ITE 8 + IT Essentials 7 Chapter 13 Quiz Answers 2023 2024 correct 100%

This is ITE 7 and ITE 8 Chapter 13 and module 13 quiz answers collection of IT Essentials 8.0 Chapter 13 Quiz Answers. It is a collection of all versions from 2020 to 2024. It is the latest update in 2023 and 2024 by experts with explanations.

ITE 8 + ITE 7.0 Chapter 13 Quiz Answers | Security-Quiz Answers ITE 8.01

  1. Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

    • Group of answer choices ports
    • protocols
    • packet speed
    • MAC addresses
    • packet size

      Answers Explanation & Hints:

      Hardware firewalls can be configured as packet filters, application layer firewalls, or proxies. Application layer firewalls read all of the traffic data and look for unwanted traffic. Proxies act as relays, scanning traffic and allowing or denying traffic based on established rules. Packet filters only concern themselves with port data, IP address data, and destination services.

  2. As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

    • Group of answer choices a duplicate hard drive copy
    • two factor authentication
    • deletion of sensitive files
    • data encryption

      Answers Explanation & Hints:

      Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.

  3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

    • Group of answer choices worm
    • stealth virus
    • phishing
    • adware

      Answers Explanation & Hints:

      Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.

  4. A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

    • Group of answer choices TPM
    • BitLocker
    • BitLocker To Go
    • VPN

      Answers Explanation & Hints:

      BitLocker To Go supports encrypting removable drives, but does not require a TPM chip. However, it does require a password.

  5. When configuring Windows security, which term is used to mean a rule assocated with an object such as a folder or printer?

    • Group of answer choices ActiveX
    • permission
    • right
    • firewall

      Answers Explanation & Hints:

      A right authorizes a user to perform an action on a computer like performing backups. A permission is a rule that is associated with a particular object like a file, folder, or printer.

  6. When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

    • Group of answer choices Ensure that all applications are working.
    • Ask what the problem is that the customer is experiencing.
    • Boot the system in Safe Mode.
    • Disconnect the system from the network.

      Answers Explanation & Hints:

      The last step before documenting findings is to verify full system functionality. Ensuring that all of the applications are working would be an example of verifying functionality. Asking what problem is that the user is experiencing is part of the first step: identifying the problem. Disconnecting from the network and rebooting in Safe Mode are both examples of the third step: determining an exact cause.

  7. A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

    • Group of answer choices Immediately remove the device from the network.
    • Add an authorized wireless access point to the network to extend coverage for the employee.
    • Make sure that the wireless router is not broadcasting an SSID.
    • Consult the company security policy to decide on actions to take against the employee.
    • Create a guest account for the employee to use when outside the building.

      Answers Explanation & Hints:

      Adding an unauthorized wireless router or access point to a company network is a serious potential security threat. The device should be removed from the network immediately in order to mitigate the threat. In addition, the employee should be disciplined. The company security policy, which employees agree to, should describe penalties for behavior that threatens the security of the company.

  8. A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

    • Group of answer choices identification and authentication policy
    • remote access policy
    • acceptable use policy
    • incident handling policy

      Answers Explanation & Hints:

      A company security policy commonly contains incident handling procedures used when a security breach occurs.

  9. A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

    • Group of answer choices login
    • synchronous
    • multifactor
    • cryptic
    • BIOS

      Answers Explanation & Hints:

      Three types of password protection that can be used to secure a workstation are the BIOS password configured through the BIOS Setup program; a login password such as a PIN, Windows, or picture password; and a network password that is kept on a server.

  10. When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

    • Group of answer choices adware
    • ransomware
    • spyware
    • Trojan

      Answers Explanation & Hints:

      Ransomware requires payment for access to the computer or files. Bitcoin is a type of digital currency that does not go through a particular bank.

  11. Which type of hard drive format is commonly performed at the factory where the drive is assembled?

    • Group of answer choices multifactor
    • low-level
    • standard
    • EFS

      Answers Explanation & Hints:

      The two types of formatting that can be performed on a mechanical hard drive are low-level and standard. The low-level format is commonly performed at the factory. The standard format only recreates the boot sector and file allocation table.

  12. A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

    • Group of answer choices Enforce password history
    • Maximum password age
    • Password must meet complexity requirements
    • Minimum password length

      Answers Explanation & Hints:

      The maximum password age setting defines the maximum number of days that can pass before the password must be changed.

  13. Which action could be used to determine if a host is compromised and flooding traffic onto the network?

    • Group of answer choices Unseat and then reconnect the hard drive connectors on the host.
    • Disconnect the host from the network.
    • Examine the Device Manager on the host for device conflicts.
    • Check the host hard drive for errors and file system issues.

      Answers Explanation & Hints:

      If a network is experiencing an extremely high volume of traffic, disconnecting a host from the network may confirm that the host is compromised and is flooding traffic onto the network. The other issues are hardware issues, and not typically security-related.

  14. Which is an example of social engineering?

    • Group of answer choices an unidentified person claiming to be a technician collecting user information from employees
    • a computer displaying unauthorized pop-ups and adware
    • the infection of a computer by a virus carried by a Trojan
    • an anonymous programmer directing a DDoS attack on a data center

      Answers Explanation & Hints:

      A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.

  15. A corporate employee has recently taken the mandated security awareness training and is wanting to use the correct security term. Which issue can occur when browsing the internet and is often initiated by the destination website?

    • Group of answer choices autorun
    • phishing
    • privacy screen
    • pop-up

      Answers Explanation & Hints:

      Most web browsers offer a pop-up blocker. In Internet Explorer, use the Tools icon to enable.

Notify of
Oldest Most Voted
Inline Feedbacks
View all comments