100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ITSP134 Chapter 17 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution €7,37   In winkelwagen

Tentamen (uitwerkingen)

ITSP134 Chapter 17 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

 2 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

ITSP134 Chapter 17 Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

Voorbeeld 2 van de 7  pagina's

  • 19 juni 2024
  • 7
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
avatar-seller
ITSP134 Chapter 17
Your company has decided that security is very important and wants to add a second
security check that will identify its employees while they are logging in to their
computers.What type of security do you recommend? - ANS-Biometric locks

Jennifer is trying to install an anti-malware program on a computer that she believes
might be infected. During the installation, she receives an error message saying the
software cannot be installed. The error reports that she does not have the privilege to
install software. Jennifer is using the administrator account, so she knows she should
be able to install the program.Which Windows option can Jennifer use to install
anti-malware software? - ANS-Install in Safe Mode.

As we configure the device and work with various settings to ensure the best quality
environment possible, it is important to track and monitor various events so that if they
need to be responded to, it can be done so in a timely manner.Which of the following
components of policies will allow for event-based monitoring? - ANS-Audit login failures

An operating system is responsible for validating certificates used to secure
communication. For Windows, Microsoft maintains a database of trusted root
certificates issued by Certificate Authorities (CAs). A root certificate is the original
certificate issued by the CA. When a Windows system opens a secure email or visits a
secure website and encounters a new digital certificate, it requests Microsoft's trusted
root certificate, which is downloaded to the computer. The download happens
seamlessly without the user's knowledge unless there's a problem. If Windows cannot
obtain the root certificate to validate the email or website, an error is displayed.Where
do you go in the Windows operating system to view and delete root certificates? -
ANS-Certificate Manager
Correct. You can use the Certificate Manager to view and delete root certificates. To use
Certification Manager, type certmgr.msc in the search box. Certification Manager is a
Microsoft Management Console that is used only for managing certificates.

You have noticed that your computer is running slower than normal and that the amount
of storage space on the hard drive is decreasing, even though you have not been doing
anything different on your computer. You believe a program is replicating by attaching
itself to other programs.What type of malware is on your computer? - ANS-Virus
Correct. A virus is a program that replicates by attaching itself to other programs. In
order for a virus to run, the infected program must be executed.

, Allison's computer is displaying a strange error message saying that Allison, who is an
administrator, does not have access to a folder in the Documents library on her user
account. Allison tried to take ownership of the folder but was still denied access. She
tried running an antivirus scan on the folder, and again access to the folder was
denied.Which option can Allison employ to resolve the security issue? - ANS-Run a
Windows Defender Offline scan.

Jennifer's company currently uses Windows Active Directory to provide centralized
authentication, authorization, and accounting to manage users on its network. The
company uses a wireless network and an earlier authentication service on the server to
authenticate end users accessing resources on the network.Which service is Jennifer's
company making use of? - ANS-RADIUS

Alexandria works for a not-for-profit company that asks for donations to help the
homeless in her community. Recently the database that holds all the contact information
about the doners was hacked, and all the data was copied.What type of data was
taken? - ANS-PII
Correct. PII (personally identifiable information) is a legal term used to describe data
that can uniquely identify a person, including Social Security number, email address,
physical address, birthdate, birthplace, mother's maiden name, marital status, phone
numbers, race, and biometric data.

Your company wants to physically secure the new data center. The company has hired
a security guard but wants to find a way so that only one person at a time can enter in
the data center. As people enter, they will have to show the security guard identification
that authorizes them to enter the data center.What is your company's new security
called? - ANS-Mantrap

While researching a network issue, Randy discovered a diagram that he can use to see
the design of the network.What type of documentation did Randy discover? -
ANS-Network topology
Correct. A network topology diagram will show how nodes are physically or logically
connected to the network. Randy should update the diagram when network equipment
is changed so that he can use the document to troubleshoot network issues.

Lane received a phone call from a client. The client claimed that a file they were working
on the day before had disappeared from their computer along with several other files.
Lane went to the client's desk to see if she could rebuild the files from the backup done
the night before. Lane found and rebuilt the files from the backed-up data. When Lane
called the next morning to see if everything was working, the client said that two of their

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Hkane. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,37. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 75619 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€7,37
  • (0)
  Kopen