Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

IT Essentials Final Exam Online Form B v6.0

Last Updated on May 20, 2021 by Admin

IT Essentials Final Exam Online Form B v6.0 2019

ITE -- Final Exam Form B

Time limit: 0

Quiz-summary

0 of 60 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60

Information

ITE — Final Exam Form B

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 60 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60
  1. Answered
  2. Review
  1. Question 1 of 60
    1. Question
    1 points
    What is the purpose of RAID adapters?
    Correct

    Incorrect

    RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.

    Hint
    RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.
  2. Question 2 of 60
    2. Question
    1 points
    Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?
    Correct

    Incorrect

    The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.

    Hint
    The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.
  3. Question 3 of 60
    3. Question
    1 points
    Which type of input device can identify users based on their voice?
    Correct

    Incorrect

    A biometric identification device is an input device that can identify a user based on a unique physical feature such as a fingerprint or voice. A digitizer is used with a stylus pen to design and create images or blueprints. A scanner is used to digitize an image or document. A KVM switch can connect multiple computers to one keyboard, monitor, and mouse.

    Hint
    A biometric identification device is an input device that can identify a user based on a unique physical feature such as a fingerprint or voice. A digitizer is used with a stylus pen to design and create images or blueprints. A scanner is used to digitize an image or document. A KVM switch can connect multiple computers to one keyboard, monitor, and mouse.
  4. Question 4 of 60
    4. Question
    1 points
    What type of external storage should be used by a technician to back up over 2 TB of music and video data files?
    Correct

    Incorrect

    An external hard drive will provide for the largest amount of data storage for backing up the music and video data files. CompactFlash and Secure Digital card technology does not support as much data storage as an external hard drive. A USB flash drive does not hold as much data storage as an external hard drive.

    Hint
    An external hard drive will provide for the largest amount of data storage for backing up the music and video data files. CompactFlash and Secure Digital card technology does not support as much data storage as an external hard drive. A USB flash drive does not hold as much data storage as an external hard drive.
  5. Question 5 of 60
    5. Question
    1 points
    What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?
    Correct

    Incorrect

    An uninterruptible power supply or UPS contains a battery backup that provides consistent power through brownouts and blackouts until the battery power is emptied. Many UPS systems can safely shut down a computer prior to the loss of battery power.

    Hint
    An uninterruptible power supply or UPS contains a battery backup that provides consistent power through brownouts and blackouts until the battery power is emptied. Many UPS systems can safely shut down a computer prior to the loss of battery power.
  6. Question 6 of 60
    6. Question
    1 points
    Which measure can help control RFI effects on wireless networks?
    Correct

    Incorrect

    A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.

    Hint
    A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.
  7. Question 7 of 60
    7. Question
    1 points
    What is the purpose of a Safety Data Sheet?
    Correct

    Incorrect

    A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.

    Hint
    A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. The SDS explains how to dispose of potentially hazardous materials in the safest manner.
  8. Question 8 of 60
    8. Question
    1 points
    What can be tested with a digital multimeter?
    Correct

    Incorrect

    A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.

    Hint
    A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.
  9. Question 9 of 60
    9. Question
    1 points
    When should a technician avoid wearing an antistatic wrist strap?
    Correct

    Incorrect

    A power supply unit or CRT monitor are both able to retain large amounts of power after being turned off. These types of devices are too dangerous to connect an antistatic wrist strap to. Antistatic wrist straps are commonly worn when upgrading RAM or replacing a hard drive.

    Hint
    A power supply unit or CRT monitor are both able to retain large amounts of power after being turned off. These types of devices are too dangerous to connect an antistatic wrist strap to. Antistatic wrist straps are commonly worn when upgrading RAM or replacing a hard drive.
  10. Question 10 of 60
    10. Question
    1 points
    Which solution should be used to clean a CPU and a heat sink?
    Correct

    Incorrect

    Isopropyl alcohol should be used to clean the surface of a heat sink and CPU. All the other solutions contain impurities which may damage the CPU.

    Hint

    Isopropyl alcohol should be used to clean the surface of a heat sink and CPU. All the other solutions contain impurities which may damage the CPU.

  11. Question 11 of 60
    11. Question
    2 points
    Which two types of expansion slots would be used by a wireless NIC in a computer today? (Choose two.)
    Correct

    Incorrect

    Wireless NICs use PCI and PCIe expansion slots on the motherboard. AGP is for a video card, ISA is an obsolete expansion slot type, and DIMM slots hold RAM modules.

    Hint
    Wireless NICs use PCI and PCIe expansion slots on the motherboard. AGP is for a video card, ISA is an obsolete expansion slot type, and DIMM slots hold RAM modules.
  12. Question 12 of 60
    12. Question
    1 points
    When a PC is being assembled, what component is connected to the motherboard with a SATA cable?
    Correct

    Incorrect

    SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.

    Hint
    SATA cables, or serial ATA cables, are used to carry data from drives to the motherboard.
  13. Question 13 of 60
    13. Question
    1 points
    A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated?
    Correct

    Incorrect

    Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.

    Hint
    Beep codes are a result of POST and these vary between computer vendors based on what BIOS is installed.
  14. Question 14 of 60
    14. Question
    3 points
    Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)
    Correct

    Incorrect

    Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.

    Hint
    Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.
  15. Question 15 of 60
    15. Question
    1 points
    What is the most important reason for a company to ensure that computer preventive maintenance is done?
    Correct

    Incorrect

    Preventive maintenance includes tasks such as cleaning the device, which can prolong the life of the device.

    Hint
    Preventive maintenance includes tasks such as cleaning the device, which can prolong the life of the device.
  16. Question 16 of 60
    16. Question
    1 points
    A technician opens up a PC to work on it, and finds that it is very dusty inside. What should the technician do?
    Correct

    Incorrect

    Dust inside a PC can cause overheating, fan malfunction, and other problems. Liquid should not be used inside a PC to remove dust; compressed air will blow the dust away from where it has accumulated. Always hold the can upright and avoid dripping any of the fluid on the PC. Care should be taken to make sure that the compressed air does not blow materials back inside the case, and that fan blades are stabilized while using the compressed air.

    Hint
    Dust inside a PC can cause overheating, fan malfunction, and other problems. Liquid should not be used inside a PC to remove dust; compressed air will blow the dust away from where it has accumulated. Always hold the can upright and avoid dripping any of the fluid on the PC. Care should be taken to make sure that the compressed air does not blow materials back inside the case, and that fan blades are stabilized while using the compressed air.
  17. Question 17 of 60
    17. Question
    1 points
    Which built-in tool is available on a Mac OS X machine to perform disk backups?
    Correct

    Incorrect

    Time Machine is an automatic backup utility in the Mac OS. The Mac Disk Utility allows an administrator to configure disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system.

    Hint
    Time Machine is an automatic backup utility in the Mac OS. The Mac Disk Utility allows an administrator to configure disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system.
  18. Question 18 of 60
    18. Question
    1 points
    A computer technician performed a number of actions to correct a problem. Some actions did not solve the problem, but eventually a solution was found. What should be documented?
    Correct

    Incorrect

    Everything that was done to solve a problem should be documented, including failed attempts and the eventual solution. A description of the problem would have been previously documented.

    Hint
    Everything that was done to solve a problem should be documented, including failed attempts and the eventual solution. A description of the problem would have been previously documented.
  19. Question 19 of 60
    19. Question
    1 points
    After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?
    Correct

    Incorrect

    There are many reasons that could cause a PC not to start, including hardware failure, MBR corruption, a hardware driver that was not installed properly, etc. One approach for PC troubleshooting is to boot the PC with a Windows 7 installation DVD and use the System Restore utility to restore the system. To access Safe Mode, we need to press the F8 key (not the F12 key). The other two options assume that the PC can start.

    Hint
    There are many reasons that could cause a PC not to start, including hardware failure, MBR corruption, a hardware driver that was not installed properly, etc. One approach for PC troubleshooting is to boot the PC with a Windows 7 installation DVD and use the System Restore utility to restore the system. To access Safe Mode, we need to press the F8 key (not the F12 key). The other two options assume that the PC can start.
  20. Question 20 of 60
    20. Question
    2 points
    What are two advantages of the NTFS file system compared with FAT32? (Choose two.)
    Correct

    Incorrect

    The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent.

    Hint
    The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent.
  21. Question 21 of 60
    21. Question
    1 points
    What type of hard drive contains flash memory for caching frequently used data but stores the most of the data on a magnetic hard disk drive?
    Correct

    Incorrect

    The solid-state hybrid disk is a drive that allows for the storage of data on a magnetic hard disk while utilizing flash memory for caching frequently used data. This is a cheaper alternative to using a solid-state drive.

    Hint
    The solid-state hybrid disk is a drive that allows for the storage of data on a magnetic hard disk while utilizing flash memory for caching frequently used data. This is a cheaper alternative to using a solid-state drive.
  22. Question 22 of 60
    22. Question
    1 points
    What does %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\Temp?
    Correct

    Incorrect

  23. Question 23 of 60
    23. Question
    1 points
    A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?
    Correct

    Incorrect

    Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.

    Hint
    Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.
  24. Question 24 of 60
    24. Question
    1 points
    A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?
    Correct

    Incorrect

    Device Manager can be used to view information about a particular piece of hardware, to view the driver version, to update the driver or roll it back, or to disable/enable a particular device.

    Hint
    Device Manager can be used to view information about a particular piece of hardware, to view the driver version, to update the driver or roll it back, or to disable/enable a particular device.
  25. Question 25 of 60
    25. Question
    1 points
    Which technology provides a solution for PC virtualization?
    Correct

    Incorrect

    Microsoft provides software, Virtual PC, which is a type of hypervisor that creates and manages virtual machines on a host computer.

    Hint
    Microsoft provides software, Virtual PC, which is a type of hypervisor that creates and manages virtual machines on a host computer.
  26. Question 26 of 60
    26. Question
    2 points
    What are two consequences of setting an incorrect boot order in the system BIOS? (Choose two.)
    Correct

    Incorrect

    When the boot order is not set correctly in the BIOS, the BIOS may not be able to locate a valid OS to boot the computer because the BIOS is not configured to look at the correct drive. Error messages, such as “BOOTMGR is missing”, “Invalid Boot Disk”, or “Missing NTLDR” may display.

    Hint
    When the boot order is not set correctly in the BIOS, the BIOS may not be able to locate a valid OS to boot the computer because the BIOS is not configured to look at the correct drive. Error messages, such as “BOOTMGR is missing”, “Invalid Boot Disk”, or “Missing NTLDR” may display.
  27. Question 27 of 60
    27. Question
    2 points
    A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
    Correct

    Incorrect

    Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.

    Hint
    Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.
  28. Question 28 of 60
    28. Question
    1 points
    Which layer of the OSI model is responsible for physical addressing and the procedures used to access media?
    Correct

    Incorrect

    The data link layer is responsible for physical addressing and access to the network media. The application layer is responsible for network services to support applications. The network layer of the OSI model is responsible for routing and logical addressing.​ The transport layer is responsible for reliable transport and flow control of data across the network.​​

    Hint
    The data link layer is responsible for physical addressing and access to the network media. The application layer is responsible for network services to support applications. The network layer of the OSI model is responsible for routing and logical addressing.​ The transport layer is responsible for reliable transport and flow control of data across the network.​​
  29. Question 29 of 60
    29. Question
    1 points
    The current IP configuration of a medium size company with several subnets is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service or protocol would simplify the workstation IP configuration task?
    Correct

    Incorrect

  30. Question 30 of 60
    30. Question
    1 points
    Several messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?
    Correct

    Incorrect

  31. Question 31 of 60
    31. Question
    2 points
    Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)
    Correct

    Incorrect

    The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result.

    Nslookup is a tool for testing and troubleshooting DNS servers.

    Hint

    The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result.

    Nslookup is a tool for testing and troubleshooting DNS servers.

  32. Question 32 of 60
    32. Question
    1 points
    Which wireless security mode supports government grade security and offers both personal and enterprise authentication?
    Correct

    Incorrect

  33. Question 33 of 60
    33. Question
    1 points
    Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
    Correct

    Incorrect

    Platform as a service (PaaS) provides a collaborative environment where multiple developers can create software and host an application through a Cloud provider.

    Hint
    Platform as a service (PaaS) provides a collaborative environment where multiple developers can create software and host an application through a Cloud provider.
  34. Question 34 of 60
    34. Question
    1 points
    A network administrator occasionally asks a technician to make sure that dust does not accumulate on devices in the network equipment closets. What is the purpose of having the technician do this job?
    Correct

    Incorrect

    Dust can clog the cooling vents of network devices. Network equipment is sensitive to heat and may not operate properly or could be damaged by heat build-up.

    Hint
    Dust can clog the cooling vents of network devices. Network equipment is sensitive to heat and may not operate properly or could be damaged by heat build-up.
  35. Question 35 of 60
    35. Question
    1 points
    A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can receive responses from workstations on the same subnet but not from remote workstations. What could be causing the problem?
    Correct

    Incorrect

    The default gateway is the interface IP address of the router that is connected to the local network. The function of the router is to enable communication among different networks. If the default gateway is not set or is incorrect, packets that are destined to other networks will not be able to reach the router, and hence there will be no communication to hosts that are located in other networks.

    Hint
    The default gateway is the interface IP address of the router that is connected to the local network. The function of the router is to enable communication among different networks. If the default gateway is not set or is incorrect, packets that are destined to other networks will not be able to reach the router, and hence there will be no communication to hosts that are located in other networks.
  36. Question 36 of 60
    36. Question
    3 points
    What are three common input devices found on laptops? (Choose three.)
    Correct

    Incorrect

    Touchpads, fingerprint readers, and web cameras are common devices on modern laptops. An external monitor is an output device. While a PS/2 keyboard is an input device, it is not commonly used with laptops. An AC power connector provides a method to recharge the battery, but provides no data input to the laptop.?

    Hint
    Touchpads, fingerprint readers, and web cameras are common devices on modern laptops. An external monitor is an output device. While a PS/2 keyboard is an input device, it is not commonly used with laptops. An AC power connector provides a method to recharge the battery, but provides no data input to the laptop.?
  37. Question 37 of 60
    37. Question
    1 points
    A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem?
    Correct

    Incorrect

    A power-intensive app that is running in the background could consume most of the CPU cycles and thus the device would exhibit very slow performance for other apps. If an app is not compatible with the device, the device operating system would freeze. If the operating system has encountered an error, the device will fail to respond.

    Hint
    A power-intensive app that is running in the background could consume most of the CPU cycles and thus the device would exhibit very slow performance for other apps. If an app is not compatible with the device, the device operating system would freeze. If the operating system has encountered an error, the device will fail to respond.
  38. Question 38 of 60
    38. Question
    1 points
    A computer technician has decided that a problem with a laptop can be solved by repairing a hardware component. What should be done first before attempting to repair a hardware component on a laptop?
    Correct

    Incorrect

    Always consult the service manual before attempting any repairs. You may consult with another technician for advice, but the manual should be consulted first. Backing up the BIOS settings is not necessary. Removal of the keyboard would occur only when necessary during repair.

    Hint
    Always consult the service manual before attempting any repairs. You may consult with another technician for advice, but the manual should be consulted first. Backing up the BIOS settings is not necessary. Removal of the keyboard would occur only when necessary during repair.
  39. Question 39 of 60
    39. Question
    1 points
    Which closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on?
    Correct

    Incorrect

    Open-ended questions help the technician to identify the issue by allowing the customer to elaborate on the issue.The answers of “What software has been installed recently?” and “What were you doing when the problem occurred?” are examples of open-ended questions. Closed-ended questions are used to narrow the focus of the problem. Closed-ended questions commonly have definite answers such as yes, no, a date, a time, or other specifics. Both questions of “Have you changed your password recently?” and “Can the laptop operate using the AC adapter? are closed-ended questions, but the one relevant to the computer not powering on is the one containing the inquiry about the AC adapter.

    Hint
    Open-ended questions help the technician to identify the issue by allowing the customer to elaborate on the issue.The answers of “What software has been installed recently?” and “What were you doing when the problem occurred?” are examples of open-ended questions. Closed-ended questions are used to narrow the focus of the problem. Closed-ended questions commonly have definite answers such as yes, no, a date, a time, or other specifics. Both questions of “Have you changed your password recently?” and “Can the laptop operate using the AC adapter? are closed-ended questions, but the one relevant to the computer not powering on is the one containing the inquiry about the AC adapter.
  40. Question 40 of 60
    40. Question
    2 points
    A technician is troubleshooting the appearance of flashing lines on a laptop screen. What are two possible causes of this distortion? (Choose two.)
    Correct

    Incorrect

    When flashing lines are appearing on a laptop screen, the most common problems are an overheating GPU, faulty GPU, or a display that is not connected properly. When the power to the pixels has been cut off, pixels on the screen will appear dead. If the images on a laptop screen are distorted, a technician should verify that the display settings have not been modified.​

    Hint
    When flashing lines are appearing on a laptop screen, the most common problems are an overheating GPU, faulty GPU, or a display that is not connected properly. When the power to the pixels has been cut off, pixels on the screen will appear dead. If the images on a laptop screen are distorted, a technician should verify that the display settings have not been modified.​
  41. Question 41 of 60
    41. Question
    1 points
    What is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced?
    Correct

    Incorrect

    Because a swelling battery is physically hazardous, it should immediately be replaced with a new one from the manufacturer.

    Hint
    Because a swelling battery is physically hazardous, it should immediately be replaced with a new one from the manufacturer.
  42. Question 42 of 60
    42. Question
    1 points

    Refer to the exhibit. What is true of this mobile device screen?

    IT Essentials Final Exam Answers Form B v6.0 2018 100% 01
    IT Essentials Final Exam Answers Form B v6.0 2018 100% 01

    Correct

    Incorrect

    The Windows Phone interface uses tiles to represent apps. Tiles are rectangular areas of a screen that identify the app and may also contain active content such as text messages, news feeds, and photos.

    Hint
    The Windows Phone interface uses tiles to represent apps. Tiles are rectangular areas of a screen that identify the app and may also contain active content such as text messages, news feeds, and photos.
  43. Question 43 of 60
    43. Question
    2 points
    What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)​
    Correct

    Incorrect

    Rooting and jailbreaking mobile devices allows customization of the OS which enables user and app access to the root directory. In addition, rooting and jailbreaking may cause a device to not properly create or maintain sandboxing features. Both of these can create security risks to the device. The three incorrect options are all considered potential benefits of rooting and jailbreaking mobile devices

    Hint
    Rooting and jailbreaking mobile devices allows customization of the OS which enables user and app access to the root directory. In addition, rooting and jailbreaking may cause a device to not properly create or maintain sandboxing features. Both of these can create security risks to the device. The three incorrect options are all considered potential benefits of rooting and jailbreaking mobile devices
  44. Question 44 of 60
    44. Question
    2 points
    What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)
    Correct

    Incorrect

    To help secure and protect the software and data on mobile devices, it is a best practice to do frequent backups. Another best practice is to ensure that all patches and updates are applied to software and applications. Patches and updates usually fix vulnerabilities as well as introduce new features.

    Hint
    To help secure and protect the software and data on mobile devices, it is a best practice to do frequent backups. Another best practice is to ensure that all patches and updates are applied to software and applications. Patches and updates usually fix vulnerabilities as well as introduce new features.
  45. Question 45 of 60
    45. Question
    1 points
    A tire store needs to use carbon copy paper to print customer invoices so that both the store and the customer have a copy. What is the best printer solution?
    Correct

    Incorrect

    The most common type of impact printer is a dot matrix printer. Dot matrix printers can use continuous feed or carbon-copy paper.

    Hint
    The most common type of impact printer is a dot matrix printer. Dot matrix printers can use continuous feed or carbon-copy paper.
  46. Question 46 of 60
    46. Question
    1 points
    A user on a home network wants to share a printer from a Windows 7 computer. What must the user do in order for other Windows 7 computers in the house to obtain the proper driver?
    Correct

    Incorrect

    Windows automatically downloads the driver to users who are accessing the shared printer and have the same version of Windows. The Additional Drivers button can be used to select other operating systems.

    Hint
    Windows automatically downloads the driver to users who are accessing the shared printer and have the same version of Windows. The Additional Drivers button can be used to select other operating systems.
  47. Question 47 of 60
    47. Question
    3 points
    Which three components are typically found in laser printer maintenance kits? (Choose three.)
    Correct

    Incorrect

    Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.

    Hint
    Laser printer maintenance kits typically contain components that wear and can be installed with minimal disassembly of the printer. Corona wires are internal components that would require a trained technician to replace. Paper trays are components that are not typically replaced during maintenance, but would be replaced any time if damaged.
  48. Question 48 of 60
    48. Question
    1 points
    What characterizes a DDoS attack?
    Correct

    Incorrect

  49. Question 49 of 60
    49. Question
    1 points
    What guideline should be followed when establishing a password security policy?
    Correct

    Incorrect

  50. Question 50 of 60
    50. Question
    3 points
    What are three features provided by the TPM module? (Choose three.)
    Correct

    Incorrect

    The TPM module stores information specific to a host system, such as encryption keys, digital certificates, and passwords. Applications that use encryption can make use of the TPM chip to secure things like user authentication information, software license protection, as well as encrypted files, folders, and disks.

    Hint
    The TPM module stores information specific to a host system, such as encryption keys, digital certificates, and passwords. Applications that use encryption can make use of the TPM chip to secure things like user authentication information, software license protection, as well as encrypted files, folders, and disks.
  51. Question 51 of 60
    51. Question
    1 points
    What is the next troubleshooting step after a theory of probable cause has been established?
    Correct

    Incorrect

    There are six steps in the troubleshooting process.
    1. Identify the problem.
    2. Establish a theory of probable cause.
    3. Test the theory to determine cause.
    4. Establish a plan of action to resolve the problem.
    5. Verify full system functionality.
    6. Document findings.

    Hint

    There are six steps in the troubleshooting process.
    1. Identify the problem.
    2. Establish a theory of probable cause.
    3. Test the theory to determine cause.
    4. Establish a plan of action to resolve the problem.
    5. Verify full system functionality.
    6. Document findings.

  52. Question 52 of 60
    52. Question
    1 points
    Once a technician understands a customer complaint, it is common to ask closed-ended questions. Which question is a close-ended one?
    Correct

    Incorrect

    During the troubleshooting, when the technician listens and understands the computer problems from the customer, some more questions may need to be asked to gather further information. These follow up questions should be targeted and closed-ended questions based on the information that have been provided by the customer. The closed-ended questions should be focused on specific aspects and the customer should be able to answer such questions with a simple “yes” or “no” or with a factual response.

    Hint
    During the troubleshooting, when the technician listens and understands the computer problems from the customer, some more questions may need to be asked to gather further information. These follow up questions should be targeted and closed-ended questions based on the information that have been provided by the customer. The closed-ended questions should be focused on specific aspects and the customer should be able to answer such questions with a simple “yes” or “no” or with a factual response.
  53. Question 53 of 60
    53. Question
    1 points
    What is a characteristic of the open source license of an application software?
    Correct

    Incorrect

    An open source license is a copyright license for software that allows developers to modify and share the source code that runs the software. Open source software could be free to use or require purchase. In either case, users have access to the source code. Open source software could be used as personal software or deployed enterprise wide. User registration is an encouraged optional feature.

    Hint
    An open source license is a copyright license for software that allows developers to modify and share the source code that runs the software. Open source software could be free to use or require purchase. In either case, users have access to the source code. Open source software could be used as personal software or deployed enterprise wide. User registration is an encouraged optional feature.
  54. Question 54 of 60
    54. Question
    2 points
    Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.)
    Correct

    Incorrect

    When a customer contacts a call center, the level one technician should always create a ticket and document the problem that the customer is experiencing. If the level one technician is unable to provide assistance, the technician should escalate the ticket to a level two technician.

    Hint
    When a customer contacts a call center, the level one technician should always create a ticket and document the problem that the customer is experiencing. If the level one technician is unable to provide assistance, the technician should escalate the ticket to a level two technician.
  55. Question 55 of 60
    55. Question
    1 points
    Users in an office complain that the network printer is printing vertical lines and streaks on all pages. What is a likely cause of this problem?
    Correct

    Incorrect

    If the printer drum is damaged, pages may have vertical lines or streaks.

    Hint
    If the printer drum is damaged, pages may have vertical lines or streaks.
  56. Question 56 of 60
    56. Question
    1 points
    A technician is troubleshooting a Windows 7 computer that displays an “Invalid Boot Disk” error message. What would be the most likely action the technician should perform to correct the issue?
    Correct

    Incorrect

    Typical causes of a computer operating system not being found are as follows:

    • The partition is not set as active.
    • The computer is missing startup files necessary for Windows.
    Hint

    Typical causes of a computer operating system not being found are as follows:

    • The partition is not set as active.
    • The computer is missing startup files necessary for Windows.
  57. Question 57 of 60
    57. Question
    2 points
    When a user tries to run a program, a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)
    Correct

    Incorrect

    Two possible solutions to a reported missing or corrupt DLL are to reinstall the program that is associated with the corrupt DLL file or restart the computer in Safe Mode and run sfc/scannow. Windows Startup Repair is used to solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs.

    Hint
    Two possible solutions to a reported missing or corrupt DLL are to reinstall the program that is associated with the corrupt DLL file or restart the computer in Safe Mode and run sfc/scannow. Windows Startup Repair is used to solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs.
  58. Question 58 of 60
    58. Question
    2 points
    Which two actions can be taken when configuring Windows Firewall? (Choose two.)
    Correct

    Incorrect

    When a different software firewall is installed, Windows Firewall must be disabled through the Windows Firewall control panel. When Windows Firewall is enabled, specific ports can be enabled that are needed by specific applications.

    Hint
    When a different software firewall is installed, Windows Firewall must be disabled through the Windows Firewall control panel. When Windows Firewall is enabled, specific ports can be enabled that are needed by specific applications.
  59. Question 59 of 60
    59. Question
    1 points
    A technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?
    Correct

    Incorrect

    It is better to grant permissions at group level than individual permissions. This way any member of a group would have the respective permissions to carry out the permitted tasks and allows for a tighter control of what the group members can do in a given environment. It also makes it easier to administer the environment.

    Hint
    It is better to grant permissions at group level than individual permissions. This way any member of a group would have the respective permissions to carry out the permitted tasks and allows for a tighter control of what the group members can do in a given environment. It also makes it easier to administer the environment.
  60. Question 60 of 60
    60. Question
    4 points

    Match the facility access control devices to the correct descriptions. (Not all options are used.)

    Sort elements
    • identification badges with photographs
    • RFID badges
    • card keys
    • biometric sensors
    • cable locks
    • devices to display image of the user
      • sensors to monitor location and access
        • devices to store user information and level of access
          • devices to identify physical characteristics of the user
            Correct

            Incorrect

          • CCNA1 v7
          • CCNA2 v7
          • CCNA3 v7
          System Test Exam Answers
          Modules 1 – 3 Exam Answers
          Modules 4 – 7 Exam Answers
          Modules 8 – 10 Exam Answers
          Modules 11 – 13 Exam Answers
          Modules 14 – 15 Exam Answers
          Modules 16 – 17 Exam Answers
          Practice Final – ITN Answers
          Course Feedback
          ITN Practice PT Skills Assessment (PTSA)
          Final Exam Answers
          Modules 1 – 4 Exam Answers
          Modules 5 – 6 Exam Answers
          Modules 7 – 9 Exam Answers
          Modules 10 – 13 Exam Answers
          Modules 14 – 16 Exam Answers
          ITN Practice Skills Assessment – PT Answers
          SRWE Practice Skills Assessment – PT Part 1 Answers
          SRWE Practice Skills Assessment – PT Part 2 Answers
          SRWE Hands On Skills Exam Answers
          SRWE Practice Final Exam Answers
          SRWE Final Exam Answers 
          Modules 1 – 2 Exam Answers
          Modules 3 – 5 Exam Answers
          Modules 6 – 8 Exam Answers
          Modules 9 – 12 Exam Answers
          Modules 13 – 14 Exam Answers
          ITN Practice PT Skills Assessment (PTSA) Answers
          SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
          SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
          ENSA Practice PT Skills Assessment (PTSA) Answers
          ENSA Hands On Skills Exam Answers
          Practice Final – ENSA Answers
          ENSA Final Exam Answers
          CCNA Certification Practice Exam Answers

          Copyright © 2023 PressExam.