100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

UPDATED ITE 8 CHAPTER 13 EXAM QUESTIONS WITH VERIFIED ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
01-05-2025
Geschreven in
2024/2025

UPDATED ITE 8 CHAPTER 13 EXAM QUESTIONS WITH VERIFIED ANSWERS A college student logs onto a college computer for the first time. Which security policy category should be presented to the student? - RIGHT ANSWER -acceptable use policies A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate? - RIGHT ANSWER -SmartScreen Filter A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.) - RIGHT ANSWER -mantrap security guard that checks IDs A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation? - RIGHT ANSWER -Limit the login times. A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall? - RIGHT ANSWER -After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled. A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation? - RIGHT ANSWER -cable locks and a token-based lock on the backroom A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name? - RIGHT ANSWER -meet complexity requirements A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend? - RIGHT ANSWER -anti malware A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend? - RIGHT ANSWER -anti malware A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend? - RIGHT ANSWER -antimalware A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable? - RIGHT ANSWER -TPM A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems? - RIGHT ANSWER -The laptop is infected by a virus. A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible? - RIGHT ANSWER -Trojan A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent? - RIGHT ANSWER -social engineering After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system? - RIGHT ANSWER -Check for the latest OS patches and updates. An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task? - RIGHT ANSWER -Windows Defender Firewall with Advanced Security How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer? - RIGHT ANSWER -Operate the web browser in private browser mode. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? - RIGHT ANSWER -remote access Refer to the exhibit. Which type of workstation password is being used? - RIGHT ANSWER -BIOS The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring? - RIGHT ANSWER -DDoS What are signatures as they relate to security threats? - RIGHT ANSWER -one or more code patterns within a specific type of malware What would cause a Microsoft Windows update to fail? - RIGHT ANSWER -A required prior update was not installed. When would a PC repair person want to deploy the idle timeout feature? - RIGHT ANSWER -when users are leaving their desk but remaining logged on Which security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes? - RIGHT ANSWER -degassing wand Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.) - RIGHT ANSWER -MD5 SHA Which two items are used in asymmetric encryption? (Choose two.) - RIGHT ANSWER -a private key a public key Which two statements characterize wireless network security? (Choose two.) - RIGHT ANSWER -With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules? - RIGHT ANSWER -proxy firewall

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 mei 2025
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

UPDATED ITE 8 CHAPTER 13 EXAM
QUESTIONS WITH VERIFIED ANSWERS
A college student logs onto a college computer for the first time.
Which security policy category should be presented to the student?
- RIGHT ANSWER -acceptable use policies



A customer uses Internet Explorer and Microsoft Edge as
browsers on the computer. The customer asks the technician how
to configure the computer to detect and filter phishing websites,
to analyze websites for suspicious items, and to check downloads
against a list of known malicious files and sites. Which web
security feature should the technician demonstrate? - RIGHT
ANSWER -SmartScreen Filter



A high technology company has an issue with unauthorized people
gaining access into the company by following an authorized
employee through the secure entrance. Which two measures could
help with this security breach? (Choose two.) - RIGHT ANSWER
-mantrap security guard that checks IDs



A manager approaches a PC repair person with the issue that
users are coming in to the company in the middle of the night to
play games on their computers. What might the PC repair person
do to help in this situation? - RIGHT ANSWER -Limit the login times.



A newly created company has fifteen Windows 10 computers that
need to be installed before the company can open for business.

, What is a best practice that the technician should implement when
configuring the Windows Firewall? - RIGHT ANSWER -After
implementing third party security software for the company, the
technician should verify that the Windows Firewall is disabled.



A retail store wants to secure laptops that are on display. The
store manager also wants a record of which employees enter the
backroom where inventory is kept. Which security option would
work best for this situation? - RIGHT ANSWER -cable locks and a
token-based lock on the backroom



A SOHO company has hired a technician to come in and configure
and secure the computers. The technician has decided to
configure a local security policy for the machines. Which setting
would the technician use to ensure that the user did not make their
password the same as their own user account name? - RIGHT
ANSWER -meet complexity requirements



A technician has been asked by a manager to recommend a
security solution for protecting a computer against adware
programs. Which security technique should the technician
recommend? - RIGHT ANSWER -antimalware



A technician has been asked by a manager to recommend a
security solution for protecting a computer against adware
programs. Which security technique should the technician
recommend? - RIGHT ANSWER -antimalware
$6.19
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
PERFECTSCHOOLERS
1.0
(1)

Maak kennis met de verkoper

Seller avatar
PERFECTSCHOOLERS Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
1 jaar
Aantal volgers
0
Documenten
156
Laatst verkocht
6 maanden geleden
PERFECTSCHOOLERS

"Dedicated to providing high-quality study materials to help students succeed. In order to facilitate and expedite learning, we distribute notes, guides, and resources on a range of topics. Join us for study tips and content designed to boost your grades!"

1.0

1 beoordelingen

5
0
4
0
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen