IT Essentials (ITE v6.0) Checkpoint Exam Answers

  1. What three voltages are commonly provided by the power supply to the various components inside the computer? (Choose three.)
    • 3.3 volts
    • 5 volts
    • 9 volts
    • 12 volts
    • 24 volts
    • 48 volts
  2. Hard drives in a grocery warehouse keep failing because of the adverse warehouse environment. What would be a possible solution for this high failure rate?
    • Install an SSD drive in each computer.
    • Install a more powerful power supply in each computer.
    • Install an antistatic mat under each computer.
    • Install each computer in a specialized high airflow case.
  3. A server administrator needs to set up a new server with disk fault tolerance technology. The administrator decides to deploy RAID 0+1 technology. What is the minimum number of disks needed to deploy the disk array setting?
    • 2
    • 3
    • 4
    • 5
    • 6
  4. Which type of interface should a customer choose if connecting a single cable from a Microsoft Windows computer to output both audio and video to a high definition television?
    • DVI
    • HDMI
    • PS/2
    • DB-15
  5. Refer to the exhibit. To what input device would the cables attach?

    ITE Checkpoint Exam 001
    • keyboard/mouse combo device
    • KVM switch
    • video distribution center
    • sound system
  6. A desktop user has requested the ability to easily transfer photos from a camera SD card to a computer. Which device can be installed on the desktop computer to fulfill this request?
    • capture card
    • storage controller
    • media reader
    • graphics card
  7. Which is the correct procedure to put out a fire with a fire extinguisher after the pin is pulled?
    • Aim just above the flame, squeeze the lever, and sweep from side to side.
    • Aim at the base of the flame, squeeze the lever, and sweep from side to side.
    • Aim directly at the center of the flame, squeeze the lever, and sweep from side to side.
    • Aim at the base of the flame, squeeze the lever, and sweep from the base to the top of the flame.
    • Aim just above the flame, squeeze the lever, and sweep from the top to the base of the flame.
  8. Which measure can help control RFI effects on wireless networks?
    • Ensure the humidity and temperature levels are set as low as possible.
    • Ensure the number of wireless NICs exceeds the number of wireless phones.
    • Ensure the wireless network is on a different frequency than the offending source.
    • Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.
  9. What can be tested with a digital multimeter?
    • wireless signal strength and access point positioning
    • basic functionality of computer ports
    • copper cable location
    • quality of electricity in computer components
  10. Which disk management tool scans the critical files of an operating system and replaces the corrupt files?
    • Scandisk
    • Chkdsk
    • Disk Cleanup
    • Optimize Drives
    • System File Checker
  11. Which action can reduce the risk of ESD damage when computer equipment is being worked on?
    • working on a grounded antistatic mat
    • lowering the humidity level in the work area
    • moving cordless phones away from the work area
    • keeping the computer plugged into a surge protector
  12. When a used CPU is being installed, what two items should be used to clean the top of the CPU and the base of the heat sink before applying thermal compound? (Choose two.)
    • tap water
    • denatured water
    • isopropyl alcohol
    • cotton swab
    • lint-free cloth
  13. A technician is troubleshooting a problem where many websites return a “certificate not valid” error. The technician notices that the date and time are not current and resets these to the correct settings. The previously inaccessible websites are now accessible. However, when the computer is restarted the same problem reoccurs. What can the technician do to prevent the date and time from resetting?
    • Reinstall the OS.
    • Upgrade the BIOS.
    • Change the power settings in the BIOS.
    • Replace the CMOS battery.
  14. Which two hardware features would a technician monitor within the BIOS if a computer was suspected of overheating? (Choose two.)
    • CPU clock speed
    • CPU fan speed
    • motherboard voltage
    • hard drive speed
    • Trusted Platform Module
  15. What component can be replaced and upgraded on a PC to increase the data processing speed?
    • CPU
    • RAM
    • hard drive
    • BIOS
  16. What are two effects of not having a preventive maintenance plan for users and organizations? (Choose two.)
    • increased repair costs
    • increased number of regular updates
    • increased downtime
    • increased management tasks
    • increased documentation needs
  17. Which three actions should be part of a regular computer preventive maintenance plan? (Choose three.)
    • removing dust from fan intakes, the power supply, and peripherals
    • installing appropriate security updates
    • removing unused or unwanted programs
    • changing browser settings
    • deleting old email
    • installing more RAM in the machine
  18. If a technician is unable to create a backup of data on a customer computer, what three pieces of information should the technician include on the liability release form signed by the customer before beginning work? (Choose three.)
    • a description of the problem
    • the steps required to resolve the problem
    • permission to work on the computer without a current backup available
    • a release from liability if data is lost or corrupted
    • the components used in the repair
    • a description of the work to be performed
  19. What is the first step in the troubleshooting process?
    • Implement a quick procedure to solve the problem.
    • Ask the user direct questions about the issue.
    • Create a plan of action to propose to the user.
    • Establish a theory for the cause of the problem.
  20. After performing a preventive maintenance on a PC, the technician powers on the PC only to find that nothing happens. What is the most likely problem?
    • The computer is not plugged into the AC outlet.
    • The power supply voltage switch is set to the incorrect voltage.
    • The technician forgot to reset the BIOS settings.
    • The CPU has not been reinserted properly.
  21. Which statement describes a characteristic of a network operating system?
    • A network operating system shares files and folders on a small network with limited security.
    • It runs multiuser applications.
    • It typically is used in SOHO environments.
    • It supports a limited number of users.
  22. What technology was created to replace the BIOS program on modern personal computer motherboards?
    • UEFI
    • RAM
    • CMOS
    • MBR
  23. On which two occasions is it most likely that a technician will have to perform a clean operating system installation if a backup has not been performed? (Choose two.)
    • A user requires access to a new printer.
    • The existing operating system is corrupted.
    • The existing security software requires upgrading.
    • The computer is being moved to a different network.
    • A new replacement hard drive is installed in a computer.
  24. Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?
    • F1
    • F8
    • F12
    • Alt-Z
    • Windows key
  25. In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?
    • C:\Users
    • C:\Program Files
    • C:\Application Data
    • C:\Program Files (x86)
  26. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?
    • Task Manager
    • Add or Remove Programs
    • Event Viewer
    • System Restore
  27. What does virtual memory provide to an operating system?
    • an increase in data storage
    • an increase in the speed of accessing RAM
    • a temporary storage of data until enough RAM is available to process it
    • the creation of virtual partitions on the hard drive
  28. A PC technician is having trouble with a Windows-based system and wants to perform a system restore from the command prompt. What command would start this process?
    • tasklist
    • robocopy
    • sfc
    • gpupdate
    • rstrui
  29. A technician is attempting to create virtual machines on a PC but wants to ensure that the physical system resources used by the virtual machines are directly managed by them and not by the host operating system. How can the technician accomplish this?
    • Set up the virtual machines using a native hypervisor.
    • Set up the virtual machines using a hosted hypervisor.
    • Set up the virtual machines as Windows Virtual PCs
    • Limit the amount of paged RAM.
    • Disable hyperthreading in the BIOS.
  30. A company has a preventive maintenance policy that requires every computer have a new restore point created every six months. For computers using the Windows 7 operating system, how can a technician create the restore point?
    • From the CLI enter the command restore /cn.
    • Choose Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point.
    • Choose Start > All Programs > Accessories > System Tools > System Restore > Next.
    • Right-click My Computer and then choose Properties > Restore > Create Restore Point.
  31. A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?
    • Change the file system to FAT16.
    • Update the driver for the graphics card.
    • Reinstall the programs in Compatibility Mode.
    • Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
  32. A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
    • The total cost of the new solution is considerably lower.
    • Data is more secure in the event of hardware failures.
    • Individual users are in control of their own computers and network resources.
    • Data resources and access are centrally controlled.
    • Personnel costs are lower because a dedicated network administrator is no longer necessary.
  33. At which TCP/IP model layer would a MAC address be found?
    • application
    • transport
    • internet
    • network access
  34. A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?
    • Add a new 802.11a device.
    • Add a new 802.11b device.
    • Add a new 802.11g device.
    • Add a new 802.11n device.
  35. A customer who wants to enhance home network security is shopping for devices. The sales representative recommends a device that has a hardware firewall. Which device can provide this service?
    • bridge
    • switch
    • integrated router
    • wireless access point
  36. Copper network cables consist of pairs of wires that are twisted together. Which type of signal interference is reduced or prevented by this?
    • RFI
    • EMI
    • crosstalk
    • white noise
  37. A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    • It cannot communicate outside its own network.
    • It can communicate on the local network as well as on the Internet.
    • It can communicate with networks inside a particular company with subnets.
    • It has a public IP address that has been translated to a private IP address.
  38. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?
    • Disable SSID broadcast.
    • Enable WPA encryption.
    • Configure DMZ settings.
    • Configure a DNS server.
  39. A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
    • WLAN LED
    • power LED
    • Internet LED
    • 1-4 Ethernet LEDs
  40. Why would an administrator use Windows Remote Desktop and Windows Remote Assistant?
    • to provide secure remote access to resources on another network
    • to connect to an enterprise network across an unsecured connection and act as a local client of that network
    • to enable sharing of files and presentations with a group of users over the Internet
    • to connect to a remote computer over the network to control its applications and data
  41. A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?
    • VPN
    • Remote Desktop
    • administrative share
    • Remote Assistance
  42. What physical layer medium is used by DSL to provide high-speed data communications?
    • telephone lines
    • television cable
    • Satellite dish
    • 4G wireless radio
  43. The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
    • APIPA
    • DHCP
    • DIPS
    • ICMP
  44. What is the function of the DNS server?
    • It assigns IP addresses to clients.
    • It accepts HTTP requests from clients.
    • It maps a hostname to a corresponding IP address.
    • It manages the domain that clients are assigned to.
  45. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
    • The cable is not connected properly to the NIC.
    • The computer has an invalid IP address.
    • The computer has an incorrect subnet mask.
    • The computer has an invalid default gateway address.

Comments

Popular posts from this blog

IT Essentials (ITE v6.0) Chapter 2 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 3 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 8 Exam Answers