It-essentials v6.0 OS & IT Chapter 12 Exam Online
It-essentials v6.0 OS & IT Chapter 12 Exam Training |
|
---|---|
Time | 30 minutes |
Questions | 28 |
Leaderboard: IT-ESSENTIALS V6.0 CHAPTER 12 EXAM
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Time limit: 0
Quiz-summary
0 of 28 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
Information
IT-ESSENTIALS V6.0 CHAPTER 12 EXAM
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 28 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- Answered
- Review
-
Question 1 of 28
1. Question
2 pointsWhich two security precautions will help protect a workplace against social engineering? (Choose two.)
Correct
Incorrect
-
Question 2 of 28
2. Question
2 pointsWhich two characteristics describe a worm? (Choose two.)
Correct
Incorrect
-
Question 3 of 28
3. Question
1 pointsWhich type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
Correct
Incorrect
-
Question 4 of 28
4. Question
1 pointsWhat is the primary goal of a DoS attack?
Correct
Incorrect
-
Question 5 of 28
5. Question
1 pointsWhich type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
Correct
Incorrect
-
Question 6 of 28
6. Question
1 pointsWhich password is the strongest?
Correct
Incorrect
-
Question 7 of 28
7. Question
3 pointsWhich three questions should be addressed by organizations developing a security policy? (Choose three.)
Correct
Incorrect
-
Question 8 of 28
8. Question
1 pointsThe XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?
Correct
Incorrect
-
Question 9 of 28
9. Question
2 pointsWhich two file-level permissions allow a user to delete a file? (Choose two.)
Correct
Incorrect
-
Question 10 of 28
10. Question
1 pointsWhat is the name given to the programming-code patterns of viruses?
Correct
Incorrect
-
Question 11 of 28
11. Question
1 pointsWhat is the most effective way of securing wireless traffic?
Correct
Incorrect
-
Question 12 of 28
12. Question
1 pointsPort triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
Correct
Incorrect
-
Question 13 of 28
13. Question
2 pointsWhat are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)
Correct
Incorrect
-
Question 14 of 28
14. Question
1 pointsWhat is the minimum level of Windows security required to allow a local user to restore backed up files?
Correct
Incorrect
-
Question 15 of 28
15. Question
1 pointsWhat is the purpose of the user account idle timeout setting?
Correct
Incorrect
-
Question 16 of 28
16. Question
2 pointsWhich two security procedures are best practices for managing user accounts? (Choose two.)
Correct
Incorrect
-
Question 17 of 28
17. Question
1 pointsWhich Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
Correct
Incorrect
-
Question 18 of 28
18. Question
2 pointsWhich two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)
Correct
Incorrect
-
Question 19 of 28
19. Question
1 pointsA manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?
Correct
Incorrect
-
Question 20 of 28
20. Question
1 pointsWhich question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
Correct
Incorrect
-
Question 21 of 28
21. Question
1 pointsWhich action would help a technician to determine if a denial of service attack is being caused by malware on a host?
Correct
Incorrect
-
Question 22 of 28
22. Question
1 pointsA technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
Correct
Incorrect
-
Question 23 of 28
23. Question
2 pointsIt has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
Correct
Incorrect
-
Question 24 of 28
24. Question
1 pointsA virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?
Correct
Incorrect
-
Question 25 of 28
25. Question
1 pointsA user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?
Correct
Incorrect
-
Question 26 of 28
26. Question
1 pointsIn what situation will a file on a computer using Windows 8.1 keep its original access permissions?
Correct
Incorrect
-
Question 27 of 28
27. Question
1 pointsWhat security measure can be used to encrypt the entire volume of a removable drive?
Correct
Incorrect
-
Question 28 of 28
28. Question
1 pointsA user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?
Correct
Incorrect