Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

IT Essentials Chapter 12 Exam Online

Last Updated on May 20, 2021 by Admin

IT Essentials Chapter 12 Exam Online 2019

ITE -- Chapter 12

Time limit: 0

Quiz-summary

0 of 27 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27

Information

ITE — Chapter 12

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 27 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  1. Answered
  2. Review
  1. Question 1 of 27
    1. Question
    2 points
    Which two security precautions will help protect a workplace against social engineering? (Choose two.)
    Correct

    Incorrect

    Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes.

    Hint
    Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes.
  2. Question 2 of 27
    2. Question
    2 points
    Which two characteristics describe a worm? (Choose two.)
    Correct

    Incorrect

    Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.

    Hint
    Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.
  3. Question 3 of 27
    3. Question
    1 points
    Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
    Correct

    Incorrect

    Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.

    Hint
    Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.
  4. Question 4 of 27
    4. Question
    1 points
    What is the primary goal of a DoS attack?
    Correct

    Incorrect

    A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.

    Hint
    A denial of service (DoS) attack attempts to overwhelm a system or process by sending large amounts of data or requests to the target. The goal is to keep the system so overwhelmed handling false requests that it is unable to respond to legitimate ones.
  5. Question 5 of 27
    5. Question
    1 points
    Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
    Correct

    Incorrect

  6. Question 6 of 27
    6. Question
    1 points
    Which password is the strongest?
    Correct

    Incorrect

    Longer passwords are more secure than passwords with fewer characters. A strong password should also contain a combination of uppercase and lower case letters, numbers, symbols, and punctuation marks. Strong passwords should be difficult to guess.

    Hint
    Longer passwords are more secure than passwords with fewer characters. A strong password should also contain a combination of uppercase and lower case letters, numbers, symbols, and punctuation marks. Strong passwords should be difficult to guess.
  7. Question 7 of 27
    7. Question
    3 points
    Which three questions should be addressed by organizations developing a security policy? (Choose three.)
    Correct

    Incorrect

    A security policy is made up of several elements in the form of rules, guidelines and checklists. It not only addresses computer usage, but extends to processes involving employees in respect of operational expectations, breaches to security, emergency procedures, and other pertinent factors governing the company.

    Hint
    A security policy is made up of several elements in the form of rules, guidelines and checklists. It not only addresses computer usage, but extends to processes involving employees in respect of operational expectations, breaches to security, emergency procedures, and other pertinent factors governing the company.
  8. Question 8 of 27
    8. Question
    1 points
    The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?
    Correct

    Incorrect

    High-level formatting does not erase data securely. Therefore data wiping software can be used to make any data on the drives unreadable. The CPU, monitor, and RAM do not permanently store information.

    Hint
    High-level formatting does not erase data securely. Therefore data wiping software can be used to make any data on the drives unreadable. The CPU, monitor, and RAM do not permanently store information.
  9. Question 9 of 27
    9. Question
    2 points
    Which two file-level permissions allow a user to delete a file? (Choose two.)
    Correct

    Incorrect

    The only set of permissions that will allow a user to delete a file are Modify and Full Control. The Read and Execute permissions only allow access to the file; while the Write permission will allow deletion of file content, but the file itself cannot be removed.

    Hint
    The only set of permissions that will allow a user to delete a file are Modify and Full Control. The Read and Execute permissions only allow access to the file; while the Write permission will allow deletion of file content, but the file itself cannot be removed.
  10. Question 10 of 27
    10. Question
    1 points
    What is the name given to the programming-code patterns of viruses?
    Correct

    Incorrect

    Antivirus programs scan against known code patterns, also known as signatures, to determine if a given piece of software is a threat or not, and then takes the appropriate action. This is why it is essential for signatures to be kept up to date to detect the latest threats.

    Hint
    Antivirus programs scan against known code patterns, also known as signatures, to determine if a given piece of software is a threat or not, and then takes the appropriate action. This is why it is essential for signatures to be kept up to date to detect the latest threats.
  11. Question 11 of 27
    11. Question
    1 points
    What is the most effective way of securing wireless traffic?
    Correct

    Incorrect

    SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic.

    Hint
    SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic.
  12. Question 12 of 27
    12. Question
    1 points
    Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
    Correct

    Incorrect

    Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device.

    Hint
    Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device.
  13. Question 13 of 27
    13. Question
    2 points
    What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)
    Correct

    Incorrect

    Firewalls (software and hardware), up to date software, and backing up data are all security measures designed to protect data. However, these are not physical security precautions. Physical security precautions prevent theft, damage, or unauthorized access to physical computer equipment.

    Hint
    Firewalls (software and hardware), up to date software, and backing up data are all security measures designed to protect data. However, these are not physical security precautions. Physical security precautions prevent theft, damage, or unauthorized access to physical computer equipment.
  14. Question 14 of 27
    14. Question
    1 points
    What is the minimum level of Windows security required to allow a local user to restore backed up files?
    Correct

    Incorrect

    For local users, the Read permission is required to backup files, but the Write permission, at a minimum, is required to restore files.

    Hint
    For local users, the Read permission is required to backup files, but the Write permission, at a minimum, is required to restore files.
  15. Question 15 of 27
    15. Question
    1 points
    What is the purpose of the user account idle timeout setting?
    Correct

    Incorrect

    The Idle Timeout and Screen Lock setting accessed through the Local Users and Groups Manager is used for logging the computer out and locking the screen if the user has not interacted with the computer for a specified amount of time. The user must log back in to recommence work.

    Hint
    The Idle Timeout and Screen Lock setting accessed through the Local Users and Groups Manager is used for logging the computer out and locking the screen if the user has not interacted with the computer for a specified amount of time. The user must log back in to recommence work.
  16. Question 16 of 27
    16. Question
    2 points
    Which two security procedures are best practices for managing user accounts? (Choose two.)
    Correct

    Incorrect

    Two best security practices for managing user accounts include limiting the time of day that users can log into a computer and limiting the number of times an incorrect password can be entered. Additionally, enabling idle timeout and screen lock for when users walk away from their computers is considered a best practice. The AutoRun feature allows executables to start automatically when external media is inserted into a drive or attached to a port. Disabling AutoRun is a security feature. Port forwarding is only to be enabled when a specific application needs it. Authentication is the act of logging in with a password, fingerprint, or facial scan and should be required.

    Hint
    Two best security practices for managing user accounts include limiting the time of day that users can log into a computer and limiting the number of times an incorrect password can be entered. Additionally, enabling idle timeout and screen lock for when users walk away from their computers is considered a best practice. The AutoRun feature allows executables to start automatically when external media is inserted into a drive or attached to a port. Disabling AutoRun is a security feature. Port forwarding is only to be enabled when a specific application needs it. Authentication is the act of logging in with a password, fingerprint, or facial scan and should be required.
  17. Question 17 of 27
    17. Question
    1 points
    Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
    Correct

    Incorrect

    There are two ways to manage the Windows firewall–through the Automatically setting and with the Manage Security Settings. The latter one is the manual method.

    Hint
    There are two ways to manage the Windows firewall–through the Automatically setting and with the Manage Security Settings. The latter one is the manual method.
  18. Question 18 of 27
    18. Question
    1 points
    A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?
    Correct

    Incorrect

    The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users.

    Hint
    The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users.
  19. Question 19 of 27
    19. Question
    1 points
    Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?
    Correct

    Incorrect

    Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.

    Hint
    Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.
  20. Question 20 of 27
    20. Question
    1 points
    Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?
    Correct

    Incorrect

    If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack.

    Hint
    If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack.
  21. Question 21 of 27
    21. Question
    1 points
    A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?
    Correct

    Incorrect

    As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking.

    Hint
    As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking.
  22. Question 22 of 27
    22. Question
    2 points
    It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)
    Correct

    Incorrect

    Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections.

    Hint
    Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections.
  23. Question 23 of 27
    23. Question
    1 points
    A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?
    Correct

    Incorrect

    To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses.

    Hint
    To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses.
  24. Question 24 of 27
    24. Question
    1 points
    A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?
    Correct

    Incorrect

    Rogue antimalware software attempts to fool the user by issuing a warning about malware infection. When the user activates the rouge program, the program infects the computer with malware. Because the rogue antimalware software can be activated by clicking in the warning message menu, the user should should attempt to close the browser tab or window instead of trying to close the message box by clicking it.

    Hint
    Rogue antimalware software attempts to fool the user by issuing a warning about malware infection. When the user activates the rouge program, the program infects the computer with malware. Because the rogue antimalware software can be activated by clicking in the warning message menu, the user should should attempt to close the browser tab or window instead of trying to close the message box by clicking it.
  25. Question 25 of 27
    25. Question
    1 points
    In what situation will a file on a computer using Windows 8.1 keep its original access permissions?
    Correct

    Incorrect

    n Windows 8.1, the location of the data and the action performed on the data determine how the permissions are propagated:

    • When the data is moved to the same volume, it will keep the original permissions.
    • When the data is copied to the same volume, it will inherit new permissions.
    • When the data is moved to a different volume, it will inherit new permissions.
    • When the data is copied to a different volume, it will inherit new permissions.
    Hint

    n Windows 8.1, the location of the data and the action performed on the data determine how the permissions are propagated:

    • When the data is moved to the same volume, it will keep the original permissions.
    • When the data is copied to the same volume, it will inherit new permissions.
    • When the data is moved to a different volume, it will inherit new permissions.
    • When the data is copied to a different volume, it will inherit new permissions.
  26. Question 26 of 27
    26. Question
    1 points
    What security measure can be used to encrypt the entire volume of a removable drive?
    Correct

    Incorrect

    Removable drives can be encrypted by using BitLocker To Go. BitLocker To Go does not use a TPM chip. Encrypting File System (EFS) can encrypt data at file and folder level, but not for an entire drive. NTFS is used for access permission control. It does not encrypt data.

    Hint
    Removable drives can be encrypted by using BitLocker To Go. BitLocker To Go does not use a TPM chip. Encrypting File System (EFS) can encrypt data at file and folder level, but not for an entire drive. NTFS is used for access permission control. It does not encrypt data.
  27. Question 27 of 27
    27. Question
    1 points
    A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?
    Correct

    Incorrect

    Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution.

    Hint
    Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution.
  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.