This IT Essentials v5 Chapter 10 quiz assesses knowledge on security threats such as social engineering, physical security measures like biometric authentication, and handling malware risks from removable media. It prepares learners for real-world IT security challenges, enhancing their understanding of essential cybersecurity practices.
Ensuring that each use of an access card allows access to only one user at the time
Ensuring that all operating system and antivirus software is up to date
Encrypting all sensitive data stored on the servers
Performing daily data backups
Registering and escorting all visitors to the premises
Rate this question:
Perform daily data backups.
Replace any software firewalls with a hardware firewall.
Implement biometric authentication.
Ensure that all operating system and antivirus software is up to date.
Disable the autorun feature in the operating system.
Rate this question:
Biometric authentication
Trusted Platform Module (TPM)
Card key access
Two-factor security
Rate this question:
Set virus protection software to scan removable media when data is accessed.
Configure the Windows Firewall to block the ports that are used by viruses.
Enable the TPM in the CMOS settings.
Repair, delete, or quarantine the infected files.
Disable the autorun feature in the operating system.
Rate this question:
When unauthorized users have changed the CMOS settings and the CMOS password must be reset
When a virus has damaged the master boot record of the system disk
When a virus has damaged the boot sector of the system disk
When the folder permissions for user members of a group are incorrect
Rate this question:
Set the user folder permissions to Deny.
Disable the users’ accounts.
Change the user file permissions to Read Only.
Enable UAC on the computer.
Rate this question:
Use data wiping.
Drill through the HDD.
Smash the platters with a hammer.
Immerse the HDD in a weak solution of bicarbonate of soda.
Rate this question:
WPA2
SSID hiding
WEP
Wireless MAC filtering
Rate this question:
A token
A TPM
A private key
A DES key
A public key
Rate this question:
Hides in a dormant state until needed by an attacker
Infects computers by attaching to software code
Executes when software is run on a computer
Is self-replicating
Travels to new computers without any intervention or knowledge of the user
Rate this question:
Worm
Phishing
Adware
Stealth virus
Rate this question:
What are the possible threats to the assets of the organization?
What is to be done in the case of a security breach?
When do the assets need protecting?
What assets require protection?
What insurance coverage is required?
Rate this question:
A service pack
Patterns in the programming code of the software on a computer
Mirror sites
Patches that prevent a newly discovered virus or worm from making a successful attack
Rate this question:
Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
Any traffic that comes into port 25 allows outgoing port 113 to be used.
Rate this question:
Packet size
Physical addresses
Protocols
Packet speed
Ports
Rate this question:
To facilitate access to external networks
To prevent the target server from being able to handle additional requests
To scan the data on the target server
To obtain all addresses in the address book within the server
Rate this question:
Have you scanned your computer recently for viruses?
What symptoms are you experiencing?
Did you open any attachments from a suspicious email message?
Is your security software up to date?
Rate this question:
Install rogue antivirus software on the host.
Log on to the host as a different user.
Disable ActiveX and Silverlight on the host.
Disconnect the host from the network.
Rate this question:
Ensure the security policy is being enforced.
Check the computer for the latest OS patches and updates.
Scan the computer with protection software.
Verify the physical security of all offices.
Rate this question:
A virus has damaged the boot sector of the system disk.
The computer has been infected with spyware.
UAC has been disabled on the computer.
Folder permissions have been changed from Deny to Allow.
Rate this question:
Mirrors
Signatures
Virus definition tables
Grayware
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.