Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Cybersecurity Essentials 1.1 Chapter 7 Quiz Online

Last Updated on May 20, 2021 by Admin

Cybersecurity Essentials 1.1 Chapter 7 Quiz Online

CE -- Chapter 7 Quiz

Time limit: 0

Quiz-summary

0 of 21 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21

Information

CE — Chapter 7 Quiz

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 21 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  1. Answered
  2. Review
  1. Question 1 of 21
    1. Question
    3 points
    A user is proposing the purchase of a patch management solution for a company. The user wants to give reasons why the company should spend money on a solution. What benefits does patch management provide? (Choose three.)
    Correct

    Incorrect

    A centralized patch management system can speed up deployment of patches and automate the process. Other good reasons to using an automated patch update service include the following:

    • Administrators control the update process.
    • Reports are generated.
    • Updates are provided from a local server.
    • Users cannot circumvent the update process.
    Hint

    A centralized patch management system can speed up deployment of patches and automate the process. Other good reasons to using an automated patch update service include the following:

    • Administrators control the update process.
    • Reports are generated.
    • Updates are provided from a local server.
    • Users cannot circumvent the update process.
  2. Question 2 of 21
    2. Question
    1 points
    A user calls the help desk complaining that an application was installed on the computer and the application cannot connect to the Internet. There are no antivirus warnings and the user can browse the Internet. What is the most likely cause of the problem?
    Correct

    Incorrect

    When troubleshooting a user problem, look for some common issues that would prevent a user from performing a function.

    Hint

    When troubleshooting a user problem, look for some common issues that would prevent a user from performing a function.

  3. Question 3 of 21
    3. Question
    1 points
    Companies may have different operation centers that handle different issues with the IT operations. If an issue is related to network infrastructure, what operation center would be responsible?
    Correct

    Incorrect

    Operation centers support different areas of the operation including the network and security. Each one focuses on particular parts of the IT structure. The center that supports security would be the SOC.

    Hint

    Operation centers support different areas of the operation including the network and security. Each one focuses on particular parts of the IT structure. The center that supports security would be the SOC.

  4. Question 4 of 21
    4. Question
    1 points
    Why is WPA2 better than WPA?
    Correct

    Incorrect

    A good way to remember wireless security standards is to consider how they evolved from WEP to WPA, then to WPA2. Each evolution increased security measures.

    Hint

    A good way to remember wireless security standards is to consider how they evolved from WEP to WPA, then to WPA2. Each evolution increased security measures.

  5. Question 5 of 21
    5. Question
    1 points
    A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?
    Correct

    Incorrect

    There are two types of errors that biometrics can have: false acceptance and false rejection. False acceptance is a Type II error. The two types can intersect at a point called the crossover error rate.

    Hint

    There are two types of errors that biometrics can have: false acceptance and false rejection. False acceptance is a Type II error. The two types can intersect at a point called the crossover error rate.

  6. Question 6 of 21
    6. Question
    1 points
    An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?
    Correct

    Incorrect

    Because hackers sniffing traffic can read clear text passwords, any connection needs to be encrypted. Additionally, a solution should not be operating system-dependent.

    Hint

    Because hackers sniffing traffic can read clear text passwords, any connection needs to be encrypted. Additionally, a solution should not be operating system-dependent.

  7. Question 7 of 21
    7. Question
    1 points
    Which service will resolve a specific web address into an IP address of the destination web server?
    Correct

    Incorrect

    DNS resolves a website address to the actual IP address of that destination.

    Hint

    DNS resolves a website address to the actual IP address of that destination.

  8. Question 8 of 21
    8. Question
    3 points
    Which three items are malware? (Choose three.)
    Correct

    Incorrect

    Email could be used to deliver malware, but email by itself is not malware. Apt is used to install or remove software within a Linux operating system. Attachments could contain malware, but not always.

    Hint

    Email could be used to deliver malware, but email by itself is not malware. Apt is used to install or remove software within a Linux operating system. Attachments could contain malware, but not always.

  9. Question 9 of 21
    9. Question
    2 points
    The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)
    Correct

    Incorrect

    Windows provides a method to encrypt files, folders, or entire hard drives depending on need. However, certain BIOS settings and configurations are necessary to implement encryption on an entire hard disk.

    Hint

    Windows provides a method to encrypt files, folders, or entire hard drives depending on need. However, certain BIOS settings and configurations are necessary to implement encryption on an entire hard disk.

  10. Question 10 of 21
    10. Question
    3 points
    A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provide justification for the request. What three reasons can the user use to justify the request? (Choose three.)
    Correct

    Incorrect

    A patch management service can provide greater control over the update process by an administrator. It eliminates the need for user intervention.

    Hint

    A patch management service can provide greater control over the update process by an administrator. It eliminates the need for user intervention.

  11. Question 11 of 21
    11. Question
    3 points
    The manager of desktop support wants to minimize downtime for workstations that crash or have other software-related issues. What are three advantages of using disk cloning? (Choose three.)
    Correct

    Incorrect

    Disk cloning can be an efficient way to maintain a baseline for workstations and servers. It is not a cost cutting method.

    Hint

    Disk cloning can be an efficient way to maintain a baseline for workstations and servers. It is not a cost cutting method.

  12. Question 12 of 21
    12. Question
    1 points
    A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?
    Correct

    Incorrect

    A baseline allows a user to perform a comparison of how a system is performing. The user can then compare the result to baseline expectations. This process allows the user to identify potential vulnerabilities.

    Hint

    A baseline allows a user to perform a comparison of how a system is performing. The user can then compare the result to baseline expectations. This process allows the user to identify potential vulnerabilities.

  13. Question 13 of 21
    13. Question
    1 points
    What is the difference between an HIDS and a firewall?
    Correct

    Incorrect

    In order to monitor local activity an HIDS should be implemented. Network activity monitors are concerned with traffic and not operating system activity.

    Hint

    In order to monitor local activity an HIDS should be implemented. Network activity monitors are concerned with traffic and not operating system activity.

  14. Question 14 of 21
    14. Question
    3 points
    What are three types of power issues that a technician should be concerned about? (Choose three.)
    Correct

    Incorrect

    Power issues include increases, decreases, or sudden changes in power and include the following:

    • Spike
    • Surge
    • Fault
    • Blackout
    • Sag/dip
    • Brownout
    • Inrush Current
    Hint

    Power issues include increases, decreases, or sudden changes in power and include the following:

    • Spike
    • Surge
    • Fault
    • Blackout
    • Sag/dip
    • Brownout
    • Inrush Current
  15. Question 15 of 21
    15. Question
    1 points
    A new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done?
    Correct

    Incorrect

    When hardening an operating system, patching and antivirus are part of the process. Many extra components are added by the manufacturer that are not necessarily needed.

    Hint

    When hardening an operating system, patching and antivirus are part of the process. Many extra components are added by the manufacturer that are not necessarily needed.

  16. Question 16 of 21
    16. Question
    1 points
    The company has many users who telecommute. A solution needs to be found so a secure communication channel can be established between the remote location of users and the company. What is a good solution for this situation?
    Correct

    Incorrect

    When a VPN is used, a user can be at any remote location such as home or a hotel. The VPN solution is flexible in that public lines can be used to securely connect to a company.

    Hint

    When a VPN is used, a user can be at any remote location such as home or a hotel. The VPN solution is flexible in that public lines can be used to securely connect to a company.

  17. Question 17 of 21
    17. Question
    1 points
    Why should WEP not be used in wireless networks today?
    Correct

    Incorrect

    Despite improvements, WEP is still vulnerable to various security issues including the ability to be cracked.

    Hint

    Despite improvements, WEP is still vulnerable to various security issues including the ability to be cracked.

  18. Question 18 of 21
    18. Question
    1 points
    A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?
    Correct

    Incorrect

    Man-in-the-middle attacks are a threat that results in lost credentials and data. These type of attacks can occur for different reasons including traffic sniffing.

    Hint

    Man-in-the-middle attacks are a threat that results in lost credentials and data. These type of attacks can occur for different reasons including traffic sniffing.

  19. Question 19 of 21
    19. Question
    1 points
    An intern has started working in the support group. One duty is to set local policy for passwords on the workstations. What tool would be best to use?
    Correct

    Incorrect

    Local policies are not group policies and only work on the local machine. Local policies can, however, be overridden if the machine is part of a Windows domain.

    Hint

    Local policies are not group policies and only work on the local machine. Local policies can, however, be overridden if the machine is part of a Windows domain.

  20. Question 20 of 21
    20. Question
    1 points
    The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?
    Correct

    Incorrect

    Audit logs can track user authentication attempts on workstations and can reveal if any attempts at break-in were made.

    Hint

    Audit logs can track user authentication attempts on workstations and can reveal if any attempts at break-in were made.

  21. Question 21 of 21
    21. Question
    3 points
    After a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.)
    Correct

    Incorrect

    Best practices entail giving the user only what is needed to do the job. Any additional privileges should be tracked and audited.

    Hint

    Best practices entail giving the user only what is needed to do the job. Any additional privileges should be tracked and audited.

  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.