IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsWhat two roles or tasks are associated with level two technicians? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsWhich two guidelines are appropriate for creating strong passwords? (Choose two.)IT Exam Answers asked 2 years ago • IT EssentialsWhich three items are biometric security devices? (Choose three.)IT Exam Answers asked 2 years ago • IT EssentialsOn which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)IT Exam Answers asked 2 years ago • IT EssentialsWhich two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsMatch the file system term used in Linux to the function.ITExamAnswers asked 4 years ago • CCNA CyberOps, IT EssentialsMatch the scripting language with the script file name extension. (Not all options are used.)ITExamAnswers asked 4 years ago • IT EssentialsMatch the task to the Windows Control Panel utility. (Not all options are used.)IT Exam Answers asked 2 years ago • IT EssentialsA company has replaced five desktop computers in the accounting and finance department with new computers. The plan is to donate the recovered computers in a fully functional state to a not-for-profit community organization. How can the company ensure that sensitive financial data cannot be accessed once the computers are donated?IT Exam Answers asked 2 years ago • IT EssentialsWhich two precautions can help prevent social engineering? (Choose two.)IT Exam Answers asked 2 years ago • IT EssentialsA cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?IT Administrator asked 3 years ago • CCNA, IT EssentialsA user receives an email requesting verification of the password that is used to access bank files. What type of security threat is this?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT EssentialsWhich security threat hides the resources that it uses from antivirus programs?IT Exam Answers asked 2 years ago • IT EssentialsAfter complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?IT Administrator asked 4 years ago • CCNA CyberOps, IT EssentialsWhich type of malware is disguised as a legitimate program?IT Exam Answers asked 2 years ago • IT Essentials