Chapters 12 – 13/ Qs with Ans & Rationales
Which two security precautions will help protect a workplace against social
engineering? (Choose two.) - Answer: registering and escorting all visitors to the
premises
ensuring that each use of an access card allows access to only one user at the time
Explanation: Encrypting data, keeping software up to date, and backing up data
are all security precautions, but will not protect against unauthorized physical
access to premises by people trying to gather information for malicious purposes.
Page 1 of 8
, It has been noted that the computers of employees who use removable flash
drives are being infected with viruses and other malware. Which two actions can
help prevent this problem in the future? (Choose two.) - Answer: -Set virus
protection software to scan removable media when data is accessed.
-Disable the autorun feature in the operating system.
Explanation: Windows Firewall filters data from the network not from removable
flash drives. The TPM is used for hardware authentication of users and devices,
not malware protection. Repairing, deleting, or quarantining infected files will
remove a current virus infection but not prevent future infections.
What are two benefits of using an ext4 partition instead of ext3? (Choose two.) -
Answer: 1. improved performance
2. increase in the size of supported files
Explanation: Based on the ex3 file system, an ext4 partition includes extensions
that improve performance and an increase in the of supported files. An ext4
partition also supports journaling, a file system feature that minimizes the risk of
file system corruption if power is suddenly lost to the system.
Users in a company have complained about network performance. After
investigation, the IT staff has determined that the attacker was using a specific
technique that affected the TCP three-way handshake. What is the type of
network attack? - Answer: SYN flood
Page 2 of 8