100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITSP134 Chapter 17 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution $7.99   Add to cart

Exam (elaborations)

ITSP134 Chapter 17 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

 2 views  0 purchase
  • Course
  • Institution

ITSP134 Chapter 17 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

Preview 2 out of 7  pages

  • June 19, 2024
  • 7
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ITSP134 Chapter 17
Your company has decided that security is very important and wants to add a second
security check that will identify its employees while they are logging in to their
computers.What type of security do you recommend? - ANS-Biometric locks

Jennifer is trying to install an anti-malware program on a computer that she believes
might be infected. During the installation, she receives an error message saying the
software cannot be installed. The error reports that she does not have the privilege to
install software. Jennifer is using the administrator account, so she knows she should
be able to install the program.Which Windows option can Jennifer use to install
anti-malware software? - ANS-Install in Safe Mode.

As we configure the device and work with various settings to ensure the best quality
environment possible, it is important to track and monitor various events so that if they
need to be responded to, it can be done so in a timely manner.Which of the following
components of policies will allow for event-based monitoring? - ANS-Audit login failures

An operating system is responsible for validating certificates used to secure
communication. For Windows, Microsoft maintains a database of trusted root
certificates issued by Certificate Authorities (CAs). A root certificate is the original
certificate issued by the CA. When a Windows system opens a secure email or visits a
secure website and encounters a new digital certificate, it requests Microsoft's trusted
root certificate, which is downloaded to the computer. The download happens
seamlessly without the user's knowledge unless there's a problem. If Windows cannot
obtain the root certificate to validate the email or website, an error is displayed.Where
do you go in the Windows operating system to view and delete root certificates? -
ANS-Certificate Manager
Correct. You can use the Certificate Manager to view and delete root certificates. To use
Certification Manager, type certmgr.msc in the search box. Certification Manager is a
Microsoft Management Console that is used only for managing certificates.

You have noticed that your computer is running slower than normal and that the amount
of storage space on the hard drive is decreasing, even though you have not been doing
anything different on your computer. You believe a program is replicating by attaching
itself to other programs.What type of malware is on your computer? - ANS-Virus
Correct. A virus is a program that replicates by attaching itself to other programs. In
order for a virus to run, the infected program must be executed.

, Allison's computer is displaying a strange error message saying that Allison, who is an
administrator, does not have access to a folder in the Documents library on her user
account. Allison tried to take ownership of the folder but was still denied access. She
tried running an antivirus scan on the folder, and again access to the folder was
denied.Which option can Allison employ to resolve the security issue? - ANS-Run a
Windows Defender Offline scan.

Jennifer's company currently uses Windows Active Directory to provide centralized
authentication, authorization, and accounting to manage users on its network. The
company uses a wireless network and an earlier authentication service on the server to
authenticate end users accessing resources on the network.Which service is Jennifer's
company making use of? - ANS-RADIUS

Alexandria works for a not-for-profit company that asks for donations to help the
homeless in her community. Recently the database that holds all the contact information
about the doners was hacked, and all the data was copied.What type of data was
taken? - ANS-PII
Correct. PII (personally identifiable information) is a legal term used to describe data
that can uniquely identify a person, including Social Security number, email address,
physical address, birthdate, birthplace, mother's maiden name, marital status, phone
numbers, race, and biometric data.

Your company wants to physically secure the new data center. The company has hired
a security guard but wants to find a way so that only one person at a time can enter in
the data center. As people enter, they will have to show the security guard identification
that authorizes them to enter the data center.What is your company's new security
called? - ANS-Mantrap

While researching a network issue, Randy discovered a diagram that he can use to see
the design of the network.What type of documentation did Randy discover? -
ANS-Network topology
Correct. A network topology diagram will show how nodes are physically or logically
connected to the network. Randy should update the diagram when network equipment
is changed so that he can use the document to troubleshoot network issues.

Lane received a phone call from a client. The client claimed that a file they were working
on the day before had disappeared from their computer along with several other files.
Lane went to the client's desk to see if she could rebuild the files from the backup done
the night before. Lane found and rebuilt the files from the backed-up data. When Lane
called the next morning to see if everything was working, the client said that two of their

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75619 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart