Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT Essentials Certification Checkpoint Exam Chapters 12 - 13, Exercises of Computer Science

A series of multiple-choice questions covering security concepts and practices relevant to it essentials certification. The questions address topics such as social engineering, malware prevention, mobile device security, network security, and data protection. Each question includes a correct answer and a brief explanation, providing insights into the rationale behind the chosen solution.

Typology: Exercises

2024/2025

Available from 11/08/2024

smartstudies
smartstudies 🇺🇸

239 documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1 /
7
IT Essentials Certification Checkpoint Exam Chapters 12 - 13
1.Which two security precautions will help protect a workplace against
social engineering? (Choose two.): registering and escorting all visitors to
the premises
ensuring that each use of an access card allows access to only one user
at the time
Explanation:Encrypting data, keeping software up to date, and backing
up data are all security precautions, but will not protect against
unauthorized physical access to premises by people trying to gather
information for malicious purposes.
2.It has been noted that the computers of employees who use removable
flash drives are being infected with viruses and other malware. Which two
actions can help prevent this problem in the future? (Choose two.): -Set
virus protection software to scan removable media when data is
accessed.
-Disable the autorun feature in the operating system.
Explanation: Windows Firewall filters data from the network not from
removable flash drives. The TPM is used for hardware authentication of
users and devices, not malware protection. Repairing, deleting, or
quarantining infected files will remove a current virus infection but not
prevent future infections.
3.What are two potential user benefits of rooting or jailbreaking a
pf3
pf4
pf5

Partial preview of the text

Download IT Essentials Certification Checkpoint Exam Chapters 12 - 13 and more Exercises Computer Science in PDF only on Docsity!

1 / IT Essentials Certification Checkpoint Exam Chapters 12 - 13 1.Which two security precautions will help protect a workplace against social engineering? (Choose two.): registering and escorting all visitors to the premises ensuring that each use of an access card allows access to only one user at the time Explanation:Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes. 2.It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.): -Set virus protection software to scan removable media when data is accessed. -Disable the autorun feature in the operating system. Explanation: Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections. 3.What are two potential user benefits of rooting or jailbreaking a

2 / mobile device? (Choose two.): The user interface can be extensively customized. The operating system can be fine-tuned to improve the speed of the device. Explanation: Rooting or jailbreaking a mobile device usually enables extensive customization of the user interface and can enable performance enhancement. The three incorrect options are all considered potential risks to the user, the device, and the network that may result from rooting or jailbreaking a mobile device. 4.Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.): 1) The device must be powered on.

  1. The device must be connected to a network. Explanation: Successful mobile device remote security measures require the device to be powered on and connected to a network. The device passcode and GPS status do not affect the operation of remote security measures. Mobile devices run apps within a sandbox by default. 5.What is the most effective way of securing wireless traffic?: WPA Explanation: SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic. 6.Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?: Disconnect the host from the network.

4 / The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied?: The most restrictive share or NTFS permission will be applied. Explanation: If a shared folder has been given the full control NTFS permission and the read share permission, the effective permission will be the most restrictive one which is read in this case. 10.A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a

5 / different computer. How should the technician handle this situation?: Perform a drive wipe before turning the drive over to the second technician. Explanation: Drives can be recycled or repurposed as long as best practices are adhered to. Drive wiping software can be used to overwrite existing data multiple times so that the original data cannot be read. 11.What are two benefits of using an ext4 partition instead of ext3? (Choose two.): 1. improved performance

  1. increase in the size of supported files Explanation: Based on the ex3 file system, an ext4 partition includes extensions that improve performance and an increase in the of supported files. An ext4 partition also supports journaling, a file system feature that minimizes the risk of file system corruption if power is suddenly lost to the system. 12.Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?: SYN flood 13.Users in a company have complained about network performance. After investigation, the IT staff has determined that the DNS server was sent with an enormous amount of false requests, thus overwhelming the server. What is the type of network attack?: DoS 14.Users in a company have complained about network performance. After

7 / security technique should the technician recommend?: Disable ports. 21.A PC technician has been asked by a supervisor to recommend a security solution for a manager traveling who needs access to internal corporate resources. Which security technique should the technician recommend?: Use a VPN 22.A PC technician has been asked by a supervisor to recommend a security solution for a company that wants a device to monitor incoming and outgoing traffic and stop any malicious activity. Which security technique should the technician recommend?: Buy an IPS. 23.A PC technician has been asked by a supervisor to recommend a security solution for a machine where the antimalware software cannot remove all of the malware. Which security technique should the technician recommend?: - Use Windows Safe Mode. 24.A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the tech- nician recommend?: Use a mantrap.