IT Essentials 7.0 Chapter 13 Exam Answers ITE 7.0 ITE 7.02 2022 2023 Full 100% (2023)

Last updated on November 26, 2022 byinfratest

IT Basics 7.0Chapter 13 Exam AnswersITE 7.0 ITE 7.02 2022 2023 Voll 100 %

Cisco Netacad ITE v7 – IT Essentials (Version 7.00) – IT Essentials 7.0 Chapter 13 Exam Answers 2022 2023 Full 100%

  • Recommend
FinaleExam answers Ch 1 - 9
Answers to the final exam Ch 10 - 14
Composite answers of the final exam Ch 1 - 14
IT Essentials 7.02 - Chapter 13
Chapter 13 Exam AnswersOnline-Test
Chapter 13 quiz answersOnline-Test
IT Essentials 7.02 - Chapter 14
Chapter 14 Exam AnswersOnline-Test
Chapter 14 quiz answersOnline-Test
Checkpoint Exam #5 (Chapters 12 – 13) AnswersOnline-Test
IT Essentials 7.02 - Laborantworten
13.2.3.7 Lab - Answers to Bitlocker and Bitlocker To Go
13.3.2.5 Lab - Configure Windows Local Security Policy Responses
13.3.3.6 Lab - Configuring users and groups in Windows Answers
13.3.4.6 Lab - Configure Windows Firewall responses
13.5.2.2 Lab - Document customer information in a work order responses
13.4.1.10 Packet Tracer - Configure Wireless Security Answers

IT Essentials (Version 7.0) – IT Essentials 7.0Chapter 13 Exam Answers

  1. What two elements are used in asymmetric encryption? (Choose two.)

    • a token
    • a DES key
    • a private key
    • a public key
    • a TPM

      Explanation:

      A token is something used to provide two-factor authentication. DES uses an identical key for encryption and decryption. Asymmetric encryption uses a private key associated with a public key.

  2. What two algorithms are used for hash encryption to ensure data integrity? (Choose two.)

    • MD5
    • Gets. Prüfsumme
    • SCHA
    • VPN
    • SSL
  3. A high tech company has a problem with unauthorized people gaining access to the company by following an authorized employee through the secure entrance. What two measures could help with this vulnerability? (Choose two.)

    • Biometrics
    • Employee Smart ID
    • human trap
    • Multifactor authentication
    • Security guard checking IDs

      Explanation:

      A guard checking IDs or a security gate can prevent someone from following a legitimate employee into a restricted area. If biometrics, employee smart IDs or multi-factor authentication are used, unauthorized persons could still track the legitimate person into the building or area once someone with the correct credentials enters the door.

  4. A user receives a call from someone claiming to represent IT services and then asks that user to confirm their username and password for audit purposes. What security threat does this call pose?

    • DDoS
    • Spam
    • Social Development
    • Anonymous Keylogging

      Explanation:

      Social engineering attempts to gain an employee's trust and convince that person to give up confidential and sensitive information such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software-based security threats, not social engineering.

  5. The IT department reports that a company web server is receiving an unusually high number of web page requests from different locations at the same time. What kind of security attack takes place?

    • Adware
    • DDoS
    • Phishing
    • Social Development
    • Spyware

      Explanation:

      Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware usually consists of annoying pop-up windows. Unlike a DDoS attack, none of these attacks generate large amounts of traffic that can limit access to network services.

  6. After confirming the removal of a virus from a computer, how should the technician ensure and check the full functionality of the system?

    • Check for the latest operating system patches and updates.
    • Document the problem and the procedures used to resolve it.
    • Talk to the user to determine the cause of the problem.
    • Gather information from different sources to clearly identify the problem.

      Explanation:

      After solving a computer problem, the next step is to verify full functionality by making sure the operating system is up to date and by testing the operation of the computer and the network to which it is connected. Documenting the problem and solution is the final step, while gathering information from the user and other sources are earlier steps in the troubleshooting process.

      (Video) IT Essentials 7.0 Chapter 7 Exam Answers ITE 7.0 ITE 7.02 | iamsaurabh9876 | Abhi_shek |

  7. A system administrator was asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows function can be used to selectively encrypt individual files in each manager's user account?​

    • BitLocker
    • EFS
    • TPM
    • Windows Update

      Explanation:

      Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders associated with a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system, such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data.

  8. When would a PC repairman want to deploy the idle timeout feature?

  9. What kind of firewall acts as a relay between users and servers on the Internet, inspecting all traffic and allowing or denying traffic based on a set of rules?

    • Paketfilter-Firewall
    • Stateful-Packet-Firewall
    • Proxy-Firewall
    • OS Firewall

      Explanation:

      There are several types of firewall configurations:

      • packet filter- Packets cannot pass through the firewall unless they conform to the specified set of rules configured in the firewall. Traffic can be filtered based on various attributes, e.g. B. Source IP address, source port or destination IP address or port.
      • Stateful Packet Inspection (SPI)- This is a firewall that tracks the status of network connections passing through the firewall. Packets that are not part of a known connection are discarded.
      • application layer- All packets traveling to or from an application are intercepted. Any unwanted outside traffic is blocked from reaching protected devices.
      • Proxy– This is a firewall installed on a proxy server that inspects all traffic and allows or denies packets based on configured rules. A proxy server is a server that acts as a relay between a client and a target server on the Internet.
  10. What would cause a Microsoft Windows update to fail?

    • The wired or wireless network card has been disabled.
    • The computer has a virus.
    • The security of the computer has been breached.
    • A required previous update was not installed.

      Explanation:

      Two things often cause a Windows update to fail:

      1. A required older update was not installed.
      2. There was a problem with the update you downloaded.
  11. A user calls the helpdesk and reports that a laptop is not working as expected. When checking the laptop, a technician finds that some system files have been renamed and file permissions changed. What could be causing these problems?

    • The file system is damaged.
    • The laptop is infected with a virus.
    • The display driver is corrupted.
    • The file system has been encrypted.

      Explanation:

      Problems with renaming system files and changing file permissions without the user's knowledge are most likely caused by a virus. File system corruption would render the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying anything at all, or it would only display the VGA resolution.

  12. How can users working on a shared computer hide their personal browsing history from other employees who may be using that computer?

    • Restart the computer after closing the web browser.
    • Operate the web browser in private browsing mode.
    • Only use an encrypted connection to access websites.
    • Move all downloaded files to the trash.

      Explanation:

      When a computer user surfs the Internet in private mode, the following happens: Cookies are disabled.
      Temporary internet files will be removed after closing the window.
      Browsing history will be removed after closing the window.

  13. A retail store wants to secure laptops on display. The store manager also wants to have a record of which employees enter the back room where the inventory is kept. Which security option is best for this situation?

    • Guards and log sheets
    • Security cameras and only the manager has access to the back room
    • Cable locks and a token-based lock in the back room
    • a stipulation that laptops are considered individually and only the owner has a key to the back room

      Explanation:

      Retail solutions need to be flexible for both customers and employees. Physical security products are available to provide a solution such as Examples include using cable locks to secure devices and an electronic lock that records activity on a door.

  14. See exhibition. An organization's security policy allows employees to connect to the office intranet from home. What type of security policy is it?

    IT Essentials 7.0 Chapter 13 Exam Answers ITE 7.0 ITE 7.02 2022 2023 Full 100% (1)
    • acceptable use
    • Handling Incidents
    • network maintenance
    • remote access

      Explanation:

      The remote access policy section of a corporate security policy specifies how remote users can access a network and what is accessible through remote connectivity.

      (Video) IT Essentials 7.0 Chapter 5 Exam Answers ITE 7.0 ITE 7.02
  15. A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects a security gap. What kind of malware could be responsible for this?

    • Adware
    • Phishing
    • Spyware
    • Trojan

      Explanation:

      Trojans can allow unauthorized remote access, make data available to the attacker, damage or delete files, use the computer as a source for other attacks, activate unauthorized services, and stop anti-malware software.

  16. A group of users on the same network are all complaining that their computers are running slowly. After investigating, the technician discovers that these computers are part of a zombie network. What kind of malware is used to control these computers?

    • Botnetz
    • Rootkit
    • Spyware
    • Virus

      Explanation:

      A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and used to attack other computers or steal data.

  17. What are signatures in relation to security threats?

    • A unique encryption key used by a known attacker
    • one or more code patterns within a specific type of malware
    • the beginning or end of a malware segment with a specific cyclic redundancy check number
    • the checksum associated with each specific malware type stored in a virus table

      Explanation:

      Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly updated as malware is constantly evolving into new strands.

  18. A college student logs on to a college computer for the first time. What category of security policy should the student be introduced to?

    • Acceptable Use Policy
    • Identification and Authentication Policies
    • Incident Handling Policies
    • Network Maintenance Guidelines

      Explanation:

      The Policies for acceptable use section of a security policy typically identifies network resources and uses that are acceptable to the organization. You can also specify the repercussions that can occur if this security policy is violated.

  19. A technician prepares to encrypt a corporate drive using Microsoft BitLocker. What BIOS option does the technician need to enable?

    • NTFS
    • SSL
    • TPM
    • EFS

      Explanation:

      A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It must be enabled prior to implementing BitLocker.

  20. What security technique or device erases the data from a hard drive by placing it near the drive platter for at least 2 minutes?

    • degaussing rod
    • EFS
    • Low level formatting
    • biometrischer Scanner
    • Delete Scope

      Explanation:

      A degaussing bar must be placed over hard drive platters for a few minutes, while an electromagnetic degaussing device can erase all data in seconds.

  21. See exhibition. What type of workstation password is used?

    IT Essentials 7.0 Chapter 13 Exam Answers ITE 7.0 ITE 7.02 2022 2023 Full 100% (2)
    • BIOS
    • Registration
    • Multifactor
    • network
    • synchronous

      Explanation:

      (Video) Digital Talent Scholarship 2020 -IT Essentials, Final Exam - Composite (Chapters 1-14)

      A BIOS password is configured by entering the BIOS setup program.

  22. A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, analyze websites for suspicious elements, and compare downloads against a list of known malicious files and websites. What web security feature should the engineer demonstrate?

    • ActiveX-Filter
    • Auto play
    • Firewall
    • SmartScreen-Filter

      Explanation:

      In Internet Explorer, use theTooloption to activate. In Microsoft Edge, use the three dots icon to selectIdeas>Show Advanced Settingsto turn themHelp protect me from malicious websites and downloads with Windows Defender SmartScreenOption an.

  23. A SOHO company hired a technician to come in and configure and backup the computers. The technician has decided to configure a local security policy for the machines. What setting would the engineer use to ensure the user doesn't make their password the same as their own user account name?

    • Enforce password history
    • maximum password age
    • minimum password length
    • Meet complexity requirements

      Explanation:

      ThePassword must meet complexity requirementsOption requires the user not to use their own user account name or part of their user account name as a password. This option also requires that the password contain at least three of the following elements: uppercase letters, lowercase letters, numbers, and symbols.

  24. A technician configures rights and permissions in Windows 7. What tool will the technician use?

    • device manager
    • Local Security Policy
    • Local users and groups
    • resource monitor

      Explanation:

      Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions.

  25. An IT technician wants to create a rule on two Windows 10 machines to prevent an installed application from accessing the public internet. What tool would the technician use to accomplish this task?

    • Computermanagement
    • DMZ
    • Local Security Policy
    • Windows Defender Firewall with advanced security

      Explanation:

      Windows Firewall with Advanced Security or Windows 10 Windows Defender Firewall with Advanced Security is used to create incoming and outgoing rules, connection security rules like security traffic between two computers and monitor all active connection security rules.

  26. A newly formed company has fifteen Windows 10 computers that need to be installed before the company can start operations. What is a best practice that the engineer should implement when configuring Windows Firewall?

    • The technician should remove all default firewall rules and selectively prevent traffic from reaching the corporate network.
    • The technician should enable Windows Firewall for inbound traffic and install other firewall software to control outbound traffic.
    • After implementing third-party security software for the company, the technician should verify that the Windows Firewall is disabled.
    • The engineer should create instructions for business users on how to allow an app through Windows Firewall using the Administrator account.

      Explanation:

      Disable Windows Firewall only if other firewall software is installed. Use the Windows Firewall (Windows 7 or 8) or Windows Defender Firewall (Windows 10) control panel to enable or disable Windows Firewall.

  27. Which two statements characterize the security of wireless networks? (Choose two.)

    • Wireless networks offer the same security features as wired networks.
    • Wireless guest mode provides open access to a protected LAN.
    • With SSID broadcast disabled, an attacker would need to know the SSID to establish a connection.
    • Using the default IP address on an access point makes hacking easier.
    • An attacker needs physical access to at least one network device to launch an attack.

      Explanation:

      The default settings on a wireless network usually include an SSID that is broadcast and default IP address settings. These default settings are considered insecure because they allow an attacker to easily detect and attempt to connect to a wireless network and make changes to the network.

  28. A manager approaches a PC repairman with the problem of users coming into the company in the middle of the night to play games on their computers. What can the PC repairer do to help in this situation?

    • Limit login times.
    • Use Event Viewer to document computer logon and logoff times.
    • Use Device Manager to restrict access to the computer.
    • Enable power-on passwords in BIOS.

      Explanation:

      The technician can limit the time that logins can occur on a computer. Using Event Viewer to determine logon times is an action that does not prevent users from logging on to the computer. Power-on BIOS passwords are not typically configured for a specific time. Device Manager is used to view the settings and operation of devices, not users.

      (Video) NETACAD IT Essentials 7, ✔️ Chapter 11: Windows Configuration

  29. A technician was asked by a manager to recommend a security solution to protect a computer from worms. What security technique should the technician recommend?

    • Antimalware
    • SSL
    • Ping-Sweep
    • IPS
  30. A technician was asked by a manager to recommend a security solution to protect a computer from ransomware. What security technique should the technician recommend?

    • Antimalware
    • encryption
    • Ping-Sweep
    • IPS
  31. A technician was asked by a manager to recommend a security solution to protect a computer from spyware. What security technique should the technician recommend?

    • Antimalware
    • double authentication
    • Ping-Sweep
    • IPS
  32. A technician was asked by a manager to recommend a security solution to protect a computer from spyware. What security technique should the technician recommend?

    • Antimalware
    • AS A
    • Ping-Sweep
    • IPS
  33. A technician was asked by a manager to recommend a security solution to protect a computer from keyloggers. What security technique should the technician recommend?

    • Antimalware
    • AS A
    • Ping-Sweep
    • IPS
  34. A technician was asked by a manager to recommend a security solution to protect a computer from adware programs. What security technique should the technician recommend?

    • Antimalware
    • IPS
    • Ping-Sweep
    • AS A
  35. A technician was asked by a manager to recommend a security solution to protect a computer from adware programs. What security technique should the technician recommend?

    • Antimalware
    • Ping-Sweep
    • double authentication
    • AS A
  36. A technician was asked by a manager to recommend a security solution to protect a computer from rootkits. What security technique should the technician recommend?

    • Antimalware
    • Ping-Sweep
    • double authentication
    • AS A
  37. A technician was asked by a manager to recommend a security solution to protect a computer from rootkits. What security technique should the technician recommend?

    • Antimalware
    • Port-Scan
    • double authentication
    • AS A
  38. A technician was asked by a manager to recommend a security solution to protect a computer from Trojans. What security technique should the technician recommend?

    • Antimalware
    • Port-Scan
    • double authentication
    • AS A
  • Recommend
FinaleExam answers Ch 1 - 9
Answers to the final exam Ch 10 - 14
Composite answers of the final exam Ch 1 - 14
IT Essentials 7.02 - Chapter 13
Chapter 13 Exam AnswersOnline-Test
Chapter 13 quiz answersOnline-Test
IT Essentials 7.02 - Chapter 14
Chapter 14 Exam AnswersOnline-Test
Chapter 14 quiz answersOnline-Test
Checkpoint Exam #5 (Chapters 12 – 13) AnswersOnline-Test
IT Essentials 7.02 - Laborantworten
13.2.3.7 Lab - Answers to Bitlocker and Bitlocker To Go
13.3.2.5 Lab - Configure Windows Local Security Policy Responses
13.3.3.6 Lab - Configuring users and groups in Windows Answers
13.3.4.6 Lab - Configure Windows Firewall responses
13.5.2.2 Lab - Document customer information in a work order responses
13.4.1.10 Packet Tracer - Configure Wireless Security Answers

3.612Voices

item rating

Subscribe to

3Comments

Latest

OldestMost Voted

Inline-Feedbacks

(Video) How to get full marks in IT ESSENTIALS 7.02 final exam (1-14 chapters) video explanation in telugu

Show all comments

Videos

1. NETACAD IT Essentials 7, ✔️ Chapter 5: Networking Concepts
(Grumpy_Grampy / JasonEJohnson31)
2. IT Essentials pc hardware and software chapter 2 quiz answer | netacad
(RRD125 vision)
3. IT Essentials ( Versión 7.00) - Examen final de los capítulos 10 a 14 de IT Essentials 7.0
(Nadinxito maz nah)
4. final exam IT Essentials Chapter 1-14 Answers
(RSR maheshwari )
5. IT Essentials اساسيات تكنولوجيا المعلومات (الفصل الثالث - الجزء الثاني)
(Dr. Omar Aldabbagh)
6. IT Essential Chapter 4 Quiz Answer | Chapter 4 Quiz Answer IT Essential | CISCO | Abhi_shek
(Electric Abhi)

References

Top Articles
Latest Posts
Article information

Author: Carmelo Roob

Last Updated: 24/09/2023

Views: 6559

Rating: 4.4 / 5 (65 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.