Chapters 12 – 13/ Qs with Ans & Rationales
Which two security precautions will help protect a workplace against social
engineering? (Choose two.) - Answer: registering and escorting all visitors to the
premises
ensuring that each use of an access card allows access to only one user at the time
Explanation: Encrypting data, keeping software up to date, and backing up data
are all security precautions, but will not protect against unauthorized physical
access to premises by people trying to gather information for malicious purposes.
Page 1 of 8
, It has been noted that the computers of employees who use removable flash
drives are being infected with viruses and other malware. Which two actions can
help prevent this problem in the future? (Choose two.) - Answer: -Set virus
protection software to scan removable media when data is accessed.
-Disable the autorun feature in the operating system.
Explanation: Windows Firewall filters data from the network not from removable
flash drives. The TPM is used for hardware authentication of users and devices,
not malware protection. Repairing, deleting, or quarantining infected files will
remove a current virus infection but not prevent future infections.
What are two potential user benefits of rooting or jailbreaking a mobile device?
(Choose two.) - Answer: The user interface can be extensively customized.
The operating system can be fine-tuned to improve the speed of the device.
Explanation: Rooting or jailbreaking a mobile device usually enables extensive
customization of the user interface and can enable performance enhancement.
The three incorrect options are all considered potential risks to the user, the
device, and the network that may result from rooting or jailbreaking a mobile
device.
Which two conditions must be met for mobile device security measures such as
remote lock and remote wipe to function? (Choose two.) - Answer: 1) The device
must be powered on.
Page 2 of 8