Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

IT Essentials Chapter 12 Quiz Answers Online

Last Updated on May 20, 2021 by Admin

IT Essentials Chapter 12 Quiz Answers Online

ITE -- Chapter 12 Quiz

Time limit: 0

Quiz-summary

0 of 15 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

Information

ITE — Chapter 12 Quiz

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 15 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  1. Answered
  2. Review
  1. Question 1 of 15
    1. Question
    1 points
    Which action could be used to determine if a host is compromised and flooding traffic onto the network?
    Correct

    Incorrect

    If a network is experiencing an extremely high volume of traffic, disconnecting a host from the network may confirm that the host is compromised and is flooding traffic onto the network. The other issues are hardware issues, and not typically security-related.

    Hint

    If a network is experiencing an extremely high volume of traffic, disconnecting a host from the network may confirm that the host is compromised and is flooding traffic onto the network. The other issues are hardware issues, and not typically security-related.

  2. Question 2 of 15
    2. Question
    1 points
    Which security threat installs on a computer without the knowledge of the user and then monitors computer activity?
    Correct

    Incorrect

    Spyware normally installs on a system without end-user knowledge and monitors activity on a computer, which can then be sent to the source of spyware. Viruses infect systems and execute malicious code. Worms self-replicate and propagate across networks from a singular host, consuming a lot of bandwidth. Adware is normally distributed through downloaded software and results in the exhibition of several pop-up windows on the system.

    Hint

    Spyware normally installs on a system without end-user knowledge and monitors activity on a computer, which can then be sent to the source of spyware. Viruses infect systems and execute malicious code. Worms self-replicate and propagate across networks from a singular host, consuming a lot of bandwidth. Adware is normally distributed through downloaded software and results in the exhibition of several pop-up windows on the system.

  3. Question 3 of 15
    3. Question
    1 points
    When would a PC repair person want to deploy the idle timeout feature?
    Correct

    Incorrect

    The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off.

    Hint

    The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off.

  4. Question 4 of 15
    4. Question
    1 points
    Which is an example of social engineering?
    Correct

    Incorrect

    A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.

    Hint

    A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.

  5. Question 5 of 15
    5. Question
    1 points
    What is the best description of Trojan horse malware?
    Correct

    Incorrect

    The best description of Trojan horse malware, and what distinguishes it from viruses and worms, is that it appears as useful software but hides malicious code. Trojan horse malware may cause annoying computer problems, but can also cause fatal problems. Some Trojan horses may be distributed over the Internet, but they can also be distributed by USB memory sticks and other means. Specifically targeted Trojan horse malware can be some of the most difficult malware to detect.

    Hint

    The best description of Trojan horse malware, and what distinguishes it from viruses and worms, is that it appears as useful software but hides malicious code. Trojan horse malware may cause annoying computer problems, but can also cause fatal problems. Some Trojan horses may be distributed over the Internet, but they can also be distributed by USB memory sticks and other means. Specifically targeted Trojan horse malware can be some of the most difficult malware to detect.

  6. Question 6 of 15
    6. Question
    2 points
    A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)
    Correct

    Incorrect

    Adding an unauthorized wireless router or access point to a company network is a serious potential security threat. The device should be removed from the network immediately in order to mitigate the threat. In addition, the employee should be disciplined. The company security policy, which employees agree to, should describe penalties for behavior that threatens the security of the company.

    Hint

    Adding an unauthorized wireless router or access point to a company network is a serious potential security threat. The device should be removed from the network immediately in order to mitigate the threat. In addition, the employee should be disciplined. The company security policy, which employees agree to, should describe penalties for behavior that threatens the security of the company.

  7. Question 7 of 15
    7. Question
    1 points
    Which level of Windows security permission is required for a local user to backup files from another user?
    Correct

    Incorrect

    A local user requires the Read permission to backup files, but the Write permission is required to restore files.

    Hint

    A local user requires the Read permission to backup files, but the Write permission is required to restore files.

  8. Question 8 of 15
    8. Question
    1 points
    Where in Windows would a technician configure a guest account for a temporary employee?
    Correct

    Incorrect

    The guest account should be used sparingly. Also, restrictions should be applied to the guest account so that the user cannot access data or resources not needed.

    Hint

    The guest account should be used sparingly. Also, restrictions should be applied to the guest account so that the user cannot access data or resources not needed.

  9. Question 9 of 15
    9. Question
    1 points
    What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses?
    Correct

    Incorrect

    Having an antivirus program on a computer does not protect a PC from virus attacks unless the signature updates are done regularly in order to detect newer and emerging threats. It should be noted that if the signature update lacks a signature for a new threat, the software will be unable to protect against that threat.

    Hint

    Having an antivirus program on a computer does not protect a PC from virus attacks unless the signature updates are done regularly in order to detect newer and emerging threats. It should be noted that if the signature update lacks a signature for a new threat, the software will be unable to protect against that threat.

  10. Question 10 of 15
    10. Question
    1 points
    For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
    Correct

    Incorrect

    Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types.

    Hint

    Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types.

  11. Question 11 of 15
    11. Question
    1 points
    A computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?
    Correct

    Incorrect

    The World Wide Web (HTTP) protocol uses port 80; port 23 is used by Telnet. Successful pings to other devices indicate that the network interface card is working correctly. BIOS and CMOS settings control system hardware functions, not network applications such as the World Wide Web.

    Hint

    The World Wide Web (HTTP) protocol uses port 80; port 23 is used by Telnet. Successful pings to other devices indicate that the network interface card is working correctly. BIOS and CMOS settings control system hardware functions, not network applications such as the World Wide Web.

  12. Question 12 of 15
    12. Question
    1 points
    What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?
    Correct

    Incorrect

    Port forwarding provides a rule-based method to direct traffic between devices on separate networks. This method provides access to devices across the Internet in a less expensive way than using a DMZ.

    Hint

    Port forwarding provides a rule-based method to direct traffic between devices on separate networks. This method provides access to devices across the Internet in a less expensive way than using a DMZ.

  13. Question 13 of 15
    13. Question
    1 points
    What is an example of the implementation of physical security?
    Correct

    Incorrect

    Encrypting data, keeping software up to date, and the use of personal firewalls are all security precautions, but will not restrict physical access to secure areas by only authorized people.

    Hint

    Encrypting data, keeping software up to date, and the use of personal firewalls are all security precautions, but will not restrict physical access to secure areas by only authorized people.

  14. Question 14 of 15
    14. Question
    3 points
    Which three rules increase the level of password strength? (Choose three.)
    Correct

    Incorrect

    Passwords should include both upper and lower case letters, numbers, and special characters. They should be at least eight characters in length. In addition, passwords should expire after a period time, such as 90 days and the reuse of passwords should be limited. In addition, computers should be configured to lock a user out after a series of failed attempts.

    Hint

    Passwords should include both upper and lower case letters, numbers, and special characters. They should be at least eight characters in length. In addition, passwords should expire after a period time, such as 90 days and the reuse of passwords should be limited. In addition, computers should be configured to lock a user out after a series of failed attempts.

  15. Question 15 of 15
    15. Question
    1 points
    When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?
    Correct

    Incorrect

    The last step before documenting findings is to verify full system functionality. Ensuring that all of the applications are working would be an example of verifying functionality. Asking what problem is that the user is experiencing is part of the first step: identifying the problem. Disconnecting from the network and rebooting in Safe Mode are both examples of the third step: determining an exact cause.

    Hint

    The last step before documenting findings is to verify full system functionality. Ensuring that all of the applications are working would be an example of verifying functionality. Asking what problem is that the user is experiencing is part of the first step: identifying the problem. Disconnecting from the network and rebooting in Safe Mode are both examples of the third step: determining an exact cause.

  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.