A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?March 7, 2021 by Mnc Certified Correct Answer for the Question – A technician is configuring rights and permissions in Windows 7. Which tool will the technician use? is given below A technician is configuring rights and permissions in Windows 7. Which tool will the technician use? Device Manager Local Security Policy Local Users and Groups Resource Monitor Correct Answer The Correct … Read more
Also check :FREE ENVATO ELEMENT ACCOUNT HERE 1. Which two items are used in asymmetric encryption? (Choose two.)
Explanation: A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key. 2. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
3. A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)
Explanation: A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area. 4. A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
Explanation: Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering. 5. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
Explanation: Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware consists, typically, of annoying popup windows. Unlike a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict access to network services. 6. After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
Explanation: After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process. 7. A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?
Explanation: Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data. 8. When would a PC repair person want to deploy the idle timeout feature?
Explanation: The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off. 9. Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?
Explanation: There are several types of firewall configurations:
10. What would cause a Microsoft Windows update to fail?
Explanation: Two things commonly cause a Windows update to fail: 1. A required older update was not installed. 2. There was a problem with the downloaded update. 11. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?
Explanation: Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution. 12. How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?
Explanation: When a computer user browses the web in private mode, the following occurs:Cookies are disabled. Temporary Internet files are removed after closing the window. Browsing history is removed after closing the window. 13. A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation?
Explanation: Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door. 14. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
Explanation: The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity. 15. A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?
Explanation: Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software. 16. A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?
Explanation: A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data. 17. What are signatures as they relate to security threats?
Explanation: Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands. 18. A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?
Explanation: The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated. 19. A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?
Explanation: A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker. 20. Which security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes?
Explanation: A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds. 21. Refer to the exhibit. Which type of workstation password is being used? ITE v7.0 – IT Essentials (Version 7.0) – IT Essentials 7.0 Chapter 13 Exam Answers
Explanation: A BIOS password is configured by entering the BIOS Setup program. 22. A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate?
Explanation: In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on. 23. A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name?
Explanation: The Password must meet complexity requirements option requires that the user not make their own user account name or part of their user account name as their password. This option also requires that the password have at least three of the following: uppercase letter, lowercase letter, number, and symbol. 24. A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?
Explanation: Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions. 25. An IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?
Explanation: Windows Firewall with Advanced Security or the Windows 10 Windows Defender Firewall with Advanced Security is used to create inbound and outbound rules, connection security rules such as security traffic between two computers, and monitoring any active connection security rules. 26. A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?
Explanation: Only disable Windows Firewall if other firewall software is installed. Use the Windows Firewall (Windows 7 or 8) or the Windows Defender Firewall (Windows 10) Control Panel to enable or disable the Windows Firewall. 27. Which two statements characterize wireless network security? (Choose two.)
Explanation: The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network. 28. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?
Explanation: The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users. 29. A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?
30. A technician has been asked by a manager to recommend a security solution for protecting a computer against ransomware. Which security technique should the technician recommend?
31. A technician has been asked by a manager to recommend a security solution for protecting a computer against spyware. Which security technique should the technician recommend?
32. A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?
33. A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?
34. A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?
35. A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?
IT Essentials v6.0:1. What is the correct way to conduct a telephone call to troubleshoot a computer problem?
2. What is a recommended technique for a technician who is both troubleshooting a problem and also trying to help a customer relax?
3. A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call?
4. What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.)
5. A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do?
6. A technician receives a call from a customer who is too talkative. How should the technician handle the call?
7. What are two examples of displaying professional communication skills while talking to a customer? (Choose two.)
8. Which statement describes a best practice related to time management?
9. Which two rules should be followed by call center employees to ensure customer satisfaction? (Choose two.)
10. Fill in the blank. The SLA is a contract defining the agreed-on level of support between a customer and a service vendor. 11. During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician do with this information?
12. Which statement is characteristic of most personal software licenses?
13. What is the definition of cyber law?
14. Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)
15. When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?
16. When performing computer forensics what is required to prove a chain of custody?
17. A technician has found possible illegal content on the hard drive of a customer computer. When should a computer forensics expert be brought in?
18. A technician is analyzing a computer that may have been used for illegal activity. What are two examples of volatile data? (Choose two.)
19. What should a level two technician do immediately after receiving an escalated work order from a level one technician?
20. What is a reason to escalate a problem from a level one technician to a level two technician?
21. What are three pieces of information a level one technician should gather from a customer? (Choose three.)
22. Which situation would require that a support desk call be given the highest priority?
23. When does a level one technician prepare an escalated work order?
24. Which statement best describes a call center?
|