctioned by the company
 when users are leaving their desk but remaining logged on *
 when users are playing music CDs and leaving them playing even after the users have left for
the day
 when users are surfing the Internet and not doing their job
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
Explanation: The idle timeout and screen lock feature is a great security measure that protects
the computer and data accessible through it if the user steps away from the desk for a
specified period of time and forgets to lock the computer or log off.
9. Which type of firewall serves as a relay between users and servers on the Internet, inspects
all traffic, and allows or denies traffic based on a set of rules?
 packet filtering firewall
 stateful packet firewall
 proxy firewall *
 operating system firewall
Explanation: There are several types of firewall configurations:
 Packet filter – Packets cannot pass through the firewall, unless they match the established
rule set configured in the firewall. Traffic can be filtered based on different attributes, such as
source IP address, source port or destination IP address or port.
 Stateful packet inspection (SPI) – This is a firewall that keeps track of the state of network
connections traveling through the firewall. Packets that are not part of a known connection
are dropped.
 Application layer – All packets traveling to or from an application are intercepted. All
unwanted outside traffic is prevented from reaching protected devices.
 Proxy – This is a firewall installed on a proxy server that inspects all traffic and allows or
denies packets based on configured rules. A proxy server is a server that is a relay between a
client and a destination server on the Internet.
10. What would cause a Microsoft Windows update to fail?
 The wired or wireless NIC was disabled.
 The computer has a virus.
 The computer has had its security breached.
 A required prior update was not installed. *
Explanation: Two things commonly cause a Windows update to fail: 1. A required older update
was not installed. 2. There was a problem with the downloaded update.
11. A user calls the help desk reporting that a laptop is not performing as expected. Upon
checking the laptop, a technician notices that some system files have been renamed and file
permissions have changed. What could cause these problems?
 The file system is corrupted.
 The laptop is infected by a virus. *
 The display driver is corrupted.
 The file system has been encrypted.
Explanation: Problems of system files being renamed and file permissions being changed
without user knowledge are most likely caused by a virus. File system corruption would make
the directory and files inaccessible. A corrupted display driver would prevent the laptop from
displaying at all or it would display only VGA resolution.
12. How can users working on a shared computer keep their personal browsing history hidden
from other workers that may use this computer?
 Reboot the computer after closing the web browser.
 Operate the web browser in private browser mode. *
 Use only an encrypted connection to access websites.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
 Move any downloaded files to the recycle bin.
Explanation: When a computer user browses the web in private mode, the following
occurs:Cookies are disabled. Temporary Internet files are removed after closing the window.
Browsing history is removed after closing the window.
13. A retail store wants to secure laptops that are on display. The store manager also wants a
record of which employees enter the backroom where inventory is kept. Which security option
would work best for this situation?
 guards and log sheets
 security cameras and only the manager having access to the backroom
 cable locks and a token-based lock on the backroom *
 a condition that laptops are viewed one at a time and only the owner has a key to the
backroom
Explanation: Retail solutions have to be flexible for both customers and employees. Physical
security products are available to provide a solution such as using cable locks to secure
equipment and an electronic lock that records activity on a door.
14. Refer to the exhibit. The security policy of an organization allows employees to connect to
the office intranet from their homes. Which type of security policy is this?
 acceptable use
 incident handling
 network maintenance
 remote access *
Explanation: The remote access policy section of a corporate security policy identifies how
remote users can access a network and what is accessible via remote connectivity.
15. A user notices that files created and saved locally last week are missing and asks the
technician to investigate. The technician suspects there has been a security breach. Which
type of malware could be responsible?
 adware
 phishing
 spyware
 Trojan *
Explanation: Trojans can enable unauthorized remote access, provide the attacker with data,
corrupt or delete files, use the computer as a source for other attacks, enable unauthorized
services, and stop antimalware software.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
16. A group of users on the same network are all complaining about their computers running
slowly. After investigating, the technician determines that these computers are part of a
zombie network. Which type of malware is used to control these computers?
 botnet *
 rootkit
 spyware
 virus
Explanation: A botnet is a network of infected computers called a zombie network. The
computers are controlled by a hacker and are used to attack other computers or to steal data.
17. What are signatures as they relate to security threats?
 a unique encryption code used by a known attacker
 one or more code patterns within a specific type of malware *
 the beginning or end of a malware segment that has a specific cyclic redundancy check
number
 the checksum associated with each specific type of malware that is stored in a virus table
Explanation: Antimalware software analyzes code patterns within malware to create
signatures that are stored in virus definition tables. Antimalware signature files are constantly
being updated because malware is constantly morphing into new strands.
18. A college student logs onto a college computer for the first time. Which security policy
category should be presented to the student?
 acceptable use policies *
 identification and authentication policies
 incident handling policies
 network maintenance policies
Explanation: The acceptable use policies section of a security policy commonly identifies
network resources and usages that are acceptable to the organization. They might also state
the ramifications that can occur if this security policy is violated.
19. A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which
BIOS option will the technician need to enable?
 NTFS
 SSL
 TPM *
 EFS
Explanation: A Trusted Platform Module (TPM) is a motherboard chip used to store security
information such as encryption keys, security certificates, and passwords. It is required to be
enabled before implementing BitLocker.
20. Which security technique or device wipes the data from a hard drive by being placed near
the drive platter for at least 2 minutes?
 degaussing wand *
 EFS
 low-level format
 biometric scanner
 erase scope
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
Explanation: A degaussing wand requires being placed over hard drive platters for a couple of
minutes, whereas an electromagnetic degaussing device can wipe all data in seconds.
21. Refer to the exhibit. Which type of workstation password is being used?
ITE v7.0 – IT Essentials (Version 7.0) – IT Essentials 7.0 Chapter 13 Exam Answers
 BIOS *
 login
 multifactor
 network
 synchronous
Explanation: A BIOS password is configured by entering the BIOS Setup program.
22. A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The
customer asks the technician how to configure the computer to detect and filter phishing
websites, to analyze websites for suspicious items, and to check downloads against a list of
known malicious files and sites. Which web security feature should the technician
demonstrate?
 ActiveX Filter
 AutoPlay
 Firewall
 SmartScreen Filter *
Explanation: In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the
three dotted icon to select Settings > View advanced settings to turn the Help protect me from
malicious sites and downloads with Windows Defender SmartScreen option on.
23. A SOHO company has hired a technician to come in and configure and secure the
computers. The technician has decided to configure a local security policy for the machines.
Which setting would the technician use to ensure that the user did not make their password
the same as their own user account name?
 enforce password history
 maximum password age
 minimum password length
 meet complexity requirements *
Explanation: The Password must meet complexity requirements option requires that the user not
make their own user account name or part of their user account name as their password. This
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
option also requires that the password have at least three of the following: uppercase letter,
lowercase letter, number, and symbol.
24. A technician is configuring rights and permissions in Windows 7. Which tool will the
technician use?
 Device Manager
 Local Security Policy
 Local Users and Groups *
 Resource Monitor
Explanation: Within the Local Users and Groups tool, a technician can create users, create
groups, and assign rights and permissions.
25. An IT technician wants to create a rule on two Windows 10 computers to prevent an
installed application from accessing the public Internet. Which tool would the technician use
to accomplish this task?
 Computer Management
 DMZ
 Local Security Policy
 Windows Defender Firewall with Advanced Security *
Explanation: Windows Firewall with Advanced Security or the Windows 10 Windows Defender
Firewall with Advanced Security is used to create inbound and outbound rules, connection
security rules such as security traffic between two computers, and monitoring any active
connection security rules.
26. A newly created company has fifteen Windows 10 computers that need to be installed
before the company can open for business. What is a best practice that the technician should
implement when configuring the Windows Firewall?
 The technician should remove all default firewall rules and selectively deny traffic from
reaching the company network.
 The technician should enable the Windows Firewall for inbound traffic and install other
firewall software for outbound traffic control.
 After implementing third party security software for the company, the technician should verify
that the Windows Firewall is disabled. *
 The technician should create instructions for corporate users on how to allow an app through
the WIndows Firewall using the Administrator account.
Explanation: Only disable Windows Firewall if other firewall software is installed. Use the
Windows Firewall (Windows 7 or 8) or the Windows Defender Firewall (Windows 10) Control
Panel to enable or disable the Windows Firewall.
27. Which two statements characterize wireless network security? (Choose two.)
 Wireless networks offer the same security features as wired networks offer.
 Wireless guest mode provides open access to a protected LAN.
 With SSID broadcast disabled, an attacker must know the SSID to connect. *
 Using the default IP address on an access point makes hacking easier. *
 An attacker needs physical access to at least one network device to launch an attack.
Explanation: The default settings on a wireless network usually include an SSID that is being
broadcast as well as default IP address settings. These default settings are considered
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
insecure because with them an attacker can easily see a wireless network and attempt to
connect to it and make changes to the network.
28. A manager approaches a PC repair person with the issue that users are coming in to the
company in the middle of the night to play games on their computers. What might the PC
repair person do to help in this situation?
 Limit the login times. *
 Use Event View to document the times logged in and out of the computer.
 Use Device Manager to limit access to the computer.
 Enable power on passwords in the BIOS.
Explanation: The technician can limit the time logins can occur on a computer. Using Event
Viewer to determine the login times is an action that does not prevent the users from logging
into the computer. Power on BIOS passwords are not usually configured for a specific time.
Device Manager is used to view settings and operation of devices, not users.
29. A technician has been asked by a manager to recommend a security solution for protecting
a computer against worms. Which security technique should the technician recommend?
 antimalware *
 SSL
 ping sweep
 IPS
30. A technician has been asked by a manager to recommend a security solution for protecting
a computer against ransomware. Which security technique should the technician recommend?
 antimalware *
 encryption
 ping sweep
 IPS
31. A technician has been asked by a manager to recommend a security solution for protecting
a computer against spyware. Which security technique should the technician recommend?
 antimalware *
 dual authentication
 ping sweep
 IPS
32. A technician has been asked by a manager to recommend a security solution for protecting
a computer against keyloggers. Which security technique should the technician recommend?
 antimalware *
 ASA
 ping sweep
 IPS
33. A technician has been asked by a manager to recommend a security solution for protecting
a computer against adware programs. Which security technique should the technician
recommend?
 antimalware *
 IPS
 ping sweep
 ASA
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
34. A technician has been asked by a manager to recommend a security solution for protecting
a computer against rootkits. Which security technique should the technician recommend?
 antimalware *
 ping sweep
 dual authentication
 ASA
35. A technician has been asked by a manager to recommend a security solution for protecting
a computer against Trojans. Which security technique should the technician recommend?
 antimalware *
 port scan
 dual authentication
 ASA
IT Essentials v6.0:
1. What is the correct way to conduct a telephone call to troubleshoot a computer problem?
 Always gather information from the customer and escalate the problem.
 Maintain professional behavior at all times. *
 Ask personal questions to get better acquainted with the customer.
 Explain each step to help the customer understand the troubleshooting process.
2. What is a recommended technique for a technician who is both troubleshooting a problem
and also trying to help a customer relax?
 Establish a good rapport with the customer.*
 Give the customer one minute to speak before taking over the conversation.
 Put the customer on hold.
 Spend time explaining the cause of the problem to the customer.
3. A customer is upset and wants to speak to a specific technician to resolve a problem
immediately. The requested technician is away from the office for the next hour. What is the
best way to handle this call?
 Refer the angry customer to a supervisor.
 Advise the customer that the requested technician is out of the office and insist on trying to
resolve the problem.
 Make an offer to help the customer immediately, and advise the customer that otherwise the
requested technician will call the customer back within two hours.*
 Ignore the request for the specific technician by walking through a step-by-step process with
the customer in an attempt to refocus the customer and solve the problem.
4. What two actions should a call center technician avoid when dealing with an angry
customer? (Choose two.)
 spending time explaining what caused the problem*
 putting the customer on hold or transferring the call*
 apologizing for any inconvenience caused to the customer
 sympathizing with the customer
 letting the customer explain the problem without interruption
5. A call center technician is on a call with a customer when a colleague indicates that there is
something to discuss. What should the technician do?
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
 Interrupt the customer and ask whether the customer would mind going on hold for a few
minutes.
 Tell the customer that the call will be put on hold for a few minutes.
 Signal to the colleague to wait.*
 Mute the line to the customer while discussing the issue with the colleague.
6. A technician receives a call from a customer who is too talkative. How should the technician
handle the call?
 Talk over the customer and quickly gather the necessary information to be of help.
 Allow the customer to speak for one minute and then try to refocus the conversation.*
 Use open-ended questions and repeat all the information back to the customer to politely
show that unnecessary information is being given.
 Politely step in and gain control of the call by asking the customer social questions.
7. What are two examples of displaying professional communication skills while talking to a
customer? (Choose two.)
 the use of active listening, with occasional interjections such as “I see” or “I understand”*
 clarifying what customers say after they have finished their explanations*
 interrupting customers with a question to gather more information
 asking customers to paraphrase their explanations
 focusing on what you cannot do to give customers an idea of the magnitude of the problem
8. Which statement describes a best practice related to time management?
 The technician should take the easier calls first, regardless of the urgency.
 The technician should give better service to a customer for whom the technician feels more
sympathy.
 The technician can take the call of another technician, even without permission to do so.
 The technician should make sure to call the customer back as close to the callback time as
possible. *
9. Which two rules should be followed by call center employees to ensure customer
satisfaction? (Choose two.)
 Show favoritism to returning customers.
 Sympathize with customers regarding their negative views of a previous technician.
 Offer different repair or replacement options if possible.*
 Communicate the repair status with explanations of any delays.*
 Take a call assigned to another technician on the call board if the call is from a known
customer.
10. Fill in the blank. The SLA is a contract defining the agreed-on level of support between a
customer and a service vendor.
11. During the process of troubleshooting, a technician gains access to customer private
information. What is expected that the technician do with this information?
 Document all information in a log file.
 Keep it confidential.*
 Send this information to the manager of the customer.
 Send this information to the technician manager.
 Back up the information just in case the customer needs it some day.
12. Which statement is characteristic of most personal software licenses?
 Developers are allowed to modify and share the source code that runs the software.
 A company is allowed to use the software campus wide.
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
 A user is allowed to share the software with friends.
 A user is allowed to install the software on only one computer. *
13. What is the definition of cyber law?
 a single law defining criminal acts that are committed online
 the collection of international, country, and local laws that affect computer security
professionals*
 a contract that defines expectations between an organization and IT service vendors for an
agreed upon level of support
 the process of collecting and analyzing data from computer systems, networks, wireless
communications, and storage devices
14. Which two actions should a technician take if illegal content, such as child pornography, is
discovered on the hard drive of a customer computer? (Choose two.)
 Confront the customer immediately.
 Remove and destroy the hard drive.
 Contact a first responder.*
 Shut down the computer until authorities arrive.
 Document as much information as possible. *
15. When performing computer forensics, what can be prevented with a properly and carefully
documented chain of custody?
 evidence tampering*
 copying of copyrighted materials
 cyber crime
 identity theft
16. When performing computer forensics what is required to prove a chain of custody?
 proper documentation procedures*
 an admission of guilt
 collected evidence
 expert testimony
17. A technician has found possible illegal content on the hard drive of a customer computer.
When should a computer forensics expert be brought in?
 immediately after the IT technician found the content
 after a system administrator has viewed the content
 after routine administrative tasks have been completed on the customer PC
 after the content is classified as illegal *
18. A technician is analyzing a computer that may have been used for illegal activity. What are
two examples of volatile data? (Choose two.)
 network connections that are open*
 data that is located on an optical drive
 files available on an internal drive
 users who are logged in to the computer*
 a USB drive that is connected to the computer
19. What should a level two technician do immediately after receiving an escalated work order
from a level one technician?
 Call the level one technician and ask questions about the problem.
 Call the customer back to ask any additional questions and resolve the problem.*
Computer Networking Tutorials-Labs-Tips, Exam & Answers
for Student & Beginners
https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html
 Document suggestions to solve the problem in the work order and return it to the level one
technician.
 Send the work order to a level three technician and ask for support.
20. What is a reason to escalate a problem from a level one technician to a level two
technician?
 when the equipment needs to be rebooted
 when drivers, applications, or operating systems need to be installed*
 when the screen resolution of a customer PC needs to be adjusted
 when a peripheral device needs to be replaced
21. What are three pieces of information a level one technician should gather from a
customer? (Choose three.)
 contact information*
 description of the problem*
 details of any recent changes to the computer*
 output from diagnostic software
 output from a remote connection to the customer computer
 current CMOS settings
22. Which situation would require that a support desk call be given the highest priority?
 The company cannot operate because of a system failure.*
 A couple of computers have operating system errors.
 Some computers cannot log in to the network.
 Two users are requesting an application enhancement.
 A user is requesting a RAM memory upgrade.
23. When does a level one technician prepare an escalated work order?
 when a problem requires that the technician ask questions and document responses
 when a technician is able to answer the questions of the customer and solve the problem
 when a problem cannot be resolved within a predetermined amount of time*
 when a technician must enter information using support software
24. Which statement best describes a call center?
 It is a busy, fast-paced work environment where agents contact customers to arrange
preventive maintenance appointments.
 It is a help desk used by customers to make an appointment to report their computer
problems.
 It is a place that exists within a company and provides computer support to both employees
and customers of the company. *
 It is a store-front environment where the customers go with their computers to have them
fixed.

Recommandé

IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersITExamAnswers.net
2.1K vues17 diapositives
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersITExamAnswers.net
2.3K vues21 diapositives
IT Essentials (Version 7.0) - ITE Chapter 8 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 8 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 8 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 8 Exam AnswersITExamAnswers.net
3.4K vues18 diapositives
IT Essentials (Version 7.0) - ITE Chapter 10 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 10 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 10 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 10 Exam AnswersITExamAnswers.net
4.6K vues17 diapositives
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 14 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam AnswersITExamAnswers.net
961 vues11 diapositives
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersITExamAnswers.net
3.2K vues15 diapositives

Contenu connexe

Tendances

Windows server par
Windows serverWindows server
Windows serverHideo Amezawa
1.5K vues22 diapositives
Configuring and administrate server par
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
1K vues123 diapositives
Network Administrator par
Network AdministratorNetwork Administrator
Network Administratorguest371b1b4
6.4K vues8 diapositives
ITE v5.0 - Chapter 7 par
ITE v5.0 - Chapter 7ITE v5.0 - Chapter 7
ITE v5.0 - Chapter 7Irsandi Hasan
8.9K vues51 diapositives
Chs nc2 reviewer - with oral questioning par
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningAdolfo Nasol
28.8K vues14 diapositives
IP addressing Grade 10 TLE ICT par
IP addressing Grade 10 TLE ICTIP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICTLeonel Rivas
1.5K vues44 diapositives

Tendances(20)

Configuring and administrate server par Gera Paulos
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos1K vues
Chs nc2 reviewer - with oral questioning par Adolfo Nasol
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
Adolfo Nasol28.8K vues
IP addressing Grade 10 TLE ICT par Leonel Rivas
IP addressing Grade 10 TLE ICTIP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICT
Leonel Rivas1.5K vues
Pc Preventative Maintenance Checklist par Miss Cheska
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
Miss Cheska27.2K vues
Email server configuration on cisco packet tracer par prodhan999
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracer
prodhan9993.6K vues
Server 2008 r2 ppt par Raj Solanki
Server 2008 r2 pptServer 2008 r2 ppt
Server 2008 r2 ppt
Raj Solanki1.5K vues
Windows 1.0 The Beginning Of A New Era par Ken Wisnewski
Windows 1.0 The Beginning Of A New EraWindows 1.0 The Beginning Of A New Era
Windows 1.0 The Beginning Of A New Era
Ken Wisnewski1.1K vues
Desktop interview qestions & answer par mandarshetye45
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
mandarshetye452.3K vues
TLS, SPF, DKIM, DMARC, authenticated email par rinnocente
TLS, SPF, DKIM, DMARC, authenticated emailTLS, SPF, DKIM, DMARC, authenticated email
TLS, SPF, DKIM, DMARC, authenticated email
rinnocente3.7K vues
Pc maintenance par FitaAyalew
Pc maintenancePc maintenance
Pc maintenance
FitaAyalew4.1K vues
Sag computer system servicing nc ii par Michael Andrion
Sag   computer system servicing nc iiSag   computer system servicing nc ii
Sag computer system servicing nc ii
Michael Andrion1.9K vues
Windows Live Forensics 101 par Arpan Raval
Windows Live Forensics 101Windows Live Forensics 101
Windows Live Forensics 101
Arpan Raval864 vues
DNS server configuration par Sanguine_Eva
DNS server configurationDNS server configuration
DNS server configuration
Sanguine_Eva9.2K vues

Similaire à IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers

Portakal Teknoloji Otc Lyon Part 1 par
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
546 vues65 diapositives
Security assignment (copy) par
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
30 vues14 diapositives
Firewalls par
FirewallsFirewalls
FirewallsDeevena Dayaal
168 vues14 diapositives
Introduction of firewall slides par
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
27.6K vues30 diapositives
CSE_Instructor_Materials_Chapter7.pptx par
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
9 vues19 diapositives
Building A Cyber-Security Policy par
Building A Cyber-Security PolicyBuilding A Cyber-Security Policy
Building A Cyber-Security PolicyTiffany Robinson
3 vues43 diapositives

Similaire à IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers(20)

Portakal Teknoloji Otc Lyon Part 1 par bora.gungoren
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
bora.gungoren546 vues
Security assignment (copy) par Amare Kassa
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa30 vues
Introduction of firewall slides par rahul kundu
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu27.6K vues
Part 1You have been recently hired as a network security analyst.docx par danhaley45372
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
danhaley453722 vues
ISE 510 Final Project Scenario Background Limetree In.docx par christiandean12115
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docx
Implementing an improved security for collin’s database and telecommuters par Rishabh Gupta
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta256 vues
James Jara Portfolio 2014 - InfoSec White Paper- Part 5 par James Jara
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara1.9K vues
Elementary-Information-Security-Practices par Octogence
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence347 vues
Packet capture and network traffic analysis par CARMEN ALCIVAR
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
CARMEN ALCIVAR3.3K vues
Nt2580 Final Project Essay Examples par Sherry Bailey
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
Sherry Bailey3 vues
Network Security - Real and Present Dangers par Peter Wood
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
Peter Wood732 vues
Project Instructions You have been recently hired as a.docx par briancrawford30935
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx

Plus de ITExamAnswers.net

IT Essentials (Version 7.0) - ITE Final Exam Answers par
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersITExamAnswers.net
17.7K vues40 diapositives
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers par
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersIT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersITExamAnswers.net
6.7K vues29 diapositives
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersITExamAnswers.net
3.1K vues15 diapositives
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersITExamAnswers.net
4.1K vues15 diapositives
IT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers par
IT Essentials (Version 7.0) - ITE Chapter 1 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 1 Exam AnswersITExamAnswers.net
3K vues17 diapositives
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers par
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersIt Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersITExamAnswers.net
471 vues15 diapositives

Plus de ITExamAnswers.net(6)

IT Essentials (Version 7.0) - ITE Final Exam Answers par ITExamAnswers.net
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
ITExamAnswers.net17.7K vues
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers par ITExamAnswers.net
IT Essentials (Version 7.0) - ITE Practice Final Exam AnswersIT Essentials (Version 7.0) - ITE Practice Final Exam Answers
IT Essentials (Version 7.0) - ITE Practice Final Exam Answers
ITExamAnswers.net6.7K vues
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers par ITExamAnswers.net
IT Essentials (Version 7.0) - ITE Chapter 7 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 7 Exam Answers
ITExamAnswers.net3.1K vues
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers par ITExamAnswers.net
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
ITExamAnswers.net4.1K vues
IT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers par ITExamAnswers.net
IT Essentials (Version 7.0) - ITE Chapter 1 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 1 Exam Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers par ITExamAnswers.net
It Essentials (Version 7.0) A+ Cert Practice Exam 1 AnswersIt Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers
It Essentials (Version 7.0) A+ Cert Practice Exam 1 Answers

Dernier

Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv... par
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Taste
62 vues21 diapositives
ICS3211_lecture 09_2023.pdf par
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
147 vues10 diapositives
BUSINESS ETHICS MODULE 1 UNIT I_A.pdf par
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfBUSINESS ETHICS MODULE 1 UNIT I_A.pdf
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfDr Vijay Vishwakarma
92 vues25 diapositives
REFERENCING, CITATION.pptx par
REFERENCING, CITATION.pptxREFERENCING, CITATION.pptx
REFERENCING, CITATION.pptxabhisrivastava11
41 vues26 diapositives
Career Building in AI - Technologies, Trends and Opportunities par
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and OpportunitiesWebStackAcademy
47 vues44 diapositives
JRN 362 - Lecture Twenty-Two par
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-TwoRich Hanley
39 vues157 diapositives

Dernier(20)

Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv... par Taste
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Taste62 vues
Career Building in AI - Technologies, Trends and Opportunities par WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy47 vues
JRN 362 - Lecture Twenty-Two par Rich Hanley
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-Two
Rich Hanley39 vues
Guess Papers ADC 1, Karachi University par Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz105 vues
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx par Niranjan Chavan
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Niranjan Chavan42 vues
Monthly Information Session for MV Asterix (November) par Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC213 vues
INT-244 Topic 6b Confucianism par S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer49 vues
What is Digital Transformation? par Mark Brown
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?
Mark Brown41 vues
JQUERY.pdf par ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3107 vues
Introduction to AERO Supply Chain - #BEAERO Trainning program par Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih123 vues
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 par MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice par Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste52 vues

IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers

  • 1. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html [Updated Constantly] IT Essentials (ITE v6.0 + v7.0) Chapter 13 Exam Answers 100% 1. Which two items are used in asymmetric encryption? (Choose two.)  a token  a DES key  a private key *  a public key *  a TPM Explanation: A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key. 2. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)  MD5 *  chap checksum  SHA *  VPN  SSL 3. A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)  biometrics  employee smart ID  mantrap *  multifactor authentication  security guard that checks IDs * Explanation: A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area. 4. A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?  DDoS  spam  social engineering *  anonymous keylogging Explanation: Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering. HERE
  • 2. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html 5. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?  adware  DDoS *  phishing  social engineering  spyware Explanation: Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware consists, typically, of annoying popup windows. Unlike a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict access to network services. 6. After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?  Check for the latest OS patches and updates. *  Document the problem and the procedures performed to solve it.  Talk with the user to determine the cause of the problem.  Gather information from a number of sources to clearly identify the problem. Explanation: After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process. 7. A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?  BitLocker  EFS *  TPM  Windows Update Explanation: Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data. 8. When would a PC repair person want to deploy the idle timeout feature?  when users are inserting media and running applications not sanctioned by the company  when users are leaving their desk but remaining logged on *  when users are playing music CDs and leaving them playing even after the users have left for the day  when users are surfing the Internet and not doing their job
  • 3. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html Explanation: The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off. 9. Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?  packet filtering firewall  stateful packet firewall  proxy firewall *  operating system firewall Explanation: There are several types of firewall configurations:  Packet filter – Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port.  Stateful packet inspection (SPI) – This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped.  Application layer – All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices.  Proxy – This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that is a relay between a client and a destination server on the Internet. 10. What would cause a Microsoft Windows update to fail?  The wired or wireless NIC was disabled.  The computer has a virus.  The computer has had its security breached.  A required prior update was not installed. * Explanation: Two things commonly cause a Windows update to fail: 1. A required older update was not installed. 2. There was a problem with the downloaded update. 11. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?  The file system is corrupted.  The laptop is infected by a virus. *  The display driver is corrupted.  The file system has been encrypted. Explanation: Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution. 12. How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?  Reboot the computer after closing the web browser.  Operate the web browser in private browser mode. *  Use only an encrypted connection to access websites.
  • 4. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html  Move any downloaded files to the recycle bin. Explanation: When a computer user browses the web in private mode, the following occurs:Cookies are disabled. Temporary Internet files are removed after closing the window. Browsing history is removed after closing the window. 13. A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation?  guards and log sheets  security cameras and only the manager having access to the backroom  cable locks and a token-based lock on the backroom *  a condition that laptops are viewed one at a time and only the owner has a key to the backroom Explanation: Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door. 14. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?  acceptable use  incident handling  network maintenance  remote access * Explanation: The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity. 15. A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?  adware  phishing  spyware  Trojan * Explanation: Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software.
  • 5. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html 16. A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?  botnet *  rootkit  spyware  virus Explanation: A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data. 17. What are signatures as they relate to security threats?  a unique encryption code used by a known attacker  one or more code patterns within a specific type of malware *  the beginning or end of a malware segment that has a specific cyclic redundancy check number  the checksum associated with each specific type of malware that is stored in a virus table Explanation: Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands. 18. A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?  acceptable use policies *  identification and authentication policies  incident handling policies  network maintenance policies Explanation: The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated. 19. A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?  NTFS  SSL  TPM *  EFS Explanation: A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker. 20. Which security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes?  degaussing wand *  EFS  low-level format  biometric scanner  erase scope
  • 6. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html Explanation: A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds. 21. Refer to the exhibit. Which type of workstation password is being used? ITE v7.0 – IT Essentials (Version 7.0) – IT Essentials 7.0 Chapter 13 Exam Answers  BIOS *  login  multifactor  network  synchronous Explanation: A BIOS password is configured by entering the BIOS Setup program. 22. A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?  ActiveX Filter  AutoPlay  Firewall  SmartScreen Filter * Explanation: In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on. 23. A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name?  enforce password history  maximum password age  minimum password length  meet complexity requirements * Explanation: The Password must meet complexity requirements option requires that the user not make their own user account name or part of their user account name as their password. This
  • 7. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html option also requires that the password have at least three of the following: uppercase letter, lowercase letter, number, and symbol. 24. A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?  Device Manager  Local Security Policy  Local Users and Groups *  Resource Monitor Explanation: Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions. 25. An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?  Computer Management  DMZ  Local Security Policy  Windows Defender Firewall with Advanced Security * Explanation: Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules. 26. A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?  The technician should remove all default firewall rules and selectively deny traffic from reaching the company network.  The technician should enable the Windows Firewall for inbound traffic and install other firewall software for outbound traffic control.  After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled. *  The technician should create instructions for corporate users on how to allow an app through the WIndows Firewall using the Administrator account. Explanation: Only disable Windows Firewall if other firewall software is installed. Use the Windows Firewall (Windows 7 or 8) or the Windows Defender Firewall (Windows 10) Control Panel to enable or disable the Windows Firewall. 27. Which two statements characterize wireless network security? (Choose two.)  Wireless networks offer the same security features as wired networks offer.  Wireless guest mode provides open access to a protected LAN.  With SSID broadcast disabled, an attacker must know the SSID to connect. *  Using the default IP address on an access point makes hacking easier. *  An attacker needs physical access to at least one network device to launch an attack. Explanation: The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered
  • 8. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network. 28. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?  Limit the login times. *  Use Event View to document the times logged in and out of the computer.  Use Device Manager to limit access to the computer.  Enable power on passwords in the BIOS. Explanation: The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users. 29. A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?  antimalware *  SSL  ping sweep  IPS 30. A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?  antimalware *  encryption  ping sweep  IPS 31. A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?  antimalware *  dual authentication  ping sweep  IPS 32. A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?  antimalware *  ASA  ping sweep  IPS 33. A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?  antimalware *  IPS  ping sweep  ASA
  • 9. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html 34. A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?  antimalware *  ping sweep  dual authentication  ASA 35. A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?  antimalware *  port scan  dual authentication  ASA IT Essentials v6.0: 1. What is the correct way to conduct a telephone call to troubleshoot a computer problem?  Always gather information from the customer and escalate the problem.  Maintain professional behavior at all times. *  Ask personal questions to get better acquainted with the customer.  Explain each step to help the customer understand the troubleshooting process. 2. What is a recommended technique for a technician who is both troubleshooting a problem and also trying to help a customer relax?  Establish a good rapport with the customer.*  Give the customer one minute to speak before taking over the conversation.  Put the customer on hold.  Spend time explaining the cause of the problem to the customer. 3. A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?  Refer the angry customer to a supervisor.  Advise the customer that the requested technician is out of the office and insist on trying to resolve the problem.  Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours.*  Ignore the request for the specific technician by walking through a step-by-step process with the customer in an attempt to refocus the customer and solve the problem. 4. What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.)  spending time explaining what caused the problem*  putting the customer on hold or transferring the call*  apologizing for any inconvenience caused to the customer  sympathizing with the customer  letting the customer explain the problem without interruption 5. A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?
  • 10. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html  Interrupt the customer and ask whether the customer would mind going on hold for a few minutes.  Tell the customer that the call will be put on hold for a few minutes.  Signal to the colleague to wait.*  Mute the line to the customer while discussing the issue with the colleague. 6. A technician receives a call from a customer who is too talkative. How should the technician handle the call?  Talk over the customer and quickly gather the necessary information to be of help.  Allow the customer to speak for one minute and then try to refocus the conversation.*  Use open-ended questions and repeat all the information back to the customer to politely show that unnecessary information is being given.  Politely step in and gain control of the call by asking the customer social questions. 7. What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)  the use of active listening, with occasional interjections such as “I see” or “I understand”*  clarifying what customers say after they have finished their explanations*  interrupting customers with a question to gather more information  asking customers to paraphrase their explanations  focusing on what you cannot do to give customers an idea of the magnitude of the problem 8. Which statement describes a best practice related to time management?  The technician should take the easier calls first, regardless of the urgency.  The technician should give better service to a customer for whom the technician feels more sympathy.  The technician can take the call of another technician, even without permission to do so.  The technician should make sure to call the customer back as close to the callback time as possible. * 9. Which two rules should be followed by call center employees to ensure customer satisfaction? (Choose two.)  Show favoritism to returning customers.  Sympathize with customers regarding their negative views of a previous technician.  Offer different repair or replacement options if possible.*  Communicate the repair status with explanations of any delays.*  Take a call assigned to another technician on the call board if the call is from a known customer. 10. Fill in the blank. The SLA is a contract defining the agreed-on level of support between a customer and a service vendor. 11. During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician do with this information?  Document all information in a log file.  Keep it confidential.*  Send this information to the manager of the customer.  Send this information to the technician manager.  Back up the information just in case the customer needs it some day. 12. Which statement is characteristic of most personal software licenses?  Developers are allowed to modify and share the source code that runs the software.  A company is allowed to use the software campus wide.
  • 11. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html  A user is allowed to share the software with friends.  A user is allowed to install the software on only one computer. * 13. What is the definition of cyber law?  a single law defining criminal acts that are committed online  the collection of international, country, and local laws that affect computer security professionals*  a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support  the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices 14. Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)  Confront the customer immediately.  Remove and destroy the hard drive.  Contact a first responder.*  Shut down the computer until authorities arrive.  Document as much information as possible. * 15. When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?  evidence tampering*  copying of copyrighted materials  cyber crime  identity theft 16. When performing computer forensics what is required to prove a chain of custody?  proper documentation procedures*  an admission of guilt  collected evidence  expert testimony 17. A technician has found possible illegal content on the hard drive of a customer computer. When should a computer forensics expert be brought in?  immediately after the IT technician found the content  after a system administrator has viewed the content  after routine administrative tasks have been completed on the customer PC  after the content is classified as illegal * 18. A technician is analyzing a computer that may have been used for illegal activity. What are two examples of volatile data? (Choose two.)  network connections that are open*  data that is located on an optical drive  files available on an internal drive  users who are logged in to the computer*  a USB drive that is connected to the computer 19. What should a level two technician do immediately after receiving an escalated work order from a level one technician?  Call the level one technician and ask questions about the problem.  Call the customer back to ask any additional questions and resolve the problem.*
  • 12. Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners https://itexamanswers.net/it-essentials-ite-v6-0-v7-0-chapter-13-exam-answers-100.html  Document suggestions to solve the problem in the work order and return it to the level one technician.  Send the work order to a level three technician and ask for support. 20. What is a reason to escalate a problem from a level one technician to a level two technician?  when the equipment needs to be rebooted  when drivers, applications, or operating systems need to be installed*  when the screen resolution of a customer PC needs to be adjusted  when a peripheral device needs to be replaced 21. What are three pieces of information a level one technician should gather from a customer? (Choose three.)  contact information*  description of the problem*  details of any recent changes to the computer*  output from diagnostic software  output from a remote connection to the customer computer  current CMOS settings 22. Which situation would require that a support desk call be given the highest priority?  The company cannot operate because of a system failure.*  A couple of computers have operating system errors.  Some computers cannot log in to the network.  Two users are requesting an application enhancement.  A user is requesting a RAM memory upgrade. 23. When does a level one technician prepare an escalated work order?  when a problem requires that the technician ask questions and document responses  when a technician is able to answer the questions of the customer and solve the problem  when a problem cannot be resolved within a predetermined amount of time*  when a technician must enter information using support software 24. Which statement best describes a call center?  It is a busy, fast-paced work environment where agents contact customers to arrange preventive maintenance appointments.  It is a help desk used by customers to make an appointment to report their computer problems.  It is a place that exists within a company and provides computer support to both employees and customers of the company. *  It is a store-front environment where the customers go with their computers to have them fixed.