Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Practice Final Exam IT Essentials Online v6.0

Last Updated on May 20, 2021 by Admin

Practice Final Exam IT Essentials Online v6.0 2019

ITE -- 6.0 Practice Final

Time limit: 0

Quiz-summary

0 of 59 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59

Information

ITE — 6.0 Practice Final

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 59 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  1. Answered
  2. Review
  1. Question 1 of 59
    1. Question
    2 points
    What two motherboard components control the system boot operations? (Choose two.)
    Correct

    Incorrect

    System boot services are provided by the motherboard BIOS and UEFI chips.

    Hint
    System boot services are provided by the motherboard BIOS and UEFI chips.
  2. Question 2 of 59
    2. Question
    1 points
    What motherboard chip controls high speed CPU communication to RAM and the video card?
    Correct

    Incorrect

    The Northbridge chip is part of the motherboard chipset and it controls high speed CPU access to motherboard components such as RAM and the video card.

    Hint
    The Northbridge chip is part of the motherboard chipset and it controls high speed CPU access to motherboard components such as RAM and the video card.
  3. Question 3 of 59
    3. Question
    1 points
    What is a possible use for virtual computing?
    Correct

    Incorrect

    Virtual environments are often used to test software and software upgrades, use multiple operating systems on a single hardware platform, and to run older applications that cannot run in modern operating systems.

    Hint
    Virtual environments are often used to test software and software upgrades, use multiple operating systems on a single hardware platform, and to run older applications that cannot run in modern operating systems.
  4. Question 4 of 59
    4. Question
    1 points

    True or False?
    Thin clients require a network connection to remote servers to perform data processing.

    Correct

    Incorrect

    Thin clients are typically low-end computers that require network access to a server for data processing and storage.

    Hint
    Thin clients are typically low-end computers that require network access to a server for data processing and storage.
  5. Question 5 of 59
    5. Question
    1 points
    What is the correct disposal process of old computer batteries?
    Correct

    Incorrect

    Batteries of any kind contain chemicals and metals that are very harmful to humans and the environment. They should be recycled based on local recycling regulations. Batteries should never be burned, placed in the regular garbage, or placed in compost bins.

    Hint
    Batteries of any kind contain chemicals and metals that are very harmful to humans and the environment. They should be recycled based on local recycling regulations. Batteries should never be burned, placed in the regular garbage, or placed in compost bins.
  6. Question 6 of 59
    6. Question
    2 points
    Which two procedures can help protect against ESD when working on a computer system? (Choose two.)
    Correct

    Incorrect

    An antistatic mat is slightly conductive and draws static electricity away from a component and transfers it safely from equipment to a grounding point. An antistatic wrist strap equalizes the electrical charge between you and the equipment.

    Hint

    An antistatic mat is slightly conductive and draws static electricity away from a component and transfers it safely from equipment to a grounding point. An antistatic wrist strap equalizes the electrical charge between you and the equipment.

  7. Question 7 of 59
    7. Question
    1 points
    Which software tool will protect against viruses and spyware on a Windows PC?
    Correct

    Incorrect

    Windows 8 Action Center checks the status of updates and verifies that a software firewall or antivirus program is running. Windows Defender actively protects against viruses and spyware. Scandisk checks the integrity of files and folders on a hard drive. System File Checker scans the critical files of an operating system and replaces those that are corrupt.

    Hint
    Windows 8 Action Center checks the status of updates and verifies that a software firewall or antivirus program is running. Windows Defender actively protects against viruses and spyware. Scandisk checks the integrity of files and folders on a hard drive. System File Checker scans the critical files of an operating system and replaces those that are corrupt.
  8. Question 8 of 59
    8. Question
    1 points
    Which cleaning material should be used to clean component contacts?
    Correct

    Incorrect

    A lint free cloth that is slightly moistened with isopropyl alcohol can be used to clean the contacts on components.

    Hint
    A lint free cloth that is slightly moistened with isopropyl alcohol can be used to clean the contacts on components.
  9. Question 9 of 59
    9. Question
    1 points
    A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?
    Correct

    Incorrect

    Time and date settings are retained in CMOS when the power is turned off. The CMOS battery allows these settings to be retained. Time and date are set in BIOS, but upgrading it will not aid in keeping the settings. Reinstalling the OS would have no effect on the ability of the computer to retrieve these settings.

    Hint
    Time and date settings are retained in CMOS when the power is turned off. The CMOS battery allows these settings to be retained. Time and date are set in BIOS, but upgrading it will not aid in keeping the settings. Reinstalling the OS would have no effect on the ability of the computer to retrieve these settings.
  10. Question 10 of 59
    10. Question
    2 points
    When a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)
    Correct

    Incorrect

    You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.

    Hint

    You must apply thermal compound between the new CPU and the heat sink/fan assembly to avoid overheating the CPU. The thermal paste helps to conduct heat from the CPU to the heat sink.

  11. Question 11 of 59
    11. Question
    1 points
    Which solid-state storage technology allows a computer BIOS to be upgraded by flashing?
    Correct

    Incorrect

    Electrically erasable programmable read-only memory (EEPROM) is non-volatile memory that can store the computer BIOS and can be upgraded by flashing its contents. ROM is a general term for read-only memory, and SDRAM and SODIMM are types of computer volatile memory.

    Hint
    Electrically erasable programmable read-only memory (EEPROM) is non-volatile memory that can store the computer BIOS and can be upgraded by flashing its contents. ROM is a general term for read-only memory, and SDRAM and SODIMM are types of computer volatile memory.
  12. Question 12 of 59
    12. Question
    2 points
    Which two existing components must be compatible with the installation of a new upgraded CPU? (Choose two.)
    Correct

    Incorrect

    The CPU that is installed into a PC must be compatible with the motherboard, chipset, and power supply.

    Hint
    The CPU that is installed into a PC must be compatible with the motherboard, chipset, and power supply.
  13. Question 13 of 59
    13. Question
    3 points
    What are three important considerations when installing a CPU on a motherboard that has just been upgraded? (Choose three.)
    Correct

    Incorrect

    Three important considerations to be taken when installing the motherboard are (1) antistatic precautions, (2) CPU pins are aligned correctly with the socket, and (3) the heat sink/fan assembly is installed correctly. The load lever should easily be locked into place when the CPU is assigned with the socket.

    Hint
    Three important considerations to be taken when installing the motherboard are (1) antistatic precautions, (2) CPU pins are aligned correctly with the socket, and (3) the heat sink/fan assembly is installed correctly. The load lever should easily be locked into place when the CPU is assigned with the socket.
  14. Question 14 of 59
    14. Question
    1 points
    A specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?
    Correct

    Incorrect

    No technical job is finished until the documentation is complete.

    Hint
    No technical job is finished until the documentation is complete.
  15. Question 15 of 59
    15. Question
    1 points
    What should a technician do before beginning any troubleshooting steps on a customer computer?
    Correct

    Incorrect

    Because a technician could be held liable for any data loss as a result of working on a customer computer, a backup should be performed before beginning any troubleshooting.

    Hint
    Because a technician could be held liable for any data loss as a result of working on a customer computer, a backup should be performed before beginning any troubleshooting.
  16. Question 16 of 59
    16. Question
    1 points
    Which document can be signed by both a user and a computer repair shop to release the shop from backing up user data?
    Correct

    Incorrect

    When troubleshooting any computer problem that may cause data loss, a computer repair company can either assume the risk of backing up user data or have the user sign a liability release form, which removes the liability of data loss from the computer repair shop.

    Hint
    When troubleshooting any computer problem that may cause data loss, a computer repair company can either assume the risk of backing up user data or have the user sign a liability release form, which removes the liability of data loss from the computer repair shop.
  17. Question 17 of 59
    17. Question
    1 points
    A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?
    Correct

    Incorrect

    The CMOS battery helps the BIOS to keep the discovered hardware as non-volatile information. The Device Manager will discover new hardware in the operating system. Resetting the BIOS using the CMOS jumper will erase the stored information about the hardware found. The last known good configuration is used to restore the operating system to the last working state.

    Hint
    The CMOS battery helps the BIOS to keep the discovered hardware as non-volatile information. The Device Manager will discover new hardware in the operating system. Resetting the BIOS using the CMOS jumper will erase the stored information about the hardware found. The last known good configuration is used to restore the operating system to the last working state.
  18. Question 18 of 59
    18. Question
    1 points
    Which location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?
    Correct

    Incorrect

    On a hard disk, up to four primary partitions can be created. Alternatively, up to three primary partitions plus an extended partition can be created, and the extended partition can further be divided into multiple logical drives, if desired. Only one primary partition can be made the active partition at any time. It is the active partition that used by the operating system to boot a PC.

    Hint
    On a hard disk, up to four primary partitions can be created. Alternatively, up to three primary partitions plus an extended partition can be created, and the extended partition can further be divided into multiple logical drives, if desired. Only one primary partition can be made the active partition at any time. It is the active partition that used by the operating system to boot a PC.
  19. Question 19 of 59
    19. Question
    1 points
    A technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?
    Correct

    Incorrect

    The primary partition that is marked active must carry the boot files for both the operating systems.In this case the data can be stored in the three logical drives created in the extended partition, leaving one extra primary drive for additional storage.

    Hint
    The primary partition that is marked active must carry the boot files for both the operating systems.In this case the data can be stored in the three logical drives created in the extended partition, leaving one extra primary drive for additional storage.
  20. Question 20 of 59
    20. Question
    1 points
    A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?
    Correct

    Incorrect

    The last known Good Configuration is a copy of the last registry that is saved on successful login. Care should be exercised never to log in when you suspect any system instability because once you log in successfully, the Last Known Good Configuration will be overwritten with the current one.

    Hint
    The last known Good Configuration is a copy of the last registry that is saved on successful login. Care should be exercised never to log in when you suspect any system instability because once you log in successfully, the Last Known Good Configuration will be overwritten with the current one.
  21. Question 21 of 59
    21. Question
    1 points
    A technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make use of the new unallocated space?
    Correct

    Incorrect

    After the partition has been split, the unallocated space has to be partitioned and then formatted and assigned a drive letter for it to be usable. A dynamic disk would have the ability to span the volume over multiple disks.

    Hint
    After the partition has been split, the unallocated space has to be partitioned and then formatted and assigned a drive letter for it to be usable. A dynamic disk would have the ability to span the volume over multiple disks.
  22. Question 22 of 59
    22. Question
    2 points
    A technician is using the six troubleshooting steps in an attempt to repair a PC. After completing the steps needed to test a theory and determine the cause, the technician still has not solved the problem. Which two steps are likely to be taken next by the technician to establish a plan of action and resolve the problem? (Choose two.)
    Correct

    Incorrect

    At this point in the troubleshooting process, the problem has already been logged. When further research is needed, common sources of help include the following:

    • Helpdesk repair logs
    • Technical websites
    • Internet search
    • Online forums
    • Device manuals
    • Computer manuals
    • Newsgroups
    • Other technicians
    • Manufacturer FAQs
    Hint

    At this point in the troubleshooting process, the problem has already been logged. When further research is needed, common sources of help include the following:

    • Helpdesk repair logs
    • Technical websites
    • Internet search
    • Online forums
    • Device manuals
    • Computer manuals
    • Newsgroups
    • Other technicians
    • Manufacturer FAQs
  23. Question 23 of 59
    23. Question
    2 points
    On a computer that will not boot, which two actions are recommended in the troubleshooting process after verifying the obvious issues such as power to the computer and display, non-bootable media, and the BIOS boot order options? (Choose two.)
    Correct

    Incorrect

    Reinstalling the operating system is one of the last things you want to do. Windows has many tools to help before that must be done. Checking the BIOS boot order or media in one of the storage devices should be one of the obvious things that were checked already. You would not want to just reset BIOS options to factory default without further investigation. A user application does not normally cause a computer to fail to boot. If this was the case, using MSCONFIG to troubleshoot would be a better solution than reinstalling all the user applications. Replacing computer components is not appropriate at this stage of the troubleshooting process.

    Hint
    Reinstalling the operating system is one of the last things you want to do. Windows has many tools to help before that must be done. Checking the BIOS boot order or media in one of the storage devices should be one of the obvious things that were checked already. You would not want to just reset BIOS options to factory default without further investigation. A user application does not normally cause a computer to fail to boot. If this was the case, using MSCONFIG to troubleshoot would be a better solution than reinstalling all the user applications. Replacing computer components is not appropriate at this stage of the troubleshooting process.
  24. Question 24 of 59
    24. Question
    1 points
    What are the four layers in the TCP/IP reference model?
    Correct

    Incorrect

  25. Question 25 of 59
    25. Question
    1 points
    What is the distance limitation of a single data run for UTP cabling without adding networking devices?
    Correct

    Incorrect

  26. Question 26 of 59
    26. Question
    1 points
    What is the default subnet mask for a Class A network?
    Correct

    Incorrect

    The subnet mask indicates the network portion of an IP address. Class A uses the first octet for the network and reserves the last three octets for host addresses, making it suitable for use with large networks.

    Hint
    The subnet mask indicates the network portion of an IP address. Class A uses the first octet for the network and reserves the last three octets for host addresses, making it suitable for use with large networks.
  27. Question 27 of 59
    27. Question
    1 points
    Which network protocol is used to automatically assign an IP address to a computer on a network?
    Correct

    Incorrect

    A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain addresses even when a DHCP server is not present.

    Hint
    A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses, simplifying the addressing process. FTP manages file transfers. SMTP sends email. ICMP is a messaging protocol that is used in troubleshooting. APIPA is Automatic Private IP Addressing, a Windows operating feature that allows DHCP clients to obtain addresses even when a DHCP server is not present.
  28. Question 28 of 59
    28. Question
    1 points
    Which open standards-based wireless security mode supports the highest level of security?
    Correct

    Incorrect

  29. Question 29 of 59
    29. Question
    2 points
    What are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)
    Correct

    Incorrect

    In order to access a VPN, a remote-access user must have an Internet connection and VPN client software installed on the computer. The Internet connection determines the latency present. Access to resources at the corporate network, such as to servers, is supplied through VPN access, but is not required in order to set it up. An Internet connection does not have to use the PSTN.

    Hint
    In order to access a VPN, a remote-access user must have an Internet connection and VPN client software installed on the computer. The Internet connection determines the latency present. Access to resources at the corporate network, such as to servers, is supplied through VPN access, but is not required in order to set it up. An Internet connection does not have to use the PSTN.
  30. Question 30 of 59
    30. Question
    1 points
    The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?
    Correct

    Incorrect

    A VPN (virtual private network) provides an encrypted tunnel for data communications across the Internet. WEP and WPA are wireless encryption protocols. MD5 is a data hashing algorithm.

    Hint
    A VPN (virtual private network) provides an encrypted tunnel for data communications across the Internet. WEP and WPA are wireless encryption protocols. MD5 is a data hashing algorithm.
  31. Question 31 of 59
    31. Question
    1 points
    What type of WAN connection would use 3G or 4G?
    Correct

    Incorrect

    3G and 4G assist in the transfer of voice, data, and video on a cellular network. 3G can support speeds up to 2 Mbps. 4G is a newer, faster version of 3G.

    Hint
    3G and 4G assist in the transfer of voice, data, and video on a cellular network. 3G can support speeds up to 2 Mbps. 4G is a newer, faster version of 3G.
  32. Question 32 of 59
    32. Question
    1 points

    True or False?
    An intrusion detection system works inline and has the ability to drop malicious traffic.

    Correct

    Incorrect

    An intrusion detection system (IDS) does not work inline with the traffic, and therefore cannot drop the traffic. An intrusion prevention system (IPS) does sit in the path of the traffic and can drop packets.

    Hint
    An intrusion detection system (IDS) does not work inline with the traffic, and therefore cannot drop the traffic. An intrusion prevention system (IPS) does sit in the path of the traffic and can drop packets.
  33. Question 33 of 59
    33. Question
    1 points
    Where can a technician enable ACPI mode on a laptop?
    Correct

    Incorrect

    The ACPI mode can be enabled in the BIOS.

    Hint
    The ACPI mode can be enabled in the BIOS.
  34. Question 34 of 59
    34. Question
    2 points
    Which two actions must be performed before installing RAM into a laptop? (Choose two.)
    Correct

    Incorrect

    Before doing any repairs or installations inside a laptop, remove the battery and disconnect AC power. The display does not have to be disconnected for a RAM upgrade. The memory module retaining clips are not removed during the installation process. Most computers automatically recognize the installed or increased amount of RAM. If an adjustment in BIOS needs to be done, it is after the installation process. Thermal compound is used to attach a heat sink to a CPU.

    Hint
    Before doing any repairs or installations inside a laptop, remove the battery and disconnect AC power. The display does not have to be disconnected for a RAM upgrade. The memory module retaining clips are not removed during the installation process. Most computers automatically recognize the installed or increased amount of RAM. If an adjustment in BIOS needs to be done, it is after the installation process. Thermal compound is used to attach a heat sink to a CPU.
  35. Question 35 of 59
    35. Question
    2 points
    Which two items would be part of a laptop preventive maintenance kit? (Choose two.)
    Correct

    Incorrect

    Other items include cotton swabs and a mild cleaning solution.

    Hint
    Other items include cotton swabs and a mild cleaning solution.
  36. Question 36 of 59
    36. Question
    1 points
    What is the purpose of running mobile device apps in a sandbox?
    Correct

    Incorrect

    Mobile device apps are run in a sandbox that isolates them from other resources. Bypassing the phone carrier from preventing access to unauthorized apps is jailbreaking or rooting the device.

    Hint
    Mobile device apps are run in a sandbox that isolates them from other resources. Bypassing the phone carrier from preventing access to unauthorized apps is jailbreaking or rooting the device.
  37. Question 37 of 59
    37. Question
    2 points
    In what two situations is a virtual printer used? (Choose two.)
    Correct

    Incorrect

    Virtual printing sends the print job to a file or to a remote destination.

    Hint
    Virtual printing sends the print job to a file or to a remote destination.
  38. Question 38 of 59
    38. Question
    2 points
    A user has installed a new printer. Which two pieces of information about the printer operation are provided by printing a test page from the computer? (Choose two.)
    Correct

    Incorrect

    Color calibration, duplex printing setup, and other options cannot be configured and tested until a test page confirms that the printer software has been installed correctly and the printer is communicating with the computer.
    In the operating system, you need to locate the printer, right-click on it, and select Properties. From the General tab, you can select Print Test Page.
    Use the following options to locate the printer based on the operating system:
    In Windows 7, use the Devices and Printers link.
    In Windows Vista, use the Printers start button option to access Printers and Faxes.
    In Windows XP, use the Printers and Faxes start button option.

    Hint

    Color calibration, duplex printing setup, and other options cannot be configured and tested until a test page confirms that the printer software has been installed correctly and the printer is communicating with the computer.
    In the operating system, you need to locate the printer, right-click on it, and select Properties. From the General tab, you can select Print Test Page.
    Use the following options to locate the printer based on the operating system:
    In Windows 7, use the Devices and Printers link.
    In Windows Vista, use the Printers start button option to access Printers and Faxes.
    In Windows XP, use the Printers and Faxes start button option.

  39. Question 39 of 59
    39. Question
    2 points
    A technician wants to add a new shared network printer to a computer. The printer is not shown in the list of available printers. What two actions can the technician take to add the printer? (Choose two.)
    Correct

    Incorrect

    There are three methods used to locate a printer that is not listed:

    • Browse for the printer on the network.
    • Enter the IP address or hostname of the printer.
    • Enter the path to the printer.
    Hint

    There are three methods used to locate a printer that is not listed:

    • Browse for the printer on the network.
    • Enter the IP address or hostname of the printer.
    • Enter the path to the printer.
  40. Question 40 of 59
    40. Question
    1 points
    A technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?
    Correct

    Incorrect

    Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.

    Hint
    Paper jams are commonly caused when the paper being used is dirty, affected by humidity, or is the wrong type of paper for the printer.
  41. Question 41 of 59
    41. Question
    1 points
    What type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee?
    Correct

    Incorrect

  42. Question 42 of 59
    42. Question
    2 points
    Which two aspects of a computer can be protected by setting the BIOS password? (Choose two.)
    Correct

    Incorrect

  43. Question 43 of 59
    43. Question
    1 points
    After logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?
    Correct

    Incorrect

    Under Windows with NTFS, the permissions for a file or folder can be set for individual users or groups. The basic permission settings are:

    • Full control – Users can see the contents of a file or folder, change and delete existing files and folders, create new files and folders, and run programs in a folder.
    • Modify – Users can change and delete existing files and folders, but cannot create new ones.
    • Read and Execute – Users can see the contents of existing files and folders and can run programs in a folder.
    • Read – Users can see the contents of a folder and open files and folders.
    • Write – Users can create new files and folders and make changes to existing files and folders.
    Hint

    Under Windows with NTFS, the permissions for a file or folder can be set for individual users or groups. The basic permission settings are:

    • Full control – Users can see the contents of a file or folder, change and delete existing files and folders, create new files and folders, and run programs in a folder.
    • Modify – Users can change and delete existing files and folders, but cannot create new ones.
    • Read and Execute – Users can see the contents of existing files and folders and can run programs in a folder.
    • Read – Users can see the contents of a folder and open files and folders.
    • Write – Users can create new files and folders and make changes to existing files and folders.
  44. Question 44 of 59
    44. Question
    1 points
    The PC support person has heard of an instance where departmental secretaries go to lunch and leave their computers unlocked and remain logged into their account. Which Windows feature would the technician use to help in this situation?
    Correct

    Incorrect

    A PC support person should configure the Idle timeout and screen lock features so that if a user leaves the computer for the specified period of time, the computer screen locks and the user must enter a password in order to unlock the computer.

    Hint
    A PC support person should configure the Idle timeout and screen lock features so that if a user leaves the computer for the specified period of time, the computer screen locks and the user must enter a password in order to unlock the computer.
  45. Question 45 of 59
    45. Question
    1 points
    After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
    Correct

    Incorrect

    After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.

    Hint
    After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.
  46. Question 46 of 59
    46. Question
    1 points
    A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
    Correct

    Incorrect

    When dealing with an angry customer, listen and without interrupting let the customer explain the problem. Show sympathy. Apologize for the problem and its inconvenience.

    Hint
    When dealing with an angry customer, listen and without interrupting let the customer explain the problem. Show sympathy. Apologize for the problem and its inconvenience.
  47. Question 47 of 59
    47. Question
    1 points

    Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?

    Practice Final Exam IT Essentials Answers v6.0 2018 100% 01
    Practice Final Exam IT Essentials Answers v6.0 2018 100% 01

    Correct

    Incorrect

    Customer privacy should be maintained. The easiest way to preserve it is removing any occurrence of passwords from the documentation that is being sent to another technician.

    If a client password is required to solve the problem, it should be sent to another technician through a specific document.

    Hint

    Customer privacy should be maintained. The easiest way to preserve it is removing any occurrence of passwords from the documentation that is being sent to another technician.

    If a client password is required to solve the problem, it should be sent to another technician through a specific document.

  48. Question 48 of 59
    48. Question
    1 points
    What determines the level of support that a call center technician will provide to an individual customer?
    Correct

    Incorrect

    A call center technician must provide the level of support that is outlined in the SLA for that individual customer.

    Hint
    A call center technician must provide the level of support that is outlined in the SLA for that individual customer.
  49. Question 49 of 59
    49. Question
    2 points
    After resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician then decides to inspect all other cable connections to prevent other faults from occurring. Which two conditions will help to prevent future cable and connector faults? (Choose two.)
    Correct

    Incorrect

    Visual inspection of internal cables is important in discovering bent pins and wear caused by sharp bends in the cables.

    Hint
    Visual inspection of internal cables is important in discovering bent pins and wear caused by sharp bends in the cables.
  50. Question 50 of 59
    50. Question
    1 points
    A technician has been asked to reinstall the OS on a computer that has a corrupted operating system. The technician inserts the installation media in the optical drive. What would be the most likely action the technician should perform next?
    Correct

    Incorrect

    Typically, once the operating system has been installed, the computer boots from the hard disk all the time. To boot from an optical drive, the boot sequence needs to be modified. Changing the BIOS password, flashing the BIOS, and changing the clock speed have no effect on loading installation files from the optical drive.

    Hint
    Typically, once the operating system has been installed, the computer boots from the hard disk all the time. To boot from an optical drive, the boot sequence needs to be modified. Changing the BIOS password, flashing the BIOS, and changing the clock speed have no effect on loading installation files from the optical drive.
  51. Question 51 of 59
    51. Question
    3 points
    What are three common causes of operating systems problems? (Choose three.)
    Correct

    Incorrect

    Typical causes of operating system problems are as follows:

    • corrupted or missing system files
    • incorrect device driver
    • failed update or service pack installation
    • corrupted registry
    • failing of faulty hard drive
    • incorrect password
    • virus infection
    • spyware
    Hint

    Typical causes of operating system problems are as follows:

    • corrupted or missing system files
    • incorrect device driver
    • failed update or service pack installation
    • corrupted registry
    • failing of faulty hard drive
    • incorrect password
    • virus infection
    • spyware
  52. Question 52 of 59
    52. Question
    3 points
    What are three common solutions for a PC that displays an IP address starting with 169.254.x.x? (Choose three.)
    Correct

    Incorrect

    Typical solutions for a client machine not receiving a DHCP IPv4 address are as follows:

    • Turn on the DHCP server.
    • Use the ipconfig /release then the ipconfig /renew command on the client machine.
    • Reboot the client machine.
    Hint

    Typical solutions for a client machine not receiving a DHCP IPv4 address are as follows:

    • Turn on the DHCP server.
    • Use the ipconfig /release then the ipconfig /renew command on the client machine.
    • Reboot the client machine.
  53. Question 53 of 59
    53. Question
    3 points
    What are three features of GPS on mobile devices? (Choose three.)
    Correct

    Incorrect

    Navigation, specialized search results, and device tracking are features of GPS on mobile devices. Remote wipe may be a feature on some mobile devices, but is not related to GPS. Phone number lookup and gas mileage calculations are not GPS features.

    Hint
    Navigation, specialized search results, and device tracking are features of GPS on mobile devices. Remote wipe may be a feature on some mobile devices, but is not related to GPS. Phone number lookup and gas mileage calculations are not GPS features.
  54. Question 54 of 59
    54. Question
    1 points
    In Windows 7, which path will give access to parental control?
    Correct

    Incorrect

  55. Question 55 of 59
    55. Question
    1 points
    A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem?
    Correct

    Incorrect

    A corrupted driver or failing hardware could cause kernel panic for Linux or Mac OS. The laptop will not be able to boot successfully. Either GRUB or LILO corruption or GRUB or LILO deletion would cause the stop screen to display a “Missing GRUB” or “Missing LILO” message. A resource unavailable to an application will cause the application to stop responding, but not prevent a laptop from starting up.

    Hint
    A corrupted driver or failing hardware could cause kernel panic for Linux or Mac OS. The laptop will not be able to boot successfully. Either GRUB or LILO corruption or GRUB or LILO deletion would cause the stop screen to display a “Missing GRUB” or “Missing LILO” message. A resource unavailable to an application will cause the application to stop responding, but not prevent a laptop from starting up.
  56. Question 56 of 59
    56. Question
    3 points
    A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)
    Correct

    Incorrect

    Quick battery draining is most likely caused by roaming between call towers, a display that is set to a high level of brightness, or apps that are using too many resources. If an app is not compatible with the device, the device OS will freeze. If the operating system has encountered an error, the device will fail to respond.

    Hint
    Quick battery draining is most likely caused by roaming between call towers, a display that is set to a high level of brightness, or apps that are using too many resources. If an app is not compatible with the device, the device OS will freeze. If the operating system has encountered an error, the device will fail to respond.
  57. Question 57 of 59
    57. Question
    6 points

    Drag the statments on the left to the mobile OS that they describe on the right. (Not all targets are used.)

    Sort elements
    • Android
    • Android
    • Android
    • iOS
    • iOS
    • iOS
    • Android
    • iOS
    • The OS has an All Apps navigation icon.
      • Apps are represented by shortcuts on the home screens.
        • The OS uses the launcher to define the format of home screens and the look and feel of the user interface.
          • The device has a physical Home button.
            • Deleting an app from the home screen deletes the app from the device.
              • IT is closed source software.
                Correct

                Incorrect

              • Question 58 of 59
                58. Question
                5 points

                Drag the description to its matching cable type.

                Sort elements
                • HDMI
                • PS/2
                • BNC
                • DB-15
                • eSATA
                • developed for high-definition televisions
                  • 6-pin mini-DIN connector for a keyboard or mouse
                    • connects coaxial cables to devices and is used with digital or analog audio and video
                      • used for analog video and has 15 pins in 3 rows
                        • 7-pin cable that connects to an external hard drive
                          Correct

                          Incorrect

                        • Question 59 of 59
                          59. Question
                          6 points

                          Match the computer problem with the area of the system affected by the problem.

                          Sort elements
                          • Operating System
                          • Operating System
                          • Security
                          • Security
                          • Network
                          • Network
                          • incomplete service pack update
                            • corrupted registry
                              • using default administrator password
                                • incorrect firewall configuration
                                  • incorrect IP address
                                    • incorrect wireless configuration
                                      Correct

                                      Incorrect

                                    • CCNA1 v7
                                    • CCNA2 v7
                                    • CCNA3 v7
                                    System Test Exam Answers
                                    Modules 1 – 3 Exam Answers
                                    Modules 4 – 7 Exam Answers
                                    Modules 8 – 10 Exam Answers
                                    Modules 11 – 13 Exam Answers
                                    Modules 14 – 15 Exam Answers
                                    Modules 16 – 17 Exam Answers
                                    Practice Final – ITN Answers
                                    Course Feedback
                                    ITN Practice PT Skills Assessment (PTSA)
                                    Final Exam Answers
                                    Modules 1 – 4 Exam Answers
                                    Modules 5 – 6 Exam Answers
                                    Modules 7 – 9 Exam Answers
                                    Modules 10 – 13 Exam Answers
                                    Modules 14 – 16 Exam Answers
                                    ITN Practice Skills Assessment – PT Answers
                                    SRWE Practice Skills Assessment – PT Part 1 Answers
                                    SRWE Practice Skills Assessment – PT Part 2 Answers
                                    SRWE Hands On Skills Exam Answers
                                    SRWE Practice Final Exam Answers
                                    SRWE Final Exam Answers 
                                    Modules 1 – 2 Exam Answers
                                    Modules 3 – 5 Exam Answers
                                    Modules 6 – 8 Exam Answers
                                    Modules 9 – 12 Exam Answers
                                    Modules 13 – 14 Exam Answers
                                    ITN Practice PT Skills Assessment (PTSA) Answers
                                    SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                                    SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                                    ENSA Practice PT Skills Assessment (PTSA) Answers
                                    ENSA Hands On Skills Exam Answers
                                    Practice Final – ENSA Answers
                                    ENSA Final Exam Answers
                                    CCNA Certification Practice Exam Answers

                                    Copyright © 2023 PressExam.