Exam Viewer - Chapter 16 Exam - IT Essentials (Version 4.

0)

Page lof6

"II.,h. (15(·0

Close Window

Assessment System

Exam Viewer· Chapter 16 Exam ·IT Essentials (Version 4.0)

Below you will find the assessment items as presented on the exam as well as the scoring rules associated with the item.

Use of the exam information in the Exam Viewer is subject to the terms of the Academy Connection Website Usage Agreement between you and Cisco. The purpose of the Exam Viewer is to support instruction while not compromising exam security for other Cisco Networking Academies or students. This material should not be distributed outside a proctored and controlled setting. If misuse is found. action will be taken to limit access to assessment content. Please remember to logout and close your browser window after using the Exam Viewer.

Which encryption technique uses a mathematical function to create a numeric value unique to the data?

o asymmetric encryption

o hash encoding OVPN

OWTLS

This item references content from the following areas:

IT Essentials

• 16.2.1 Describe and compare security techniques

2 Which two methods help protect network cables? (Choose two.)

o enclosing the cables in conduits

o enclosing the cables in cable locks

o routing the cables inside the walls of a building

o leaves cables exposed to reveal tampering Dusing RFID tags

Scoring Rule For: correctness of response

Max Value = 2

'1 point for each correct option.

o points if more options are selected than required.

This item references content from the following areas:

• 16.1.2 Explain when and how to use security hardware

• 16.2.2 Describe and compare access control devices

3 Which method of filtering traffic is used to monitor established network connections to allow only packets from established network connections?

o packet filter

o proxy firewall

o stateful packet inspection

o wireless NICs

Scoring Rule For: correctness of response

http://ev-iip.netacad.net/virtuoso/delive1'Y/pllb=d()c/~~am=vIewer.shtmf?CJPP~26&FORMJb ... · 973/200S·

Exam Viewer - Chapter 16 Exam - IT Essentials (Version 4.0)

Page 2 of6

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.2.3 Describe and compare firewall types

4 Which Windows XP command performs a data backup? o BACKUP

OBUP

ONTBACKUP

OXPBACKUP

Scoring Rule For: correctness of response

"joe '"Y Ji option

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.4.3 Explain data backup procedures. access to backups, and secure physical backup media

5 What is a disadvantage of configuring a firewall using permissive settings?

o Devices are exposed to attack.

o Packet transmission becomes complicated. requiring explicit access permission for all packets.

o The extra ports that are used by various applications are closed.

o The settings may cause a user to be locked out of the system.

Scoring Rule For: correctness of response

J??!0~oo

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.3.2 Describe configuring firewall types

6 Which feature is characteristic of a guest account?

o It always remains active.

o It can be configured to grant extensive access to resources on a temporary basis.

o It disables access to the Internet, e-mail, and any printer.

o It must be specifically configured for each guest.

This item references content from the following areas:

IT Essentials

• 16.4.2 Maintain accounts

7 Which technique may be used to generate a message digest from a hash encoding process? o the use of a combination of identical encryption keys

use of a mathematical function to generate a corresponding text value that is unique to the message

o the use of the SHA or MD5 algorithms

o the use of a key that is agreed to by the sender and receiver

http://ev-iip.netacad.net/virtuoso/delivery/puh-doc/exam_viewer.shtml?qpp=20&FORM_ID ... 9/3/2008

Exam Viewer - Chapter 16 Exam - IT Essentials (Version 4.0)

Page 3 of6

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.2.1 Describe and compare security techniques

8 Which method can turn a laptop into a zombie computer?

o improperly configuring the BIOS setting

o partially uninstalling the operating system

o reformatting the hard drive

o remotely controlling the operating system

Scoring Rule For: correctness of response

This item references content from the following areas:

IT Essentials

• 16.4.1 Describe the configuration of operating system updates

9 After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)

D paperwork that is provided to customers

D the manufacturer FAQ for network devices

D firewall logs

D network device logs D technical websites

Scoring Rule For: correctness of response

IT potnt for each correct option.

o points if more options are selected than required.

I

Max Value = 2

I

This item references content from the following areas:

IT Essentials

• 16.5.1 Review the troubleshooting process

10 After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in.

- - - - tater, the user rebooted the-computerandwas able to log in, Which-step did the technician omit duringJhe troubleshooting process? _.

o closing the issue with the customer

o gathering data from the computer

o gathering information from the user

o trying quick solutions

Scoring Rule For: correctness of response

This item references content from the following areas:

htlp:llev-iip.netacad.net/virtuoso/delivery/pub-doc/exam_viewer.shtml?qpp=20&FORM_ID ...

Exam Viewer - Chapter 16 Exam - IT Essentials (Version 4.0)

Page 4 of6

IT Essentials

• 16.5.1 Review the troubleshooting process

11 What is the purpose of using hash encoding?

o to ensure complete security of the message digest

o to ensure that the data remains the same even if the message digest is tampered with

o to ensure that tampering with data is detectable

o to regenerate the message digest when the original message digest is changed

Scoring Rule For: correctness of response

~PtiOO

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.2.1 Describe and compare security techniques

12 Which characteristic of an application is used by the Windows XP firewall to determine whether the application is allowed to access the network?

o file permission

o port number OIRQ Ousername

This item references content from the following areas:

IT Essentials

• 16.3.2 Describe configuring firewall types

13 Which right can only be granted by enabling the Full Control file-level permission?

o change the permissions of a file

o delete a file

o overwrite a file Orun a file

This item references content from the following areas:

IT Essentials

• 16.3.1 Configure security settings

14 Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.) D It costs less because it is more efficient.

D It does not impact the processing performance of the equipment it protects.

D It always protects both the computer it is installed on as well as the rest of the network. D It is designed to protect more than one computer.

It is a free Windows operating system component.

Scoring Rule For: correctness of response

http://ev-iip.netacad.net/virtuoso/delivery/pub-doc/exam _ viewer.shtml?qpp=20&FORM _ID... 9/312008

Exam Viewer - Chapter 16 Exam - IT Essentials (Version 4.0)

Page 50f6

This item references content from the following areas:

IT Essentials

• 16.2.3 Describe and compare firewall types

15 A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?

o EXT

o FAT OFAT32 ONTFS

This item references content from the following areas:

IT Essentials

• 16.3.1 Configure security settings

16 A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?

OMD5

OPGP

OWEP

OWPA

Scoring Rule For: correctness of response

,.-OPI""

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.3.1 Configure security settings

17 What is the default setting for Windows XP operating system updates?

o automatic

o only download updates

Scoring Rule For: correctness of response

r::="~;'"

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.4.1 Describe the configuration of operating system updates

18 A user can locate the setup for an application on the server but is unable to download it. The user requests the help of a technician, who

http://ev-iip.netacad.net/virtuoso/delivery/pub-doc/exam_ viewer.shtml?qpp=20&FORM_ID ...

Exam Viewer - Chapter 16 Exam - IT Essentials (Version 4.0)

Page 60f6

looks up the list of common problems and their recommended solutions. Which solution should the technician try to resolve this problem?

o Change the read permission granted to the user on the setup file to read and execute.

o Grant system administrator privileges to the user on a temporary basis.

o Inform the user that this is due to a phishing attack and then perform an antivirus scan.

o Verify that the MAC address of the computer is listed in the MAC address filter table.

Scoring Rule For: correctness of response

Max Value = 2

II

This item references content from the following areas:

IT Essentials

• 16.5.2 Identify common problems and solutions

19 Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?

o smart card

o security key fob

o storage area network

o biometric device

This item references content from the following areas:

IT Essentials

• 16.2.2 Describe and compare access control devices

20 Which two NTFS file-level permissions allow a user to delete a file? (Choose two.) Damend

Ddelete

D full control Dmodify Dwrite

This item references content from the following areas:

IT Essentials

• 16.3.1 Configure security settings

[ ResetVlew

Showing 1 of 1

Prev Page: 1

Next

Close Window

All contents copyright ©2001-200S Cisco Systems, Inc. All rights reserved. Privacy Statement and Trademarks.

http://ev-iip.netacad.net/virtuoso/delivery/pub-doc/exam _ viewer.shtml ?qpp=20&FORM _ ID... 9/3/2008

Sign up to vote on this title
UsefulNot useful