Saturday, June 4, 2011

Chapter 16 Exam - IT Essentials: PC Hardware and Software (Version 4.1)

1   
Why should the default username and password be changed as soon as an access point is powered on and accessed?

  • The change provides a minimum level of security to the access point.
   
2   
Which important feature is offered by the USB standard?
   
  • It can supply power from the computer to devices.

3   
After logging into a computer, a user is unable to access the CIW folder. Access to this folder is necessary to complete an assignment. Which two actions can the administrator take to provide the user access to the folder? (Choose two.)

  • Give the person rights to the CIW folder.
  • Add the user to a group that has the rights to the CIW folder.
   
4   
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?

  • smart card
   
5   
Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
   
  • security key fob

6   
What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)

  • infrastructure
  • type of Layer 2 devices that are used within the network

7   
A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wireless router provides wireless and wired connectivity. What firewall option may be enabled in order for customers to gain access to the web server from their remote locations?
   
  • port forwarding
   
8   
What are two features of Windows Vista Backup? (Choose two.)
   
  • The backup files can be saved to another connected computer or server.
  • The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.

9   
Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?

  • Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.
   
10   
What is a feature of the firewall capability when Windows Vista is the operating system?

  • The firewall can be managed manually by permitting or allowing specific ports.

11   
A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
   
  • The computer has been infected with spyware.
   
12   
Which two factors should management consider when developing a security policy? (Choose two.)
   
  • expense of the security protection
  • the costs that are associated with data loss
   
13   
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
   
  • the manufacturer FAQ for network devices
  • technical websites

14   
Which two hashing algorithms are used to ensure that messages are unaltered during transmission? (Choose two.)

  • MD5   
  • SHA   

15   
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)

  • It does not impact the processing performance of the equipment it protects.
  • It is designed to protect more than one computer.
   
16   
Which issue should be addressed in the detailed information that is provided by a local security policy?
   
  • the types of intrusions that are covered by the policy
   
17   
Why would security application software be implemented on a network?

  •  to protect the operating system
   
18   
Which Windows XP command initiates a backup from the command line?

  • ntbackup

19   
A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
  
  • The administrator does not have the correct permissions to make the change.
   
20   
What can a homeowner who has a wireless router do to hide the wireless router signal from the surrounding neighbors?

  • Disable SSID broadcast.

21 komentar:

mowaud said...

Percentage: 90.0%
thanks dude

Anonymous said...

6.Corrected
There are 4 interrelated aspects,
access, data, infrastructure, and computers

Anonymous said...

The Windows Vista backup files have the extension .zip. Backup data is automatically compressed, and each file has a maximum compressed size of 200 MB. A Windows Vista backup file can be saved to a hard drive, any recordable media, or to another computer or server connected to your network. The backup can only be created from an NTFS partition. The target hard drive must be either NTFS or FAT formatted.

Anonymous said...

8 wrong

Anonymous said...

16 wrong
The security policy should also provide detailed information about the following issues in case of an emergency:

Steps to take after a breach in security
Who to contact in an emergency
Information to share with customers, vendors, and the media
Secondary locations to use in an evacuation
Steps to take after an emergency is over, including the priority of services to be restored

Anonymous said...

Correct answer for 16
the priority of services to be restored after an emergency is over

SSS said...

17 wrong

Anonymous said...

8 What are two features of Windows Vista Backup? (Choose two.)
correct
The backup files have the extension .zip.
The backup files can be saved to another connected computer or server.

Anonymous said...

6 What are two interrelated aspects that would be involved in the physical security of an organization? (Choose two.)
correct
infrastructure
network access

Unknown said...

makasih mas.. sangat berguna sekali ...
sekarang saya tinggal nyiapin diri ujian skillnya aja..

keep writing and sharing mas...
hatur thank you :)

Anonymous said...

4. wrong
the correct answer is biometric device

Anonymous said...

4 is right shit it is smart card

Anonymous said...

thanks for the shares

Anonymous said...

Thanx for the answers...got 90% this time (2 wrong answers)!

#4 is right: the note says "Smart cards are used in many applications worldwide, such as secure ID badges"

#19 : If the Admin does not have the permission, who would be the authorized one?
The answer should be "the user is logged into the system"

Unable to answer #19 exactly as there are 2 wrong answers..

Anonymous said...

Damn i got 70%

Anonymous said...

Ok, first let me say thanks for the post it is very helpful. But there are some of these wrong. I just took the test and used your answers and got an 80. I am glad that i get 2 tries on the test because i retook the test and got a 100 0n it so here are the corrected answers that are wrong! Change these and you should make a 100 also.

6 - Wrong
Answer should be -
Infrastructure
Network access

8 - Wrong
Answer should be -
The backup files have the extension.zip
The backup files can be saved to another connected computer or server.

16 - Wrong
Answer should be -
The priority of the services to be restored after an emergency is over.

Anonymous said...

Thanks everyone I got 100%

Anonymous said...

Which two factors should management consider when developing a security policy? (Choose two.)

Answers are NOT

a backup schedule
the costs that are associated with data loss

- TCW

Anonymous said...

Questions with original incorrect answers

6.
8.
12.
16.

Annon that posted on November 30th 2012 has correct answers for 6, 8, and 16

Correct answers for 12

expense of the security protection
the costs that are associated with data loss

-TCW

Anonymous said...

Nikko Dizon from BSCOE - 1

Anonymous said...

Christine Mae Almaden & Kenneth Almaden <3 FOREVER!!!

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review