IT Questions Bank What are two features of the Android operating system? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhich protocol enables mail to be downloaded from an email server to a client and then deletes the email from the server?ITExamAnswers asked 2 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8, Operating Systems BasicsA traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost?IT Administrator asked 3 years ago • IT Essentials, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsWhat are three reasons that users of iOS devices might use iCloud? (Choose three.)ITExamAnswers asked 12 months ago • Operating Systems BasicsWhich cellular technology supports speeds up to 20 Gbps?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsA user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)IT Administrator asked 4 years ago • IT Essentials, Operating Systems BasicsA salesperson wants to embed geographical location metadata onto various media such as photographs and videos. What technology, product, or setting allows this task to be accomplished?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhy would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat are two advantages of the NTFS file system compared with FAT32? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8, Operating Systems BasicsA technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What can the technician do to resolve this problem?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, IT Essentials 8, Operating Systems BasicsWhich two location data sources can locator apps use to determine the position of a mobile device? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhat are two types of cloud-enabled services for mobile devices? (Choose two.)ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8, Operating Systems BasicsWhich model does Apple use to provide iOS apps to customers?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8, Operating Systems Basics