Chapters 12 – 13/ Qs with Ans & rationales
Which two security precautions will help protect a workplace against social
engineering? (Choose two.) - Answer: registering and escorting all visitors to the
premises
ensuring that each use of an access card allows access to only one user at the time
Explanation: Encrypting data, keeping software up to date, and backing up data
are all security precautions, but will not protect against unauthorized physical
access to premises by people trying to gather information for malicious purposes.
Page 1 of 11
, A user complains about not being able to modify a shared remote file. The
technician investigates the issue and notices that both NTFS and share
permissions have been assigned to the shared folder and file. What is the effective
permission when this security technique has been applied? - Answer: The most
restrictive share or NTFS permission will be applied.
Explanation: If a shared folder has been given the full control NTFS permission
and the read share permission, the effective permission will be the most
restrictive one which is read in this case.
A hard drive used by an administrative assistant in a Federal Reserve Bank is
replaced with a new larger capacity drive. The technician brings the old drive into
the technical office and is asked for the drive so it can be used in a different
computer. How should the technician handle this situation? - Answer: Perform a
drive wipe before turning the drive over to the second technician.
Explanation: Drives can be recycled or repurposed as long as best practices are
adhered to. Drive wiping software can be used to overwrite existing data multiple
times so that the original data cannot be read.
What are two benefits of using an ext4 partition instead of ext3? (Choose two.) -
Answer: 1. improved performance
2. increase in the size of supported files
Page 2 of 11