100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITSP134 Chapter 16 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution CA$11.59   Add to cart

Exam (elaborations)

ITSP134 Chapter 16 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

 3 views  0 purchase
  • Course
  • Institution

ITSP134 Chapter 16 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

Preview 2 out of 6  pages

  • June 19, 2024
  • 6
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ITSP134 Chapter 16

You need to secure your Windows 7 computer in a way that prevents access to the
entire HDD even if the drive is moved to another system.What solution should you
implement? - ANS-BitLocker

As administrators and other IT support personnel get to know the various types of
malware, grayware, and other types of resource stealing and draining applications, it is
important to know how each type works.Which of the following is an unwanted
application that substitutes itself for a legitimate application? - ANS-Trojan
Correct. This type of malware does not need a host program and substitutes itself for a
legitimate application. While an end user thinks they are executing one application, they
are actually executing the Trojan, which is embedded in the legitimate software.

Understanding the various types of attacks that a network can experience is a constant
learning experience for administrators. Knowing the basic types and categories is
important.Which of the following explains what a DoS attack is? - ANS-This type of
attack is commonly referred to as a denial-of-service attack
Correct. This attack often overwhelms a computer or network with requests or traffic for
the purpose of preventing new connections.

What user accounts are created automatically and disabled by default when Windows is
installed? (Select TWO.) - ANS-Guest
Correct. The Guest user is created automatically and disabled by default when
Windows is initially installed.

Administrator

A company asked you to help mitigate the brute force attacks carried out against its
users' Windows account passwords. You successfully removed the malware
responsible for the attacks and need to better secure the passwords assigned to the
user accounts without limiting the system's usability.What options can be included when
securing user accounts? (Select THREE.) - ANS-Require user account passwords.
Correct. Each user account should have an assigned password. Blank passwords are
unacceptable in most situations.

Require strong passwords.

, Correct. Strong password requirements should be enforced for all users. There needs to
be a balance between strong, complex passwords and passwords that are memorable.

Set failed logon restrictions.
Correct. Brute force attacks try combinations of letters, numbers, and symbols again
and again until they are successful. Enabling failed logon restrictions will discourage
most password cracking by requiring a timeout between failed attempts or locking an
account for a set period of time or until manually unlocked by an admin.

A coworker asks your opinion about how to minimize ActiveX attacks while they browse
the Internet using Internet Explorer. The coworker recalls there is a setting in the
Internet Options dialog box to prompt the user before downloading ActiveX controls but
can't remember which tab to use.What tab would suggest the coworker look in for the
ActiveX controls? - ANS-Security tab
Correct. Your coworker should use the Security tab to set the zone security level for the
Internet zone. Setting the level to medium-high will prompt users before they download
ActiveX controls that are not digitally signed by Microsoft.

A technician wants to limit access to a group of folders and is using Group Policy to
prevent the users in the sales department from accessing folders assigned to the
accounting department. The technician is having difficulty achieving acceptable
results.What is the most likely reason for the difficulties that the technician is
experiencing? - ANS-The technician should be setting NTFS permissions instead of
using Group Policy.
Correct. File and folder permissions should be made using NTFS permissions on the
folders.

While performing disk and file maintenance on the company file server, you determine a
user in the accounting department has been accidentally saving documents to all
shared folders on the file server. The user's computer was recently passed to them from
another user in the company, and according to company policy, the user should have
access only to the accounting share.What option best describes the situation above? -
ANS-The principle of least privilege was not followed.
Correct. The principle of least privilege is an approach to permissions in which a user is
given only the permissions required to perform their job and no more. This principle was
not followed in that they had access to all shared folders on the file server.

The users in the sales department needs a central location on the network to share data
files. All the client computers in the organization are running Windows 10 and have
network and internet connectivity. The file server that hosts the network drive for the

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$11.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


CA$11.59
  • (0)
  Add to cart