IT Essentials-Chapter 9: PC Hardware and Software
(Version 4.1)
Chapter 9
Exam - IT Essentials: PC Hardware and Software (Version 4.1)
jawaban
|
pertanyaan
|
1- spyware
2- grayware
|
What are two examples of malware? (Choose two.)
|
1- Enable WEP.
2- Enable MAC filtering
|
Which two actions improve security on a wireless network? (Choose two.)
|
Implement lockout rules upon consecutive unsuccessful attempts at
accessing the system.
|
Which best practice should be included in a password protection
policy?
|
1- What items need to be protected?
2- What is to be done in the case of
a security breach?
3- What are the possible threats to
the items?
|
Which three questions should be addressed by organizations developing a
security policy? (Choose three.)
|
Download the latest signature files on a regular basis
|
What must be done to ensure that the antivirus software on a computer is
able to detect and eradicate the most recent viruses?
|
Create a restore point
|
A technician has downloaded the latest Windows XP updates from the
Microsoft website. What should the technician do before installing the
updates?
|
The update will be installed as soon as the computer is powered on
|
A computer that is configured for automatic updates is shut down during a
scheduled update. However, the update is downloaded successfully without any
file being corrupted in the process. What will happen to the update as a
result of this shutdown?
|
guiding visitors within the premises and escorting them personally when
they leave
|
Which precaution helps protect against social engineering in the
workplace?
|
spam
|
A large number of e-mail messages are appearing in the inbox of a home
computer user. The messages relate to products for which the user has never
requested information. Which name is given to this type of e-mail?
|
replay
|
A company network was subjected to several security attacks after TCP/IP
had been installed on the company computers. Analysis has shown that in most
of the attacks, attackers used network sniffers to extract user names and passwords
of critical accounts on the network. Which type of TCP/IP attack did these
attackers deploy?
|
by installing unwanted programs on a computer
|
How can web tools, such as Java or ActiveX, be used for a malicious
attack?
|
a biometric sensor
|
Which security device stores user physical characteristics to provide a
user level of facility access?
|
poor wireless device security
|
What condition can allow unauthorized access to a network for users who
are not physically connected to the network?
|
because everyone can be affected by computer and network security
problems
|
Why should everyone in an organization give high priority to computer and
network security?
|
1- keep equipment functioning
2- provide access only to authorized
users
|
What are two important outcomes of good computer and network security?
(Choose two.)
|
a programming code pattern
|
What is a signature as the term is used in
antivirus and antispyware software development?
|
2.5.4.3.6.1
|
Refer to the exhibit. What is the correct order for the steps in the
troubleshooting process?
|
1- What problems are you experiencing?
2- What websites have you visited
recently?
|
Which two questions are examples of open-ended questions that could be
used in the security troubleshooting process? (Choose two.)
|
Establish a plan of action for resolution.
|
For troubleshooting security problems, what should be done immediately
after the exact cause of the problem is determined?
|
Identify the problem
|
At which step of the troubleshooting process will a computer technician
ask the customer a series of open-ended and closed-ended questions?
|
Tidak ada komentar:
Posting Komentar