IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 2022 2023 Full 100% correct 100%

Cisco Netacad ITE v7 – IT Essentials (Version 7.00) – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 2022 2023 Full 100%

  1. What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)​

    • enabling app access to the root directory
    • not properly creating or maintaining sandboxing features
    • allowing the user interface to be extensively customized
    • improving device performance
    • enabling features that are disabled by a cellular carrier

      Answers Explanation & Hints:

      Rooting and jailbreaking mobile devices allows customization of the OS which enables user and app access to the root directory. In addition, rooting and jailbreaking may cause a device to not properly create or maintain sandboxing features. Both of these can create security risks to the device. The three incorrect options are all considered potential benefits of rooting and jailbreaking mobile devices

  2. What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)

    • Execute a factory reset once a month to remove all unidentified malicious software.
    • Back up user data on a regular basis.
    • Password protect iTunes or Google Play accounts.
    • Use airplane mode if you are accessing the Internet at an open Wi-Fi site.
    • Ensure that the operating system software and applications contain the latest updates.
    • Unmount all unused disk partitions.

      Answers Explanation & Hints:

      To help secure and protect the software and data on mobile devices, it is a best practice to do frequent backups. Another best practice is to ensure that all patches and updates are applied to software and applications. Patches and updates usually fix vulnerabilities as well as introduce new features.

  3. A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)

    • The airplane mode is turned on.
    • An app is using too many resources.
    • An app is not compatible with the device.
    • The device is roaming between call towers.
    • The display is set to a high level of brightness.
    • The device is connecting over a VPN.

      Answers Explanation & Hints:

      Quick battery draining is most likely caused by roaming between call towers, a display that is set to a high level of brightness, or apps that are using too many resources. If an app is not compatible with the device, the device OS will freeze. If the operating system has encountered an error, the device will fail to respond.

  4. Drag the statments on the left to the mobile OS that they describe on the right. (Not all targets are used.)

    IT Essentials 7 - IT Essentials 7.0 Practice Final Ch 10 - 14 Exam Answers 01
    IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 01
  5. Refer to the exhibit. A user issues the command ls -l in a Linux system. Match the description to the result of the command output. (Not all options are used.)

    IT Essentials 7 - IT Essentials 7.0 Practice Final Ch 10 - 14 Exam Answers 001
    IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 001
    IT Essentials 7 - IT Essentials 7.0 Practice Final Ch 10 - 14 Exam Answers 02
    IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 02
  6. Which two operations can help prevent a mobile device from being tracked without permission? (Choose two.)

    • Turn off the GPS when not in use.
    • Use a VPN connection whenever possible.
    • Set the device to not store credentials.
    • Set the device to connect only to known WiFi networks.
    • Disable or remove apps that allow connections to the GPS.

      Answers Explanation & Hints:

      Device tracking relies on GPS function. Turning off the GPS when not in use and disabling or removing apps that use the GPS function may prevent a device from being tracked.

  7. Which component uses the greatest amount of power on most mobile devices?

    • LCD screen
    • camera
    • CPU
    • media player

      Answers Explanation & Hints:

      The LCD screen consumes the most power on most mobile devices. The CPU, camera, and media player use power, but less extensively than the LCD screen does.

  8. What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?

    • Disk Utility
    • Deja Dup
    • Disk Error-Checking
    • System Restore

      Answers Explanation & Hints:

      The Mac Disk Utility allows an administrator to configure automatic disk backups. The Deja Dup tool is a tool built into the Linux OS for backing up data. Disk Error-Checking is a Windows tool for checking the integrity of files and folders. The System Restore tool is a Windows tool for allowing an administrator to roll back the operating system to a previous configuration.

  9. A network technician is troubleshooting a DHCP issue for a user and has requested assistance from a senior technician. The senior technician provides the graphic to illustrate configuration options. What is the purpose of the Alternate Configuration feature?

    IT Essentials 7 - IT Essentials 7.0 Practice Final Ch 10 - 14 Exam Answers 002
    IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 002
    • It allows an administrator to change the MAC address of the PC in order to receive another IP address from a DHCP server.
    • It allows an administrator to specify the IP address of a DHCP server when a PC is having trouble receiving an IP address dynamically.
    • It allows an administrator to choose a secondary network interface card (NIC) for the PC to use if it is having difficulty contacting a DHCP server.
    • It allows an administrator to configure an alternative IP address for the PC to use if it is unable to contact a DHCP server.

      Answers Explanation & Hints:

      The Windows Internet Protocol Version 4 (TCP/IPv4) Properties window includes an Alternate Configuration tab which allows an administrator to configure an alternative IP address for the PC to use if it is unable to contact a DHCP server.

  10. Match remote access authentication methods to the description. (Not all options are used.)

    IT Essentials 7 - IT Essentials 7.0 Practice Final Ch 10 - 14 Exam Answers 03
    IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 03
  11. When a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)

    • Reinstall the correct drivers.
    • Use the msconfig command to adjust the startup settings for the program.
    • Run Windows Startup Repair.
    • Run sfc/scannow in Safe Mode.
    • Register the DLL file using the regsvr32 command.

      Answers Explanation & Hints:

      Two possible solutions to a reported missing or corrupt are to register the DLL file using the regsvr32 command or restart the computer in Safe Mode and run sfc/scannow . Windows Startup Repair is used solve Windows startup problems. Adjusting the program startup settings by using msconfig is applicable only to programs that start correctly. Drivers relate to hardware, not to programs.

  12. A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)

    • The index service is not running.
    • The computer has a virus.
    • An update has corrupted the operating system.
    • The UAC has been turned off.
    • The user has breached the user security policy.
    • The CPU needs to be upgraded.

      Answers Explanation & Hints:

      If a computer locks without an error message, hardware or software could be the issue. Problems could include the following:The CPU or FSB are set incorrectly on the motherboard or in the BIOS.
      The computer is overheating.
      An update has corrupted the operating system.
      The RAM is failing or a RAM module is failing.
      The hard drive is failing.
      The power supply is failing.
      The computer has a virus.

  13. A user has submitted a trouble ticket stating that their computer is showing the error “BOOTMGR is missing”. The IT technician replicates the error and finds that it occurs after the POST of this Windows 10 machine. What are two possible solutions for this problem? (Choose two.)

    • Restore BOOTMGR using the Windows Recovery Environment.
    • Run virus removal software.
    • Run chkdsk /F /R from the recovery console.
    • Run the bootrec /fixboot command.
    • Use the last known good configuration to boot the computer.

      Answers Explanation & Hints:

      The message “BOOTMGR is missing” could be a symptom of a missing or damaged BOOTMGR, a Boot Configuration Data file missing or damaged, a boot order not set correctly in BIOS, a corrupted MBR, or a failing hard drive. Because the OS cannot be located to start, the fix cannot be done using a regular command.

  14. A user calls the help desk and reports that invalid system disk or invalid boot disk error messages display on the workstation when it is powered on. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician suspects that the MBR is corrupted.

    • Which process can the technician use to check and repair the MBR?
    • Run the sfc command.
    • Run the chkdsk command.
    • Run the bootrec command.
    • Boot the workstation in Safe Mode.

      Answers Explanation & Hints:

      The bootrec command can be used to repair and troubleshoot MBR issues. The chkdsk command can be used to check the integrity of files and folders by scanning the hard disk surface for physical errors. The sfc command can be used to verify and replace important Windows system files.

  15. A technician is visiting a website and is using Google Chrome on a Windows 10 PC. The technician is trying to view the password for the website. The technician uses the Credential Manager to view the password but cannot see it. What could be the cause?

    • The browser had crashed after accessing the website.
    • The Credential Manager will only store system passwords.
    • The website visited placed a cookie disallowing the storage of the password.
    • Web credentials are not saved for sites accessed by browsers other than Explorer and Edge.

      Answers Explanation & Hints:

      Windows Credential Manager will only store passwords for websites that are visited using Explorer or Edge. Credentials created with other browsers must be managed from within the browser software.

  16. A technician wants to split a large partition on a drive in a Windows 10 PC without loss of any data. How can this be accomplished?

    • Shrink the existing partition and create a new partition from the unallocated space.
    • Delete the existing partition and create two new partitions.
    • Reinitialize the disk and create new partitions.
    • Delete the existing partition and format the disk with two new partitions.

      Answers Explanation & Hints:

      Use Disk Manage r to shrink the size of the existing partition. This creates unallocated space that can be used to create a new partition without loss of data on the existing partition.

  17. A technician is troubleshooting a Windows 10 PC. The PC has an application that displays an error message about a missing DLL. The technician has located the DLL file on the PC and wants to register it. Which command line tool can the technician use for the task?

    • regedit
    • regsvr32
    • dism
    • sfc

      Answers Explanation & Hints:

      The administrative command line tool regsvr32 in Windows 10 can be used to register and unregister .dll files and ActiveX controls in the Registry.

  18. A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the internet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue?

    • Adjust the default gateway IPv4 address on the laptop.
    • Implement an Alternate Configuration IPv4 address on the laptop.
    • Modify the DNS server IPv4 address on the laptop.
    • Modify the proxy settings used on the laptop.

      Answers Explanation & Hints:

      By setting up an alternate IPv4 address on the laptop, the user will be able to move between a network with DHCP and another network that requires a static IPv4 address.

  19. A technician is troubleshooting a Windows 10 computer that displays an “Invalid Boot Disk” error message. What should be the first action the technician should take to troubleshoot the issue?

    • Use the last known good configuration to boot the computer.
    • Change the boot order in the UEFI/BIOS settings to select the drive that has the operating system installed as the first boot device.
    • Run the command chkdsk .
    • Boot the computer in Safe Mode and run sfc / scanno w .

      Answers Explanation & Hints:

      The first thing the technician should do when addressing an “Invalid Boot Disk” error message is to ensure that the boot order in the UEFI/BIOS settings is set to drive that has the operating system installed as the first boot device.

  20. Match the scripting language with the script file name extension. (Not all options are used.)

    IT Essentials 7 - IT Essentials 7.0 Practice Final Ch 10 - 14 Exam Answers 04
    IT Essentials 7 – IT Essentials 7.0 Practice Final Ch 10 – 14 Exam Answers 04

    Answers Explanation & Hints:

    Linux Shell Script is .sh<br />Linux Shell Script uses a file extension of .sh.<br />Windows Batch File uses a file extension of .bat.<br />PowerShell uses a file extension of .ps1.<br />Python uses a file extension of .py.<br />JavaScript uses a file extension of .js.<br />VBScript uses a file extension of .vbs.

  21. Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)

    • hard disk drives
    • solid state drives
    • RAM
    • cache
    • CPU registers

      Answers Explanation & Hints:

      Persistent data is data stored on an internal or external hard drive, or an optical drive. Data is preserved when the computer is turned off.

  22. Which two statements are correct about level one and level two technicians? (Choose two.)

    • Level two technicians are usually more knowledgeable about technology than the level one technicians are.
    • Level two technicians prepare a work order and escalate it to a level one technician if a problem cannot be resolved within ten minutes.
    • Level one technicians usually work on the problems that require opening up the computer case.
    • Level two technicians usually respond to the “down calls” as they may be able to resolve them faster.
    • Level two technicians are often referred to as “incident screeners,” and level one technicians are often referred to as “product specialists.”

      Answers Explanation & Hints:

      Call centers sometimes have different names for level one and level two technicians. Level one technicians might be known as level one analysts, dispatchers, or incident screeners. Level two technicians might be known as product specialists or technical-support personnel.
      The level two technician is usually more knowledgeable than the level one technician is about technology, or has been working for the company for a longer period of time. When a problem cannot be resolved within a predetermined amount of time, the level one technician prepares an escalated work order.

  23. Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.)

    • Document the reason the customer called and create a support ticket.
    • Inform the customer of the need to call back later.
    • Escalate the customer to a level two technician.
    • Ask the customer further questions to diagnose and attempt to fix the problem.
    • Place the customer on hold until the customer has time to cool down.

      Answers Explanation & Hints:

      When a customer contacts a call center, the level one technician should always create a ticket and document the problem that the customer is experiencing. If the level one technician is unable to provide assistance, the technician should escalate the ticket to a level two technician.

  24. What two roles or tasks are associated with level two technicians? (Choose two.)

    • remotely updating drivers and software on customer computers
    • prioritizing incoming calls according to their severity
    • gathering customer information to initiate a work order
    • escalating a trouble ticket to a higher level technician
    • gathering diagnostic information from a customer computer

      Answers Explanation & Hints:

      Level two technicians are primarily tasked with receiving and working on escalated work orders. Their tasks involve using remote access software to connect to the computer of a customer to perform maintenance and fixes.

  25. When performing computer forensics what is required to prove a chain of custody?

    • proper documentation procedures
    • an admission of guilt
    • collected evidence
    • expert testimony

      Answers Explanation & Hints:

      A chain of custody requires accurate and thorough documentation to track the collected evidence.

  26. A technician has copied several commercial movies to a company server to be shared with colleagues. How would this behavior be classified?

    • acceptable
    • ethically wrong but legal
    • illegal but ethical
    • ethically wrong and illegal

      Answers Explanation & Hints:

      It is not permissible to install, copy, or share digital content (including software, music, text, images, and video) in violation of copyright and software agreements or applicable laws. This is legally and ethically wrong.

  27. A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?

    • Tell the customer to install 2 GB of DDR3 PC3-10600 RAM.
    • Explain that the original technician is no good and the supervisor will be told.
    • Suggest that the customer purchase a new computer.
    • Confirm the issues and give detailed instructions to solve the problem.

      Answers Explanation & Hints:

      When dealing with customers, a technician must show professionalism in all aspects. When explaining the solution to solve the problem, a technician should provide a simple step-by-step process of instructions. The technician should speak in plain terms and avoid the industry jargon.

  28. A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?

    • Explain to the customer that it is a simple task and ask the customer to try it again.
    • Ask the customer to find someone with more experience to perform the task.
    • Tell the customer that another technician will explain the task .
    • Determine whether the customer would prefer to receive the instructions in another form, such as emailed, illustrated written instructions.

      Answers Explanation & Hints:

      When providing a solution to solve a problem, a technician should prepare to explain alternative ways that the technician can help the customer, if necessary, such as emailing information, faxing step-by-step instructions, or using remote control software to solve the problem.

  29. An IT technician is troubleshooting a file error on an employee laptop. While working in the system files directory, the technician notices that the User Account Control (UAC) box appears requesting a password. What should the IT technician do next?

    • Call the employee and apologize for the delay in repairs and request the administrator password over the phone.
    • Shutdown the laptop and email the employee with a request for the administrator account password of the supervisor.
    • Call the employee and ask the employee to come to the IT department to enter the necessary credentials.
    • Shutdown the laptop, boot it from a bootable CD/USB, and modify the system files to complete the repair.

      Answers Explanation & Hints:

      The employee may have dropped off the laptop expecting repairs using the local user account. It is important to get permission from the customer before accessing other computer accounts, including the administrator account. If private information, such as usernames and passwords are being collected, it is important to keep them as confidential as possible.

  30. What is the best definition of personally identifiable information (PII)?

    • Data that is collected by businesses to track the digital behavior of consumers.
    • Data that is collected from servers and web browsers using cookies in order to track a consumer.
    • Data that is collected by businesses to distinguish identities of individuals.
    • Data that is collected from servers and websites for anonymous browsing.

      Answers Explanation & Hints:

      Personally identifiable information (PII) is data that could be used to distinguish the identity of an individual, such as mother’s maiden name, social security number, and/or date of birth.

  31. Which two Windows operating systems cannot be upgraded to Windows 8.1 64-bit? (Choose two.)

    • Windows 7 32-bit
    • Windows XP 64-bit
    • Windows 7 64-bit
    • Windows Vista 64-bit
    • Windows 8 64-bit

      Answers Explanation & Hints:

      Neither Windows XP nor Windows 7 32-bit can be upgraded to Windows 8.1 64-bit. A 32-bit operating system cannot be upgraded to a 64-bit operating system. A Windows XP system cannot be directly updated to Windows 8.1. In either of these cases, a clean installation must be performed.

  32. A user wishes to upgrade a PC to Windows 10 from a PC that is running a 32-bit version of Windows 7. Which two editions of Windows 10 will support this upgrade? (Choose two).

    • 32-bit Windows Home
    • 32-bit version of Windows 10 Pro
    • 64-bit version of Windows 10 Pro
    • 64-bit version of Windows Home
    • 64-bit version of Windows 10 Enterprise

      Answers Explanation & Hints:

      Windows Home, Windows XP, and Windows Vista are not supported in the upgrade path to Windows 10. The 64-bit version of Windows 10 Enterprise cannot be downgraded to Windows 10.

  33. After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure?

    • Create a System Repair Disc and restore the image.
    • Press the F12 key during the boot process and start the computer in Safe Mode.
    • Boot from a Windows 7 installation media and access the System Restore utility.
    • Access the Control Panel and choose Restore Files from Backup from the System and Security menu.

      Answers Explanation & Hints:

      There are many reasons that could cause a PC not to start, including hardware failure, MBR corruption, a hardware driver that was not installed properly, etc. One approach for PC troubleshooting is to boot the PC with a Windows 7 installation DVD and use the System Restore utility to restore the system. To access Safe Mode, we need to press the F8 key (not the F12 key). The other two options assume that the PC can start.

  34. Which statement is correct about installing a 32-bit operating system on a x64 architecture?

    • The OS will always make use of all the RAM available.
    • The OS will run correctly.
    • The OS can address more than 128 GB of memory.
    • This combination will provide better security.

      Answers Explanation & Hints:

      A 32-bit operating system can run on a x64 architecture, but it will not be able to use more than 4 GB of the system memory. A 64-bit OS includes features that provide additional security.

  35. A technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive?

    • 1
    • 2
    • 4
    • 16
    • 32
    • 128

      Answers Explanation & Hints:

      Master boot record (MBR) is the boot sector standard that supports a maximum primary partition of 2TB. MBR allows four primary partitions per drive. The globally unique identifier (GUID) partition table standard (GPT) can support enormous partitions with a theoretical maximum of 9.4ZB (9.4 x 10 to the 24th bytes). GPT supports a maximum of 128 primary partitions per drive.

  36. A network administrator is tasked with deployment of Windows 10 Pro for a large number of new PCs in the company. The administrator uses a PC to perform a base installation together with standard company applications. The PC is tested to be fully functional. Which tool must the administrator use to remove all computer and user specific information before building a deployable image from the disk?

    • Ntoskrnl.exe
    • Sysprep.exe
    • Unattended.bat
    • Windows Easy Transfer

      Answers Explanation & Hints:

      When a base installation of an OS together together with applications is being performed, some computer and user specific information is included. This includes such items as SID, user accounts, and time zone. Before an image for deployment is finally created, the specific information must be removed. The Microsoft System Preparation (sysprep.exe) tool can be used for the task.

  37. A network analyst is booting a PC that has Windows 8 installed. The boot process is currently working on the following step: The BIOS boots the computer using the first drive that contains a valid boot sector. What is the next step that will happen in the boot process?

    • The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager.
    • WINLOGON.EXE displays the Windows Welcome screen
    • NTOSKRNL.EXE starts the login file called WINLOGON.EXE.
    • The Windows kernal takes over the boot process.
  38. A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are two purposes of botnets? (Choose two.)

    • to attack other computers
    • to gain access to the restricted part of the operating system
    • to record any and all keystrokes
    • to transmit viruses or spam to computers on the same network
    • to withhold access to a computer or files until money has been paid

      Answers Explanation & Hints:

      Botnets can be used to perform DDoS attacks, obtain data, or transmit malware to other devices on the network.

  39. A company has a security policy that permits the reuse of wiped drives in other computers. The wiped drives are often used for additional storage or as a replacement drive. What are two methods that could be used to wipe data? (Choose two.)

    • biometric scanner
    • data wiping software
    • degaussing equipment
    • EFS encryption
    • multifactor erasure

      Answers Explanation & Hints:

      Data wiping software overwrites data multiple times. A degaussing wand or degaussing device uses magnetism to destroy data on a hard drive.

  40. A technician is configuring a SOHO computer. The technician wants to create a local account that requires a password and wants a screen saver to appear if the person using the computer steps away for a period of time. Which two Windows Control Panels will the technician use to accomplish these tasks? (Choose two.)

    • Ease of Access
    • Hardware and Sound
    • Network and Internet
    • Personalization
    • Programs
    • User Accounts

      Answers Explanation & Hints:

      The User Accounts Windows Control Panel is used to create and manage local user accounts and configure passwords for each account. The Personalization Windows Control Panel is used to access the Screen Saver Settings window where the computer can be configured to display the logon screen if there is no use for a preconfigured amount of minutes.

  41. After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

    • Check for the latest OS patches and updates.
    • Document the problem and the procedures performed to solve it.
    • Talk with the user to determine the cause of the problem.
    • Gather information from a number of sources to clearly identify the problem.

      Answers Explanation & Hints:

      After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.

  42. What is the next troubleshooting step after a theory of probable cause has been established?

    • Test the theory to determine cause.
    • Identify the exact problem.
    • Establish a plan of action.
    • Document findings and outcomes.

      Answers Explanation & Hints:

      There are six steps in the troubleshooting process.
      1. Identify the problem.
      2. Establish a theory of probable cause.
      3. Test the theory to determine cause.
      4. Establish a plan of action to resolve the problem.
      5. Verify full system functionality.
      6. Document findings.

  43. When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?

    • network policy
    • least privilege
    • audit
    • password

      Answers Explanation & Hints:

      Users should have access to information on a need to know basis. When a user moves from job role to job role, the same concept applies.

  44. A technician has been notified of a problem on the network. After investigation, the technician determines that a specific internal company computer is launching an attack on other company computers. Which type of malware is being used?

    • DoS
    • rootkit
    • Trojan
    • spoofing

      Answers Explanation & Hints:

      A proxy Trojan is a type of malware that uses one computer as a source device to launch attacks to other devices. Malware evolves quickly so it is important to obtain the most recent antimalware updates as a protective measure.

  45. What is a recommended best practice for a technician who must perform tasks that require administrative access?

    • Using a standard account with limited permissions, use the Run as Administrator option to perform the task that requires elevated privileges.
    • Log off the computer and then log in with an account with administrator privileges.
    • Prevent the computer from contacting the network authentication server by disabling the network card and then log in with an administrator account.
    • Ask the current user to log off, restart the computer, and then log in with the administrator account.

      Answers Explanation & Hints:

      In addition to nontechnical users having a standard user account, it is also a best practice to make technical staff use a limited account. Then when an administrative task is needed, the technician uses the Run as Administrator option and provides the appropriate credentials of an account that has elevated credentials for the one task.

  46. A client installed a new driver for a device three weeks ago; however, this driver is causing the system to freeze occasionally and the client wishes to revert back to the old driver. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Restart the Windows Update services.
    • Uninstall and reinstall the device using device manager.
    • Restore using Sysprep.
  47. A technician is working on a Windows 10 PC that keeps freezing occasionally after a driver update. System restore has been turned off. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Uninstall and reinstall the device using device manager.
    • Restart the Windows Update services.
    • Restore using Sysprep.
  48. A user tries to install an application on a Windows 10 Pro PC but it fails. The user tries to uninstall the application but it fails to uninstall. What option can be used to address this issue without loss of data or applications?

    • Use Restore Point.
    • Use Advanced Start-up.
    • Restart the Windows Update services.
    • Uninstall and reinstall the device using device manager.
  49. A technician is troubleshooting a Windows 10 PC that will not do any windows updates automatically or manually. What option can be used to address this issue without loss of data or applications?

    • Delete all the files in C:\Windows\SoftwareDistribution folder and restart the PC.
    • Perform a repair of Windows using Installation media.
    • Restart the Windows Update services.
    • Uninstall and reinstall the device using device manager.
  50. A technician is troubleshooting a Windows 10 PC that will not do any windows updates automatically or manually. What option can be used to address this issue without loss of data or applications?

    • Delete all the files in C:\Windows\SoftwareDistribution folder and restart the PC.
    • Restore using Sysprep.
    • Restart the Windows Update services.
    • Uninstall and reinstall the device using device manager.
  51. A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Restore using Sysprep.
    • Restart the Windows Update services.
    • Uninstall and reinstall the device using device manager.
  52. A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Restore using Sysprep.
    • Go back to the initial Windows build.
    • Use Advanced Start-up.
  53. A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Restart the Windows Update services.
    • Go back to the initial Windows build.
    • Use Advanced Start-up.
  54. A client installed a new driver for a device three weeks ago; however, this driver is causing the system to freeze occasionally and the client wishes to revert back to the old driver. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Restart the Windows Update services.
    • Go back to the initial Windows build.
    • Use Advanced Start-up.
  55. A client installed a new driver for a device three weeks ago; however, this driver is causing the system to freeze occasionally and the client wishes to revert back to the old driver. What option can be used to address this issue without loss of data or applications?

    • Reset this PC.
    • Uninstall and reinstall the device using device manager.
    • Go back to the initial Windows build.
    • Use Advanced Start-up.
  56. A user wants to check a file system for errors, including errors with physical media. Which administrative command-line tool or command can be used to address this?

    • chkdsk
    • type
    • net user
    • robocopy
  57. A technician wants to create customized system image files that will be installed on computers in the network. Which administrative command-line tool or command can be used to address this?

    • dism
    • robocopy
    • type
    • chkdsk
  58. A user wants to terminate a running process on a computer. Which administrative command-line tool or command can be used to address this?

    • taskkill
    • robocopy
    • type
    • chkdsk
  59. A technician wants to copy files and entire directory trees from one volume to another volume on a Windows 10 PC. Which administrative command-line tool or command can be used to address this?

    • robocopy
    • type
    • net user
    • chkdsk
  60. A technician is troubleshooting a Windows 10 PC that has a .dll file for an application that has not been registered. Which administrative command-line tool or command can be used to address this?

    • regsvr32
    • type
    • net user
    • robocopy
  61. A user wants to display the contents of a text file in a command interpreter. Which administrative command-line tool or command can be used to address this?

    • type
    • robocopy
    • net user
    • chkdsk
  62. A technician is troubleshooting a Windows 10 PC that has corrupted system files. Which administrative command-line tool or command can be used to address this?

    • sfc
    • chkdsk
    • robocopy
    • diskpart
  63. A user wants to display and change information about computer users. Which administrative command-line tool or command can be used to address this?

    • net user
    • diskpart
    • chkdsk
    • mstsc
  64. A user wishes to see a summary of software information and system components, including hardware components, on a Windows 10 PC. Which administrative command-line tool or command can be used to address this?

    • msinfo32
    • chkdsk
    • robocopy
    • diskpart
  65. A technician has just configured the security policy on a Windows 10 PC and wants to ensure the policy is implemented immediately. Which administrative command-line tool or command can be used to address this?

    • gpupdate
    • diskpart
    • chkdsk
    • mstsc
  66. A technician has been asked by a manager to recommend a security solution for protecting a computer against keyloggers. Which security technique should the technician recommend?

    • antimalware
    • IPS
    • encryption
    • SSL
  67. A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

    • antimalware
    • IPS
    • encryption
    • SSL
  68. A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

    • antimalware
    • ping sweep
    • encryption
    • SSL
  69. A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

    • antimalware
    • ping sweep
    • encryption
    • SSL
  70. A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

    • antimalware
    • port scan
    • encryption
    • SSL
  71. A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

    • antimalware
    • port scan
    • encryption
    • SSL
  72. A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

    • antimalware
    • RAID
    • dual authentication
    • encryption
  73. A technician has been asked by a manager to recommend a security solution for protecting a computer against firmware viruses. Which security technique should the technician recommend?

    • antimalware
    • RAID
    • dual authentication
    • encryption
  74. A technician has been asked by a manager to recommend a security solution for protecting a computer against firmware viruses. Which security technique should the technician recommend?

    • antimalware
    • TPM
    • dual authentication
    • encryption
  75. A technician has been asked by a manager to recommend a security solution for protecting a computer against boot sector viruses. Which security technique should the technician recommend?

    • antimalware
    • TPM
    • dual authentication
    • encryption
  76. True or False? Smartphones require an operating system before they can be operated.

    • True
    • False
  77. True or False? Modern operating systems boot the computer, manage the file system, and support only one user, task, or CPU.

    • False
    • True
  78. True or False? When a hardware device is installed, the operating system needs to use a device driver to access and use that hardware.

    • True
    • False
  79. True or False? When a user is working on a system that uses a network file system, there is no difference between accessing a file stored locally or on another computer on the network.

    • True
    • False
  80. True or False? Windows 10 64-bit version can be installed on as little as 1GB of hard drive space.

    • False
    • True
  81. True or False? DirectX is a collection of APIs related to multimedia tasks for Microsoft Windows.

    • True
    • False
  82. True or False? The registry is a database that only contains information about the device drivers on a computer.

    • False
    • True
  83. True or False? Multitasking describes a computer operating system that is capable of running multiple applications at the same time.

    • True
    • False
  84. True or False? Multithreading describes an operating system that can support two or more CPUs.

    • False
    • True
  85. True or False? Hard drives partitioned with a master boot record (MBR) cannot have an extended partition or logical drives.

    • False
    • True
  86. An instructor is discussing facts about different mobile device operating software. The instructor states: “The start voice control function can be performed with the home button.” To which OS does this relate: iOS, Android, or both?

    • iOS
    • both
    • Android
  87. An instructor is discussing facts about different mobile device operating software. The instructor states: “To synchronize a mobile device to a PC, iTunes must be installed on the PC.” To which OS does this relate: iOS, Android, or both?

    • iOS
    • both
    • Android
  88. An instructor is discussing facts about different mobile device operating software. The instructor states: “The mobile devices have a feature called Spotlight that is a search tool that provides information from many sources.” To which OS does this relate: iOS, Android, or both?

    • iOS
    • both
    • Android
  89. An instructor is discussing facts about different mobile device operating software. The instructor states: “This OS can be used by programmers to operate devices like laptops, smart TVs, and e-book readers.” To which OS does this relate: iOS, Android, or both?

    • Android
    • both
    • iOS
  90. An instructor is discussing facts about different mobile device operating software. The instructor states: “The icon on the Home screen is a shortcut to the app.” To which OS does this relate: iOS, Android, or both?

    • Android
    • both
    • iOS
  91. An instructor is discussing facts about different mobile device operating software. The instructor states: “To help prevent malicious programs from infecting the device, mobile device apps are run in a sandbox that isolates them from other resources.” To which OS does this relate: iOS, Android, or both?

    • both
    • Android
    • iOS
  92. An instructor is discussing facts about different mobile device operating software. The instructor states: “WIFI hotspots are a location data source that can be used by locator apps to determine the position of a mobile device.” To which OS does this relate: iOS, Android, or both?

    • both
    • Android
    • iOS
  93. An instructor is discussing facts about different mobile device operating software. The instructor states: “Remote backups are a cloud-enabled service for mobile devices.” To which OS does this relate: iOS, Android, or both?

    • both
    • Android
    • iOS
  94. An instructor is discussing facts about different mobile device operating software. The instructor states: “GPS signals are used to enable geocaching, geotagging and device tracking on these mobile devices.” To which OS does this relate: iOS, Android, or both?

    • both
    • iOS
    • Android
  95. An instructor is discussing facts about different mobile device operating software. The instructor states: “The user interface can be extensively customized using rooting or jailbreaking into a mobile device.” To which OS does this relate: iOS, Android, or both?

    • both
    • Android
    • iOS
  96. A user calls the help desk and reports that invalid system disk or invalid boot disk error messages display on the workstation when it is powered on. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician suspects that the MBR is corrupted. Which process can the technician use to check and repair the MBR?

    • Run the sfc command.
    • Run the chkdsk command.
    • Run the bootrec command.
    • Boot the workstation in Safe Mode.

      Answers Explanation & Hints:

      The bootrec command can be used to repair and troubleshoot MBR issues. The chkdsk command can be used to check the integrity of files and folders by scanning the hard disk surface for physical errors. The sfc command can be used to verify and replace important Windows system files.
  97. A technician is booting a laptop that has Windows 10 installed with 2 GB RAM. The boot process is currently working on the following step: NTOSKRNL.EXE starts the login file called WINLOGON.EXE. What is the next step that will happen in the boot process?

    • WINLOGON.EXE displays the Windows Welcome screen.
    • WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
    • WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
    • Winload uses the path specified in BOOTMGR to find the boot partition.

This Post Has 12 Comments

  1. karma

    I’m a developer. is there an API to retrieve the questions/answers data programmatically?

    1. InfraExam

      What is the website that offer the course that you mention?

      1. karma

        I’m working on a browser extension which will automatically answer the questions given some data. I’m asking you if all the answers to the questions you have here, in this website, are stored somewhere, maybe in a JSON format, or if you’re just writing them down in HTML to then update the website

  2. Jožko Šteiner

    Hello My name is jožko,
    Is this very updated, im writing the cisco final exam test answers 14 certificate tommorrow zítra.
    Can i trust, thank you.

    1. InfraExam

      Sure, you can truth it.

  3. Not Me

    What is a recommended best practice for a technician who must perform tasks that require administrative access?

    • Using a standard account with limited permissions, use the Run as Administrator option to perform the task that requires elevated privileges.(this is correct.)
    • Log off the computer and then log in with an account with administrator privileges.
    • Prevent the computer from contacting the network authentication server by disabling the network card and then log in with an administrator account.
    • Ask the current user to log off, restart the computer, and then log in with the administrator account.(not this)
    1. InfraExam

      Thank you for your update.

  4. Anyone

    A technician is booting a laptop that has Windows 10 installed with 2 GB RAM. The boot process is currently working on the following step: NTOSKRNL.EXE starts the login file called WINLOGON.EXE. What is the next step that will happen in the boot process?

    • WINLOGON.EXE displays the Windows Welcome screen.
    • WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
    • Winload uses the path specified in BOOTMGR to find the boot partition.
    • WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.

    Don’t know the answer 🙂

    1. InfraExam

      The answer is : WINLOGON.EXE displays the Windows Welcome screen.

      We have just updated.

      Thank You for your update.

  5. Sharry

    A user calls the help desk and reports that invalid system disk or invalid boot disk error messages display on the workstation when it is powered on. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician suspects that the MBR is corrupted. Which process can the technician use to check and repair the MBR?

    • Run the bootrec command.
    • Run the sfc command.
    • Run the chkdsk command.
    • Boot the workstation in Safe Mode.
    1. InfraExam

      We have just updated. Thank you.

  6. Smita kumari nirala

    Bahut bahut bahut achha

Comments are closed.