IT Essentials (V5.0)

IT Essentials Final Exam V5.0 Answers

1. A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?

Defrag

Chkdsk

Msconfig

Regedit

 

2. How is DSL able to carry telephone and data signals at the same time?

Each signal uses a different frequency.

Each connection is dialed separately.

DSL uses low frequency transmissions.

DSL uses digital signals to carry both the telephone and data traffic.

IT Essentials Practice Final Exam V5.0 Answers

1. A technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?

Administrative Tools

Command Prompt

BIOS

Safe mode

System Registry

 

2. What is an accurate description of asymmetric encryption technology?

It is an encryption protocol that is used to encrypt data as the data is sent over the VPN.

It is an encryption process that uses identical keys on both ends to establish the VPN.

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.

Asymmetric encryption is an encryption process that compares traffic on both ends to make sure the traffic has not been altered.

IT Essentials Chapter 12 V5.0 Answers

1. A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process?

Ask a list of closed-ended questions.

Research the problem.

Document all findings, actions, and outcomes.

Implement preventive measures.

 

2. A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the new hardware and powering up the computer, an "OS not found" error message is displayed. What is the most probable cause for that error message?

The power supply is faulty.

The hard drive jumper is set incorrectly.

The motherboard needs replacing to be able to support the new hard drive.

The USB port has too many attached devices to supply adequate power.

The BIOS needs updating.

IT Essentials Chapter 11 V5.0 Answers

1. Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)

solid state drives

CPU registers

RAM

hard disk drives

cache

 

2. Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)

Contact a first responder.

Confront the customer immediately.

Shut down the computer until authorities arrive.

Document as much information as possible.

Remove and destroy the hard drive.

IT Essentials Chapter 10 V5.0 Answers

1. All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to solve this issue?

Set the user folder permissions to Deny.

Disable the users' accounts.

Change the user file permissions to Read Only.

Enable UAC on the computer.

 

2. Which three questions should be addressed by organizations developing a security policy? (Choose three.)
How should future expansion be done?

What are the possible threats to the assets of the organization?

What is to be done in the case of a security breach?

When do the assets need protecting?

What assets require protection?

What insurance coverage is required?

IT Essentials Chapter 9 V5.0 Answers

1. A technician recorded that a new fuser roller unit was installed in a laser printer to solve a printing problem. Which step in the troubleshooting process did the technician just perform?

verifying the solution and system functionality

testing a theory to determine the cause of the problem

identifying the problem

documenting findings, actions, and outcomes

 

2. What are two functions of a print server? (Choose two.)

ensure that the connected client computers have up-to-date printer drivers

store backups of documents sent to the printer

provide uninterrupted power to the printer

provide print resources to all connected client computers

store print jobs in a queue until the printer is ready

IT Essentials Chapter 8 V5.0 Answers

1. Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?

simple passcode

pattern

remote wipe

slide

 

2. Which statement is true about industry standards for cellular networks?

First generation cellular standards are mostly digital standards.

Third generation cellular standards require a maximum of 1 Gb/s for devices moving slowly, such as when a user has a mobile device and is walking.

Cellular standards have made it more difficult and expensive to make calls to people that are on a different network.

Cell phones that use a single standard can often only be used in specific geographic areas.

IT Essentials Chapter 7 V5.0 Answers

1. Which statement is true about laptops?

Most of the internal components that are designed for laptops cannot be used for desktops.

Laptop CPUs do not use cooling devices.

Laptops use fewer components than desktops use.

Laptop motherboards have standard form factors.

 

2. A technician has been asked to decide which laptop components should be cleaned on a monthly basis as part of a maintenance routine. What are two examples of components that should be included? (Choose two.)

CPU

hard disk platters and heads

exterior case

keyboard*

RAM

IT Essentials Chapter 6 V5.0 Answers

1. Which type of connection to the Internet is capable of the fastest transfer rates?

ISDN BRI

dial-up

ISDN PRI

cable

 

2. When is a dial-up connection used to connect to an Internet provider?

when a high-speed connection is provided over a cable TV network

when a digital connection is provided using ISDN

when a regular telephone line is used

when a cellular telephone provides the service

IT Essentials Chapter 5 V5.0 Answers

1. To which category of hypervisor does the Microsoft Virtual PC belong?

Type 1

Type 2

Type 3

Type 4

 

2. Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed?

Services

Performance Monitor

Component Services

Event Viewer