Chapter 12
Chapter 12
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to
find that question/answer. If the question is not here, find it in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and Multiple-
Choice list in form below this article. We will update answers for you in the shortest time.
Thank you! We truly value your contribution to the website.
IT Essentials v7.0:
1. Which two location data sources can locator apps use to determine the position of a
mobile device? (Choose two.)
cellular towers
WiFi hotspots
the sandbox
remote lock
an app source
Explanation: In addition to GPS, mobile device locator apps can use cellular towers and WiFi
hotspots to determine the position of a mobile device. The device sandbox, remote lock, or an
app source (Play Store or iTunes) are other features and functions related to security and app
downloading.
2. What are two ways that iOS differs from Android? (Choose two.)
iOS uses an All Apps button whereas Android uses a Home button.
iOS has a physical Home button, but Android uses navigation icons.
In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In
Android, the icon on the Home screen is a shortcut to the app.
In iOS, apps can only appear on screens, whereas in Android, apps can appear on screens and in
folders.
In iOS, folders are created by dragging one app on top of another app, but in Android folders
must be created from the home screen menu.
Explanation: Apple iOS devices have a physical Home button that has many uses. One of the
uses of the Home button is navigation between screens. Android uses navigation icons instead of
a physical Home button. In addition, much like a Windows OS, apps in Android are represented
by icons that are shortcuts to the actual app. In iOS, the icons are the apps. Deleting an icon in
Android deletes only the shortcut. However, the entire app is deleted from an iOS device when
its icon is deleted.
3. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
Explanation: The passcode lock feature on mobile devices helps prevent theft of private
information and places the device into a power saving state. Personal data will not usually be
erased from some mobile devices unless the number of failed passcode login attempts exceeds a
threshold. Remote lock allows the device to be locked from a remote location. A factory reset
returns the device to the original operation state when the device was first purchased. Various
applications such as email or cloud storage can provide synchronization capabilities to be able to
restore and re-synchronize information such as user data, contacts, and email on a mobile
device.y other device features and actions.
4. Refer to the exhibit. What two statements are true about the mobile operating system
screen shown? (Choose two.)
Explanation: The highlighted area shows the Android operating system navigation icons. From
left to right they are Back, Home, and Recent Apps.
5. Which two methods are commonly used to remove the default restrictions and
protections added to mobile operating systems? (Choose two.)
rooting
jailbreaking
rootkit execution
device update
system backup
6. A Linux administrator wants to backup current files in a data directory and store them
in a new directory on another disk. Which two commands would be needed? (Choose two.)
cd
cp
rm
mv
mkdir
Explanation: The mkdir command is used to create the new directory and the cp command is
used to copy files from one directory to another.
7. A file called new_resume has the following file permissions: rw-r-x–x. What two facts
can be determined from these permissions? (Choose two.)
Explanation: Read, write, and execute permissions are assigned to each file. The permissions
are listed in groups of three. The first group of three permissions references users, the second
references group members, and the third references others. The first position of each of the three
permissions is the R or read permission, the second is the W or write permission, and the third is
the X or execute permission. If any position has a dash, the associated group does not have
permission for that category. In this case, the user hasread and write access (rw-). Group
members haveread and execute access (r-x). Other people haveexecute only access (–x).
iTunes
Google Play
freeware sites
the Apple App Store
Explanation: Google Play ensures that the app is compatible with the mobile device and is a
trusted source for apps.
buttons
icons
tiles
widgets
Explanation: The Windows Phone OS uses tiles to represent apps. Tiles are rectangles that can
display active content. When tapped, they open the associated app. Tiles can be resized to
unclutter screens and to reflect the relative importance of the app.
The operating system will be updated with the most recent updates and patches.
All user data and settings will be deleted.
The operating system will be deleted and all user data is transferred to the Cloud.
A complete backup of the device is done and all viruses and malware are removed.
Explanation: After a factor reset, a mobile device is left in the same state that it was when it left
the factory. The operating system software would not be altered but all user data, settings, and
third party applications would be deleted. Backups should be done prior to a factory reset.
Updates or patches to the operating system could be done before or after the factory reset.
11. What is the name of the Windows Phone 8.1 digital, or virtual, assistant?
Bing
Cortana
Nova Launcher
Spotlight
Explanation: Siri is the well-known digital, or virtual, assistant that is available in iOS.
Windows Phone also has a digitial assistant. It is called Cortana.
Explanation: Wi-Fi calling is a way that a mobile phone can use a wireless data network to
make phone calls as if it were connected to a cellular network. In cases where cell phone
coverage is inadequate, calls can be placed from places that have open Wi-Fi networks.
13. What is the purpose of signature files used to secure mobile devices and operating
systems?
They contain a record of historical and pending firmware and software updates.
They contain a list of all user passwords.
They contain a log of digital certificates and encryption keys associated with the user.
They contain sample code from known viruses and malware that is used by security software
to identify malicious software.
Explanation: Antivirus and antimalware software compare the contents of a disk with sample
virus and malware code included in signature files. If a comparison is found, the user can be
notified and the virus can be isolated or removed.
It manages antivirus signature files, encryption keys, and certificates when a device boots.
It automates the POST and checks the disk for bad sectors during a boot.
It checks the validity of hardware and software on the device after a factory reset.
It allows the user to select the OS to use to boot the device.
It allows the user to determine which apps are automatically opened during the boot process.
Explanation: Many devices have multiple operating systems installed in different partitions.
When a device boots, the boot manager asks the user to select the OS to use. The boot manager
then directs the BIOS to the correct partition so that the device can continue to boot by using the
selected OS.
mstsc
Netboot
Time Machine
Finder
Explanation: Netboot is a built-in tool on the Mac OS that allows for remotely booting the
computers. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac
OS file system. MSTSC is used to open the Windows Remote Desktop utility. Time Machine is
an automatic backup utility built into the Mac OS.
16. What tool or command is used in the Mac OS X to navigate the file system?
File Explorer
Task Manager
Finder
mstsc
Explanation: Finder is similar to the Windows File Explorer tool and is used to navigate the
Mac OS file system. The mstsc command is used to open the Windows Remote Desktop utility.
The Task Manager tool on Windows allows a user to view all running applications.
17. Which model does Apple use to provide iOS apps to customers?
iCloud
Xcode
sandbox
walled garden
Explanation: Apple uses a walled garden model for the iOS apps. The apps must be submitted
to and approved by Apple before they are released to users.
18. Android apps run primarily based on privileges enabled by the user. Sometimes an
Android app requires extra privileges to access system components. How do Android apps
run to accomplish both situations?
Explanation: Android apps run in a sandbox and have only the privileges enabled by the user. If
an app needs to obtain permissions, a prompt will appear and the user can grant permissions
through settings.
19. Which navigation icon on the system bar of an Android device is used to return to the
previous screen?
Back
Home
Menu
Recent Apps
20. Which statement describes the iOS app icons on a mobile device screen?
Explanation: On the iOS interface, each app on screen is the actual app, not a shortcut.
21. What is the purpose of using the auto-brightness feature on a mobile device with an
LCD screen?
Explanation: The LCD screen for most mobile devices uses the most battery power. Lowering
the brightness or using the auto-brightness feature helps conserve battery power.
Explanation: Apple uses a technology known as Touch ID in which the user sets up a template
fingerprint scan that is converted into a unique hash and stored within a secure cache on the iOS
device. The hash is used to authenticate with the user.
23. Which cloud-based storage service does Microsoft provide for backups?
iCloud
Dropbox
OneDrive
Google Sync
Explanation: Data on mobile devices must be backed up periodically to ensure that it can be
recovered if needed. Most mobile operating systems come with a user account linked to the
cloud services of the vendor, such as iClould for iOS, Google Sync for Android, and OneDrive
for Microsoft.
24. A mobile device user notices that the system update includes an update of the Primary
Rate ISDN (PRI). What is the function of the PRI?
25. A Linux PC user notices that the PC freezes on startup and exhibits kernel panic where
there is a stop screen. What is a possible cause for the issue?
Explanation: When a driver in a Linux system has been corrupted or a piece of hardware is
failing, the system will freeze on startup and exhibits kernel panic where there is a stop screen.
grep
ifconfig
ls
vim
Explanation: The vim command is used to open a text editor; ls displays files within a directory;
grep searches for strings of characters within a file; and ifconfig displays information about the
network interface card.
27. Which Linux file system introduced the journaled file system, which can be used to
minimize the risk of file system corruption in the event of a sudden power loss?
ext2
ext3
CDFS
NFS
Explanation: The ext3 file system is considered a journaled file system that was designed to
improve the existing ext2 file system. A journal, the main feature added to ext3, is a technique
used to minimize the risk of file system corruption in the event of sudden power loss.
28. What is the most commonly used method to close an application that appears to be
frozen on an OS X-based computer?
Use Force Quit.
Use Task Manager.
Access the Status menu.
Access the Notification Center.
Explanation: To use Force Quit, right-click on the application icon that is not responding from
the Dock and close the application.
29. Which file system is the primary file system used by Apple in current Macintosh
computers?
ext2
ext3
CDFS
HFS+
APFS
Explanation: To use Force Quit, right-click on the application icon that is not responding from
the Dock and close the application.
30. An instructor is discussing facts about different mobile device operating software. The
instructor states: “The mobile devices have a feature called Spotlight that is a search tool
that provides information from many sources.” To which OS does this relate: iOS,
Android, or both?
iOS
Android
both
31. An instructor is discussing facts about different mobile device operating software. The
instructor states: “This OS uses the system bar, displayed at the bottom of every screen, to
navigate apps and screens.” To which OS does this relate: iOS, Android, or both?
Android
iOS
both
32. An instructor is discussing facts about different mobile device operating software. The
instructor states: “This OS can be used by programmers to operate devices like laptops,
smart TVs, and e-book readers.” To which OS does this relate: iOS, Android, or both?
Android
iOS
both
33. An instructor is discussing facts about different mobile device operating software. The
instructor states: “The icon on the Home screen is a shortcut to the app.” To which OS
does this relate: iOS, Android, or both?
Android
iOS
both
34. An instructor is discussing facts about different mobile device operating software. The
instructor states: “WIFI hotspots are a location data source that can be used by locator
apps to determine the position of a mobile device.” To which OS does this relate: iOS,
Android, or both?
both
iOS
Android
35. An instructor is discussing facts about different mobile device operating software. The
instructor states: “Remote backups are a cloud-enabled service for mobile devices.” To
which OS does this relate: iOS, Android, or both?
both
iOS
Android
36. An instructor is discussing facts about different mobile device operating software. The
instructor states: “GPS signals are used to enable geocaching, geotagging and device
tracking on these mobile devices.” To which OS does this relate: iOS, Android, or both?
both
iOS
Android
37. An instructor is discussing facts about different mobile device operating software. The
instructor states: “The start voice control function can be performed with the home
button.” To which OS does this relate: iOS, Android, or both?
iOS
Android
both
38. An instructor is discussing facts about different mobile device operating software. The
instructor states: “To synchronize a mobile device to a PC, iTunes must be installed on the
PC.” To which OS does this relate: iOS, Android, or both?
iOS
Android
both
39. An instructor is discussing facts about different mobile device operating software. The
instructor states: “When the device roams out of the range of any Wi-Fi networks, it can
connect to the cellular data network if this feature is enabled.” To which OS does this
relate: iOS, Android, or both?
both
iOS
Android
IT Essentials v6.0:
1. Which two security precautions will help protect a workplace against social engineering?
(Choose two.)
3. Which type of security threat uses email that appears to be from a legitimate sender and
asks the email recipient to visit a website to enter confidential information?
adware
phishing
stealth virus
worm
5. Which type of attack involves the misdirection of a user from a legitimate web site to a
fake web site?
SYN flooding
DDoS
DNS poisoning
spoofing
qwerty
Abc123
Im4ging!
Gd^7123e!
pAssword
8. The XYZ company has decided to upgrade some of its older PCs. What precaution
should the company take before the disposal of the remaining older computers?
9. Which two file-level permissions allow a user to delete a file? (Choose two.)
Read
Modify
Read and Execute
Write
Full Control
List Contents
grayware
mirrors
signatures
virus definition tables
WPA2
SSID hiding
WEP
wireless MAC filtering
12. Port triggering has been configured on a wireless router. Port 25 has been defined as
the trigger port and port 113 as an open port. What effect does this have on network
traffic?
Any traffic that comes into port 25 allows outgoing port 113 to be used.
All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
Any traffic that is using port 25 going out of the internal network will also be allowed to transmit
out port 113.
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal
network through port 113.
13. What are two physical security precautions that a business can take to protect its
computers and systems? (Choose two.)
14. What is the minimum level of Windows security required to allow a local user to restore
backed up files?
Write
Read
Create
Full
15. What is the purpose of the user account idle timeout setting?
16. Which two security procedures are best practices for managing user accounts? (Choose
two.)
Disable authentication.
Limit the number of failed login attempts.
Restrict the time of day that users can log into a computer.
Enable AutoRun.
Enable port forwarding.
17. Which Windows Firewall option allows the user to manually allow access to the ports
required for an application to be allowed to run?
18. Which two Windows default groups are allowed to back up and restore all files, folders,
and subfolders regardless of what permissions are assigned to those files and folders?
(Choose two.)
Administrators
Power Users
Backup Operators
Access Control Assistants
Cryptographic Operators
19. A manager approaches a PC repair person with the issue that users are coming in to the
company in the middle of the night to play games on their computers. What might the PC
repair person do to help in this situation?
20. Which question would be an example of an open-ended question that a technician might
ask when troubleshooting a security issue?
21. Which action would help a technician to determine if a denial of service attack is being caused by
malware on a host?
Explanation: As part of the fifth step of the troubleshooting process, technicians should apply
preventive measures whenever possible. Most company security policies include a section on
password complexity and length requirements. Ensuring that this policy is being enforced can
help prevent attackers from being able to compromise systems through password cracking.
23. It has been noted that the computers of employees who use removable flash drives are
being infected with viruses and other malware. Which two actions can help prevent this
problem in the future? (Choose two.)
Set virus protection software to scan removable media when data is accessed.
Configure the Windows Firewall to block the ports that are used by viruses.
Disable the autorun feature in the operating system.
Repair, delete, or quarantine the infected files.
Enable the TPM in the CMOS settings.
24. A virus has infected several computers in a small office. It is determined that the virus
was spread by a USB drive that was shared by users. What can be done to prevent this
problem?
25. A user is browsing the Internet when a rogue pop-up warning message appears
indicating that malware has infected the machine. The warning message window is
unfamiliar, and the user knows that the computer is already protected by antimalware
software. What should the user do in this situation?
26. In what situation will a file on a computer using Windows 8.1 keep its original access
permissions?
27. What security measure can be used to encrypt the entire volume of a removable drive?
EFS
TPM
BitLocker To Go
NTFS permission
28. A user calls the help desk reporting that a laptop is not performing as expected. Upon
checking the laptop, a technician notices that some system files have been renamed and file
permissions have changed. What could cause these problems?
29. Which two operating systems can be upgraded to Windows XP Home? (Choose two.)
Windows 95
Windows 3.1
Windows 98
Windows 98 SE
Windows NT workstation
30. A customer using a Windows XP computer is complaining that a new card reader is not
working. A technician tests the card reader on a Windows 7 computer and does not detect
any problems. What are two possible solutions to the problem with the XP computer?
(Choose two.)
31. A technician is replacing an internal hard drive used as a secondary drive on a PC.
After connecting the new hardware and powering up the computer, an “OS not found”
error message is displayed. What is the most probable cause for that error message?
32. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it
is slower than it was before the upgrade. The Performance tab from the Task Manager
displays only one CPU graph. What is the most probable solution to this problem?
33. A laptop that is running Windows XP displays “Missing NTLDR” after the POST.
What are the two most probable reasons for this problem? (Choose two.)
34. Several times during the last few days, a user has experienced the Blue Screen of Death
when plugging an external hard drive into a laptop via USB. What is a possible solution for
this problem?
36. What are two possible solutions to any Windows computer restarting continuously and
never displaying the desktop? (Choose two.)
37. A PC is not able to connect to a wired network. Pinging the loopback address is
successful, but the gateway cannot be reached. On the network switch all the interface
lights are on, except for the interface connected to the PC. The LED on the network card is
off. What is the most likely cause of this problem?
38. Users in a recently installed wireless network are complaining of slow data transfer and
frequent loss of connectivity. The technician checks that the wireless security is correctly
implemented, and there is no evidence of unauthorized users on the network. Which two
problems might the technician suspect? (Choose two.)
39. A group of users is unable to connect to the network. When testing several of the PCs
and issuing the command ipconfig, the technician notices that all of them have an IP
address in the 169.254.x.x range. What is the most likely cause of this problem?
40. A technician is working on a laptop that has a dark display. After attaching an external
display and verifying that it works, the technician now has a better idea as to the problem.
What could be the problem?
41. A technician replaces a laptop keyboard that was no longer functioning, and has
verified that the newly replaced keyboard functions properly. What is the final step the
technician should take as part of the troubleshooting process?
42. A user complains that when a page is printed on a laser printer, the page smears when
touched. What is a possible cause of this issue?
43. A technician finds that occasionally when a network printer is restarted, clients are
unable to print to it, receiving a “Document failed to print” message. What is a probable
cause of this?
44. A user complains that a printer is outputting random characters instead of the desired
document. What is a probable cause of this?
46. A computer displays this message when the computer boots: “MBR has been changed
or modified.” What could cause this problem?
47. Users are complaining that they are receiving spam from the email account that belongs
to a co-worker. What could cause this problem?
A virus has damaged the master boot record on the system that is used by the co-worker.
The network adapter on the computer that is used by the co-worker is malfunctioning.
The email account belonging to the co-worker was hijacked because of malware.
The email client belonging to the co-worker is not configured properly.
48. A technician is troubleshooting a laptop that has the power light on and the hard drive
spinning. However, the laptop only displays vertical lines that change color. What is the
problem?
49. A technician is troubleshooting a laser printer that outputs blank paper for all print
jobs including printer test pages. What is a probable cause?
50. A technician arrives and asks a customer, “Can you describe the problem?” The
customer replies, “All email messages that I send have the wrong date. I have restarted the
computer several times, but this does not seem to help.”
What could be the problem?
The MBR is corrupted.
The CPU voltage is set too low.
The CMOS battery has failed.
The hard drive is beginning to fail.
51. A technician is troubleshooting a Windows 7 laptop infected with a virus that has
damaged the master boot record. The technician has booted the laptop using the
installation media and is attempting to repair the laptop from the command line interface.
Which two commands can the technician use to repair the corrupt master boot record?
(Choose two.)
regedit
chkdsk
regedt32
bootrec /fixboot
bootrec /fixmbr
52. A file called new_resume has the following file permissions: rw-r-x–x . What two facts
can be determined from these permissions? (Choose two.)