Time limit: 0
Quiz-summary
0 of 136 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
Information
IT Essentials 7.0 Practice Final Exam (Chapters 10-14) Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 136 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- Answered
- Review
-
Question 1 of 136
1. Question
1 pointsWhat two motherboard components control the system boot operations? (Choose two.)Correct
Incorrect
-
Question 2 of 136
2. Question
1 pointsWhat motherboard chip controls high speed CPU communication to RAM and the video card?Correct
Incorrect
-
Question 3 of 136
3. Question
1 pointsWhich two procedures can help protect against ESD when working on a computer system? (Choose two.)Correct
Incorrect
-
Question 4 of 136
4. Question
1 pointsWhich software tool will protect against viruses and spyware on a Windows PC?Correct
Incorrect
-
Question 5 of 136
5. Question
1 pointsWhich cleaning material should be used to clean component contacts?Correct
Incorrect
-
Question 6 of 136
6. Question
1 pointsA technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?Correct
Incorrect
-
Question 7 of 136
7. Question
1 pointsWhen a new motherboard is being installed, between which two components must thermal compound be applied? (Choose two.)Correct
Incorrect
-
Question 8 of 136
8. Question
1 pointsA specific computer has an issue that could not be resolved by the help desk technician. The on-site technician finds that Windows updates have been disabled. The technician re-enables the update service, configures the computer for automatic updates, downloads and installs all missing updates, ensures the computer boots successfully, and verifies with the customer that the issue has been resolved. Which step, if any, is next?Correct
Incorrect
-
Question 9 of 136
9. Question
1 pointsWhat should a technician do before beginning any troubleshooting steps on a customer computer?Correct
Incorrect
-
Question 10 of 136
10. Question
1 pointsWhich document can be signed by both a user and a computer repair shop to release the shop from backing up user data?Correct
Incorrect
-
Question 11 of 136
11. Question
1 pointsA technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the BIOS rediscovers all the hardware at every boot. What action would fix this problem?Correct
Incorrect
-
Question 12 of 136
12. Question
1 pointsWhich location on a hard disk is used by the BIOS to search for operating system instructions in order to boot a PC?Correct
Incorrect
Hint
On a hard disk, up to four primary partitions can be created. Alternatively, up to three primary partitions plus an extended partition can be created, and the extended partition can further be divided into multiple logical drives, if desired. Only one primary partition can be made the active partition at any time. It is the active partition that used by the operating system to boot a PC. -
Question 13 of 136
13. Question
1 pointsA technician is asked to set up one hard drive that will support two operating systems and will store data files in three separate drive locations. Which partition settings will support these requirements?Correct
Incorrect
Hint
The primary partition that is marked active must carry the boot files for both the operating systems.In this case the data can be stored in the three logical drives created in the extended partition, leaving one extra primary drive for additional storage. -
Question 14 of 136
14. Question
1 pointsA user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?Correct
Incorrect
-
Question 15 of 136
15. Question
1 pointsA technician uses the shrink volume feature of the disk management utility and splits the partition. What must the technician do next in order to make use of the new space?Correct
Incorrect
-
Question 16 of 136
16. Question
1 pointsA technician is using the six troubleshooting steps in an attempt to repair a PC. After completing the steps needed to test a theory and determine the cause, the technician still has not solved the problem. Which two steps are likely to be taken next by the technician to establish a plan of action and resolve the problem? (Choose two.)Correct
Incorrect
-
Question 17 of 136
17. Question
1 pointsOn a computer that will not boot, which two actions are recommended in the troubleshooting process after verifying the obvious issues such as power to the computer and display, non-bootable media, and the BIOS boot order options? (Choose two.)Correct
Incorrect
-
Question 18 of 136
18. Question
1 pointsWhat is the distance limitation of a single data run for UTP cabling without adding networking devices?Correct
Incorrect
-
Question 19 of 136
19. Question
1 pointsWhat is the default subnet mask for a Class A network?Correct
Incorrect
-
Question 20 of 136
20. Question
1 pointsWhich network protocol is used to automatically assign an IP address to a computer on a network?Correct
Incorrect
-
Question 21 of 136
21. Question
1 pointsWhich open standards-based wireless security mode supports the highest level of security?Correct
Incorrect
-
Question 22 of 136
22. Question
1 pointsWhat are two network requirements necessary to establish a VPN connection between a remote computer and a private company LAN? (Choose two.)Correct
Incorrect
-
Question 23 of 136
23. Question
1 pointsThe corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN?Correct
Incorrect
-
Question 24 of 136
24. Question
1 pointsWhat type of WAN connection would use 3G or 4G?Correct
Incorrect
-
Question 25 of 136
25. Question
1 pointsTrue or False? An intrusion detection system works inline and has the ability to drop malicious traffic.Correct
Incorrect
-
Question 26 of 136
26. Question
1 pointsWhere can a technician enable ACPI mode on a laptop?Correct
Incorrect
-
Question 27 of 136
27. Question
1 pointsWhich two actions must be performed before installing RAM into a laptop? (Choose two.)Correct
Incorrect
-
Question 28 of 136
28. Question
1 pointsWhich two items would be part of a laptop preventive maintenance kit? (Choose two.)Correct
Incorrect
-
Question 29 of 136
29. Question
1 pointsWhat is the purpose of running mobile device apps in a sandbox?Correct
Incorrect
-
Question 30 of 136
30. Question
1 pointsA user has installed a new printer. Which two pieces of information about the printer operation are provided by printing a test page from the computer? (Choose two.)Correct
Incorrect
-
Question 31 of 136
31. Question
1 pointsA technician wants to add a new shared network printer to a computer. The printer is not shown in the list of available printers. What two actions can the technician take to add the printer? (Choose two.)Correct
Incorrect
-
Question 32 of 136
32. Question
1 pointsA technician is installing a new printer in a cool, damp environment. After the printer cabling is done, and the software and print driver are installed, the printer test page jams. What is the most likely cause of the print failure?Correct
Incorrect
-
Question 33 of 136
33. Question
1 pointsWhat type of security attack is being launched when a hacker calls a company to obtain computer login information and pretends to be an employee?Correct
Incorrect
-
Question 34 of 136
34. Question
1 pointsWhich two aspects of a computer can be protected by setting the BIOS password? (Choose two.)Correct
Incorrect
-
Question 35 of 136
35. Question
1 pointsAfter logging into a computer, a user can view files but is unable to download the files. What action can the administrator take to allow the user to download the files while preventing deletion of the files?Correct
Incorrect
-
Question 36 of 136
36. Question
1 pointsThe PC support person has heard of an instance where departmental secretaries go to lunch and leave their computers unlocked and remain logged into their account. Which Windows feature would the technician use to help in this situation?Correct
Incorrect
-
Question 37 of 136
37. Question
1 pointsA customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?Correct
Incorrect
-
Question 38 of 136
38. Question
1 pointsRefer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?Correct
Incorrect
-
Question 39 of 136
39. Question
1 pointsWhat determines the level of support that a call center technician will provide to an individual customer?Correct
Incorrect
-
Question 40 of 136
40. Question
1 pointsAfter resolving an intermittent CD-ROM drive fault by firmly reconnecting a loose cable, the technician then decides to inspect all other cable connections to prevent other faults from occurring. Which two conditions will help to prevent future cable and connector faults? (Choose two.)Correct
Incorrect
-
Question 41 of 136
41. Question
1 pointsA technician has been asked to reinstall the OS on a computer that has a corrupted operating system. The technician inserts the installation media in the optical drive. What would be the most likely action the technician should perform next?Correct
Incorrect
-
Question 42 of 136
42. Question
1 pointsWhat are three common causes of operating systems problems? (Choose three.)Correct
Incorrect
Hint
Typical causes of operating system problems are as follows:- corrupted or missing system files
- incorrect device driver
- failed update or service pack installation
- corrupted registry
- failing of faulty hard drive
- incorrect password
- virus infection
- spyware
-
Question 43 of 136
43. Question
1 pointsWhich built-in BIOS diagnostic test would a technician run to check a computer boot problem?Correct
Incorrect
-
Question 44 of 136
44. Question
1 pointsWhat are three features of GPS on mobile devices? (Choose three.)Correct
Incorrect
-
Question 45 of 136
45. Question
1 pointsIn Windows 7, which path will give access to parental control?Correct
Incorrect
-
Question 46 of 136
46. Question
1 pointsA user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem?Correct
Incorrect
-
Question 47 of 136
47. Question
1 pointsDrag the statements on the left to the mobile OS that they describe on the right. (Not all targets are used.)Correct
Incorrect
-
Question 48 of 136
48. Question
1 pointsDrag the description to its matching cable type.Correct
Incorrect
-
Question 49 of 136
49. Question
1 pointsMatch the computer problem with the area of the system affected by the problem.Correct
Incorrect
-
Question 50 of 136
50. Question
1 pointsDrag the statments on the left to the mobile OS that they describe on the right. (Not all targets are used.)Correct
Incorrect
-
Question 51 of 136
51. Question
1 pointsRefer to the exhibit. A user issues the command ls -l in a Linux system. Match the description to the result of the command output. (Not all options are used.)Correct
Incorrect
-
Question 52 of 136
52. Question
1 pointsMatch remote access authentication methods to the description. (Not all options are used.)Correct
Incorrect
-
Question 53 of 136
53. Question
1 pointsMatch the scripting language with the script file name extension. (Not all options are used.)Correct
Incorrect
-
Question 54 of 136
54. Question
1 pointsWhat are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)Correct
Incorrect
Hint
Rooting and jailbreaking mobile devices allows customization of the OS which enables user and app access to the root directory. In addition, rooting and jailbreaking may cause a device to not properly create or maintain sandboxing features. Both of these can create security risks to the device. The three incorrect options are all considered potential benefits of rooting and jailbreaking mobile devices -
Question 55 of 136
55. Question
1 pointsWhat two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)Correct
Incorrect
Hint
To help secure and protect the software and data on mobile devices, it is a best practice to do frequent backups. Another best practice is to ensure that all patches and updates are applied to software and applications. Patches and updates usually fix vulnerabilities as well as introduce new features. -
Question 56 of 136
56. Question
1 pointsA user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)Correct
Incorrect
Hint
Quick battery draining is most likely caused by roaming between call towers, a display that is set to a high level of brightness, or apps that are using too many resources. If an app is not compatible with the device, the device OS will freeze. If the operating system has encountered an error, the device will fail to respond. -
Question 57 of 136
57. Question
1 pointsWhich two operations can help prevent a mobile device from being tracked without permission? (Choose two.)Correct
Incorrect
Hint
Device tracking relies on GPS function. Turning off the GPS when not in use and disabling or removing apps that use the GPS function may prevent a device from being tracked. -
Question 58 of 136
58. Question
1 pointsWhich component uses the greatest amount of power on most mobile devices?Correct
Incorrect
Hint
The LCD screen consumes the most power on most mobile devices. The CPU, camera, and media player use power, but less extensively than the LCD screen does. -
Question 59 of 136
59. Question
1 pointsWhat tool is included in the Mac OS X for backing up disks to image files and recovering disk images?Correct
Incorrect
Hint
The Mac Disk Utility allows an administrator to configure automatic disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Disk Error-Checking is a Windows tool for checking the integrity of files and folders. The System Restore tool is a Windows tool for allowing an administrator to roll back the operating system to a previous configuration. -
Question 60 of 136
60. Question
1 pointsWhen a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)Correct
Incorrect
Hint
Two possible solutions to a reported missing or corrupt are to register the DLL file using the regsvr32 command or restart the computer in Safe Mode and run sfc/scannow. Windows Startup Repair is used solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs. -
Question 61 of 136
61. Question
1 pointsA computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)Correct
Incorrect
Hint
If a computer locks without an error message, hardware or software could be the issue. Problems could include the following:- The CPU or FSB are set incorrectly on the motherboard or in the BIOS.
- The computer is overheating.
- An update has corrupted the operating system.
- The RAM is failing or a RAM module is failing.
- The hard drive is failing.
- The power supply is failing.
- The computer has a virus.
-
Question 62 of 136
62. Question
1 pointsA user has submitted a trouble ticket stating that their computer is showing the error “BOOTMGR is missing”. The IT technician replicates the error and finds that it occurs after the POST of this Windows 10 machine. What are two possible solutions for this problem? (Choose two.)Correct
Incorrect
Hint
The message “BOOTMGR is missing” could be a symptom of a missing or damaged BOOTMGR, a Boot Configuration Data file missing or damaged, a boot order not set correctly in BIOS, a corrupted MBR, or a failing hard drive. Because the OS cannot be located to start, the fix cannot be done using a regular command. -
Question 63 of 136
63. Question
1 pointsA user calls the help desk and reports that invalid system disk or invalid boot disk error messages display on the workstation when it is powered on. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician suspects that the MBR is corrupted. Which process can the technician use to check and repair the MBR?Correct
Incorrect
Hint
The bootrec command can be used to repair and troubleshoot MBR issues. The chkdsk command can be used to check the integrity of files and folders by scanning the hard disk surface for physical errors. The sfc command can be used to verify and replace important Windows system files. -
Question 64 of 136
64. Question
1 pointsA technician is visiting a website and is using Google Chrome on a Windows 10 PC. The technician is trying to view the password for the website. The technician uses the Credential Manager to view the password but cannot see it. What could be the cause?Correct
Incorrect
Hint
Windows Credential Manager will only store passwords for websites that are visited using Explorer or Edge. Credentials created with other browsers must be managed from within the browser software. -
Question 65 of 136
65. Question
1 pointsA technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the internet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue?Correct
Incorrect
Hint
By setting up an alternate IPv4 address on the laptop, the user will be able to move between a network with DHCP and another network that requires a static IPv4 address. -
Question 66 of 136
66. Question
1 pointsWhich two statements are correct about level one and level two technicians? (Choose two.)Correct
Incorrect
Hint
Call centers sometimes have different names for level one and level two technicians. Level one technicians might be known as level one analysts, dispatchers, or incident screeners. Level two technicians might be known as product specialists or technical-support personnel. The level two technician is usually more knowledgeable than the level one technician is about technology, or has been working for the company for a longer period of time. When a problem cannot be resolved within a predetermined amount of time, the level one technician prepares an escalated work order. -
Question 67 of 136
67. Question
1 pointsWhat two roles or tasks are associated with level two technicians? (Choose two.)Correct
Incorrect
Hint
Level two technicians are primarily tasked with receiving and working on escalated work orders. Their tasks involve using remote access software to connect to the computer of a customer to perform maintenance and fixes. -
Question 68 of 136
68. Question
1 pointsWhen performing computer forensics what is required to prove a chain of custody?Correct
Incorrect
Hint
A chain of custody requires accurate and thorough documentation to track the collected evidence. -
Question 69 of 136
69. Question
1 pointsA technician has copied several commercial movies to a company server to be shared with colleagues. How would this behavior be classified?Correct
Incorrect
Hint
It is not permissible to install, copy, or share digital content (including software, music, text, images, and video) in violation of copyright and software agreements or applicable laws. This is legally and ethically wrong. -
Question 70 of 136
70. Question
1 pointsA call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?Correct
Incorrect
Hint
When dealing with customers, a technician must show professionalism in all aspects. When explaining the solution to solve the problem, a technician should provide a simple step-by-step process of instructions. The technician should speak in plain terms and avoid the industry jargon. -
Question 71 of 136
71. Question
1 pointsA call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?Correct
Incorrect
Hint
When providing a solution to solve a problem, a technician should prepare to explain alternative ways that the technician can help the customer, if necessary, such as emailing information, faxing step-by-step instructions, or using remote control software to solve the problem. -
Question 72 of 136
72. Question
1 pointsAn IT technician is troubleshooting a file error on an employee laptop. While working in the system files directory, the technician notices that the User Account Control (UAC) box appears requesting a password. What should the IT technician do next?Correct
Incorrect
Hint
The employee may have dropped off the laptop expecting repairs using the local user account. It is important to get permission from the customer before accessing other computer accounts, including the administrator account. If private information, such as usernames and passwords are being collected, it is important to keep them as confidential as possible. -
Question 73 of 136
73. Question
1 pointsWhich two Windows operating systems cannot be upgraded to Windows 8.1 64-bit? (Choose two.)Correct
Incorrect
Hint
Neither Windows XP nor Windows 7 32-bit can be upgraded to Windows 8.1 64-bit. A 32-bit operating system cannot be upgraded to a 64-bit operating system. A Windows XP system cannot be directly updated to Windows 8.1. In either of these cases, a clean installation must be performed. -
Question 74 of 136
74. Question
1 pointsA user wishes to upgrade a PC to Windows 10 from a PC that is running a 32-bit version of Windows 7. Which two editions of Windows 10 will support this upgrade? (Choose two).Correct
Incorrect
Hint
Windows Home, Windows XP, and Windows Vista are not supported in the upgrade path to Windows 10. The 64-bit version of Windows 10 Enterprise cannot be downgraded to Windows 10. -
Question 75 of 136
75. Question
1 pointsAfter a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?Correct
Incorrect
Hint
There are many reasons that could cause a PC not to start, including hardware failure, MBR corruption, a hardware driver that was not installed properly, etc. One approach for PC troubleshooting is to boot the PC with a Windows 7 installation DVD and use the System Restore utility to restore the system. To access Safe Mode, we need to press the F8 key (not the F12 key). The other two options assume that the PC can start. -
Question 76 of 136
76. Question
1 pointsWhich statement is correct about installing a 32-bit operating system on a x64 architecture?Correct
Incorrect
Hint
A 32-bit operating system can run on a x64 architecture, but it will not be able to use more than 4 GB of the system memory. A 64-bit OS includes features that provide additional security. -
Question 77 of 136
77. Question
1 pointsA technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive?Correct
Incorrect
Hint
Master boot record (MBR) is the boot sector standard that supports a maximum primary partition of 2TB. MBR allows four primary partitions per drive. The globally unique identifier (GUID) partition table standard (GPT) can support enormous partitions with a theoretical maximum of 9.4ZB (9.4 x 10 to the 24th bytes). GPT supports a maximum of 128 primary partitions per drive. -
Question 78 of 136
78. Question
1 pointsA network administrator is tasked with deployment of Windows 10 Pro for a large number of new PCs in the company. The administrator uses a PC to perform a base installation together with standard company applications. The PC is tested to be fully functional. Which tool must the administrator use to remove all computer and user specific information before building a deployable image from the disk?Correct
Incorrect
Hint
When a base installation of an OS together together with applications is being performed, some computer and user specific information is included. This includes such items as SID, user accounts, and time zone. Before an image for deployment is finally created, the specific information must be removed. The Microsoft System Preparation (sysprep.exe) tool can be used for the task. -
Question 79 of 136
79. Question
1 pointsA network analyst is booting a PC that has Windows 8 installed. The boot process is currently working on the following step: The BIOS boots the computer using the first drive that contains a valid boot sector. What is the next step that will happen in the boot process?Correct
Incorrect
-
Question 80 of 136
80. Question
1 pointsA help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are two purposes of botnets? (Choose two.)Correct
Incorrect
Hint
Botnets can be used to perform DDoS attacks, obtain data, or transmit malware to other devices on the network. -
Question 81 of 136
81. Question
1 pointsA company has a security policy that permits the reuse of wiped drives in other computers. The wiped drives are often used for additional storage or as a replacement drive. What are two methods that could be used to wipe data? (Choose two.)Correct
Incorrect
Hint
Data wiping software overwrites data multiple times. A degaussing wand or degaussing device uses magnetism to destroy data on a hard drive. -
Question 82 of 136
82. Question
1 pointsA technician is configuring a SOHO computer. The technician wants to create a local account that requires a password and wants a screen saver to appear if the person using the computer steps away for a period of time. Which two Windows Control Panels will the technician use to accomplish these tasks? (Choose two.)Correct
Incorrect
Hint
The User Accounts Windows Control Panel is used to create and manage local user accounts and configure passwords for each account. The Personalization Windows Control Panel is used to access the Screen Saver Settings window where the computer can be configured to display the logon screen if there is no use for a preconfigured amount of minutes. -
Question 83 of 136
83. Question
1 pointsAfter confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?Correct
Incorrect
Hint
After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process. -
Question 84 of 136
84. Question
1 pointsWhat is the next troubleshooting step after a theory of probable cause has been established?Correct
Incorrect
Hint
There are six steps in the troubleshooting process. 1. Identify the problem. 2. Establish a theory of probable cause. 3. Test the theory to determine cause. 4. Establish a plan of action to resolve the problem. 5. Verify full system functionality. 6. Document findings. -
Question 85 of 136
85. Question
1 pointsA technician has been notified of a problem on the network. After investigation, the technician determines that a specific internal company computer is launching an attack on other company computers. Which type of malware is being used?Correct
Incorrect
Hint
A proxy Trojan is a type of malware that uses one computer as a source device to launch attacks to other devices. Malware evolves quickly so it is important to obtain the most recent antimalware updates as a protective measure. -
Question 86 of 136
86. Question
1 pointsWhat is a recommended best practice for a technician who must perform tasks that require administrative access?Correct
Incorrect
Hint
In addition to nontechnical users having a standard user account, it is also a best practice to make technical staff use a limited account. Then when an administrative task is needed, the technician uses the Run as Administrator option and provides the appropriate credentials of an account that has elevated credentials for the one task. -
Question 87 of 136
87. Question
1 pointsA technician is troubleshooting a Windows 10 PC that has a .dll file for an application that has not been registered. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 88 of 136
88. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against boot sector viruses. Which security technique should the technician recommend?Correct
Incorrect
-
Question 89 of 136
89. Question
1 pointsTrue or False? When a user is working on a system that uses a network file system, there is no difference between accessing a file stored locally or on another computer on the network.Correct
Incorrect
-
Question 90 of 136
90. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “To synchronize a mobile device to a PC, iTunes must be installed on the PC.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 91 of 136
91. Question
1 pointsA client installed a new driver for a device three weeks ago; however, this driver is causing the system to freeze occasionally and the client wishes to revert back to the old driver. What option can be used to address this issue without loss of data or applications?Correct
Incorrect
-
Question 92 of 136
92. Question
1 pointsWhen a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?Correct
Incorrect
Hint
Users should have access to information on a need to know basis. When a user moves from job role to job role, the same concept applies. -
Question 93 of 136
93. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “To help prevent malicious programs from infecting the device, mobile device apps are run in a sandbox that isolates them from other resources.” To which OS does this relate?Correct
Incorrect
-
Question 94 of 136
94. Question
1 pointsTrue or False? Hard drives partitioned with a master boot record (MBR) cannot have an extended partition or logical drives.Correct
Incorrect
-
Question 95 of 136
95. Question
1 pointsA technician is troubleshooting a Windows 10 computer that displays an “Invalid Boot Disk” error message. What should be the first action the technician should take to troubleshoot the issue?Correct
Incorrect
Hint
The first thing the technician should do when addressing an “Invalid Boot Disk” error message is to ensure that the boot order in the UEFI/BIOS settings is set to drive that has the operating system installed as the first boot device. -
Question 96 of 136
96. Question
1 pointsA technician is troubleshooting a Windows 10 PC. The PC has an application that displays an error message about a missing DLL. The technician has located the DLL file on the PC and wants to register it. Which command line tool can the technician use for the task?Correct
Incorrect
Hint
The administrative command line tool regsvr32 in Windows 10 can be used to register and unregister .dll files and ActiveX controls in the Registry. -
Question 97 of 136
97. Question
1 pointsA technician wants to split a large partition on a drive in a Windows 10 PC without loss of any data. How can this be accomplished?Correct
Incorrect
Hint
Use Disk Manage r to shrink the size of the existing partition. This creates unallocated space that can be used to create a new partition without loss of data on the existing partition. -
Question 98 of 136
98. Question
1 pointsA network technician is troubleshooting a DHCP issue for a user and has requested assistance from a senior technician. The senior technician provides the graphic to illustrate configuration options. What is the purpose of the Alternate Configuration feature?Correct
Incorrect
Hint
The Windows Internet Protocol Version 4 (TCP/IPv4) Properties window includes an Alternate Configuration tab which allows an administrator to configure an alternative IP address for the PC to use if it is unable to contact a DHCP server. -
Question 99 of 136
99. Question
1 pointsWhich two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)Correct
Incorrect
Hint
Persistent data is data stored on an internal or external hard drive, or an optical drive. Data is preserved when the computer is turned off. -
Question 100 of 136
100. Question
1 pointsChad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.)Correct
Incorrect
Hint
When a customer contacts a call center, the level one technician should always create a ticket and document the problem that the customer is experiencing. If the level one technician is unable to provide assistance, the technician should escalate the ticket to a level two technician. -
Question 101 of 136
101. Question
1 pointsWhat is the best definition of personally identifiable information (PII)?Correct
Incorrect
Hint
Personally identifiable information (PII) is data that could be used to distinguish the identity of an individual, such as mother’s maiden name, social security number, and/or date of birth. -
Question 102 of 136
102. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “Remote backups are a cloud-enabled service for mobile devices.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 103 of 136
103. Question
1 pointsA Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications?Correct
Incorrect
-
Question 104 of 136
104. Question
1 pointsA user wants to display and change information about computer users. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 105 of 136
105. Question
1 pointsA user wants to display the contents of a text file in a command interpreter. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 106 of 136
106. Question
1 pointsTrue or False? Modern operating systems boot the computer, manage the file system, and support only one user, task, or CPU.Correct
Incorrect
-
Question 107 of 136
107. Question
1 pointsA user tries to install an application on a Windows 10 Pro PC but it fails. The user tries to uninstall the application but it fails to uninstall. What option can be used to address this issue without loss of data or applications?Correct
Incorrect
-
Question 108 of 136
108. Question
1 pointsTrue or False? Multitasking describes a computer operating system that is capable of running multiple applications at the same time.Correct
Incorrect
-
Question 109 of 136
109. Question
1 pointsA technician is working on a Windows 10 PC that keeps freezing occasionally after a driver update. System restore has been turned off. What option can be used to address this issue without loss of data or applications?Correct
Incorrect
-
Question 110 of 136
110. Question
1 pointsA technician is troubleshooting a Windows 10 PC that will not do any windows updates automatically or manually. What option can be used to address this issue without loss of data or applications?Correct
Incorrect
-
Question 111 of 136
111. Question
1 pointsA user wants to check a file system for errors, including errors with physical media. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 112 of 136
112. Question
1 pointsA technician wants to create customized system image files that will be installed on computers in the network. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 113 of 136
113. Question
1 pointsA user wants to terminate a running process on a computer. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 114 of 136
114. Question
1 pointsA technician wants to copy files and entire directory trees from one volume to another volume on a Windows 10 PC. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 115 of 136
115. Question
1 pointsA technician is troubleshooting a Windows 10 PC that has corrupted system files. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 116 of 136
116. Question
1 pointsA user wishes to see a summary of software information and system components, including hardware components, on a Windows 10 PC. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 117 of 136
117. Question
1 pointsA technician has just configured the security policy on a Windows 10 PC and wants to ensure the policy is implemented immediately. Which administrative command-line tool or command can be used to address this?Correct
Incorrect
-
Question 118 of 136
118. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?Correct
Incorrect
-
Question 119 of 136
119. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?Correct
Incorrect
-
Question 120 of 136
120. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?Correct
Incorrect
-
Question 121 of 136
121. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?Correct
Incorrect
-
Question 122 of 136
122. Question
1 pointsA technician has been asked by a manager to recommend a security solution for protecting a computer against firmware viruses. Which security technique should the technician recommend?Correct
Incorrect
-
Question 123 of 136
123. Question
1 pointsTrue or False? Smartphones require an operating system before they can be operated.Correct
Incorrect
-
Question 124 of 136
124. Question
1 pointsTrue or False? When a hardware device is installed, the operating system needs to use a device driver to access and use that hardware.Correct
Incorrect
-
Question 125 of 136
125. Question
1 pointsTrue or False? Windows 10 64-bit version can be installed on as little as 1GB of hard drive space.Correct
Incorrect
-
Question 126 of 136
126. Question
1 pointsTrue or False? DirectX is a collection of APIs related to multimedia tasks for Microsoft Windows.Correct
Incorrect
-
Question 127 of 136
127. Question
1 pointsTrue or False? The registry is a database that only contains information about the device drivers on a computer.Correct
Incorrect
-
Question 128 of 136
128. Question
1 pointsTrue or False? Multithreading describes an operating system that can support two or more CPUs.Correct
Incorrect
-
Question 129 of 136
129. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “The start voice control function can be performed with the home button.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 130 of 136
130. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “The mobile devices have a feature called Spotlight that is a search tool that provides information from many sources.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 131 of 136
131. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “This OS can be used by programmers to operate devices like laptops, smart TVs, and e-book readers.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 132 of 136
132. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “The icon on the Home screen is a shortcut to the app.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 133 of 136
133. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “To help prevent malicious programs from infecting the device, mobile device apps are run in a sandbox that isolates them from other resources.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 134 of 136
134. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “WIFI hotspots are a location data source that can be used by locator apps to determine the position of a mobile device.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 135 of 136
135. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “GPS signals are used to enable geocaching, geotagging and device tracking on these mobile devices.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect
-
Question 136 of 136
136. Question
1 pointsAn instructor is discussing facts about different mobile device operating software. The instructor states: “The user interface can be extensively customized using rooting or jailbreaking into a mobile device.” To which OS does this relate: iOS, Android, or both?Correct
Incorrect