Minggu, 18 September 2011

Chapter 9 Exam - IT Essentials: PC Hardware and Software (Version 4.1)








Answer
Question
1- spyware
2- grayware
What are two examples of malware? (Choose two.) 
1- Enable WEP.
2- Enable MAC filtering
Which two actions improve security on a wireless network? (Choose two.)
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Which best practice should be included in a password protection policy? 
1- What items need to be protected?
2- What is to be done in the case of a security breach?
3- What are the possible threats to the items?
Which three questions should be addressed by organizations developing a security policy? (Choose three.) 
Download the latest signature files on a regular basis
What must be done to ensure that the antivirus software on a computer is able to detect and eradicate the most recent viruses? 
Create a restore point
A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates? 
The update will be installed as soon as the computer is powered on
A computer that is configured for automatic updates is shut down during a scheduled update. However, the update is downloaded successfully without any file being corrupted in the process. What will happen to the update as a result of this shutdown? 
guiding visitors within the premises and escorting them personally when they leave
Which precaution helps protect against social engineering in the workplace?
spam
A large number of e-mail messages are appearing in the inbox of a home computer user. The messages relate to products for which the user has never requested information. Which name is given to this type of e-mail? 
replay
A company network was subjected to several security attacks after TCP/IP had been installed on the company computers. Analysis has shown that in most of the attacks, attackers used networksniffers to extract user names and passwords of critical accounts on the network. Which type of TCP/IP attack did these attackers deploy? 
by installing unwanted programs on a computer
How can web tools, such as Java or ActiveX, be used for a malicious attack?
a biometric sensor
Which security device stores user physical characteristics to provide a user level of facility access?
poor wireless device security
What condition can allow unauthorized access to a network for users who are not physically connected to the network?
because everyone can be affected by computer and network security problems
Why should everyone in an organization give high priority to computer and network security?
1- keep equipment functioning
2- provide access only to authorized users
What are two important outcomes of good computer and network security? (Choose two.)
a programming code pattern
What is a signature as the term is used in antivirus and antispyware software development? 
2.5.4.3.6.1
Refer to the exhibit. What is the correct order for the steps in the troubleshooting process?
1- What problems are you experiencing?
2- What websites have you visited recently?
Which two questions are examples of open-ended questions that could be used in the security troubleshooting process? (Choose two.)
Establish a plan of action for resolution.
For troubleshooting security problems, what should be done immediately after the exact cause of the problem is determined?
Identify the problem
At which step of the troubleshooting process will a computer technician ask the customer a series of open-ended and closed-ended questions?

Tidak ada komentar:

Posting Komentar