100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

IT Essentials Certification Checkpoint Exam Chapters 12 – 13/ Qs with Ans & rationales

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
17-12-2024
Written in
2024/2025

IT Essentials Certification Checkpoint Exam Chapters 12 – 13/ Qs with Ans & rationales Which two security precautions will help protect a workplace against social engineering? (Choose two.) - Answer: registering and escorting all visitors to the premises ensuring that each use of an access card allows access to only one user at the time Explanation: Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes. A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied? - Answer: The most restrictive share or NTFS permission will be applied. Explanation: If a shared folder has been given the full control NTFS permission and the read share permission, the effective permission will be the most restrictive one which is read in this case.

Show more Read less
Institution
IT Essentials Certification Checkpoint
Course
IT Essentials Certification Checkpoint









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IT Essentials Certification Checkpoint
Course
IT Essentials Certification Checkpoint

Document information

Uploaded on
December 17, 2024
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

IT Essentials Certification Checkpoint Exam
Chapters 12 – 13/ Qs with Ans & rationales
Which two security precautions will help protect a workplace against social
engineering? (Choose two.) - Answer: registering and escorting all visitors to the
premises


ensuring that each use of an access card allows access to only one user at the time


Explanation: Encrypting data, keeping software up to date, and backing up data
are all security precautions, but will not protect against unauthorized physical
access to premises by people trying to gather information for malicious purposes.




Page 1 of 11

, A user complains about not being able to modify a shared remote file. The
technician investigates the issue and notices that both NTFS and share
permissions have been assigned to the shared folder and file. What is the effective
permission when this security technique has been applied? - Answer: The most
restrictive share or NTFS permission will be applied.


Explanation: If a shared folder has been given the full control NTFS permission
and the read share permission, the effective permission will be the most
restrictive one which is read in this case.


A hard drive used by an administrative assistant in a Federal Reserve Bank is
replaced with a new larger capacity drive. The technician brings the old drive into
the technical office and is asked for the drive so it can be used in a different
computer. How should the technician handle this situation? - Answer: Perform a
drive wipe before turning the drive over to the second technician.


Explanation: Drives can be recycled or repurposed as long as best practices are
adhered to. Drive wiping software can be used to overwrite existing data multiple
times so that the original data cannot be read.


What are two benefits of using an ext4 partition instead of ext3? (Choose two.) -
Answer: 1. improved performance
2. increase in the size of supported files




Page 2 of 11

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Studyresource1 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
7243
Member since
1 year
Number of followers
24
Documents
1361
Last sold
2 weeks ago
EXCELLENT TUTOR.

Veteran teacher / Tutor with years of experience planning and implementing study documents, case studies, test banks and all kinds of exams questions with well articulated answers for students. Passionate and highly effective with success in study guide strategies to develop students\' academic skills and raise test scores.

4.6

708 reviews

5
490
4
148
3
58
2
10
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions