CHECKPOINT EXAM CHAPTERS 12 – 13
COMPLETE DETAILED CASE STUDY
Which two security precautions will help protect a workplace against social engineering? (Choose two.) -
registering and escorting all visitors to the premises
ensuring that each use of an access card allows access to only one user at the time
Explanation:Encrypting data, keeping software up to date, and backing up data are all security
precautions, but will not protect against unauthorized physical access to premises by people trying to
gather information for malicious purposes.
It has been noted that the computers of employees who use removable flash drives are being infected
with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose
two.) - -Set virus protection software to scan removable media when data is accessed.
-Disable the autorun feature in the operating system.
Explanation: Windows Firewall filters data from the network not from removable flash drives. The TPM is
used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or
quarantining infected files will remove a current virus infection but not prevent future infections.
What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.) - The user
interface can be extensively customized.
The operating system can be fine-tuned to improve the speed of the device.
Explanation: Rooting or jailbreaking a mobile device usually enables extensive customization of the user
interface and can enable performance enhancement. The three incorrect options are all considered
, potential risks to the user, the device, and the network that may result from rooting or jailbreaking a
mobile device.
Which two conditions must be met for mobile device security measures such as remote lock and remote
wipe to function? (Choose two.) - 1) The device must be powered on.
2) The device must be connected to a network.
Explanation: Successful mobile device remote security measures require the device to be powered on
and connected to a network. The device passcode and GPS status do not affect the operation of remote
security measures. Mobile devices run apps within a sandbox by default.
What is the most effective way of securing wireless traffic? - WPA2
Explanation: SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than
WEP or WPA for encrypting traffic.
Which action would help a technician to determine if a denial of service attack is being caused by
malware on a host? - Disconnect the host from the network.
Explanation: If a host infected with malware is causing a denial of service attack by flooding the network
with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both
examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is
a type of attack where the malware appears to be an antivirus telling the users that their system is
infected. If a system is infected with malware, it is unlikely that logging on as a different user would
prevent the malware from continuing the denial of service attack.
The corporate security policy states that all remote connections use only secure tunnels for data
communications. Which encryption technique secures data traveling across the public Internet as if it
were traveling across the corporate LAN? - VPN
Explanation: A VPN (virtual private network) provides an encrypted tunnel for data communications
across the Internet. WEP and WPA are wireless encryption protocols. MD5 is a data hashing algorithm