It essentials v6.0 Chapter 12 Quiz Simulator Online
It-essentials v6.0 Chapter 12 Practice Quiz Simulator |
|
---|---|
Time | 60 minutes |
Questions | 15 |
Show Answers |
Leaderboard: It-essentials v6.0 Chapter 12 Practice Quiz Simulator
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
It-essentials v6.0 Chapter 12 Practice Quiz Simulator
Quiz-summary
0 of 15 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
Information
It-essentials v6.0 Chapter 12 Practice Quiz Simulator
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 15 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Answered
- Review
-
Question 1 of 15
1. Question
1 pointsWhich action could be used to determine if a host is compromised and flooding traffic onto the network?
Correct
Incorrect
Hint
Explanation:
If a network is experiencing an extremely high volume of traffic, disconnecting a host from the network may confirm that the host is compromised and is flooding traffic onto the network. The other issues are hardware issues, and not typically security-related. -
Question 2 of 15
2. Question
1 pointsWhich security threat installs on a computer without the knowledge of the user and then monitors computer activity?
Correct
Incorrect
Hint
Explanation:
Spyware normally installs on a system without end-user knowledge and monitors activity on a computer, which can then be sent to the source of spyware. Viruses infect systems and execute malicious code. Worms self-replicate and propagate across networks from a singular host, consuming a lot of bandwidth. Adware is normally distributed through downloaded software and results in the exhibition of several pop-up windows on the system. -
Question 3 of 15
3. Question
1 pointsWhen would a PC repair person want to deploy the idle timeout feature?
Correct
Incorrect
Hint
Explanation:
The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off. -
Question 4 of 15
4. Question
1 pointsWhich is an example of social engineering?
Correct
Incorrect
Hint
Explanation:
A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering. -
Question 5 of 15
5. Question
1 pointsWhat is the best description of Trojan horse malware?
Correct
Incorrect
Hint
Explanation:
The best description of Trojan horse malware, and what distinguishes it from viruses and worms, is that it appears as useful software but hides malicious code. Trojan horse malware may cause annoying computer problems, but can also cause fatal problems. Some Trojan horses may be distributed over the Internet, but they can also be distributed by USB memory sticks and other means. Specifically targeted Trojan horse malware can be some of the most difficult malware to detect. -
Question 6 of 15
6. Question
2 pointsA technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)
Correct
Incorrect
Hint
Explanation:
Adding an unauthorized wireless router or access point to a company network is a serious potential security threat. The device should be removed from the network immediately in order to mitigate the threat. In addition, the employee should be disciplined. The company security policy, which employees agree to, should describe penalties for behavior that threatens the security of the company. -
Question 7 of 15
7. Question
1 pointsWhich level of Windows security permission is required for a local user to backup files from another user?
Correct
Incorrect
Hint
Explanation:
A local user requires the Read permission to backup files, but the Write permission is required to restore files. -
Question 8 of 15
8. Question
1 pointsWhere in Windows would a technician configure a guest account for a temporary employee?
Correct
Incorrect
Hint
Explanation:
The guest account should be used sparingly. Also, restrictions should be applied to the guest account so that the user cannot access data or resources not needed. -
Question 9 of 15
9. Question
1 pointsWhat must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?
Correct
Incorrect
Hint
Explanation:
Having an antivirus program on a computer does not protect a PC from virus attacks unless the signature updates are done regularly in order to detect newer and emerging threats. It should be noted that if the signature update lacks a signature for a new threat, the software will be unable to protect against that threat. -
Question 10 of 15
10. Question
1 pointsFor security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
Correct
Incorrect
Hint
Explanation:
Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types. -
Question 11 of 15
11. Question
1 pointsA computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?
Correct
Incorrect
Hint
Explanation:
The World Wide Web (HTTP) protocol uses port 80; port 23 is used by Telnet. Successful pings to other devices indicate that the network interface card is working correctly. BIOS and CMOS settings control system hardware functions, not network applications such as the World Wide Web. -
Question 12 of 15
12. Question
1 pointsWhat security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?
Correct
Incorrect
Hint
Explanation:
Port forwarding provides a rule-based method to direct traffic between devices on separate networks. This method provides access to devices across the Internet in a less expensive way than using a DMZ. -
Question 13 of 15
13. Question
1 pointsWhat is an example of the implementation of physical security?
Correct
Incorrect
Hint
Explanation:
Encrypting data, keeping software up to date, and the use of personal firewalls are all security precautions, but will not restrict physical access to secure areas by only authorized people. -
Question 14 of 15
14. Question
3 pointsWhich three rules increase the level of password strength? (Choose three.)
Correct
Incorrect
-
Question 15 of 15
15. Question
1 pointsWhen a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?
Correct
Incorrect
Hint
Explanation:
The last step before documenting findings is to verify full system functionality. Ensuring that all of the applications are working would be an example of verifying functionality. Asking what problem is that the user is experiencing is part of the first step: identifying the problem. Disconnecting from the network and rebooting in Safe Mode are both examples of the third step: determining an exact cause.