It-essentials v5.0 Final Exam Answers

By | May 4, 2014

Final exam IT Essentials v5.0 1 Which power criterion will affect the number of internal drives that are installed in a computer? +5VDC output +20VDC output AC input DC output power supply voltage power supply wattage 2 A customer needs additional storage space on an older computer. What will the technician look at in the computer to determine… Read More »

It-essentials v5.0 Practice Final Exam Answers

By | May 4, 2014

It-essentials v5.0 Practice Final Exam Answers 1 Which two elements should typically be included in a computer security policy? (Choose two.) technical details of the biometric systems used a list of acceptable user passwords an acceptable computer usage statement for the organization details of the data file access procedures requirements necessary for data to remain confidential on a… Read More »

IT Essentials v5.0 Chapter 12 Exam Answers

By | May 4, 2014

1 Which two operating systems can be upgraded to Windows XP Home? (Choose two.) Windows 95 Windows 3.1 Windows 98* Windows 98 SE Windows NT workstation* 2 A customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not… Read More »

IT Essentials v5.0 Chapter 11 Exam Answers

By | May 4, 2014

1 Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.) Contact a first responder.* Confront the customer immediately. Shut down the computer until authorities arrive. Document as much information as possible.* Remove and destroy the hard drive. 2 What is the… Read More »

IT Essentials v5.0 Chapter 10 Exam Answers

By | May 4, 2014

1 A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent? social engineering* anonymous keylogging spam DDoS 2 Which two security precautions will help protect a workplace against social engineering? (Choose… Read More »

IT Essentials v5.0 Chapter 8 Exam Answers

By | May 4, 2014

1 What is a good source for safely downloading Android apps? the Apple App Store iTunes freeware sites Google Play* 2 What two functions can be performed with the home button on an iOS mobile device? (Choose two.) lock the device the same functions as the Android navigation buttons* start voice control* reset the device to the factory… Read More »

IT Essentials v5.0 Chapter 7 Exam Answers

By | May 4, 2014

1 Which two statements are true of a laptop CPU when compared to a desktop CPU? (Choose two.) The laptops consume more power. The laptop CPUs are interchangeable with desktop CPUs. The laptops are designed to produce less heat.* The laptops operate at higher clock speeds. The laptops use smaller cooling devices.* 2 In the power management settings,… Read More »