IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsWhat term is used to describe a logical drive that can be formatted to store data?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8, Operating Systems BasicsWhich user account should be used only to perform system management and not as the account for regular use?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, IT Essentials 8, Operating Systems BasicsWhat is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?ITExamAnswers asked 3 years ago • Endpoint Security, IT Essentials, Networking EssentialsA technician needs to purchase a storage drive that both connects directly to the PCIe bus and provides reliability. Which type of storage device would best meet these requirements?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is the purpose of running mobile device apps in a sandbox?ITExamAnswers asked 4 years ago • IT Essentials, Operating Systems BasicsWhich navigation icon on the system bar of an Android device is used to return to the previous screen?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsAn employee wants to keep a local backup of iPhone data on a Windows laptop. What type of software does the employee need on the laptop to create this backup?IT Administrator asked 4 years ago • IT Essentials, Operating Systems BasicsWhich two location-specific services can the GPS feature on a mobile device offer? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, Operating Systems BasicsAndroid apps run primarily based on privileges enabled by the user. Sometimes an Android app requires extra privileges to access system components. How do Android apps run to accomplish both situations?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhich statement describes the Touch ID in iOS devices?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhat are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, Operating Systems BasicsWhat are two features of the Android operating system? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhich protocol enables mail to be downloaded from an email server to a client and then deletes the email from the server?ITExamAnswers asked 2 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8, Operating Systems BasicsA traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost?IT Administrator asked 3 years ago • IT Essentials, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsWhich cellular technology supports speeds up to 20 Gbps?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems Basics