Last Updated on June 14, 2021 by InfraExam

IT Essentials 7 – IT Essentials A+ 220-1002 Certification Practice Exam Answers 2020 Correct 100%

Cisco Netacad ITE v7 – IT Essentials (Version 7.00) – IT Essentials A+ 220-1002 Certification Practice Exam Exam Answers 2020 2021

  1. Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)

    • hard disk drives
    • solid state drives
    • RAM
    • cache
    • CPU registers
  2. On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)

    • A user requires access to a new printer.
    • The existing operating system is corrupted.
    • The existing security software requires upgrading.
    • The computer is being moved to a different network.
    • A new replacement hard drive is installed in a computer.
  3. Which three items are biometric security devices? (Choose three.)

    • fingerprint reader
    • retina scanner
    • voice recognition
    • smart card
    • key fob
    • password
  4. Match the task to the Windows 10 Control Panel utility. (Not all options are used.)

    IT Essentials 7 – IT Essentials A+ 220-1002 Certification Practice Exam Answers 02
    IT Essentials 7 – IT Essentials A+ 220-1002 Certification Practice Exam Answers 02
  5. Match the scripting language with the script file name extension. (Not all options are used.)

    IT Essentials 7 – IT Essentials A+ 220-1002 Certification Practice Exam Answers 01
    IT Essentials 7 – IT Essentials A+ 220-1002 Certification Practice Exam Answers 01
  6. Which two precautions can help prevent social engineering? (Choose two.)

    • Always ask for the ID of unknown persons.
    • Escort all visitors.
    • Keep your password securely under your keyboard.
    • Do not allow any customers into the workplace.
    • Always require a user name and password to be configured.
  7. Which two guidelines are appropriate for creating strong passwords? (Choose two.)

    • Use at least eight characters.
    • Include letters, numbers, and symbols.
    • Change the password once each year.
    • Use only upper case and numeric values in passwords.
    • Passwords should contain symbols only.
  8. A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)

    • Ask socially related questions to direct the customer away from the problem.
    • Work to redirect the conversation to solving the problem.
    • Immediately transfer the customer to a higher level technician.
    • Reply to the customer with the same level of anger.
    • Let the customer explain the problem without interrupting.
  9. A technician working on a computer discovers what is suspected to be illegal activity. Which three pieces of information should be immediately documented? (Choose three.)

    • duration of the suspected illegal activity
    • evidence of the suspected illegal activity
    • why the computer was accessed by the technician
    • details of all past users of the computer
    • technical specifications of the computer
    • location of the computer
  10. An administrative assistant tries to link a Bluetooth keyboard and mouse to a computer. The keyboard does not work, but the mouse works fine. What are two issues that could cause this situation? (Choose two.)

    • Wi-Fi is turned off.
    • The keyboard battery is dead.
    • Bluetooth is turned off.
    • The Num Lock key has been inadvertently pressed.
    • The keyboard is too far from the computer.
  11. What two roles or tasks are associated with level two technicians? (Choose two.)

    • remotely updating drivers and software on customer computers
    • prioritizing incoming calls according to their severity
    • gathering customer information to initiate a work order
    • escalating a trouble ticket to a higher level technician
    • gathering diagnostic information from a customer computer
  12. What are two file attributes in the Windows environment? (Choose two.)

    • details
    • archive
    • read-only
    • security
    • general
  13. A user finds that when launching a downloaded Windows update file, Windows Update fails. What are two possible causes for this? (Choose two.)

    • The hard disk is failing.
    • The Windows Firewall is turned off.
    • The downloaded update file is corrupted.
    • The virus definitions are out of date.
    • A previous update that is required for the current update is not installed.
  14. A store in a shopping center uses a wireless network to provide internet access for three tablet computers. The authentication to the wireless router has been configured as 128-bit WEP. Recently the store employees notice that the internet connection is getting slower. The network administrator of the shopping center reviews the logs of the wireless router and notices many non-store devices are associated with the router. Which two actions can the network administrator do to improve the security of the wireless network access? (Choose two.)

    • Use a 32-character long SSID.
    • Change WEP to WPA2 protocol.
    • Change to the 152-bit WEP protocol.
    • Use the MAC address filtering feature.
    • Ensure that the shared key is randomly generated.
  15. A user is hiking in a city park. The user wants to make a call home but cannot get a reliable cellular signal. What are two possible causes for the bad cellular coverage? (Choose two.)

    • The location service is turned off.
    • The Bluetooth headset is unpaired.
    • There are not enough cell towers in the area.
    • The distance to the nearest Wi-Fi access point is too far.
    • The user is located between coverage areas of the carrier.
  16. A user purchases a new smartphone and is trying to use a high quality Bluetooth headset on the new device. However, the headset is not connected to the smartphone. What are three settings that the user needs to check to troubleshoot the problem? (Choose three.)

    • The headset is turned on.
    • The pin code is entered correctly.
    • The authentication service is turned on.
    • The USB port on the headset is working.
    • The Bluetooth connection is enabled on the smartphone.
    • The battery capacity on the smartphone is above 50%.
  17. An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

    • The IT technician should have researched the company policy about personal communication with customers on company time.
    • The IT technician should have used encryption to hide the purpose of the emails.
    • The IT technician should have added the customer to a chain letter with many recipients instead.
    • The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products.
    • The IT technician should have requested permission from a supervisor to send the customer emails.
  18. A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

    • RDP connects on TCP port 22.
    • RDP requires a Windows client.
    • RDP uses an encrypted session.
    • RDP is a command-line network virtual terminal protocol.
    • RDP connects on TCP port 3389.
  19. A computer can successfully ping outside the local network, but cannot access any World Wide Web services. What is the most probable cause of this problem?

    • Windows Firewall is blocking port 80.
    • Windows Firewall blocks port 23 by default.
    • The computer network interface card is faulty.
    • The BIOS or CMOS settings are blocking web access.
  20. Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

    • F1
    • F8
    • F12
    • Alt-Z
    • Windows key
  21. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

    • Task Manager
    • Add or Remove Programs
    • Event Viewer
    • System Restore
  22. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

    • Is your security software up to date?
    • Have you scanned your computer recently for viruses?
    • Did you open any attachments from a suspicious email message?
    • What symptoms are you experiencing?
  23. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

    • Check the computer for the latest OS patches and updates.
    • Verify the physical security of all offices.
    • Ensure the security policy is being enforced.
    • Scan the computer with protection software.
  24. A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?

    • Change the file system to FAT16.
    • Update the driver for the graphics card.
    • Reinstall the programs in Compatibility Mode.
    • Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
  25. In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?

    • C:\Users
    • C:\Program Files
    • C:\Application Data
    • C:\Program Files (x86)
  26. A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the

    • primary partition is extended to make it usable?
    • Convert the disk type to dynamic.
    • Ensure that the disk type is basic.
    • Format the disk with the FAT64 file system.
    • Partition the new space as a basic disk.
  27. A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?

    • ASR
    • Fixboot
    • Fixmbr
    • Regedit
    • SFC
  28. What is the first step a technician should take when preparing to work on the inside of a computer?

    • Remove the power supply.
    • Disconnect the computer from power.
    • Disconnect the computer from the network.
    • Remove external devices such as a mouse.
  29. What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

    • a security encryption key
    • a MAC address
    • a username and password
    • an updated wireless driver
  30. What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

    • MAC filtering
    • software firewall
    • proxy server
    • WPA encryption


4.3 16 votes
Article Rating
Notify of
Oldest Most Voted
Inline Feedbacks
View all comments