Chapter 13

¡Supera tus tareas y exámenes ahora con Quizwiz!

What would cause a Microsoft Windows update to fail?

A required prior update was not installed.

A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?

After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates

A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?

Local Users and Groups

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

MD5 SHA

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?

Operate the web browser in private browser mode.

A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?

SmartScreen Filter

A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?

TPM

A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?

Trojan

An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?

Windows Defender Firewall with Advanced Security

Which two statements characterize wireless network security? (Choose two.)

With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier.

A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?

acceptable use policies

A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?

antimalware

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

botnet

A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation?

cable locks and a token-based lock on the backroom

Which security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes?

degaussing wand

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

mantrap security guard that checks IDs

A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name?

meet complexity requirements

What are signatures as they relate to security threats?

one or more code patterns within a specific type of malware

Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?

proxy firewall

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

remote access

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

social engineering


Conjuntos de estudio relacionados

Chapter 10 Muscles of the upper limb

View Set

Intro to Public Relations - Exam 3

View Set

Research Methods Final - Chapter 12

View Set

Compensation Ch. 14- Special Groups

View Set

Conservation of Momentum in One Dimension

View Set

Module 6 - Alterations in Elimination: Gastrointestinal

View Set

Combo with Older Adult Nclex questions and 1 other

View Set

(AWS Academy) Module 10 - Auto Scaling and Monitoring

View Set