Name: 
 

IT Essentials objective 6.1



True/False
Indicate whether the statement is true or false.
 

 1. 

You can share both encrypted folders and encrypted files.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 2. 

You install a new wireless network for a client. However, your client has been reading about network security and asks you to increase the security of the network while maintaining the wireless nature of the network. What do you suggest to accomplish this?      .
a.
Connect all the wireless clients to the wireless access point using CAT5 cable
c.
Install more wireless access points throughout the network
b.
Enable Wired Equivalent Privacy
d.
Change encryption from 40-bit keys to 16-bit keys
 

 3. 

Which of the following is used to block unauthorized outside users from accessing an intranet site?
a.
hub
c.
gateway
b.
router
d.
firewall
 

 4. 

Performing a System State Backup backs up _______.     
a.
the entire operating system along with user configuration settings
c.
data that has changed since the last major backup
b.
key operating system configuration settings and data so that the system can be rebuilt quickly in the event of a failure
d.
tagged files and folders
 

 5. 

You are setting up a SOHO network by connecting several Windows XP computers to a router, which in turn provides access to a broadband Internet connection. What steps should be taken to protect the network from attack?      
a.
Enable the Windows Firewall feature on each machine
c.
Enable a unique WEP key for each machine
b.
Establish a unique SSID on each machine
d.
Configure MS-CHAP authentication on each machine
 

 6. 

A member of the Power Users group has been trying to access the files of a user who has left the company. However, she can’t get into them. Why is this?
a.
Power Users don’t have access rights to user’s files and folders unless they created the user or they have been granted permissions through some other source
c.
Power User members have access only to their own files and system hardware configuration functions
b.
Only a file’s owner or an administrator can access secured files
d.
Power Users have access only to files allowed by an administrator
 

 7. 

You have been asked to connect a single Windows XP system to a broadband modem for Internet access. Which of the following actions should you take to protect the PC from the Internet?
a.
Turn on Windows Firewall and enable the file sharing option
c.
Configure the firewall function in the modem
b.
Turn on ICS and enable file and printer sharing
d.
Install spam blocker, adware, and antivirus protection software
 

 8. 

Which of the following is considered malicious software?
a.
Adware
c.
Spam
b.
Pop-ups
d.
Worms
 

 9. 

Which of the following is considered a virus?
a.
Trojan
c.
Worm
b.
Spam
d.
Spyware
 

 10. 

What is one way to completely remove data from a hard disk drive?
a.
Partition and completely reformat the drive
c.
Delete all the files on the drive and perform a disk defrag operation
b.
Reinstall the operating system over the existing OS structure
d.
Physically destroy the drive’s platters with a hammer or acid
 

 11. 

A technician is in the server room when you enter, and you notice that the door has been braced open. What should you do?
a.
Tell the technician to close the door when he leaves
c.
Close the door and note the security breach in the server room log book
b.
Report the security breach to the network supervisor
d.
Tell the technician he is creating a security breach and close the door yourself
 

 12. 

Where would you establish a Supervisory password on a computer that will be installed in an Internet kiosk so that users can access the system but not modify its hardware configuration such as accessing a USB port?
a.
In CMOS
c.
In Windows
b.
In the BIOS
d.
If you set a password in this environment, users will not be able to access the system
 

 13. 

You have just installed a new high-speed tape drive in a customer’s server and backed up her entire system. How can you be sure that the new drive has done this successfully?
a.
Check the size of the backup file to make sure that it is large enough to represent the stored data
c.
Place the backup tape in another drive and see if it can be read from a secondary storage device in case the first drive fails
b.
Check the backup log to make sure that everything indicated was backed up to the tape
d.
Verify the backup by performing a restore operation from the tape
 

 14. 

You are searching online for a new high-end video card that you want to purchase for your game machine. When you go to one of the sites that have listed this product in your favorite search engine, you receive a message warning you that the site’s SSL certificate has expired. Which of the following actions should you take first?
a.
Leave the site immediately because there is no security connection present at this time
c.
Examine the certificate to determine whether it comes from a trustworthy authority and determine whether you trust it before doing business on this site
b.
In Internet Explorer, access the Internet Options page, select the Contents tab, and access Certificates. Click the Clear the SSL State option
d.
Reconfigure the Windows Date and Time Properties to show the correct date and time
 

 15. 

What backup method requires the most time to perform?      
a.
Incremental
c.
Differential
b.
Full
d.
Selective
 

 16. 

Your company is sponsoring an Internet café at a local trade show, and you are responsible for setting up six PCs that trade show attendees can walk up to and use to browse the Web or check their email. Because these machines are open to public use, what type of BIOS password should be established on them?
a.
User access
c.
Admin access
b.
Remote access
d.
Supervisory access
 

 17. 

A friend has contacted you with questions about his Windows XP Professional PC. He uses it to perform Internet research for his home business, in addition to preparing reports, creating documents, and managing finances. Other than the applications he is familiar with, your friend is basically PC illiterate. However, he is worried that his system is not up-to-date because he has heard about updates to Windows XP, but the has no idea of how to acquire or install them. What can you tell your friend about acquiring and installing updates and patches for his computer system?
a.
Your friend should use the Internet to access the Microsoft Windows Update page where he can obtain and install the latest updates and service packs for his operating system through the Windows Update service
c.
Tell your friend to download SP2 for Windows XP Professional from the Microsoft website because all other Windows XP patches are unnecessary
b.
Offer to prepare your friend an update disc created using a Windows XP PC that is completely updated with the latest patches and service pack
d.
Tell your friend not to worry because Windows XP Professional comes with the Automatic Updates feature enabled by default. Therefore, he has been receiving Windows Updates in the background as he has been browsing the Internet
 

 18. 

You run your own computer management company and would like to expand your business. However, it seems that you are constantly handling emergency calls from your established customers and can’t find the time to investigate better business activities for your company. After reviewing your call log for the past year, you conclude that a large portion of your time has been spent removing viruses, spyware, and adware from customers’ systems, which is included in their annual service fee. If you could reduce the number of calls you must handle performing these types of services, you could investigate more profitable business activities. What can you do to protect PC systems against malware like your customers have been encountering so that you can pursue these other activities?
a.
Configure their firewalls to block the user access to the Internet
c.
Use file and folder permission settings to limit user interactions with their PCs
b.
Educate users about how these types of programs are encountered and how they can be avoided
d.
Use the Sharing feature to limit access to the operating system kernel files
 

 19. 

A strong password should ____.
a.
combine uppercase and lowercase characters
b.
use consecutive letters or numbers
c.
contain at least 6 characters
d.
All of the above
 

 20. 

To limit the potential damage from malware, it’s a good idea to create a(n) ____ account to use for your everyday normal computer activities.
a.
Administrator
c.
Backup Operator
b.
Limited User
d.
Guest
 

 21. 

An alternative e-mail client to Microsoft Outlook and Outlook Express is ____.
a.
Eudora
c.
Opera
b.
Firefox
d.
Internet Explorer
 

 22. 

____ puts data into code that must be translated before it can be accessed, and can be applied to either a folder or file.
a.
Authorization
c.
Encapsulation
b.
Authentication
d.
Encryption
 

 23. 

____ is a type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
a.
Scam e-mail
c.
Virus hoax
b.
Phishing
d.
Guerilla marketing
 

 24. 

____ is moving data from one application to another application or from one storage media to another, and most often involves a change in the way the data is formatted.
a.
Encryption
c.
Data transformation
b.
Data migration
d.
Polymorphism
 

 25. 

The protocols used to encrypt account names and passwords are called ____ protocols.
a.
user service
c.
authentication
b.
encryption
d.
authorization
 

 26. 

____ displays pop-up ads based on your browsing habits.
a.
Adware
c.
Virus
b.
Spyware
d.
Spam
 

 27. 

____ is junk e-mail that you don’t want, that you didn’t ask for, and that gets in your way.
a.
Adware
c.
A virus
b.
Spyware
d.
Spam
 

 28. 

A(n) ____ is a program that copies itself throughout a network or the Internet without a host program.
a.
adware
c.
virus
b.
spyware
d.
worm
 

 29. 

A ____ is dormant code added to software and triggered at a predetermined time or by a predetermined event.
a.
logic bomb
c.
virus
b.
Trojan horse
d.
worm
 

 30. 

A ____ does not need a host program to work; rather, it substitutes itself for a legitimate program.
a.
logic bomb
c.
virus
b.
Trojan horse
d.
browser hijacker
 

 31. 

A ____ virus hides in an executable program or in a word-processing document that contains a macro.
a.
boot sector
c.
script
b.
file
d.
multipartite
 

 32. 

A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
a.
boot sector virus
c.
macro
b.
file virus
d.
multipartite virus
 

 33. 

As a ____ virus replicates, it changes its characteristics.
a.
stealth
c.
script
b.
polymorphic
d.
multipartite
 

Multiple Response
Identify one or more choices that best complete the statement or answer the question.
 

 34. 

Which of the following are wireless encryption protocols? (Select all that apply.)
 a.
WPA
 c.
SSID
 b.
WEP
 d.
CHAPS
 

 35. 

Which of the following steps can be taken to protect a wireless network from unauthorized user access? (Select all that apply.)
 a.
Set up MAC address filtering on each card
 c.
Set up WEP on all network nodes
 b.
Configure the AP so that it doesn’t broadcast the SSID
 d.
Minimize the distance between network connections
 

 36. 

Which of the following are advantages associated with using NTFS? (Select all that apply.)
 a.
Data security
 c.
64-bit entries to keep track of items
 b.
Support for larger drives
 d.
Handling small drives efficiently
 

 37. 

After a system becomes infected with a virus, what actions can be taken to remove viruses from an infected system? (Select all that apply.)
 a.
Run an antivirus program to detect and remove the virus
 c.
Partition the drive and reinstall the operating system
 b.
Reinstall the operating system over the current OS structure to replace the infected file
 d.
Install the antivirus software CD and run it
 

 38. 

You are responsible for maintaining and administering 35 PCs in your area of the building. You need to secure them so that employees cannot change CMOS settings. What types of passwords should be set to provide secured logons for users in the CMOS while still protecting the system configuration? (Select all that apply.)
 a.
User access
 c.
Admin access
 b.
Remote access
 d.
Supervisory access
 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
virus
f.
packet
b.
key fob
g.
spyware
c.
adware
h.
ActiveX control
d.
passphrase
i.
dialer
e.
malware
 

 39. 

Made up of several words with spaces allowed
 

 40. 

A small program that can be downloaded by a Web site to your computer
 

 41. 

A segment of data sent over a network connection
 

 42. 

A type of smart card
 

 43. 

Any unwanted program that means you harm and is transmitted to your computer without your knowledge
 

 44. 

Produces unwanted pop-up ads
 

 45. 

Software that installs itself on your computer to spy on you, and collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm
 



 
Check Your Work     Start Over