Last Updated on October 26, 2019 by Admin
IT Essentials Final Exam Online Form A v6.0 2019
ITE -- Final Exam Form A
Quiz-summary
0 of 60 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
Information
ITE — Final Exam Form A
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 60 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- Answered
- Review
-
Question 1 of 60
1. Question
1 pointsWhy do laptop computers use CPU throttling techniques?Correct
Incorrect
CPU throttling is used to conserve power and increase battery life on portable devices. Throttling also produces less heat.Hint
CPU throttling is used to conserve power and increase battery life on portable devices. Throttling also produces less heat. -
Question 2 of 60
2. Question
1 pointsWhat is the purpose of RAID adapters?Correct
Incorrect
RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy.Hint
RAID 0 allows “striping” or writing data across two hard drives, but provides no redundancy. The other RAID versions provide redundancy. -
Question 3 of 60
3. Question
1 pointsWhich type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?Correct
Incorrect
The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output.Hint
The high definition multimedia interface or HDMI connector is used for outputting both audio and video on a single cable. A PS/2 port connects a keyboard or a mouse to a computer. Digital visual interfaces and DB-15 connectors are only used for video output. -
Question 4 of 60
4. Question
1 pointsWhat tool is included in the Mac OS X for backing up disks to image files and recovering disk images?Correct
Incorrect
The Mac Disk Utility allows an administrator to configure automatic disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Disk Error-Checking is a Windows tool for checking the integrity of files and folders. The System Restore tool is a Windows tool for allowing an administrator to roll back the operating system to a previous configuration.Hint
The Mac Disk Utility allows an administrator to configure automatic disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Disk Error-Checking is a Windows tool for checking the integrity of files and folders. The System Restore tool is a Windows tool for allowing an administrator to roll back the operating system to a previous configuration. -
Question 5 of 60
5. Question
2 pointsA new technician has joined the IT team and is about to service a heavy printer. Which two precautions should be taken to avoid any injury when transporting the heavy printer to the service area? (Choose two.)Correct
Incorrect
When lifting heavy objects, avoiding bending or using the strength of the back, keeping heavy weights close to the body when carrying them, and using the strength of the legs and knee to lift something, all contribute to avoid injury.Hint
When lifting heavy objects, avoiding bending or using the strength of the back, keeping heavy weights close to the body when carrying them, and using the strength of the legs and knee to lift something, all contribute to avoid injury. -
Question 6 of 60
6. Question
1 pointsWhat type of device provides power to a computer and allows it to be safely shut down in the event of a power loss?Correct
Incorrect
An uninterruptible power supply or UPS contains a battery backup that provides consistent power through brownouts and blackouts until the battery power is emptied. Many UPS systems can safely shut down a computer prior to the loss of battery power.Hint
An uninterruptible power supply or UPS contains a battery backup that provides consistent power through brownouts and blackouts until the battery power is emptied. Many UPS systems can safely shut down a computer prior to the loss of battery power. -
Question 7 of 60
7. Question
1 pointsWhich measure can help control RFI effects on wireless networks?Correct
Incorrect
A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones.Hint
A wireless network (IEEE 802.11) can be affected by radio frequency interference because it shares the same radio frequency range with other devices, such as cordless phones. -
Question 8 of 60
8. Question
1 pointsWhat can be tested with a digital multimeter?Correct
Incorrect
A digital multimeter can test the integrity of circuits and the quality of electricity in computer components.Hint
A digital multimeter can test the integrity of circuits and the quality of electricity in computer components. -
Question 9 of 60
9. Question
1 pointsWhen should a technician avoid wearing an antistatic wrist strap?Correct
Incorrect
A power supply unit or CRT monitor are both able to retain large amounts of power after being turned off. These types of devices are too dangerous to connect an antistatic wrist strap to. Antistatic wrist straps are commonly worn when upgrading RAM or replacing a hard drive.Hint
A power supply unit or CRT monitor are both able to retain large amounts of power after being turned off. These types of devices are too dangerous to connect an antistatic wrist strap to. Antistatic wrist straps are commonly worn when upgrading RAM or replacing a hard drive. -
Question 10 of 60
10. Question
1 pointsRefer to the exhibit. As part of the process of building a computer, what is the proper order of the first three steps in the installation of a power supply?
Correct
Incorrect
The steps for installing a power supply are as follows:
- Insert the power supply into the case.
- Align the holes in the power supply with the holes in the case.
- Secure the power supply to the case with screws.
Power is not applied until all components have been installed.
Hint
The steps for installing a power supply are as follows:
- Insert the power supply into the case.
- Align the holes in the power supply with the holes in the case.
- Secure the power supply to the case with screws.
Power is not applied until all components have been installed.
-
Question 11 of 60
11. Question
2 pointsWhich two operations can help prevent a mobile device from being tracked without permission? (Choose two.)Correct
Incorrect
Device tracking relies on GPS function. Turning off the GPS when not in use and disabling or removing apps that use the GPS function may prevent a device from being tracked.Hint
Device tracking relies on GPS function. Turning off the GPS when not in use and disabling or removing apps that use the GPS function may prevent a device from being tracked. -
Question 12 of 60
12. Question
1 pointsWhat is a characteristic of a computer power connector?Correct
Incorrect
Hard disk drives and optical drives that do not have SATA power sockets use a Molex power connector. A Molex connector and a SATA connector cannot be used on the same drive at the same time. An ATX main power connector provides the motherboard with power from the power supply.Hint
Hard disk drives and optical drives that do not have SATA power sockets use a Molex power connector. A Molex connector and a SATA connector cannot be used on the same drive at the same time. An ATX main power connector provides the motherboard with power from the power supply. -
Question 13 of 60
13. Question
1 pointsWhich expansion card can assist in troubleshooting a computer problem when no video is available?Correct
Incorrect
A POST card can be installed into a PCI or PCIe slot on the motherboard. When the computer encounters errors on startup, an error code is displayed on the card. Graphics cards and USB expansion cards do not have this ability. BIOS is found on a chip on the motherboard.
Hint
A POST card can be installed into a PCI or PCIe slot on the motherboard. When the computer encounters errors on startup, an error code is displayed on the card. Graphics cards and USB expansion cards do not have this ability. BIOS is found on a chip on the motherboard.
-
Question 14 of 60
14. Question
2 pointsWhich two PC settings can be configured using the BIOS setup utility? (Choose two.)Correct
Incorrect
The computer boot sequence and support for virtualization can configured from within BIOS. The computer operating system typically allocates memory to applications and enables device drivers. POST is typically not configurable.Hint
The computer boot sequence and support for virtualization can configured from within BIOS. The computer operating system typically allocates memory to applications and enables device drivers. POST is typically not configurable. -
Question 15 of 60
15. Question
1 pointsWhat factor should be taken into consideration more with laptops than with desktops?Correct
Incorrect
Laptops are designed to be mobile and will most likely be used in situations that lack both environmental control and air filtration. Desktop computers are designed to be permanent workstations and are more likely to be used in controlled environments.Hint
Laptops are designed to be mobile and will most likely be used in situations that lack both environmental control and air filtration. Desktop computers are designed to be permanent workstations and are more likely to be used in controlled environments. -
Question 16 of 60
16. Question
3 pointsWhat are three benefits of computer preventive maintenance? (Choose three.)Correct
Incorrect
Preventive maintenance can reduce the need for future repairs, but cannot eliminate them entirely. Preventive maintenance does not affect a technician making repairs. Preventive maintenance has no effect on RAM access time. The remaining options are all benefits of performing preventive maintenance.Hint
Preventive maintenance can reduce the need for future repairs, but cannot eliminate them entirely. Preventive maintenance does not affect a technician making repairs. Preventive maintenance has no effect on RAM access time. The remaining options are all benefits of performing preventive maintenance. -
Question 17 of 60
17. Question
1 pointsWhich step in the troubleshooting process is important to help avoid repeating repair processes that were performed previously?Correct
Incorrect
-
Question 18 of 60
18. Question
1 pointsA computer user complains of a computer that freezes up after about five minutes of use. The technician checks the computer BIOS to see if there might be a configuration problem that is causing the computer to behave consistently in this manner. While the technician is reviewing the information, the computer once again freezes. What is the probable cause of the computer problem?Correct
Incorrect
A problem with the CPU or overheating can cause the computer to freeze.Hint
A problem with the CPU or overheating can cause the computer to freeze. -
Question 19 of 60
19. Question
1 pointsWhy is a full format more beneficial than a quick format when preparing for a clean OS installation?Correct
Incorrect
A full format removes files from a partition while scanning the disk for bad sectors. A quick format will remove files from a partition but does not scan a disk for bad sectors.Hint
A full format removes files from a partition while scanning the disk for bad sectors. A quick format will remove files from a partition but does not scan a disk for bad sectors. -
Question 20 of 60
20. Question
1 pointsWhat is the default file system used during a fresh installation of Windows 7?Correct
Incorrect
While Windows XP can use either FAT or NTFS, Vista and Windows 7 can only be installed on an NTFS partition.Hint
While Windows XP can use either FAT or NTFS, Vista and Windows 7 can only be installed on an NTFS partition. -
Question 21 of 60
21. Question
1 pointsWhat is the first step an administrator should take when splitting a single partition into multiple partitions?Correct
Incorrect
The first step in the process of splitting a partition is to use the shrink volume feature of the Disk Manager utility. Afterwards, the new partition must be formatted and assigned a drive letter.Hint
The first step in the process of splitting a partition is to use the shrink volume feature of the Disk Manager utility. Afterwards, the new partition must be formatted and assigned a drive letter. -
Question 22 of 60
22. Question
1 pointsA user notices that some of the programs that are installed before upgrading Windows to a new version no longer function properly after the upgrade. What can the user do to fix this problem?Correct
Incorrect
Compatibility mode allows an application designed for an earlier version of Windows to operate in later versions. Right-click on the command that starts an application and select Properties to access compatibility mode.Hint
Compatibility mode allows an application designed for an earlier version of Windows to operate in later versions. Right-click on the command that starts an application and select Properties to access compatibility mode. -
Question 23 of 60
23. Question
1 pointsA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?Correct
Incorrect
Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.Hint
Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding. -
Question 24 of 60
24. Question
1 pointsA technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems?Correct
Incorrect
Device Manager can be used to view information about a particular piece of hardware, to view the driver version, to update the driver or roll it back, or to disable/enable a particular device.Hint
Device Manager can be used to view information about a particular piece of hardware, to view the driver version, to update the driver or roll it back, or to disable/enable a particular device. -
Question 25 of 60
25. Question
1 pointsAfter a Windows operating system has been installed, which program would a technician use to select the programs that will run at startup?Correct
Incorrect
Msconfig is a system utility that can be used to performs diagnostic procedures on the Windows startup files.Hint
Msconfig is a system utility that can be used to performs diagnostic procedures on the Windows startup files. -
Question 26 of 60
26. Question
1 pointsWhich type of network spans a single building or campus and provides services and applications to people within a common organizational structure?Correct
Incorrect
A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person.Hint
A LAN is smaller or more contained than a WAN, which can span several cities. A MAN is usually contained in one city. A PAN is a very small network of devices that are located in close proximity to one another, usually within range of a single person. -
Question 27 of 60
27. Question
2 pointsA network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)Correct
Incorrect
Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced.Hint
Centralization in a client-server network configuration provides better monitoring for security, as well as easier access to resources. The total cost may be higher because a network administrator is required, but reliability and scalability are enhanced. -
Question 28 of 60
28. Question
1 pointsWhat are the four layers in the TCP/IP reference model?Correct
Incorrect
-
Question 29 of 60
29. Question
1 pointsSeveral messages sent to the network administrator are reporting that access to a secure server using HTTPS is failing. After checking recent updates to the company firewall, the administrator learns that the firewall is blocking HTTPS. Which port should be opened to solve the problem?Correct
Incorrect
-
Question 30 of 60
30. Question
1 pointsA user wants to map a network drive on a PC that is named “WORK2” and runs Windows 7. The name of the shared resource the user wishes to map to is called “installs” and is located on a workstation called “WORK1”. What would be the correct path for mapping the network drive?Correct
Incorrect
The correct path syntax for mapping a network drive on a PC is \\servername\sharename. Note that the path statement is not case sensitive. Please also note that back-slashes (“\”) are used in Windows path statements and that ‘servername’ is the name of the source or location of the resource.Hint
The correct path syntax for mapping a network drive on a PC is \\servername\sharename. Note that the path statement is not case sensitive. Please also note that back-slashes (“\”) are used in Windows path statements and that ‘servername’ is the name of the source or location of the resource. -
Question 31 of 60
31. Question
1 pointsA customer who travels frequently wants to know which technology is the most suitable for being connected to the corporate network at all times at low cost. Which network technology would a network administrator recommend?Correct
Incorrect
Cellular networks can provide access to data networks at any given time. ISDN and microwave networks require a fixed location. Satellite would work, but is very expensive.Hint
Cellular networks can provide access to data networks at any given time. ISDN and microwave networks require a fixed location. Satellite would work, but is very expensive. -
Question 32 of 60
32. Question
1 pointsWhat is the difference between cloud computing and a data center?Correct
Incorrect
Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff.Hint
Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff. -
Question 33 of 60
33. Question
2 pointsA user complains about being unable to connect to the wireless network. Which two actions should be part of troubleshooting the wireless connection? (Choose two.)Correct
Incorrect
Also check if the computer has a button that enables wireless connectivity.Hint
Also check if the computer has a button that enables wireless connectivity. -
Question 34 of 60
34. Question
1 pointsA technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?Correct
Incorrect
In order to access remote networks, a host IP configuration must include the address of the device that will be used to access the Internet or other networks. Pings to remote networks will fail if the default gateway is incorrect. Because the user can access local hosts, there are no problems with the NIC or operating system.Hint
In order to access remote networks, a host IP configuration must include the address of the device that will be used to access the Internet or other networks. Pings to remote networks will fail if the default gateway is incorrect. Because the user can access local hosts, there are no problems with the NIC or operating system. -
Question 35 of 60
35. Question
1 pointsAn ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer’s problem?Correct
Incorrect
-
Question 36 of 60
36. Question
1 pointsA technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?Correct
Incorrect
Look for the ACPI power management configuration section in BIOS.Hint
Look for the ACPI power management configuration section in BIOS. -
Question 37 of 60
37. Question
2 pointsA technician needs to configure a Bluetooth headset for a laptop user. Which two steps should the technician take before installing the headset? (Choose two.)Correct
Incorrect
When attaching any wireless device to a laptop, power does not have to be removed (either AC or the DC battery). Also, you do not have to worry about ESD when installing a wireless device.Hint
When attaching any wireless device to a laptop, power does not have to be removed (either AC or the DC battery). Also, you do not have to worry about ESD when installing a wireless device. -
Question 38 of 60
38. Question
1 pointsWhat laptop component converts DC power to AC so that the display can illuminate?Correct
Incorrect
The backlight (using either CCFL or LED technology) illuminates the back of the display, but the inverter part is what does the conversion of DC to AC for that backlight.Hint
The backlight (using either CCFL or LED technology) illuminates the back of the display, but the inverter part is what does the conversion of DC to AC for that backlight. -
Question 39 of 60
39. Question
1 pointsWhich closed-ended question would be appropriate for a technician to use to narrow down the possible problems on a laptop that will not power on?Correct
Incorrect
Open-ended questions help the technician to identify the issue by allowing the customer to elaborate on the issue.The answers of “What software has been installed recently?” and “What were you doing when the problem occurred?” are examples of open-ended questions. Closed-ended questions are used to narrow the focus of the problem. Closed-ended questions commonly have definite answers such as yes, no, a date, a time, or other specifics. Both questions of “Have you changed your password recently?” and “Can the laptop operate using the AC adapter? are closed-ended questions, but the one relevant to the computer not powering on is the one containing the inquiry about the AC adapter.Hint
Open-ended questions help the technician to identify the issue by allowing the customer to elaborate on the issue.The answers of “What software has been installed recently?” and “What were you doing when the problem occurred?” are examples of open-ended questions. Closed-ended questions are used to narrow the focus of the problem. Closed-ended questions commonly have definite answers such as yes, no, a date, a time, or other specifics. Both questions of “Have you changed your password recently?” and “Can the laptop operate using the AC adapter? are closed-ended questions, but the one relevant to the computer not powering on is the one containing the inquiry about the AC adapter. -
Question 40 of 60
40. Question
2 pointsA technician is troubleshooting the appearance of flashing lines on a laptop screen. What are two possible causes of this distortion? (Choose two.)Correct
Incorrect
When flashing lines are appearing on a laptop screen, the most common problems are an overheating GPU, faulty GPU, or a display that is not connected properly. When the power to the pixels has been cut off, pixels on the screen will appear dead. If the images on a laptop screen are distorted, a technician should verify that the display settings have not been modified.Hint
When flashing lines are appearing on a laptop screen, the most common problems are an overheating GPU, faulty GPU, or a display that is not connected properly. When the power to the pixels has been cut off, pixels on the screen will appear dead. If the images on a laptop screen are distorted, a technician should verify that the display settings have not been modified. -
Question 41 of 60
41. Question
1 pointsA user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?Correct
Incorrect
Widgets are programs that when installed associate with the application they were built for. This will cause the application to launch when the widget icon is touched on the touchscreen of the Android device.Hint
Widgets are programs that when installed associate with the application they were built for. This will cause the application to launch when the widget icon is touched on the touchscreen of the Android device. -
Question 42 of 60
42. Question
1 pointsWhich component uses the greatest amount of power on most mobile devices?Correct
Incorrect
The LCD screen consumes the most power on most mobile devices. The CPU, camera, and media player use power, but less extensively than the LCD screen does.Hint
The LCD screen consumes the most power on most mobile devices. The CPU, camera, and media player use power, but less extensively than the LCD screen does. -
Question 43 of 60
43. Question
1 pointsWhat is the purpose of using the MIME email protocol on mobile devices?Correct
Incorrect
The MIME email protocol allows pictures and documents to be included in email messages.Hint
The MIME email protocol allows pictures and documents to be included in email messages. -
Question 44 of 60
44. Question
1 pointsWhat is an indication that the battery in a mobile device could become physically hazardous and should be immediately replaced?Correct
Incorrect
Because a swelling battery is physically hazardous, it should immediately be replaced with a new one from the manufacturer.Hint
Because a swelling battery is physically hazardous, it should immediately be replaced with a new one from the manufacturer. -
Question 45 of 60
45. Question
2 pointsA technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)Correct
Incorrect
-
Question 46 of 60
46. Question
1 pointsFor cleaning a laser printer, what should be used to pick up excess particles of toner?Correct
Incorrect
The toner used in a laser printer consists of microscopic particles. To effectively pick up these particles, it is recommended that a vacuum capable of High Efficiency Particulate Air (HEPA) filtration be used.Hint
The toner used in a laser printer consists of microscopic particles. To effectively pick up these particles, it is recommended that a vacuum capable of High Efficiency Particulate Air (HEPA) filtration be used. -
Question 47 of 60
47. Question
1 pointsWhat characterizes a DDoS attack?Correct
Incorrect
-
Question 48 of 60
48. Question
2 pointsWhich two password control policies should an organization implement to ensure strong passwords? (Choose two.)Correct
Incorrect
-
Question 49 of 60
49. Question
1 pointsA computer technician has been asked to secure all Windows 7 computers by encrypting all the data on each computer. Which Windows feature should be used to provide this level of encryption?Correct
Incorrect
BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data.Hint
BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data. -
Question 50 of 60
50. Question
3 pointsThe activity of a previously unknown program triggers an alert by Windows firewall. What three options will the user have for dealing with this event? (Choose three.)Correct
Incorrect
If a program is blocked by Windows firewall, the user will be presented with three options for dealing with this event: Keep blocking, Unblock, or Ask me later.Hint
If a program is blocked by Windows firewall, the user will be presented with three options for dealing with this event: Keep blocking, Unblock, or Ask me later. -
Question 51 of 60
51. Question
2 pointsA technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)Correct
Incorrect
Several actions can be taken by a technician when security issues are suspected as the possible cause of a problem with a computer. Logging in as a different user or disconnecting the PC from the network to isolate the cause of the problem are two possible actions.Hint
Several actions can be taken by a technician when security issues are suspected as the possible cause of a problem with a computer. Logging in as a different user or disconnecting the PC from the network to isolate the cause of the problem are two possible actions. -
Question 52 of 60
52. Question
1 pointsA call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?Correct
Incorrect
When dealing with customers, a technician must show professionalism in all aspects. When explaining the solution to solve the problem, a technician should provide a simple step-by-step process of instructions. The technician should speak in plain terms and avoid the industry jargon.Hint
When dealing with customers, a technician must show professionalism in all aspects. When explaining the solution to solve the problem, a technician should provide a simple step-by-step process of instructions. The technician should speak in plain terms and avoid the industry jargon. -
Question 53 of 60
53. Question
1 pointsWhat expectation is defined in the service level agreement between an organization and service vendor?Correct
Incorrect
The service level agreement, or SLA, is a legal agreement between an organization and a service vendor. The agreement is a binding contract that spells out service expectations of the service vendor. The SLA typically contains response time guarantees, part availability, and time of service availability.Hint
The service level agreement, or SLA, is a legal agreement between an organization and a service vendor. The agreement is a binding contract that spells out service expectations of the service vendor. The SLA typically contains response time guarantees, part availability, and time of service availability. -
Question 54 of 60
54. Question
1 pointsIn which circumstance should a level one technician initiate an escalated work order?Correct
Incorrect
The primary responsibility of a level one technician is to gather information from the customer. The level one technician needs to accurately enter all the information into the work order. When the problems are very simple to resolve, a level one technician can take care of these without escalating the work order. However, when a problem requires the expertise of a level two technician, the level one technician initiates an escalated work order so that a level two technician will be involved to solve the problem.Hint
The primary responsibility of a level one technician is to gather information from the customer. The level one technician needs to accurately enter all the information into the work order. When the problems are very simple to resolve, a level one technician can take care of these without escalating the work order. However, when a problem requires the expertise of a level two technician, the level one technician initiates an escalated work order so that a level two technician will be involved to solve the problem. -
Question 55 of 60
55. Question
1 pointsAn application appears frozen and is not responding to a mouse or the keyboard. What Windows OS tool can be used to stop the application?Correct
Incorrect
In Task Manager, the application or process that is not responding can be identified and closed. Device Manager is used to manage devices and their drivers. Disk Management is used to manage the partition and file systems of storage devices. Event Viewer is used to review the alerts and notifications sent from the system.Hint
In Task Manager, the application or process that is not responding can be identified and closed. Device Manager is used to manage devices and their drivers. Disk Management is used to manage the partition and file systems of storage devices. Event Viewer is used to review the alerts and notifications sent from the system. -
Question 56 of 60
56. Question
2 pointsWhich two issues are likely to cause BSOD errors? (Choose two.)Correct
Incorrect
Device driver errors are the most likely cause of BSOD errors. Failing RAM can also create BSOD errors. Software issues such as browsers and antivirus do not produce BSOD errors. A power supply failure would prevent the machine from starting.Hint
Device driver errors are the most likely cause of BSOD errors. Failing RAM can also create BSOD errors. Software issues such as browsers and antivirus do not produce BSOD errors. A power supply failure would prevent the machine from starting. -
Question 57 of 60
57. Question
2 pointsA user has installed a new FTP client on a computer, but is unsuccessful in connecting to an FTP server. Which two key pieces of information should the user ensure are configured correctly on the FTP client? (Choose two.)Correct
Incorrect
Without the correct connection information for the FTP server, file transfer services cannot occur.Hint
Without the correct connection information for the FTP server, file transfer services cannot occur. -
Question 58 of 60
58. Question
1 pointsA technician wants to allow users to backup and restore all the files on their computers, but does not want the users to be able to make changes to the system. How should the technician give users this functionality?Correct
Incorrect
It is better to grant permissions at group level than individual permissions. This way any member of a group would have the respective permissions to carry out the permitted tasks and allows for a tighter control of what the group members can do in a given environment. It also makes it easier to administer the environment.Hint
It is better to grant permissions at group level than individual permissions. This way any member of a group would have the respective permissions to carry out the permitted tasks and allows for a tighter control of what the group members can do in a given environment. It also makes it easier to administer the environment. -
Question 59 of 60
59. Question
1 pointsA technician who is working on an employee’s laptop finds that a number of files that were encrypted on a network server drive are present on the laptop drive in unencrypted form. What could cause this problem?Correct
Incorrect
When encrypted files are transferred to a new computer that is not using an NTFS formatted hard drive, the files will no longer be encrypted.Hint
When encrypted files are transferred to a new computer that is not using an NTFS formatted hard drive, the files will no longer be encrypted. -
Question 60 of 60
60. Question
4 pointsMatch the facility access control devices to the correct descriptions. (Not all options are used.)
Sort elements
- identification badges with photographs
- RFID badges
- card keys
- biometric sensors
- cable locks
-
devices to display image of the user
-
sensors to monitor location and access
-
devices to store user information and level of access
-
devices to identify physical characteristics of the user
Correct
Incorrect