Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

IT Essentials Certification Checkpoint Exam Chapters 12 - 13

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
23-10-2024
Written in
2024/2025

IT Essentials Certification Checkpoint Exam Chapters 12 - 13

Institution
IT Essentials Certification Checkpoint
Course
IT Essentials Certification Checkpoint

Content preview

HIT ESSENTIALS CERTIFICATION
CHECKPOINT EXAM CHAPTERS 12 – 13
COMPLETE DETAILED CASE STUDY


Which two security precautions will help protect a workplace against social engineering? (Choose two.) -
registering and escorting all visitors to the premises



ensuring that each use of an access card allows access to only one user at the time



Explanation:Encrypting data, keeping software up to date, and backing up data are all security
precautions, but will not protect against unauthorized physical access to premises by people trying to
gather information for malicious purposes.



It has been noted that the computers of employees who use removable flash drives are being infected
with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose
two.) - -Set virus protection software to scan removable media when data is accessed.

-Disable the autorun feature in the operating system.



Explanation: Windows Firewall filters data from the network not from removable flash drives. The TPM is
used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or
quarantining infected files will remove a current virus infection but not prevent future infections.



What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.) - The user
interface can be extensively customized.



The operating system can be fine-tuned to improve the speed of the device.



Explanation: Rooting or jailbreaking a mobile device usually enables extensive customization of the user
interface and can enable performance enhancement. The three incorrect options are all considered

, potential risks to the user, the device, and the network that may result from rooting or jailbreaking a
mobile device.



Which two conditions must be met for mobile device security measures such as remote lock and remote
wipe to function? (Choose two.) - 1) The device must be powered on.



2) The device must be connected to a network.



Explanation: Successful mobile device remote security measures require the device to be powered on
and connected to a network. The device passcode and GPS status do not affect the operation of remote
security measures. Mobile devices run apps within a sandbox by default.



What is the most effective way of securing wireless traffic? - WPA2



Explanation: SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than
WEP or WPA for encrypting traffic.



Which action would help a technician to determine if a denial of service attack is being caused by
malware on a host? - Disconnect the host from the network.



Explanation: If a host infected with malware is causing a denial of service attack by flooding the network
with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both
examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is
a type of attack where the malware appears to be an antivirus telling the users that their system is
infected. If a system is infected with malware, it is unlikely that logging on as a different user would
prevent the malware from continuing the denial of service attack.



The corporate security policy states that all remote connections use only secure tunnels for data
communications. Which encryption technique secures data traveling across the public Internet as if it
were traveling across the corporate LAN? - VPN



Explanation: A VPN (virtual private network) provides an encrypted tunnel for data communications
across the Internet. WEP and WPA are wireless encryption protocols. MD5 is a data hashing algorithm

Written for

Institution
IT Essentials Certification Checkpoint
Course
IT Essentials Certification Checkpoint

Document information

Uploaded on
October 23, 2024
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
12d0llars Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
144
Member since
1 year
Number of followers
13
Documents
6833
Last sold
6 days ago
STUVIA USA

Welcome to my study hub where clear summaries and exam-focused notes help you pass faster. Welcome! Here you'll find well-organized study materials designed to save time and improve understanding. Welcome to simple, reliable notes that help you prepare confidently for exams

3.5

18 reviews

5
9
4
1
3
2
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions