Last Updated on June 14, 2021 by Admin

IT Essentials 7 Chapter 12 Quiz Answers 2020 correct 100%

  1. A user has an iOS device. What will happen if the user forgets the passcode to unlock the device?

    • The user must call Apple to reset the passcode.
    • The user can visit the Apple website to initiate a passcode reset request.
    • The user must perform a full restore from a backup saved in iTunes or iCloud.
    • The user can use the Find My iPhone service on the website www.icloud.com to reset the passcode.
      Answers Explanation & Hints:

      On iOS devices, the passcode is used as part of the encryption key for the entire system. The passcode is not stored anywhere, no one can gain access to the user data on iOS devices, including Apple. A forgotten passcode will render user data unreachable, forcing the user to perform a full restore from a backup saved in iTunes or iCloud.

  2. What three tasks can be done with the iOS device Home button? (Choose three.)

    • wake the device
    • respond to an alert
    • display the navigation icons
    • return to the home screen
    • open audio controls
    • place apps into folders
      Answers Explanation & Hints:

      The physical Home button on an iOS device can perform many functions depending on how it is used. Pressing the button while the device screen is turned off will wake the device. While an app is in use, pressing the Home button will return the user to the Home screen. Double-pressing the Home button while the screen is locked will show the audio controls, which makes it possible to adjust music volume without entering a passcode to enter the system.

  3. A company is creating a new website to be hosted on a Linux server. The system administrator creates the group “webteam” and assigns team members to it. The administrator then creates the directory “webpages” for storing files. Later that day, one of the team members reports of being unable to create files in the “webpages” directory or subdirectories. The administrator uses the ls -l command to view the file permissions. The result displayed is drwxr-xr–. What should the administrator do to allow team members to add and edit files?

    • Add the user to the webteam group.
    • Issue the command chmod 775 –R webteam.
    • Issue the command chmod 775 –R webpages.
    • Make the user the owner of the directory and subdirectories.
      Answers Explanation & Hints:

      The permission of drwxr-x-r- indicates that the owner of the directory may read, write, and execute the files in the directory, the group members may read and execute the files in the directory but cannot create files, and all users may read files in the directory. By issuing the command chmod 775 –R webpages, the group members can create and modify files in the directory and subdirectories. The user is already a member in the group because the user can navigate in the directory and subdirectories.

  4. Which two location-specific services can the GPS feature on a mobile device offer? (Choose two.)

    • playing local songs
    • delivering local advertising
    • displaying local weather information
    • planning a route between two locations
    • displaying a map of a destination city while driving
      Answers Explanation & Hints:

      GPS services allow app vendors and websites to know the location of a device and offer location-specific services such as local weather and advertising.

  5. A user presses the Recent Apps icon on an Android-based smartphone to see a list of recently used apps. What should the user do to remove an app from the list?

    • Swipe the app up.
    • Double tap on the app.
    • Swipe the app down.
    • Swipe the app to either side.
      Answers Explanation & Hints:

      By pressing the Recent Apps icon on the system bar, a list of recently used apps will display. A user can remove an app by swiping it to either side.

  6. Which feature of an Android or iOS mobile device helps prevent malicious programs from infecting the device?​

    • The phone carrier prevents the mobile device app from accessing some smartphone features and programs.
    • The passcode restricts the mobile device app from access to other programs.
    • Mobile device apps are run in a sandbox that isolates them from other resources.
    • The remote lock feature prevents malicious programs from infecting the device.
      Answers Explanation & Hints:

      Because mobile device apps do run in a sandbox (an isolated location) it is difficult for malicious programs to infect the device. The passcode and remote lock features secure the device against unauthorized use. The carrier may disable access to some features and programs based on the service contract, but this a commercial, not a security, function.

  7. What two preventive maintenance tasks should be scheduled to occur automatically? (Choose two.)

    • executing a backup
    • scanning the signature files
    • updating the operating system software
    • resetting devices by applying the factory reset feature
    • checking the disks for bad sectors
      Answers Explanation & Hints:

      To avoid the loss of irreplaceable information, it is critical that regular backups be executed and that the hard drives be checked regularly. The signature files are scanned constantly by antimalware software. Updating the OS should happen when necessary but should not occur automatically. Because the factory reset of a device deletes all settings and user data, a factory reset should only be done if a major issue requires it.

  8. Match the Linux CLI commands to their function. (Not all options are used.)

    • rm —> removes files 
    • man —> displays the documentation for a specific command 
    • ls —> displays the files inside a directory 
    • cd —> changes the current directory 
    • mkdir —> creates a directory under the current directory 
      Answers Explanation & Hints:

      man – displays the documentation for a specific command
      ls – displays the files inside a directory.
      cd – changes the current directory
      mkdir – creates a directory under the current directory
      cp – copies files from source to destination
      mv – moves files to a different directory
      rm – removes files

  9. Which two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.)

    • patching
    • rooting
    • remote wipe
    • sandboxing
    • jailbreaking
      Answers Explanation & Hints:

      Rooting and jailbreaking are the terms that describe unlocking Android and iOS mobile devices to grant users full access to the file system and full access to kernel modules. Remote wipe, sandboxing, and patching are examples of mobile operating system features and functions that are related to device security.

  10. What are two features of the Android operating system? (Choose two.)

    • Android is open source and allows anyone to contribute to its development and evolution.
    • Android has been implemented on devices such as cameras, smart TVs, and e-book readers.
    • All available Android applications have been tested and approved by Google to run on the open source operating system.
    • Each implementation of Android requires a royalty to be paid to Google.
    • Android applications can only be downloaded from Google Play.
      Answers Explanation & Hints:

      As an open source operating system, Android allows anyone to contribute to the development and evolution of compatible software. Android has been implemented on a wide range of devices and platforms including cameras, smart TVs, and e-book readers. Royalties are not payable to Google, and Google has not tested and approved all available Android applications. Android applications are available from a range of sources.

  11. A system administrator is using the crontab command to edit an entry on a Linux server. Which service is the administrator configuring?

    • editing a shell script to run when the server starts
    • installing the new BIOS update when it is available
    • scheduling a task to run at a specific time and date
    • deleting caches and cookies after the web browser closes
      Answers Explanation & Hints:

      In Linux and OS X, the cron service is responsible for scheduled tasks. As a service, cron runs in the background and executes tasks at specific dates and times. Cron uses a schedule table called a cron table that can be edited with the crontab command.

  12. Which three methods can be used to unlock a smartphone? (Choose three.)

    • NFC
    • passcode
    • encryption
    • swipe pattern
    • QR code scan
    • biometric information
      Answers Explanation & Hints:

      A smartphone should use the screen lock feature to protect sensitive information. To unlock the device, a password or passcode is required. Smartphones also support pattern locks, or swipe locks. Pattern locks eliminate the time it takes to type passwords or pin numbers. You just need to join the dots (numbers) on the keypad in a specific pattern and the phone is unlocked. Many modern mobile devices come with biometric authentication capability such as fingerprint sensors and face recognition for unlocking the device.

  13. True of False?

    Android and OS X are based on the Unix operating system.

    • true
    • false
      Answers Explanation & Hints:

      Both the OS X and Android operating systems use the Unix operating software as a base.

  14. What are two types of cloud-enabled services for mobile devices? (Choose two.)

    • locator apps
    • remote backup
    • passcode configuration
    • screen calibration
    • screen app locking
      Answers Explanation & Hints:

      Locator apps and remote backup are two types of cloud-enabled services for mobile devices. Passcode configuration, screen calibration and screen app locking are performed on the device directly by the user, not as a cloud-enabled service.

  15. A person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on. What was this person doing to the device?

    • a normal power off
    • a factory reset
    • a full backup to the iCloud
    • a standard reset of the device
    • an operating system update
      Answers Explanation & Hints:

      If a problem occurs with an Android device that cannot be solved with a normal power off and on, a user can try a reset of the device. Holding the power button and the volume down keys until the device powers off and then powering it on is one of the ways to reset most Android devices.

  16. How is the representation of apps in the Windows Phone operating system interface different from the representations used in Android and iOS?

    • Windows Phone uses rectangles that can display active content and that can also be resized.
    • Windows Phone uses buttons that must be tapped before an app can be seen.
    • Windows Phone uses widgets that, when deleted from the Start screen, also delete the associated app.
    • Windows Phone uses badges that indicate the system resources used by each app.
      Answers Explanation & Hints:

      In the Windows Phone interface, apps are represented by tiles. Tiles are not only short cuts to an app. They can display active content and they can be resized to unclutter and visually organize screens.

5 1 vote
Article Rating
Subscribe
Notify of
guest
2 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments