IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsA customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not detect any problems. What are two possible solutions to the problem with the XP computer? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsWhich two operating systems can be upgraded to Windows XP Home? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsWhat security measure can be used to encrypt the entire volume of a removable drive?ITExamAnswers asked 4 years ago • IT EssentialsIn what situation will a file on a computer using Windows 8.1 keep its original access permissions?ITExamAnswers asked 4 years ago • IT EssentialsA user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?ITExamAnswers asked 4 years ago • IT EssentialsWhich two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsWhich Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?ITExamAnswers asked 4 years ago • IT EssentialsWhich two security procedures are best practices for managing user accounts? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsWhat is the purpose of the user account idle timeout setting?ITExamAnswers asked 4 years ago • IT EssentialsWhat is the minimum level of Windows security required to allow a local user to restore backed up files?ITExamAnswers asked 4 years ago • IT EssentialsWhat is the name given to the programming-code patterns of viruses?ITExamAnswers asked 4 years ago • IT EssentialsWhich two file-level permissions allow a user to delete a file? (Choose two.)ITExamAnswers asked 4 years ago • IT EssentialsThe XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?ITExamAnswers asked 4 years ago • IT EssentialsWhich three questions should be addressed by organizations developing a security policy? (Choose three.)ITExamAnswers asked 4 years ago • IT EssentialsWhich password is the strongest?ITExamAnswers asked 4 years ago • IT Essentials