Last Updated on December 6, 2018 by Admin
ITE 6.0 A+ Cert Practice Exam 2 Online 2018 100%
Learning with Cisco Netacad, there are many exams and lab activities to do. Some instructor require students to complete all Chapter exams, Pre-Test, Practices Final, Final Exam and Chapter Quiz. No mater what instructors want you to do, examict.com offers all exams and lab activities answers and solutions with clear explanation. Our Experts have verified all exam answers before we published to the website. We recommended you to chose any relevant chapter from the following:
ITE -- 6.0 A+ Cert Practice Exam 2
Quiz-summary
0 of 80 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
Information
ITE -- 6.0 A+ Cert Practice Exam 2
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 80 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- Answered
- Review
-
Question 1 of 80
1. Question
1 pointsA server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?Correct
Incorrect
RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well.Hint
RAID 0+1 combines data striping and data mirroring. The minimum number of disks required for data striping is 2 and the minimum number of disks (or disk sets) for data mirroring is 2 as well. -
Question 2 of 80
2. Question
1 pointsA user has detected that one of the virtual machines in a computer is infected with a virus. Which statement about the situation is likely to be true?Correct
Incorrect
The virtual machines work separately from the host operating systems, even though they use the same system resources. The weaknesses and vulnerabilities from one virtual machine are not spread to other virtual machines or the host operating system.Hint
The virtual machines work separately from the host operating systems, even though they use the same system resources. The weaknesses and vulnerabilities from one virtual machine are not spread to other virtual machines or the host operating system. -
Question 3 of 80
3. Question
1 pointsWhich fire protection system would be best for a university computer/electronics lab?Correct
Incorrect
-
Question 4 of 80
4. Question
1 pointsWhy should a technician avoid opening the casing of a power supply?Correct
Incorrect
Power supplies contain high voltage, and only highly-trained technicians should attempt to repair them. A power supply can still hold dangerous levels of electricity even after being disconnected from the mains power.Hint
Power supplies contain high voltage, and only highly-trained technicians should attempt to repair them. A power supply can still hold dangerous levels of electricity even after being disconnected from the mains power. -
Question 5 of 80
5. Question
1 pointsWhat is the first step a technician should take when preparing to work on the inside of a computer?Correct
Incorrect
Before any service inside a computer is performed, the PC should be turned off and disconnected from any source of power to reduce the risk of shock.Hint
Before any service inside a computer is performed, the PC should be turned off and disconnected from any source of power to reduce the risk of shock. -
Question 6 of 80
6. Question
1 pointsWhat tool can be used to find and attempt to fix file structural errors on a hard disk in Windows 7?Correct
Incorrect
Chkdsk attempts to correct file structural errors. Format is used to prepare a storage deviceso that it may store data. System file checker (sfc) replaces corrupt operating system files. Remove directory (rd) is used to delete a directory from the file structure.Hint
Chkdsk attempts to correct file structural errors. Format is used to prepare a storage deviceso that it may store data. System file checker (sfc) replaces corrupt operating system files. Remove directory (rd) is used to delete a directory from the file structure. -
Question 7 of 80
7. Question
1 pointsA customer asks for a solution to a printer problem that is beyond the knowledge level of the technician. What should the technician do?Correct
Incorrect
Trying to fix a problem that is beyond the knowledge level of the technician may create additional problems.Hint
Trying to fix a problem that is beyond the knowledge level of the technician may create additional problems. -
Question 8 of 80
8. Question
1 pointsWhich statement that is related to running 64-bit software is correct?Correct
Incorrect
32-bit software can run on a 64-bit processor running a 64-bit operating system. 64-bit software can only run on a 64-bit processor running a 64-bit operating system.Hint
32-bit software can run on a 64-bit processor running a 64-bit operating system. 64-bit software can only run on a 64-bit processor running a 64-bit operating system. -
Question 9 of 80
9. Question
1 pointsWhich statement is correct about installing a 32-bit operating system on a x64 architecture?Correct
Incorrect
A 32-bit operating system can run on a x64 architecture, but it will not be able to use more than 4 GB of the system memory. A 64-bit OS includes features that provide additional security.Hint
A 32-bit operating system can run on a x64 architecture, but it will not be able to use more than 4 GB of the system memory. A 64-bit OS includes features that provide additional security. -
Question 10 of 80
10. Question
1 pointsWhat action should a technician take before upgrading computers from Vista to Windows 7?Correct
Incorrect
When an upgrade from Vista to Windows 7 is being planned, the first step is to download and run the Windows 7 Upgrade advisor. It is not necessary in that situation to uninstall all programs or to upgrade the video card, as the requirements are the same for the two operating systems.Hint
When an upgrade from Vista to Windows 7 is being planned, the first step is to download and run the Windows 7 Upgrade advisor. It is not necessary in that situation to uninstall all programs or to upgrade the video card, as the requirements are the same for the two operating systems. -
Question 11 of 80
11. Question
1 pointsWhat is a possible situation when it might be necessary to boot Windows 7 from a USB device, a CD, or a DVD?Correct
Incorrect
Disabling background services, deleting registry keys, and partitioning the hard drive do not require rebooting a PC. It might be necessary to boot a computer from a USB drive in order to repair the system in some situations.Hint
Disabling background services, deleting registry keys, and partitioning the hard drive do not require rebooting a PC. It might be necessary to boot a computer from a USB drive in order to repair the system in some situations. -
Question 12 of 80
12. Question
1 pointsWhat type of partition has the ability to create volumes spanning across more than one disk?Correct
Incorrect
The primary partition contains the operating system files and is usually the first partition. The OS uses the active partition to boot the computer. The extended partition normally uses the remaining free space on a hard drive or takes the place of a primary partition. A dynamic partition is the only type of partition that allows creating volumes spanning over more than one disk.Hint
The primary partition contains the operating system files and is usually the first partition. The OS uses the active partition to boot the computer. The extended partition normally uses the remaining free space on a hard drive or takes the place of a primary partition. A dynamic partition is the only type of partition that allows creating volumes spanning over more than one disk. -
Question 13 of 80
13. Question
1 pointsWhat type of file system allows the use of files larger than 5 GB and is mostly used on internal hard drives?Correct
Incorrect
The file system exFAT, also known as FAT64, is used to address some of the shortcoming of FAT32 and is mainly used for USB flash drives. CDFS is used for optical drives. FAT32 allows the storage of files up to 4 GB in size. NTFS allows the storage of files up to 16 TB in size.Hint
The file system exFAT, also known as FAT64, is used to address some of the shortcoming of FAT32 and is mainly used for USB flash drives. CDFS is used for optical drives. FAT32 allows the storage of files up to 4 GB in size. NTFS allows the storage of files up to 16 TB in size. -
Question 14 of 80
14. Question
1 pointsWhich user account should be used only to perform system management and not as the account for regular use?Correct
Incorrect
The administrator account is used to manage the computer and is very powerful. Best practices recommend that it be used only when it is needed to avoid accidentally performing significant changes to the system.Hint
The administrator account is used to manage the computer and is very powerful. Best practices recommend that it be used only when it is needed to avoid accidentally performing significant changes to the system. -
Question 15 of 80
15. Question
1 pointsWhich type of user account is created automatically during a Windows 8.1 installation?Correct
Incorrect
During a Windows 8.1 installation the Administrator account is created automatically. All other accounts have to be created manually.Hint
During a Windows 8.1 installation the Administrator account is created automatically. All other accounts have to be created manually. -
Question 16 of 80
16. Question
1 pointsA technician is attempting to repair a Windows 7 laptop that has a missing or corrupt OS file that prevents Windows 7 from starting up. The technician reboots the laptop and accesses the WinRE via the F8 key. Which option must the technician choose in the System Recovery menu to locate and fix the missing or corrupt system files?Correct
Incorrect
Startup Repair will scan the hard drive and identify and fix any missing or corrupt OS files. WinRE options can also be accessed by booting from the installation media or a system repair disk.Hint
Startup Repair will scan the hard drive and identify and fix any missing or corrupt OS files. WinRE options can also be accessed by booting from the installation media or a system repair disk. -
Question 17 of 80
17. Question
1 pointsWhen would the PXE option be used when repairing a PC?Correct
Incorrect
The Preboot eXecution Environment (PXE, but pronounced pixie) BIOS boot option is used to install an operating system from a remote network location.Hint
The Preboot eXecution Environment (PXE, but pronounced pixie) BIOS boot option is used to install an operating system from a remote network location. -
Question 18 of 80
18. Question
1 pointsA user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?Correct
Incorrect
A partition must be formatted with the NTFS file system in order to extend it by using the unallocated space on the disk. Once the partition has been extended, the disk type must be converted to a dynamic disk in order for the new partition to be accessible.Hint
A partition must be formatted with the NTFS file system in order to extend it by using the unallocated space on the disk. Once the partition has been extended, the disk type must be converted to a dynamic disk in order for the new partition to be accessible. -
Question 19 of 80
19. Question
1 pointsA user is viewing the Windows Disk Management utility and notices that one of the disks is marked as Foreign. What does this mean?Correct
Incorrect
When a dynamic disk is removed from another Windows PC and installed onto the current PC, the disk manager will note this and mark it as Foreign within the Disk Management utility.Hint
When a dynamic disk is removed from another Windows PC and installed onto the current PC, the disk manager will note this and mark it as Foreign within the Disk Management utility. -
Question 20 of 80
20. Question
2 pointsWhat are two file attributes in the Windows environment? (Choose two.)Correct
Incorrect
The file attributes are read-only, archive, hidden, and system. Details, security, and general are tabs on the file Properties applet.Hint
The file attributes are read-only, archive, hidden, and system. Details, security, and general are tabs on the file Properties applet. -
Question 21 of 80
21. Question
2 pointsWhat are two functions of hypervisors? (Choose two.)Correct
Incorrect
The hypervisor does not protect the hosting OS from malware. Neither does it allow sharing software across virtual machines. The hard drive of the supporting computer does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them.Hint
The hypervisor does not protect the hosting OS from malware. Neither does it allow sharing software across virtual machines. The hard drive of the supporting computer does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them. -
Question 22 of 80
22. Question
1 pointsWhich Windows utility can be used to schedule a regular backup for preventive maintenance?Correct
Incorrect
Windows Task Scheduler is a tool that helps scheduling repetitive tasks, such as backups, antivirus scans, and more.Hint
Windows Task Scheduler is a tool that helps scheduling repetitive tasks, such as backups, antivirus scans, and more. -
Question 23 of 80
23. Question
1 pointsWhich statement is correct about applying firmware updates?Correct
Incorrect
Firmware updates can make the hardware unusable if not performed correctly. Sometimes it is not possible to revert to the original firmware once the update has been performed because of how the changes are applied to the EPROM technology.Hint
Firmware updates can make the hardware unusable if not performed correctly. Sometimes it is not possible to revert to the original firmware once the update has been performed because of how the changes are applied to the EPROM technology. -
Question 24 of 80
24. Question
1 pointsWhat is true about restore points?Correct
Incorrect
Any change from a system restore is reversible. A restore point only contains information about the system and registry settings and therefore cannot be used to backup or recover data files.Hint
Any change from a system restore is reversible. A restore point only contains information about the system and registry settings and therefore cannot be used to backup or recover data files. -
Question 25 of 80
25. Question
1 pointsA user has a computer that is infected with spyware. What should be performed before removing the spyware?Correct
Incorrect
An infected computer that performs a system restore will save the virus or spyware along with the restore point. Therefore, system restore files must be deleted before the removal of malware.Hint
An infected computer that performs a system restore will save the virus or spyware along with the restore point. Therefore, system restore files must be deleted before the removal of malware. -
Question 26 of 80
26. Question
1 pointsA technician is troubleshooting a Windows 7 laptop that takes significantly longer than expected when performing a file search. What is the possible cause?Correct
Incorrect
The Windows indexing service is used to speed up file searches. A slow search may be the result of either the index service not running or not indexing the correct location.Hint
The Windows indexing service is used to speed up file searches. A slow search may be the result of either the index service not running or not indexing the correct location. -
Question 27 of 80
27. Question
1 pointsA user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure?Correct
Incorrect
Backing up important files is the first step in protecting existing data. After backing up, running chkdsk will allow the technician to determine if there are bad sectors on the hard drive, without losing any data.Hint
Backing up important files is the first step in protecting existing data. After backing up, running chkdsk will allow the technician to determine if there are bad sectors on the hard drive, without losing any data. -
Question 28 of 80
28. Question
1 pointsA user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?Correct
Incorrect
The functions of the listed commands are as follows:
- runas - runs a program or tool with different permissions
- rstrui - starts the System Restore utility
- gpresult - displays group policy settings
- gpupdate - refreshes group policy settings
- tasklist - displays currently running applications
Hint
The functions of the listed commands are as follows:- runas - runs a program or tool with different permissions
- rstrui - starts the System Restore utility
- gpresult - displays group policy settings
- gpupdate - refreshes group policy settings
- tasklist - displays currently running applications
-
Question 29 of 80
29. Question
1 pointsA company has recently deployed Active Directory and now a workstation cannot connect to a network resource. A technician takes corrective action by modifying group policy settings. Which command should the technician use to make the workstation synchronize with the new settings?Correct
Incorrect
The functions of the listed commands are as follows:
- runas - runs a program or tool with different permissions
- rstrui - starts the System Restore utility
- gpresult - displays group policy settings
- gpupdate - refreshes group policy settings
- tasklist - displays currently running applications
Hint
The functions of the listed commands are as follows:- runas - runs a program or tool with different permissions
- rstrui - starts the System Restore utility
- gpresult - displays group policy settings
- gpupdate - refreshes group policy settings
- tasklist - displays currently running applications
-
Question 30 of 80
30. Question
2 pointsA wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)Correct
Incorrect
Disabling DHCP and assigning static IP addresses only to authorized devices will prevent unauthorized devices from automatically obtaining IP address information. Without the correct IP address information, the unauthorized devices will not be able to communicate over the network. Disabling DNS will result in all connected devices no longer automatically being able to communicate with network resources by name (IP addresses would have to be used.), but will not prevent unauthorized devices from connecting and enabling potentially malicious access from occurring. Subnetting the network will change the range of IP addresses used but not prevent unauthorized network access. Disabling SSID broadcasts is only applicable to wireless networks, not wired networks.Hint
Disabling DHCP and assigning static IP addresses only to authorized devices will prevent unauthorized devices from automatically obtaining IP address information. Without the correct IP address information, the unauthorized devices will not be able to communicate over the network. Disabling DNS will result in all connected devices no longer automatically being able to communicate with network resources by name (IP addresses would have to be used.), but will not prevent unauthorized devices from connecting and enabling potentially malicious access from occurring. Subnetting the network will change the range of IP addresses used but not prevent unauthorized network access. Disabling SSID broadcasts is only applicable to wireless networks, not wired networks. -
Question 31 of 80
31. Question
1 pointsRefer to the exhibit. In what situation would a technician use this tab?Correct
Incorrect
The Alternate Configuration tab allows a device to have two IP configurations. One configuration might set the network card to DCHP using the General tab and then configure a static IP address for the home network using the Alternate Configuration tab.Hint
The Alternate Configuration tab allows a device to have two IP configurations. One configuration might set the network card to DCHP using the General tab and then configure a static IP address for the home network using the Alternate Configuration tab. -
Question 32 of 80
32. Question
1 pointsOn a PC that is running Windows 7 Ultimate, a user sets up a home entertainment system and creates a homegroup. The user then joins two other PCs to the workgroup, one PC running Windows 7 Starter and the other running Windows 7 Home Basic. What else must the user do in order to have the user accounts on the Windows 7 Home Basic and Windows 7 Starter PCs access the shares on the home entertainment system?Correct
Incorrect
When Windows 7 PCs join a homegroup all user accounts on all the PCs are added to the homegroup. Windows 7 Starter and Windows 7 Home Basic PCs can join the homegroup but cannot be used to create a homegroup.Hint
When Windows 7 PCs join a homegroup all user accounts on all the PCs are added to the homegroup. Windows 7 Starter and Windows 7 Home Basic PCs can join the homegroup but cannot be used to create a homegroup. -
Question 33 of 80
33. Question
1 pointsA user is reporting that a file has been shared specifically with another user on the network, but the other user opens the file and is unable to save it once edited. What is the probable cause?Correct
Incorrect
The permission setting should have been Change or Full Control. The Read permission does not allow edited files to be saved.Hint
The permission setting should have been Change or Full Control. The Read permission does not allow edited files to be saved. -
Question 34 of 80
34. Question
1 pointsWhich character of the Cloud model provides easy monitoring, controlling, reporting, and billing for both the provider and customers?Correct
Incorrect
With measured service of the Cloud model, the resource usage can be easily monitored, controlled, reported, and billed to provide full visibility to both the Cloud service provider and customers.Hint
With measured service of the Cloud model, the resource usage can be easily monitored, controlled, reported, and billed to provide full visibility to both the Cloud service provider and customers. -
Question 35 of 80
35. Question
1 pointsA business organization is configuring security on the mobile devices that are used in the organization. The security policy states that business data on mobile devices should only ever be accessed by employees. Which mobile device security feature can be used to best ensure that business data is rendered completely inaccessible if the device is lost or stolen?Correct
Incorrect
Remote wipe is a security feature that remotely clears the device of all user data to prevent it from being maliciously compromised. Remote lock and the user passcode lock features on mobile devices can help prevent theft of private information but the data remains on the device and may be accessed if the passcode is ever broken. Sandbox describes the running of mobile apps separate from the operating system.Hint
Remote wipe is a security feature that remotely clears the device of all user data to prevent it from being maliciously compromised. Remote lock and the user passcode lock features on mobile devices can help prevent theft of private information but the data remains on the device and may be accessed if the passcode is ever broken. Sandbox describes the running of mobile apps separate from the operating system. -
Question 36 of 80
36. Question
2 pointsAn administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could cause this situation? (Choose two.)Correct
Incorrect
-
Question 37 of 80
37. Question
1 pointsWhat is needed from Apple and Google in order for individual programmers to develop apps for iOS and Android devices?Correct
Incorrect
Both Apple and Google release their own software development kits (SDKs) that allow developers to create apps for iOS and Android mobile devices. Developers can run the SDK and create apps on a simulator. SLA is an agreement between a service provider and customers.Hint
Both Apple and Google release their own software development kits (SDKs) that allow developers to create apps for iOS and Android mobile devices. Developers can run the SDK and create apps on a simulator. SLA is an agreement between a service provider and customers. -
Question 38 of 80
38. Question
1 pointsWhich type of malware is disguised as a legitimate program?Correct
Incorrect
Trojan horses disguise themselves as legitimate programs. Worms replicate themselves across a network. Adware may attach to a legitimate program, but does not disguise itself. Spyware monitors the activities of a user.
Hint
Trojan horses disguise themselves as legitimate programs. Worms replicate themselves across a network. Adware may attach to a legitimate program, but does not disguise itself. Spyware monitors the activities of a user. -
Question 39 of 80
39. Question
1 pointsAfter complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?Correct
Incorrect
The source of the problem cannot be a virus because in this situation the server is passive and at the receiving end of the attack. A replay attack uses intercepted and recorded data in an attempt to gain access to an unauthorized server. This type of attack does not involve multiple computers. The issue is not the bandwidth available, but the number of TCP connections taking place. Receiving a large number of connections from multiple locations is the main symptom of a distributed denial of service attack which use botnets or zombie computers.Hint
The source of the problem cannot be a virus because in this situation the server is passive and at the receiving end of the attack. A replay attack uses intercepted and recorded data in an attempt to gain access to an unauthorized server. This type of attack does not involve multiple computers. The issue is not the bandwidth available, but the number of TCP connections taking place. Receiving a large number of connections from multiple locations is the main symptom of a distributed denial of service attack which use botnets or zombie computers. -
Question 40 of 80
40. Question
1 pointsWhich security threat hides the resources that it uses from antivirus programs?Correct
Incorrect
Rootkits target a known vulnerability to gain administrator-level access. This gives the rootkit the ability to hide itself. Trojans, worms, and spyware do not gain administrator level access.Hint
Rootkits target a known vulnerability to gain administrator-level access. This gives the rootkit the ability to hide itself. Trojans, worms, and spyware do not gain administrator level access. -
Question 41 of 80
41. Question
1 pointsA user receives an email requesting verification of the password that is used to access bank files. What type of security threat is this?Correct
Incorrect
Phishing is a form of attack that starts with the attacker pretending to be a legitimate entity and then tries to gather information that can be used to conduct the exploit.Hint
Phishing is a form of attack that starts with the attacker pretending to be a legitimate entity and then tries to gather information that can be used to conduct the exploit. -
Question 42 of 80
42. Question
1 pointsA cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?Correct
Incorrect
Social engineering is when a person attempts to manipulate another individual to gain access to information or resources to which they are not entitled.Hint
Social engineering is when a person attempts to manipulate another individual to gain access to information or resources to which they are not entitled. -
Question 43 of 80
43. Question
2 pointsWhich two precautions can help prevent social engineering? (Choose two.)Correct
Incorrect
Asking for IDs and escorting visitors are effective ways to prevent social engineering. Users should never keep their passwords in the work area. Eliminating customers is not always practical for business purposes.Hint
Asking for IDs and escorting visitors are effective ways to prevent social engineering. Users should never keep their passwords in the work area. Eliminating customers is not always practical for business purposes. -
Question 44 of 80
44. Question
1 pointsA company has replaced five desktop computers in the accounting and finance department with new computers. The plan is to donate the recovered computers in a fully functional state to a not-for-profit community organization. How can the company ensure that sensitive financial data cannot be accessed once the computers are donated?Correct
Incorrect
Data wiping the hard drives with software that will securely erase all data will ensure that company data cannot later be accessed. This may be time consuming but for a small number of computers this is more cost-effective than the expense of degaussing. Deleting all the files and directories on the hard drives or performing a high-level format on each drive will leave the computers vulnerable to having the company data recovered by specific forensic software. Drilling holes in the hard drive platters would mean that the computers are no longer in working condition.Hint
Data wiping the hard drives with software that will securely erase all data will ensure that company data cannot later be accessed. This may be time consuming but for a small number of computers this is more cost-effective than the expense of degaussing. Deleting all the files and directories on the hard drives or performing a high-level format on each drive will leave the computers vulnerable to having the company data recovered by specific forensic software. Drilling holes in the hard drive platters would mean that the computers are no longer in working condition. -
Question 45 of 80
45. Question
1 pointsA technician needs to permanently destroy data on some drives before disposing of them. What is the best way to do this?Correct
Incorrect
The best way to permanently destroy data is by shattering the platters of the hard drives with a hammer.Hint
The best way to permanently destroy data is by shattering the platters of the hard drives with a hammer. -
Question 46 of 80
46. Question
1 pointsWhich technology allows a mobile device to automatically rotate what is being displayed on the screen as the physical orientation of the device is changed?Correct
Incorrect
An accelerometer allows the device to adapt based on the position of the device. This feature can be disabled or enabled through the Settings > Display option path.Hint
An accelerometer allows the device to adapt based on the position of the device. This feature can be disabled or enabled through the Settings > Display option path. -
Question 47 of 80
47. Question
3 pointsWhat three technologies enable virtual assistants to interact with end users via voice commands? (Choose three.)Correct
Incorrect
A digital assistant, or virtual assistant, relies on artificial intelligence, machine learning, and voice recognition technology to understand conversational-style voice commands.Hint
A digital assistant, or virtual assistant, relies on artificial intelligence, machine learning, and voice recognition technology to understand conversational-style voice commands. -
Question 48 of 80
48. Question
2 pointsWhich two guidelines are appropriate for creating strong passwords? (Choose two.)Correct
Incorrect
Strong passwords should be at least eight characters, and should include upper and lower case letters, numbers, and symbols. Although passwords should be changed regularly as specified in the local security policy, the amount of time between changes has no effect on the creation of strong passwords. Limiting a password to only symbols, or to only numbers and upper case letters, does not provide the strongest password possible.Hint
Strong passwords should be at least eight characters, and should include upper and lower case letters, numbers, and symbols. Although passwords should be changed regularly as specified in the local security policy, the amount of time between changes has no effect on the creation of strong passwords. Limiting a password to only symbols, or to only numbers and upper case letters, does not provide the strongest password possible. -
Question 49 of 80
49. Question
1 pointsA user is able to only access files required to perform a specific task. What type of security practice is being applied?Correct
Incorrect
Limiting access to files or folders that are needed to perform a specific job is known as the principle of least privilege. The other options do not exist.
Hint
Limiting access to files or folders that are needed to perform a specific job is known as the principle of least privilege. The other options do not exist. -
Question 50 of 80
50. Question
3 pointsWhich three items are biometric security devices? (Choose three.)Correct
Incorrect
Fingerprint readers, retina scanners, and voice recognition are all biometric devices, comparing physical characteristics of the user to stored data to authenticate the user. Smart cards, key fobs, and passwords are all security measures, but do not rely on biometrics.
Hint
Fingerprint readers, retina scanners, and voice recognition are all biometric devices, comparing physical characteristics of the user to stored data to authenticate the user. Smart cards, key fobs, and passwords are all security measures, but do not rely on biometrics. -
Question 51 of 80
51. Question
1 pointsHow can a user prevent specific applications from accessing a Windows computer over a network?Correct
Incorrect
Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications.Hint
Network applications have specific TCP or UDP ports that can be left open or blocked in Windows Firewall. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications. -
Question 52 of 80
52. Question
1 pointsA technician is troubleshooting a workstation in a domain that has been infected with a virus. What is the first step the technician should take to clean the infected workstation?Correct
Incorrect
The first step is to disconnect the infected workstation from the network. This will quarantine the infected workstation and prevent the virus from spreading throughout the network.Hint
The first step is to disconnect the infected workstation from the network. This will quarantine the infected workstation and prevent the virus from spreading throughout the network. -
Question 53 of 80
53. Question
1 pointsWhat is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?Correct
Incorrect
Regardless of the levels of security configured on a WLAN, a WPA secured WLAN always requires the use of an encryption key. Without the proper key, a device cannot connect to the network.Hint
Regardless of the levels of security configured on a WLAN, a WPA secured WLAN always requires the use of an encryption key. Without the proper key, a device cannot connect to the network. -
Question 54 of 80
54. Question
1 pointsA technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?Correct
Incorrect
The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network.Hint
The first action a technician should do to secure a new wireless network is to change the default user-name and password of the wireless router. The next action would usually be to configure encryption. Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting to the wireless network. -
Question 55 of 80
55. Question
1 pointsA company has a guest wireless network available for visitors while on the company premises. A technician has noted that unauthorized users are connecting to this wireless network from outside the premises. Which action can be taken to reduce unauthorized connections to the guest wireless network while enabling visitors to still connect quickly and easily without assistance while on the company premises?Correct
Incorrect
Reducing the transmitted radio power to a level that gives network coverage only within the company premises will enable authorized visitors to continue to connect to the guest network connect quickly and easily without assistance, but prevent connection from outside the premises. Enabling MAC address filtering, configuring WPA encryption, and disabling SSID broadcast will prevent unauthorized access to the network. However, these actions will also make it more difficult for visitors to connect when the requirement is for quick and easy access without assistance.Hint
Reducing the transmitted radio power to a level that gives network coverage only within the company premises will enable authorized visitors to continue to connect to the guest network connect quickly and easily without assistance, but prevent connection from outside the premises. Enabling MAC address filtering, configuring WPA encryption, and disabling SSID broadcast will prevent unauthorized access to the network. However, these actions will also make it more difficult for visitors to connect when the requirement is for quick and easy access without assistance. -
Question 56 of 80
56. Question
1 pointsWhat is the most commonly used method to close an application that appears to be frozen on an OS X-based computer?Correct
Incorrect
To use Force Quit, right-click on the application icon that is not responding from the Dock and close the application.Hint
To use Force Quit, right-click on the application icon that is not responding from the Dock and close the application. -
Question 57 of 80
57. Question
1 pointsIn a Linux operating system, which component interprets user commands and forwards them to the OS?Correct
Incorrect
The functions of different components of a Linux system are as follows:
- CLI – command-line interface, accepts user commands
- shell – a program that interprets the user commands and passes them to the OS
- kernel – manages CPU and RAM allocation to processes, system calls, and file systems
- application program – program for various applications
Hint
The functions of different components of a Linux system are as follows:- CLI – command-line interface, accepts user commands
- shell – a program that interprets the user commands and passes them to the OS
- kernel – manages CPU and RAM allocation to processes, system calls, and file systems
- application program – program for various applications
-
Question 58 of 80
58. Question
1 pointsIn the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?Correct
Incorrect
The functions of listed CLI commands of a Linux system are as follows:
- cat – lists the contents of a file
- man – displays the documentation for a specific command
- crontab – manages the cron service for scheduling system tasks
- grep – searches for specific strings of characters within a file or other commands outputs
Hint
The functions of listed CLI commands of a Linux system are as follows:- cat – lists the contents of a file
- man – displays the documentation for a specific command
- crontab – manages the cron service for scheduling system tasks
- grep – searches for specific strings of characters within a file or other commands outputs
-
Question 59 of 80
59. Question
1 pointsIn Linux and OS X, which CLI command can be used to display the name of the current directory?Correct
Incorrect
The functions of listed CLI commands of Linux and OS X systems are as follows:
- ps – lists the process currently running in the system
- pwd – displays the name of the current directory
- sudo – runs a command as another user
- chmod – modifies file permissions
Hint
The functions of listed CLI commands of Linux and OS X systems are as follows:- ps – lists the process currently running in the system
- pwd – displays the name of the current directory
- sudo – runs a command as another user
- chmod – modifies file permissions
-
Question 60 of 80
60. Question
1 pointsA system administrator issues the apt-get command on a laptop that has Ubuntu installed. What is the function provided by the command?Correct
Incorrect
The apt-get utility (also a command) is the Ubuntu Linux package manager. It is used to install, configure, and remove packages.Hint
The apt-get utility (also a command) is the Ubuntu Linux package manager. It is used to install, configure, and remove packages. -
Question 61 of 80
61. Question
1 pointsA computer technician is notified by a user that there are no automated backups being created on an Apple computer. What is the first thing the technician should check?Correct
Incorrect
Time Machine is the OS X backup tool. To verify whether the tool is turned on, access Settings > Time Machine.Hint
Time Machine is the OS X backup tool. To verify whether the tool is turned on, access Settings > Time Machine. -
Question 62 of 80
62. Question
1 pointsA user has been using a smartphone for several hours, but now the applications on the device have become unresponsive. What action should the user take?Correct
Incorrect
Restoring a device to factory defaults should only be done if either or both of the following have failed: restarting the device or turning the device off and powering it back on again.Hint
Restoring a device to factory defaults should only be done if either or both of the following have failed: restarting the device or turning the device off and powering it back on again. -
Question 63 of 80
63. Question
1 pointsA customer is explaining a problem with a computer to a technician. The technician recognizes the problem prior to the customer finishing the explanation. What should the technician do?Correct
Incorrect
It is always important to allow the customer to finish explaining the problem at hand. You should always be attentive and actively listen to the customer without interrupting and acknowledge the customer occasionally to affirm that you are actively listening to the customer.Hint
It is always important to allow the customer to finish explaining the problem at hand. You should always be attentive and actively listen to the customer without interrupting and acknowledge the customer occasionally to affirm that you are actively listening to the customer. -
Question 64 of 80
64. Question
1 pointsAfter consulting the manufacturer manuals, a technician applies a series of recommended solutions that resolve a problem with a workstation computer. What is the next step in the troubleshooting process that the technician should perform?Correct
Incorrect
After the recommended solutions have been applied to resolve the problem, full system functionality should be verified and preventive measures implemented if applicable. This would be followed by documenting the solution and actions. Determining the next steps to resolve the problem and testing the theory of probable cause have already been completed in this scenario.Hint
After the recommended solutions have been applied to resolve the problem, full system functionality should be verified and preventive measures implemented if applicable. This would be followed by documenting the solution and actions. Determining the next steps to resolve the problem and testing the theory of probable cause have already been completed in this scenario. -
Question 65 of 80
65. Question
1 pointsA security audit for the human resources office finds that most employees leave confidential information on the screen when they are out of office for a short period of time. Which Windows control panel link should be used to make the monitor show a screen saver after a few minutes of inactivity and require that the user re-authenticate?Correct
Incorrect
Use the Control Panel > Personalization > Screen Saver path to select a screen saver and enable the On resume, display logon screen option.Hint
Use the Control Panel > Personalization > Screen Saver path to select a screen saver and enable the On resume, display logon screen option. -
Question 66 of 80
66. Question
2 pointsWhen a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)Correct
Incorrect
Two possible solutions to a reported missing or corrupt are to register the DLL file using the regsvr32 command or restart the computer in Safe Mode and run sfc/scannow. Windows Startup Repair is used solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs.Hint
Two possible solutions to a reported missing or corrupt are to register the DLL file using the regsvr32 command or restart the computer in Safe Mode and run sfc/scannow. Windows Startup Repair is used solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs. -
Question 67 of 80
67. Question
1 pointsAfter questioning a user about the problems being experienced with a PC operating system, the support technician suspects that a recent service pack installation has failed. Which step of the troubleshooting process has the technician just concluded?Correct
Incorrect
By suspecting that an operating system service pack has failed to install successfully, the technician has established a theory of probable cause of the problem. The next step would be to test the theory to determine the cause of the problem, followed by establishing a plan of action to resolve the problem. Documentation is the final step and would occur after the solution has been verified and the system restored to full functionality.Hint
By suspecting that an operating system service pack has failed to install successfully, the technician has established a theory of probable cause of the problem. The next step would be to test the theory to determine the cause of the problem, followed by establishing a plan of action to resolve the problem. Documentation is the final step and would occur after the solution has been verified and the system restored to full functionality. -
Question 68 of 80
68. Question
1 pointsA support desk technician is asking a customer a series of questions about a problem connecting to the network. Which step of the troubleshooting process is the technician applying?Correct
Incorrect
Before any solutions can be proposed or tested, the problem must first be identified. This is done by gathering information from the customer by asking questions and clarifying details of the problem.Hint
Before any solutions can be proposed or tested, the problem must first be identified. This is done by gathering information from the customer by asking questions and clarifying details of the problem. -
Question 69 of 80
69. Question
1 pointsA computer technician has successfully returned a laptop to full operation and verified system functionality. Actions the technician performed included modifying the registry and applying patches to the operating systems. What is the next step in the troubleshooting process that the technician should do?Correct
Incorrect
The technician is ready to conclude the troubleshooting process by documenting the solution. The manufacturer manuals and repair logs would be consulted to establish a plan of action and resolve the problem before the solution has been applied. Rebooting the computer, and re-attaching and testing all peripherals, would occur during the testing and verification stage after the solution has been implemented.Hint
The technician is ready to conclude the troubleshooting process by documenting the solution. The manufacturer manuals and repair logs would be consulted to establish a plan of action and resolve the problem before the solution has been applied. Rebooting the computer, and re-attaching and testing all peripherals, would occur during the testing and verification stage after the solution has been implemented. -
Question 70 of 80
70. Question
1 pointsWhat is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?Correct
Incorrect
Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network. A software firewall is used to prevent other users from gaining access to the protected computer. Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network. A proxy server is mostly used to filter traffic based on content.Hint
Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network. A software firewall is used to prevent other users from gaining access to the protected computer. Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network. A proxy server is mostly used to filter traffic based on content. -
Question 71 of 80
71. Question
1 pointsA user reports that a computer is unable to print on an inkjet printer. The technician has determined that there is no paper in the paper bin. What is the next step in the troubleshooting process?Correct
Incorrect
What the technician just did was to determine the exact cause. What is next in the troubleshooting process is to establish a plan of action.Hint
What the technician just did was to determine the exact cause. What is next in the troubleshooting process is to establish a plan of action. -
Question 72 of 80
72. Question
2 pointsA support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)Correct
Incorrect
Angry customers should be allowed to explain the problem, then be redirected to discussing how the problem can be solved. Transferring the customer, replying in a rude tone, and asking unrelated questions will usually increase, not ease, the anger being expressed by the customer.Hint
Angry customers should be allowed to explain the problem, then be redirected to discussing how the problem can be solved. Transferring the customer, replying in a rude tone, and asking unrelated questions will usually increase, not ease, the anger being expressed by the customer. -
Question 73 of 80
73. Question
3 pointsA technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)Correct
Incorrect
The initial reason for accessing the computer, the suspected illegal matter or operations, and the location of the computer are immediately apparent to the technician and should be among the first details documented. Details of past computer users and the duration of the illegal activity are matters that the appropriate investigators will determine. The technical specifications of the computer may have little relevance to its illegal use.Hint
The initial reason for accessing the computer, the suspected illegal matter or operations, and the location of the computer are immediately apparent to the technician and should be among the first details documented. Details of past computer users and the duration of the illegal activity are matters that the appropriate investigators will determine. The technical specifications of the computer may have little relevance to its illegal use. -
Question 74 of 80
74. Question
1 pointsA Windows PC that was formatted with the NTFS file system displays a missing or corrupt DLL error message when a certain program is run. What is the cause of this?Correct
Incorrect
Missing or corrupt DLL files can result when they are uninstalled in error when another program is being uninstalled or there is a failure in the registration process of the DLL during installation.Hint
Missing or corrupt DLL files can result when they are uninstalled in error when another program is being uninstalled or there is a failure in the registration process of the DLL during installation. -
Question 75 of 80
75. Question
2 pointsWhat are two possible symptoms of MBR/GPT corruption in a workstation? (Choose two.)Correct
Incorrect
When the MBR/GPT is corrupted, the workstation cannot identify the active partition in order to load a valid operating system. The error message "Inaccessible Boot Device" indicates that the active partition is determined. However, the device driver is incompatible with the boot controller or BOOTMGR is corrupted. The reason that a workstation continually restarts is probably that the workstation is set to restart when there is a failure or a startup file has become corrupted. The most likely reason for BSOD is an incompatible device driver or a hardware failure.Hint
When the MBR/GPT is corrupted, the workstation cannot identify the active partition in order to load a valid operating system. The error message "Inaccessible Boot Device" indicates that the active partition is determined. However, the device driver is incompatible with the boot controller or BOOTMGR is corrupted. The reason that a workstation continually restarts is probably that the workstation is set to restart when there is a failure or a startup file has become corrupted. The most likely reason for BSOD is an incompatible device driver or a hardware failure. -
Question 76 of 80
76. Question
1 pointsWhen installing application software on a Windows 7 workstation, the user sees an error message indicating that the installation is unsuccessful. What should the user try next?Correct
Incorrect
A possible reason that an application does not install successfully is that the application is not compatible with Windows 7. An application does not register its service if it is not installed successfully. The chkdsk command is used to check and recover disk errors. The bootrec command is used to check and recover the MBR/GPT of a system.Hint
A possible reason that an application does not install successfully is that the application is not compatible with Windows 7. An application does not register its service if it is not installed successfully. The chkdsk command is used to check and recover disk errors. The bootrec command is used to check and recover the MBR/GPT of a system. -
Question 77 of 80
77. Question
1 pointsA new computer workstation has been installed in a small office. The user of the workstation can print a document using a network printer on the LAN, but cannot access the Internet. What is a possible cause of the problem?Correct
Incorrect
The fact that the workstation can print at a networked printer indicates that the TCP/IP stack is functional. However, that the workstation cannot communicate with external networks indicates that the most likely problem is the incorrect default gateway address. If the workstation is configured to obtain an IP address automatically, the DHCP server address does not to be configured.Hint
The fact that the workstation can print at a networked printer indicates that the TCP/IP stack is functional. However, that the workstation cannot communicate with external networks indicates that the most likely problem is the incorrect default gateway address. If the workstation is configured to obtain an IP address automatically, the DHCP server address does not to be configured. -
Question 78 of 80
78. Question
1 pointsWhat is a result when the DHCP servers are not operational in a network?Correct
Incorrect
When workstations are configured with obtaining IP address automatically but DHCP servers are not available to respond to the requests, a workstation can assign itself an IP addresses from the 169.254.0.0/16 network.Hint
When workstations are configured with obtaining IP address automatically but DHCP servers are not available to respond to the requests, a workstation can assign itself an IP addresses from the 169.254.0.0/16 network. -
Question 79 of 80
79. Question
1 pointsA user reports that during the boot up process of a Windows 7 workstation, the message "MBR has been changed or modified" appears. What is the most probable cause of the message?Correct
Incorrect
The change or modification of the MBR by a virus causes the system to display the message. A damaged MBR, damaged boot sector, and damaged Windows system files will cause different error messages to appear.Hint
The change or modification of the MBR by a virus causes the system to display the message. A damaged MBR, damaged boot sector, and damaged Windows system files will cause different error messages to appear. -
Question 80 of 80
80. Question
5 pointsMatch the task to the Windows Control Panel utility. (Not all options are used.)
Sort elements
- view hidden files
- configure PC to use DHCP
- change color quality
- change account settings
- view hardware status
- allow ICMP packets in
-
Folder Options
-
Network and Security Center
-
Display/Display Settings
-
User Accounts
-
Devices and Printers
Correct
Incorrect
Learning with Cisco Netacad, there are many exams and lab activities to do. Some instructor require students to complete all Chapter exams, Pre-Test, Practices Final, Final Exam and Chapter Quiz. No mater what instructors want you to do, examict.com offers all exams and lab activities answers and solutions with clear explanation. Our Experts have verified all exam answers before we published to the website. We recommended you to chose any relevant chapter from the following: