ITE v7.0 Certification Checkpoint Exam #4 Chapters 10-11 Exam Answers

IT Essentials (Version 7.00) – ITE 7.0 Certification Checkpoint Exam Chapters 10 – 11 Answers

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. A user wishes to upgrade a PC to Windows 10 from a PC that is running a 32-bit version of Windows 7. Which two editions of Windows 10 will support this upgrade? (Choose two).

  • 32-bit Windows Home
  • 32-bit version of Windows 10 Pro
  • 64-bit version of Windows 10 Pro
  • 64-bit version of Windows Home
  • 64-bit version of Windows 10 Enterprise

Explanation: Windows Home, Windows XP, and Windows Vista are not supported in the upgrade path to Windows 10. The 64-bit version of Windows 10 Enterprise cannot be downgraded to Windows 10.

2. A user in a corporate environment is reporting that a Windows computer used by part-time employees is running slowly after a Windows update. Which two actions should a technician take to help in this situation? (Choose two.)

  • Run Disk Cleanup.
  • Disable unneeded processes.
  • Repartition the hard drive into smaller partitions.
  • Use the System File Checker tool.
  • Use the mstsc command.

Explanation: The Windows Disk Cleanup tool searches for files that might not be used or needed, such as .tmp files, that would free up drive space. Disabling unneeded processes closes applications and processes that are not currently being used, thus freeing up hard drive space and memory for faster performance.

3. A user of a Windows 10 PC wants to automatically sync the user profile across various Windows 10 devices that the user owns. How can the user accomplish this?

  • Have the user sign into all devices with the Microsoft account of the user.
  • Ensure that the user is in the proper group so that the group policy will be applied.
  • Use gpupdate to propagate the group policy to other devices.
  • Make sure that OneDrive file sync is disabled.

Explanation: A Microsoft account is required to sync data between devices, to access OneDrive, and to work with parental controls of the Child account. It allows access to Microsoft cloud services and syncs desktop settings and profiles across multiple devices. For this to occur, all devices must be signed in with the same Microsoft account.

4. A technician wishes to prepare the computers in the network for disaster recovery. The network consists of a variety of desktops and laptops from different vendors. All the computers are running either a 32-bit version of Windows 10 Pro or a 64-bit version of Windows 10 Pro. How would the technician prepare the recovery media?

  • Prepare one 64-bit recovery disc for all the computers.
  • Prepare one 32-bit recovery disc for all the computers.
  • Prepare individual recovery discs for all the computers.
  • Prepare one image restore for all the computers.

Explanation: All the PCs are from different vendors and thus have dissimilar hardware configurations. Furthermore, all the PCs have a variety of 32-bit Windows 10 and 64-bit Windows 10. Because the PCs have different versions of the OS and dissimilar hardware, you cannot use the same image on all the PCs . In order to use a single image, Sysprep must be used to strip out machine specific information like the SID, and all PCs must have the same hardware configuration and the same version of the Windows operating system.

5. A user is trying to share a printer attached to a Windows 10 PC but is unable to do so. What account should be used to do that?

  • system
  • local service
  • network service
  • administrator

Explanation: The administrator account must be used to share a local printer on a network.

6. A technician changes the length of the local user password to five characters using the Local Security Policy snap-in. The technician tries to create a password of “dave” for the local user account of “dave” but it fails because of the Windows 10 password complexity requirements. Which password would meet the requirements?

  • Dave4
  • Dave$
  • D@ve4
  • dave$

Explanation: Password complexity rules would dictate that the password must not use the username within the password, and must have a combination of six upper/lower case alpha-numeric and non-alpha-numeric characters.

7. A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this?

  • The SID of the original PC is not cleared when creating the image with DISM.
  • The technician used the wrong tool to create the image file.
  • The network drivers were not added to the image file.
  • The Sysprep utility should have been turned off prior to the creation of the image file.

Explanation: The technician must use Sysprep to clean up the local specific configuration, such as the SID, otherwise the cloned systems will not work properly.

8. A technician wishes to view all the processes that are running for the active user on a Windows 10 PC. What option must be selected on the Windows Task Manager in order to do this?

  • Select the Startup tab.
  • Show processes under the User tab.
  • Select the Services tab.
  • Select the Performance tab.

Explanation: The Users tab in the task manager can be used to see all the processes that are running under the current active user.

9. A technician is troubleshooting a Windows 10 PC with a frozen Internet Explorer window. Which command can the technician run, as an administrator at a command prompt, to terminate the Internet Explorer process that has hung?

  • taskkill /fi iexplorer.exe
  • taskkill /pid iexplorer.exe
  • taskkill /f /im iexplorer.exe
  • taskkill /f /im explorer.exe

Explanation: The taskkill command can be used to end processes and services. The switch /im refers to the ImageName to end a task by PID or image name respectively. The switch /f terminates the process without any user notification. This is useful because it will terminate the hung process even if it is displaying a dialogue box.

10. A technician is troubleshooting a Windows 10 PC that is taking a long time to start up. The technician needs to identify which user applications are causing the greatest delay in the startup of the PC. Which tool should the technician use?

  • Performance Monitor
  • System Configuration
  • Resource Monitor
  • Task Manager

Explanation: The Startup tab in the Task Manager can be used to examine which processes are loaded at startup and can be used to identify the application causing the startup delay.

11. A user is trying to install a new application on a Windows 10 PC but the application fails to install fully. The user tries to uninstall the application but fails to uninstall it. What can the user do to remove the application from the PC without affecting existing applications and data?

  • Use the Reset this PC option.
  • Restore from a Windows image file.
  • Roll back the last driver installed.
  • Restore using a System Restore point.

Explanation: System Restore is used to reset the system configuration to an earlier point in time and can be used to reverse changes made when installing an application or device driver.

12. A technician is troubleshooting a computer that has two monitors attached. The technician wants to disable one of them to see if that changes the symptoms exhibited. Which Windows tool would the technician use to disable the monitor?

  • BIOS
  • Device Manager
  • Resource Monitor
  • Task Manager

Explanation: An installed device can be disabled through Device Manager. To disable a device in Device Manager, expand the particular category, such as Monitors, right-click on the monitor, select the Disable Device option.

13. The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices?

  • TACACS+
  • TKIP
  • RADIUS
  • WPA2-PSK

Explanation: RADIUS and TACACS+ both use a separate server that performs authentication on behalf of network devices. However, RADIUS is an open standard and provides greater compatibility.

14. An administrator calls the help desk with the following situation. “I need to make changes to a file. I can open it but I am unable to make changes.” What advice should the help desk agent give to the caller?

  • Check the permissions for this file.
  • Set the file permissions to read and execute.
  • Create a virtual machine with an OS that supports the application.
  • If using Windows, set the idle timeout and screen lock.

15. An administrator calls the help desk with the following situation. “I need to use an application that is not supported by Windows on my PC.” What advice should the help desk agent give to the caller?

  • Create a virtual machine with an OS that supports the application.
  • Set the file permissions to read and execute.
  • Check the permissions for this file.
  • If using Windows, set the idle timeout and screen lock.

16. A manager calls the help desk with the following situation. “I need to use an application that is not supported by Windows on my PC.” What advice should the help desk agent give to the caller?

  • Create a virtual machine with an OS that supports the application.
  • Set the file permissions to read and execute.
  • Check the permissions for this file.
  • If using Windows, set the idle timeout and screen lock.

17. A manager calls the help desk with the following situation. “I need to be able to view and download files but not delete them.” What advice should the help desk agent give to the caller?

  • Set the file permissions to read and execute.
  • Create a virtual machine with an OS that supports the application.
  • Check the permissions for this file.
  • If using Windows, set the idle timeout and screen lock.

18. A manager calls the help desk with the following situation. “Many employees leave their desks for extended periods of time with their PCs still logged in and unlocked.” What advice should the help desk agent give to the caller?

  • If using Windows, set the idle timeout and screen lock.
  • Create a virtual machine with an OS that supports the application.
  • Check the permissions for this file.
  • Set the file permissions to read and execute.

19. A manager calls the help desk with the following situation. “What can be done to improve the printing performance of the departmental laser printer?” What advice should the help desk agent give to the caller?

  • Upgrade the RAM in the printer.
  • Use Task Manager to release system resources from the unresponsive application.
  • Use Device Manager to look for any driver issues or problems.
  • Check the RAID controller, because it may need to be replaced.

20. An IT support person calls the help desk with the following situation. “What can be done to improve the printing performance of the departmental laser printer?” What advice should the help desk agent give to the caller?

  • Upgrade the RAM in the printer.
  • Use Task Manager to release system resources from the unresponsive application.
  • Use Device Manager to look for any driver issues or problems.
  • Check the RAID controller, because it may need to be replaced.

21. An IT support person calls the help desk with the following situation. “I need to add a new printer but I can’t see it on the list of available printers.” What advice should the help desk agent give to the caller?

  • Enter the IP address or browse for it on the network.
  • Use Task Manager to release system resources from the unresponsive application.
  • Use Device Manager to look for any driver issues or problems.
  • Check the RAID controller, because it may need to be replaced.

22. An IT support person calls the help desk with the following situation. “I added a new PC to my LAN. I can ping other devices on my LAN but not any remote devices.” What advice should the help desk agent give to the caller?

  • Check the IP address configuration on the new PC, because the default gateway may be incorrect.
  • Use Task Manager to release system resources from the unresponsive application.
  • Use Device Manager to look for any driver issues or problems.
  • Check the RAID controller, because it may need to be replaced.

23. A technician calls the help desk with the following situation. “I am trying to save a file to my RAID drive but my system cannot find it.” What advice should the help desk agent give to the caller?

  • Check the RAID controller, because it may need to be replaced.
  • Use Task Manager to release system resources from the unresponsive application.
  • Use Device Manager to look for any driver issues or problems.
  • Check the IP address configuration on the new PC, because the default gateway may be incorrect.

24. A user needs to display a list of current processes running on a local or a remote computer. What is the best Windows command to select to do the job?

  • tasklist
  • sfc
  • shutdown
  • DISM
  • path

25. A user sees an unfamiliar IP address in the web server log file and wants to verify the organization that owns the IP address. What is the best Windows command to select to do the job?

  • nslookup
  • DISM
  • sfc
  • tasklist
  • regsrv32

26. A user has deleted all the files from a directory and wants to remove the empty directory. What is the best Windows command to select to do the job?

  • rd
  • DISM
  • sfc
  • tasklist
  • history

27. A user notices errors for some Windows operations and suspects that some system files might be corrupted. The user wants to scan and verify the integrity of all system files and replace corrupted files with correct versions. What is the best Windows command to select to do the job?

  • sfc
  • DISM
  • shutdown
  • tasklist
  • path

28. A user wants to copy a group of files from one Windows directory to another. What is the best Windows command to select to do the job?

  • robocopy
  • md
  • rd
  • del
  • net use

29. A user wants to end one or more processes on a PC based on process ID or image name. What is the best Windows command to select to do the job?

  • taskkill
  • md
  • rd
  • del
  • exit

30. A user needs to manage the drives, disks, partitions, volumes, and virtual drives of a PC. What is the best Windows command to select to do the job?

  • diskpart
  • md
  • rd
  • del
  • net user

31. A user has been told by the systems administrator that the group policy settings for user workstations are modified. The user has been asked to synchronize the workstation with the new settings. What is the best Windows command to select to do the job?

  • gpupdate
  • rd
  • del
  • move
  • cls

32. A user sees an unfamiliar IP address in the web server log file and wants to verify the organization that owns the IP address. What is the best Windows command to select to do the job?

  • nslookup
  • md
  • rd
  • del
  • regsrv32

33. A user is trying to create a new Windows directory for storing files related to a new project. What is the best Windows command to select to do the job?

  • md
  • rd
  • del
  • move
  • help
Subscribe
Notify of
guest

1 Comment
Inline Feedbacks
View all comments
jantje
jantje
2 years ago

thanks

1
0
Would love your thoughts, please comment.x
()
x