It-essentials v7.0 Chapter 1-4 Checkpoint Exam Answers 1. A user is building a custom computer system and is trying to decide on components for the new system. The user does light to medium graphic design, programming, and gaming. Which two components would be appropriate for this type of …
It-essentials v7.0 Chapter 4 Exam Answers 1. A web designer installed the latest video editing software and now notices that when the application loads, it responds slowly. Also the hard disk LED is constantly flashing when the application is in use. What is a solution to solve the …
It-essentials v7.0 Chapter 3 Exam Answers 1. Match the RAID technology terms to the description. (Not all options are used.) 2. Which two considerations would be of the greatest importance when building a workstation that will run multiple virtual machines? (Choose two.) amount of RAM * number of …
It-essentials v7.0 Chapter 2 Exam Answers 1. What is a good safety precaution to take when opening a computer case? Place tape over the case edges that are sharp.* Remove the cover (or door) of the computer case before installing or removing parts. Remove the connections to the …
It-essentials v7.0 Chapter 1 Exam Answers 1. A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibility issues input instructions into a laptop by using a pen. What device should the store owner recommend to …
1. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? DH * A private key A digital certificate A different public key 2. Which type of attack does the use of HMACs protect against? DoS DDoS Brute force Man-in-the-middle * …
1. With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Artichoke * Lettuce Onion Cabbage 2. What is a characteristic of a layered defense-in-depth security approach? Three or more devices are used. Routers are replaced with firewalls. When one device fails, …
1. Which technology is a proprietary SIEM system? SNMP agent Splunk * Stealthwatch NetFlow collector 2. Which term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs? True positive True negative False positive * False negative 3. Which monitoring technology mirrors …
1. What type of attack uses zombies? Trojan horse SEO poisoning Spear phishing DDoS * 2. What is the best description of Trojan horse malware? It is the most easily detected form of malware. It appears as useful software but hides malicious code. * It is malware that …
1. What specialized network device is responsible for enforcing access control policies between networks? Bridge Switch Firewall * IDS 2. What information does an Ethernet switch examine and use to build its address table? Source IP address Destination IP address Source MAC address * Destination MAC address 3. …