0% found this document useful (0 votes)
56 views74 pages

IT Essentials 7.0 8.0 Practice Final Exam (Chapters 10-14) Answers

This document contains the answers to a practical final exam for the IT Essentials course covering chapters 10 to 14. It provides the answers to the exam questions organized by chapter. The document also explains how to find the answers using Ctrl+F and mentions that updates will be made if new questions are added to the exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views74 pages

IT Essentials 7.0 8.0 Practice Final Exam (Chapters 10-14) Answers

This document contains the answers to a practical final exam for the IT Essentials course covering chapters 10 to 14. It provides the answers to the exam questions organized by chapter. The document also explains how to find the answers using Ctrl+F and mentions that updates will be made if new questions are added to the exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

22/08/2023 03:39 IT Essentials 7.0 8.

0 Final practical exam (chapters 10-14) Answers

Question bank on IT List of IOS commands  Ebooks

IP Calculators » Donations

Search on the site 

 Domicile  The CCNV » Security » CyberOps »

IT Questions Bank IOS Command List CCNA » CCNA Security v2.0 »

Cybersecurity » Networking Essentials IP Subnet Calculators » Donation Contact

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 1/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

IT Essentials 7.0 8.0 Final Exam


practice (chapters 10-14) Answers
29 janv. 2020 | Dernière mise à jour : 14 août 2023 |
 IT-Essentials v7.0IT Essentials8, IT-Essentials28 Comments

Share Tweet Share Pin it

IT Essentials (Version 8.0) – IT Essentials 8.0


Practice Final Ch 10 - 14 Answers

How to find: Press "Ctrl + F" in the


navigator and fill in any form
in the question to find this question/answer. If
the question is not here, find it in the Bank of
questions.

NOTE: If you have the new question on this


test, please comment on the list of questions and
multiple choice under this article. We will update
the answers for you as soon as possible. IT Essentials v7.0
Thank you! We really appreciate your contribution. Responses
on the website.
IT Essentials v7

IT Essentials (Version 7.00) – IT Essentials IT Essentials v8.0 (NEW)

7.0 Practice Final Chapters 10 – 14


Chapter 1 Answers to
What are the two components of the motherboard that the exam

They control the system startup operations? Chapter 2 Answers to


(Choose two.) the exam

BIOS chip Chapter 3 Answers to


Pink UEFI the exam
Puce Northbridge
Chapter 4 Answers to
Puce Southbridge
the exam
CPU
Control exam of
2. Which motherboard chip controls the communication

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 2/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Northbridge Chapter 5 Answers to


Southbridge the exam
BIOS
Chapter 6 Answers to
UEFI
the exam
3. What are the two procedures that can help to
Control exam of
protect against electrostatic discharges when
certification #2
Are you working on a computer system? (Choose-
(chapters 5 to 6)
in two.) Responses

the use of an anti-static wrist strap Chapter 7 Answers to


the use of magnetized tools the exam
the use of an antistatic mat
Chapter 8 Answers to
the use of safety glasses
the exam
the use of polyester clothing
Control exam of
4. Which software tool protects against viruses and
certification #3
spyware on a Windows PC?
(chapters 7 to 8)
Windows 8 Maintenance Center Responses

Scandisk Chapter 9 Responses to


Windows Defender the exam
System File Checker
Chapter 10 Exam Answers
5. What cleaning material should be used for cleaning
the contacts of the components? Chapter 11 Exam Answers

isopropyl alcohol Certification Checkpoint


Exam #4 (Chapters 10 -
compressed air
11) Answers
cotton swabs and cloths
Dishwashing liquid and water Chapter 12 Exam Answers

6. A technician solves a problem where many Chapter 13 Exam Answers


Websites return an "invalid certificate" error. The
Certification Checkpoint
technician notices that the date and time are not set
Exam #5 (Chapter 12 -
day and resets them to the correct settings. The sites
13) Answers
Webs that were previously inaccessible are now
accessible. However, when the computer is restarted, Chapter 14 Exam Answers
the same problem repeats itself. What can be done Practice Final Exam
technician to prevent the date and time from (Chapters 1-9) Answers
reset?
Practice Final Exam
Reinstall the operating system. (Chapters 10-14)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 3/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final Practice Exam (chapters 10-14) Answers

7. When a new motherboard is being installed, between Final Exam (Chapters 10-
which two components must thermal compound be 14) Answers
applied? (Choose two.)
Final Exam - Composite
(Chapters 1-14) Answers

A+ 220-1001 Certification
Practice Exam Answers

A+ 220-1002 Certification
CPU
Practice Exam Answers
RAM
chassis
heat sink
chipset
motherboard

8. A specific computer has an issue that could not be


resolved by the help desk technician. The on-site
technician finds that Windows updates have been
disabled. The technician re-enables the update service,
configures the computer for automatic updates,
downloads and installs all missing updates, ensures the
computer boots successfully, and verifies with the
customer that the issue has been resolved. Which step, if
any, is next?

Document the findings, actions, and outcomes.


No further action is needed.
Establish a plan of action to resolve the problem and
implement the solution.
Verify full system functionality and, if applicable,
implement preventive measures.
Test the theory to determine the cause.
What should a technician do before beginning any
troubleshooting steps on a customer computer?

Perform a data backup.


Document the findings.
Identify the problem.
Establish a plan of action.

10. Which document can be signed by both a user and a

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 4/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

work order
liability release form
warranty form

A technician is troubleshooting a 4-year-old computer.


that takes a long time to boot, and identifies that the BIOS
rediscovers all the hardware at every boot. What action
would fix this problem?

Replace the CMOS battery.


Launch Device Manager to discover new hardware.
Reset the BIOS using the CMOS jumper.
Start the computer with the last known good.
configuration.
12. Which location on a hard disk is used by the BIOS to
search for operating system instructions in order to boot
a PC?

the logical drive


the active partition
the Windows partition
the extended partition

Related Posts
On a hard disk, up to four primary partitions.
can be created. Alternatively, up to three primary IT Essentials 7.0 Chapter 10 – 14
Skills Assessment Exam Answers
partitions plus an extended partition can be created, and
the extended partition can further be divided into multiple IT Essentials v6.0 – Chapter 14:
logical drives, if desired. Only one primary partition can Advanced Troubleshooting

be made the active partition at any time. It is the active IT Essentials 8 Module 6 Quiz
partition that is used by the operating system to boot a PC. Answers: Applied Networking

IT Essentials (ITE v5.0 & v5.02) A+


13. A technician is asked to set up one hard drive that will Cert Practice Exam 1Test online
100% 2019
support two operating systems and will store data files in
three separate drive locations. Which partition settings IT Essentials (ITE v6.0) A+ Cert
will support these requirements? Practice Exam 1 Test Online 2019

1 primary, 3 active, 1 extended, 2 logical Essentials v7.0: Chapter 1 –


Introduction to the material
2 logical, 2 active, 3 extended
personal computing
2 primary, 1 active, 1 extended, 3 logical
3 primary, 1 active, 2 extended IT Essentials v6.0 - Chapter 1:

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 5/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Practical Final Exam (chapters 10-14) Answers

this case the data can be stored in the three logical drives IT Essentials 7.0 8.0 Final Exam
(chapters 1-9) Complete answers
created in the extended partition, leaving one extra
primary drive for additional storage. IT Essentials (ITE v6.0 + v7.0)
Chapter 9 Exam Answers
100%
A user installs a new sound card driver in a computer
that is working properly. After the installation of the
drivers for the new sound card, the computer fails to Recent comments
boot. Which quick fix can the user implement to return to SinaD on modules 5 to 7:
Surveillance and management of
the previous working state?
devices Complete responses to
Boot to Emergency Recovery State. the group exam

Boot to Last Known Good Configuration. 65 ms surCCNA 1 v7.0 Answers


Start from the recovery console. completed in the final exam -
Start to start Windows normally. Introduction to networks

15. A technician uses the reduction function of the IT administratorson


the answers to the Career exam
volume of the disk management utility and divide it
Analyst pathway in
partition. What should the technician do next to use junior cybersecurity
the new space?
sign of ambition on the responses to
Partition the unallocated space. the Career Pathway exam of
the junior cybersecurity analyst
Format the existing partition.
Delete all partitions and reset the disk. IT Administratoron the
Convert the unallocated space into a dynamic disk. réponses au quiz 3.3.2 Threat
Intelligence
16. A technician uses the six troubleshooting steps to
try to repair a PC. After completing the steps
necessary to test a theory and determine its
because the technician still hasn't resolved the problem.
What are the two steps that may be followed?
by the technician to establish an action plan and resolve
the problem? (Choose two.)

Conduct a search on the Internet.


Ask other users in the area.
Access the service repair logs
of assistance.
Talk with the user supervisor.
Call technical support to report the issue.

17. On a computer that won't start, what are the


two recommended actions in the process of

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 6/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

non-bootable support and order options


BIOS startup? (Choose two.)

Remove unnecessary devices.


Reinstall the operating system.
Reset the BIOS to factory settings.
Use the last known good configuration.
Replace the computer components one by one
until the problem is resolved.
Reinstall the user applications.

18. What is the distance limit of a single execution?


data for UTP wiring without addition of
network devices?

33 pi (10 m)
100 pi (31 m)
330 pi (100 m)
500 pi (154 m)
19. What is the default subnet mask for a
Class A network?

0.0.0.255
0.0.255.255

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 7/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

255.255.255.0

20. Which network protocol is used to assign


automatically an IP address to a computer on a
network?

FTP
DHCP
ICMP
SMTP
The APIPA
21. What wireless security mode based on standards
Does open support the highest level of security?

WEP
WPA2
WPA
JUMP

22. What are the two network requirements needed?


to establish a VPN connection between a computer
distant and a private corporate local network?
(Choose two.)

Low latency network connection


Secure Web Server
Internet access
RTC Access
Client VPN

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 8/74
22/08/2023 03:40 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

data. What encryption technique secures the


données circulant sur l’Internet public comme si elles
were traveling on the company's local network?

MD5
VPN
WEP
WPA

24. What type of WAN connection would 3G or 4G use?


?

LIS
satellite
cable
POTS
cellular

25. True or false?


An intrusion detection system operates online
and has the ability to eliminate malicious traffic.

true
fake

26. Where can a technician enable ACPI mode on a

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 9/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

Device Manager
Personalization

27. What are the two actions to be taken beforehand?


install RAM in a laptop?
(Choose two.)

Use a thermal compound to connect the


memory to the motherboard.
Before installing the RAM, update the settings.
CMOS recorded on the amount of newly added RAM
configured.
Remove the battery.
Disconnect the screen from the lower part of the computer
portable.
Unplug the power supply.
Remove the retention clips from the memory module.
locations where the new RAM will be inserted.
28. What are the two elements that would be part of a
preventive maintenance kit for laptop?
(Choose two.)

compressed air
plastic pen
soft chiffon
Antistatic bracelet
flat head screwdriver

29. What is the purpose of executing applications for


mobile devices in a sandbox?

To allow the phone to run multiple


operating systems
to prevent malware
to infect the device
To enable the display of separate application icons
on the home screen
To bypass the operator's restrictions
telephone restrictions that prevent access to unauthorized applications

authorized
30. A user has installed a new printer.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 10/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

confirmation that the color calibration is optimized


Checking the settings of the print head
confirmation that double-sided printing (duplex)
works correctly
Verification that the driver software is working
correctly
confirmation that the printer and the computer
communication

A technician wants to add a new


shared network printer to a computer. The printer
does not appear in the list of available printers.
What are the two actions that the technician can take
perform to add the printer? (Choose one)
two.)

Enter the printer model.


Enter the printer's IP address.
Access a command prompt and use the
net use command to locate the printer and the
printer access path.
Search for the printer on the network.
Enter the name of the computer used for sharing
the printer.
32. A technician installs a new printer in
a cool and humid environment. Once the wiring of
the printer finished and the software and the print driver
installed, the printer test page gets stuck.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 11/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

too much humidity


insufficient memory for the printer
loose printer cables

33. What type of security attack is launched when a


computer hacker calls a company to obtain
login information for a computer and claims
to be an employee?

spyware
phishing
adware
Troyan
Social engineering

34. What are the two aspects of a computer that


can be protected by setting the password of the
BIOS? (Choose two.)

Network address assignment method


Hard disk parameters
Connection to the operating system
operating system startup
File system management
Firewall settings

35. After connecting to a computer, a user


can display the files, but cannot
download. What action can the administrator take?
undertake to allow the user to download
the files while preventing their deletion?

Set folder permissions to Read.


Set the file permissions to Modify.
Set file permissions to Full Control
Set file permissions to Read and
execution.

The support person heard about


of a case where the ministerial secretaries go for lunch and
leave their computer unlocked and stay connected
to their account. Which Windows feature
Would a technician use to help you with this

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 12/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

BIOS/UEFI password
Inactivity timeout and screen lock
Windows Firewall

A customer is angry and calls to complain that


the service scheduled on the computer took longer than
planned. The technician examines the work order and
note that the service was performed by a new one
employee. How should the technician react?

Check that the computer is functioning properly


now.
Listen to the complaint, then apologize for everything
disadvantage caused by the long service on
the computer.
Explain that the repair technician sent for
performing the service is inexperienced.
Put the client on hold until a supervisor
be available.
38. See the document. When troubleshooting an installed software
on a computer system, a level one technician
needs the help of a level two technician. The
the file presented in the room must be sent to
technicien de niveau deux. Comment le technicien de
Should level one deliver this file?

This file must not be shared with the technician of


level two.
Replace all the passwords in the file with
<password omitted> before sending the file via email.
mail, then provide the passwords by
secure means, if necessary.
Send the file as is to the level two technician.
Deliver the file in printed format only.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 13/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Examen final pratique (chapitres 10-14) Réponses

Explanation: The privacy of clients must be preserved.


The simplest way to preserve it is to delete
every occurrence of password in the documentation
sent to another technician. If a client password
is necessary to solve the problem, it must be
sent to another technician via a specific document.

What determines the level of support that a


call center technician will provide to a client
individual?

The support is based on this client's SLA contract.


All customers receive the same level of support from
the share of the call center.
A level one technician will provide a level of support.
higher than a level two technician.
An individual call center technician chooses the
support level based on available time for
help the client.

40. After resolving an intermittent defect of the reader


CD-ROM by firmly reconnecting a loose cable, the
the technician then decides to inspect all the others
cable connections to prevent further faults from occurring
occur. What are the two conditions that
will help prevent future cable faults and
connector? (Choose two.)

There are no missing connector pins or


tordues.
The cables are tensioned between the connectors.
Cables are not abruptly bent around the
adapter cards.
The device's data cables exceed the
manufacturer specifications.
The connector mounting screws were overtightened.
with a screwdriver.
A technician has been invited to reinstall the system.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 14/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

would be the most likely action that the technician should take
then carry out?

Modify the boot sequence in the BIOS.


Change the BIOS password.
Flash the BIOS for a firmware update.
Modify the clock speeds in the BIOS.

42. What are the three common causes of


Operating system problems? (Choose one)
three.)

a damaged register
incorrect IP addressing information
Loose cable connections
Failure of the Service Pack installation
CMOS battery problem
viral infection

Explanation: The typical causes of problems


operating system are as follows:
corrupted or missing system files
Incorrect device driver
Update or installation failed
Service Pack
corrupted registry
failure of a defective hard drive
incorrect password
viral infection
spyware

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 15/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

43. What integrated BIOS diagnostic test does a technician


would he execute to check a startup problem of
the computer?

memory test
Test POST
Start the test
Test de batterie

44. What are the three characteristics of the GPS on the


mobile devices? (Choose three.)

Phone number search


navigation
Specialized search results
Device tracking
Remote Erasure
Calculations of gasoline consumption
45. In Windows 7, what path will provide access to
parental control?

Start > Control Panel > Options tab


network and Internet > Internet > Security
Start > Control Panel > accounts
users and Parental Control > Parental Control
Start > Control Panel > Accounts
Users and User Accounts > Parental Control
Modify account control settings
the user
Start > Control Panel > Network and Internet > Internet
Options > Parental Control link

46. A user calls the help desk reporting that a laptop with
Linux freezes on startup and displays kernel panic. What
could cause this problem?

A driver has become corrupted.


GRUB or LILO has been deleted.
GRUB or LILO has been corrupted.
An application is using a resource that has become
unavailable.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 16/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Answer

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 17/74
22/08/2023 03:41 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

48. Drag the description to its cable type


correspondent.Response to the question

49. Match the computer problem with the area of the


system affected by the problem. Question

Answer

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 18/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

50. Drag the statements on the left to the mobile OS that


They describe on the right. (Not all targets are used.)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 19/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

Answer

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 20/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

51. Refer to the exhibit. A user issues the command ls -l in


a Linux system. Match the description to the result of the
command output. (Not all options are used.)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 21/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Examen final pratique (chapitres 10-14) Réponses

52. Match the authentication methods


remote access to the description. (Not all options do
are not used.)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 22/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Respond

53. Match the scripting language with


the script file name extension. (All the
options are not used.)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 23/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Practical final exam (chapters 10-14) Answers

54. What are the two potential risks that could


result from the rooting or jailbreaking of a device
mobile? (Choose two.)

Improvement of device performance


not to create or manage properly
sandboxing features
Activation of application access to the directory
root
allowing extensive customization of the interface
user
activation of features disabled by a
mobile phone operator

Explanation: Rooting and jailbreaking devices


mobiles allow system customization
exploitation, which allows users and
applications to access the root directory. Furthermore,
rooting and jailbreaking can prevent a
device for creating or managing correctly
sandboxing features. These two elements
can create security risks for the device. The
three incorrect options are all considered as

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 24/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

55. What are the two tasks to be accomplished?


regularly to preserve the security and integrity of
data and applications on mobile devices?
(Choose two.)

Password protect the iTunes accounts or


Google Play.
Use airplane mode if you are accessing the Internet on a
open Wi-Fi site.
Make sure that the software and applications of
operating systems contain the latest
updates.
Unmount all unused disk partitions.
Regularly back up user data.
Perform a factory reset once a month
to remove all non-malicious software
identified.

Explanation: To secure and protect the software and the


data on mobile devices, it is recommended
to perform frequent backups. Another good
the practice consists of ensuring that all the patches and

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 25/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

the vulnerabilities and introduce new ones


features.

56. A user notices that a mobile device


consumes energy faster than usual.
What are the three causes of rapid discharge of the
battery? (Choose three.)

The screen is set to a high brightness level.


Airplane mode is activated.
The device connects via a VPN.
An application is not compatible with the device.
An application is using too many resources.
The device is roaming between the call towers.

Explanation: The rapid discharge of the battery is


probably caused by roaming between the towers
from a call, a screen set to a high brightness level
or applications that use too many resources. If
an application is not compatible with the device, the
the device's operating system freezes. If the
operating system encountered an error, the device
will not respond.

57. What are the two operations that can help to


prevent the tracking of a mobile device without permission?
(Choose two.)

Disable or remove the applications that

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 26/74
22/08/2023 03:42 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

Configure the device to connect only


to known Wi-Fi networks.
Use a VPN connection whenever possible.
Turn off the GPS when it is not in use.
Configure the device so that it does not store the
identification information.

Explanation: The monitoring of devices relies on the function


GPS. Disabling GPS when not in use and
the deactivation or deletion of applications that
using the GPS function can prevent tracking of a
device.

58. Which component consumes the most amount


energy on most mobile devices?

camera
CPU
Multimedia player
LCD screen

Explanation: The LCD screen consumes the most energy.


on most mobile devices. The processor,
the camera and the media player consume
energy, but not as widely as the LCD screen.

59. What tool is included in Mac OS X for backup?


disks in image files and retrieve
disk images?

System restoration
Deja Dup
Disk error checking
Disk Utility

Explanation: Mac Disk Utility allows an administrator


to set up automatic backups on disk.
L’outil Deja Dup est un outil intégré au système

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 27/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

The system is a Windows tool allowing for a


administrator to restore a previous configuration
of the operating system.

60. When a user attempts to run a program,


a missing or corrupted DLL message appears.
What are the two possible solutions to this problem?
(Choose two.)

Run sfc/scannow in safe mode.


Use the msconfig command to adjust the
program startup parameters.
Run the automatic restart tool.
Reinstall the appropriate drivers.
Register the DLL file using the command
regsvr32.

Explanation: Two possible solutions to a reported issue


missing or corrupted are to register the DLL file to
the help of the command regsvr32 or to restart
the computer in safe mode and run sfc /
scannow. The automatic startup repair of
Windows is used to solve problems of
Windows startup. Adjusting the settings of
starting the program using msconfig
applies only to programs that are starting
correctly. The drivers relate to the hardware, not
to the programs.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 28/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

61. A computer locks itself several times without


Error message. What are the two conditions that
may be at the root of the problem? (Choose one)
two.)

The computer contains a virus.


User Account Control has been disabled.
The processor needs to be upgraded.
An update has corrupted the operating system.
The indexing service is not running.
The user has violated the security policy of
the user.

Explanation: If a computer locks up without a message


of error, the hardware or software can be the
problem. The issues could include the items
following:
The processor or the front bus are defined by
incorrect manner on the motherboard or in the
BIOS.
The computer is overheating.
An update has corrupted the system.
of exploitation.
The RAM is faulty or a RAM module is
failing.
The hard drive is failing.
The power supply is failing.
The computer contains a virus.

62. A user submitted an incident ticket indicating


your computer displays the error 'BOOTMGR is missing'
missing." The IT technician replicates the error
and it is noted that it occurs after the self-test of
startup (POST) of this Windows 10 machine. What
What are the two possible solutions to this problem?
(Choose two.)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 29/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Execute the command bootrec /fixboot.


Run chkdsk /F /R from the console
recovery.
Restore BOOTMGR using the environment of
Windows recovery.
Run an antivirus software.
Use the last known good configuration for
start the computer.

Explanation: The message 'BOOTMGR is missing'


could be the symptom of a missing BOOTMGR or
damaged, of a configuration data file of
missing or damaged startup, of an order of
poorly defined boot in the BIOS, a corrupted MBR
or a failing hard drive. Given that the system
the operation cannot be located to start, the
correction cannot be made using a
regular order.

63. A user calls technical support and reports


that invalid system disk error messages
Invalid boot disk error appears on the
workstation when it is powered on. When a
the technician arrives at the office, the user mentions
that the workstation was working well the day before. The
The technician suspects that the MBR is corrupted. What
process the technician can use to verify and
repair the MBR?

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 30/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Run the chkdsk command.


Start the workstation in safe mode.

Explanation: The command bootrec can be used


to repair and resolve MBR issues.
The command chkdsk can be used to check
the integrity of files and folders by analyzing the
hard disk surface in search of physical errors.
The command can be used to verify and
replace important Windows system files.

A technician visits a website and uses Google


Chrome on a Windows 10 PC. The technician is trying
to display the website password. The technician
use the Credential Manager to
display the password, but cannot see it. What
could be the cause?

The browser crashed after accessing the site


Web.
The Credential Manager stores
only system passwords.
The visited website placed a cookie prohibiting the
password storage.
The web credentials are not
registered for sites accessible by
browsers other than Explorer and Edge.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 31/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

the Edge. The credentials created with


other browsers must be managed from the
navigation software.

A technician is troubleshooting a computer


employee laptop that has a problem with
wired network connectivity. The laptop can be
connect to the Internet when used indoors
office, but cannot connect to the network when it
is used in a research laboratory. The company
uses DHCP at the office, but not DHCP in the
research laboratory. How can the technician
solve this problem?

Implement an IPv4 configuration address


alternative on the laptop.
Change the IPv4 address of the DNS server on the computer
portable.
Modify the proxy settings used on the computer
portable.
Adjust the default gateway IPv4 address to
the laptop.

Explanation: By configuring another IPv4 address on


the laptop, the user will be able to move between
a network with DHCP and another network that requires
a static IPv4 address.

66. What are the two correct statements?


regarding level one and level two technicians
two? (Choose two of them.)

Level two technicians prepare an order of


work and pass it on to a level one technician if
A problem cannot be solved in ten minutes.
Level two technicians are often referred to as "
incident control agents" and the technicians of
level one are often referred to as 'product specialists'.
Level two technicians are generally

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 32/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Level two technicians respond


usually to "breakdown calls" because they can
to be able to solve them more quickly.
Level one technicians generally work on
the problems that require opening the case of
the computer.

Explanation: Call centers sometimes have names.


different for level one and level two technicians
two. Level one technicians can be called
level one analysts, dispatchers or controllers
incidents. Level two technicians can be
called product specialists or support staff
technique.

The level two technician is generally more


more competent than the level one technician on the
technology, or working for the company for more than
for a long time. When a problem cannot be solved
within a predetermined time frame, the level one technician
prepare an escalated work order.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 33/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Transmission of an incident ticket to a technician


higher level
Customer information collection to initiate an order
work
Remote update of drivers and software on
the clients' computers
diagnostic information collection from
a client's computer
prioritize incoming calls based on their severity

Explanation: Level two technicians are


mainly responsible for receiving and working on
escalated work orders. Their tasks involve
the use of remote access software to
connect to a client's computer in order to carry out the
maintenance and repairs.

68. During the computer investigation, what is required to


prove the existence of a chain of custody?

a confession of guilt
Appropriate documentation procedures
Expert testimony
Collected evidence

Explanation: A chain of custody requires a


detailed and complete documentation to follow the
collected evidence.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 34/74
22/08/2023 03:43 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

A technician copied several commercial films.


on a company server to share with
colleagues. How would this behavior be classified?

Acceptable
ethically wrong and illegal
illegal but ethical
ethically wrong but legal

It is not permissible to install, copy, or share.


digital content (including software, music, text, images,
and video) in violation of copyright and software
agreements or applicable laws. This is legally and
ethically wrong.

70. A call center technician answers a call


of a frequent client who is known to be impatient and
lack of experience with computers. The client
encounter a problem with an application taken in
charged by the call center. The customer informs the
technician that the problem has already been reported, but the
the technician was rude, did not listen and did not
solve the problem. If the technician is convinced that the
the problem can be solved by increasing the amount of
memory in the computer, what should he do?

Suggest to the customer to buy a new computer.


Ask the customer to install 2 GB of DDR3 PC3 RAM.
10600.
Confirm the issues and give instructions
detailed to solve the problem.
Explain that the original technician is not good and that
the supervisor will be informed.

Explanation: When dealing with clients, a


the technician must demonstrate professionalism in
all aspects. When explaining the solution for
to solve the problem, a technician must provide a
simple step-by-step instruction process. The

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 35/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

A call center technician asked a


client to carry out a simple operation to settle a
problem on a computer. The client seems unable
to carry out the task. What should the technician do?

Determine if the client prefers to receive the


instructions in another form, for example, some
illustrated written instructions sent by mail
electronics.
Explain to the client that it is a simple task and
ask him to try again.
Tell the client that another technician will explain it to you.
task.
Ask the client to find someone with more.
experience to perform the task.

Explanation: When it provides a solution to resolve


a problem, a technician must prepare to explain
other ways the technician can assist the client, if
necessary, like sending information by mail
electronics, send step-by-step instructions
by fax or use remote control software
to solve the problem.

A IT technician is fixing an error.


de fichier sur l’ordinateur portable d’un employé. Lorsque
you work in the system files directory, the
technician notes that the dialog box Control of

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 36/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Call the employee and apologize for the delay in


the repairs and ask for the password
administrator by phone.
Call the employee and ask him to come to the
IT service to enter information
of identification necessary.
Turn off the laptop and send an email to
the employee with an account password request
supervisor administrator.
Turn off the laptop, start it from a
Bootable CD/USB and modify the system files to
finish the repair.

Explanation: The employee may have dropped the computer.


portable while waiting for repairs using the account
the local user. It is important to obtain permission
of the client before accessing other computer accounts,
including the administrator account. If any information
private, such as usernames and passwords
passed, are collected, it is important to keep them
as confidential as possible.

73. What are the two Windows operating systems?


that cannot be upgraded to Windows 8.1 64
bits? (Choose two.)

Windows 7 64 bits
Windows 7 32 bits
Windows 8 64 bits
Windows XP 64 bits
Windows Vista 64 bits

Neither Windows XP nor Windows 7 32 bits


can be upgraded to Windows 8.1 64-bit. A
32-bit operating system cannot be upgraded to
level towards a 64-bit operating system. A
Windows XP system cannot be directly upgraded to
day to Windows 8.1. In either case,

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 37/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

74. A user wishes to upgrade a PC to


Windows 10 from a PC running a 32-bit version
Windows 7 editions. What are the two editions of
Windows 10 that will support this upgrade
? (Choose two).

64-bit version of Windows 10 Professional


Windows 32-bit homepage
32-bit version of Windows 10 Professional
64-bit version of Windows 10 Enterprise
64-bit version of Windows Home

Explanation: Windows Home, Windows XP and Windows


Views are not supported in the update path.
to level to Windows 10. The 64-bit version of
Windows 10 Enterprise cannot be downgraded to
Windows 10.

75. Once a computer is turned on, Windows 7 does not


cannot start. What initial procedure does a
What technique would he use to address this failure?

Press the F12 key during the process of


start and boot the computer in safe mode.
Start from a Windows installation media
7 and access the system restore utility.
Access the Control Panel and choose
Restore the files from the backup in the

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 38/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Explanation: There are many reasons that


could prevent a PC from starting, particularly a
hardware failure, a MBR corruption, a driver
material that has not been installed correctly, etc. A
The approach to troubleshooting the PC involves starting up.
the PC with a Windows 7 installation DVD and to
use the system restore utility to
restore the system. To access safe mode,
we must press the F8 key (not the key
F12). The other two options assume that the PC can
start.

76. Which statement is correct about


the installation of a 32-bit operating system on a
x64 architecture?

This combination will provide better security.


The operating system can address more than 128 GB
from memory.
The operating system will function correctly.
The operating system will always use all the RAM
available.

Explanation: A 32-bit operating system can


to run on an x64 architecture, but it will not be able to
use more than 4 GB of system memory. A system
64-bit operating system includes features that offer
an additional security.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 39/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Practice Final Exam (chapters 10-14) Answers

77. A technician is trying to create several partitions on


a hard drive that uses the boot sector standard
which supports a maximum partition size of 2
What is the maximum number of main partitions?
authorized by hard drive?

128
32
4
2
16
1

Explanation: The main boot record


(MBR) is the industry standard for booting that takes into account

load a maximum primary partition of 2TB. MBR


authorize four main partitions per drive. The
GPT standard (GUID Partition Table standard)
the globally unique identifier (GUID) can take on
charge of enormous partitions with a theoretical maximum
from 9.4 ZB (9.4 x 10 to the 24th byte). GPT supports
a maximum of 128 primary partitions per drive.

78. A network administrator is responsible for deployment


from Windows 10 Pro for a large number of new
PC in the company. The administrator uses a PC to
perform a basic installation with the applications
company standard. The PC is tested to be
fully functional. What tool does the administrator need to
use to delete all information
specific to the computer and the user before creating
a deployable image from the disk?

Without supervision.bat
Ntoskrnl.exe
File and settings transfer for Windows
Sysprep.exe

Explanation: When a basic installation of a

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 40/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

that the SID, user accounts, and the time zone.


Before a deployed image is finalized
created, the specific information must be
deleted. The Microsoft System Preparation tool
(sysprep.exe) can be used for the task.

79. A network analyst starts a PC on which


Windows 8 is installed. The boot process
currently working on the next step: The BIOS
start the computer using the first drive that
contains a valid boot sector. What is the
next step that will occur in the process of
startup?

WINLOGON.EXE displays the Windows welcome screen


NTOSKRNL.EXE starts the logon file called
WINLOGON.EXE.
The code in the bootstrap sector is executed and the
the control of the start-up process is given to
Windows Startup Manager.
The Windows kernel supports the process of
starting.

80. A service technician notices a


increase in the number of calls regarding the
performance of the computers located at the manufacturing plant.
The technician believes that botnets are responsible for
problem. What are the two objectives of botnets?

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 41/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final practice exam (chapters 10-14) Answers

to access the restricted part of the system


exploitation
to transmit viruses or spam to
computers on the same network
deny access to a computer or files until
that the money has been paid
to record all keystrokes
to attack other computers

Explanation: Botnets can be used for


carry out DDoS attacks, obtain data or
transmit malware to other devices
of the network.

81. A company has a security policy that allows


the reuse of erased readers in others
computers. Wiped drives are often used
for additional storage or as a drive
replacement. What are the two methods that
could be used to erase the data?
(Choose two.)

EFS Encryption
Demagnetization equipment
Data erasure software
Multifactorial erasure
Biometric scanner

Explanation: Data erasure software


crush the data several times. A baguette of
demagnetization or a demagnetization device
use magnetism to destroy data on a
hard drive.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 42/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

A technician configures a SOHO computer.


the technician wishes to create a local account that requires
a password and wants a screensaver
appears if the person using the computer moves away
for a certain period of time. What are the two panels
the Windows configuration that the technician will use for
complete these tasks? (Choose two.)

Programs
Material and sound
Personalization
Ease of access
Network and Internet
User accounts

Explanation: The Windows Control Panel


User accounts are used to create and manage
local user accounts and configure passwords
pass for each account. The Control Panel
Windows customization is used to access the
Screen saver settings window where
the computer can be configured to display the screen
session login if there is no use for
a preconfigured number of minutes.

83. After confirming the removal of a virus from a


computer, how should the technician ensure

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 43/74
22/08/2023 03:44 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Search for the latest patches and updates of


operating system.
Gather information from a number of
sources to clearly identify the problem.
Document the problem and the procedures performed
to solve it.

Explanation: After solving a problem


Computing, the next step is to check all
the features while ensuring that the system
operation is up to date and testing the functioning of
the computer and the network to which it is connected. The
documentation of the problem and the solution is there
final step, while the information gathering
from the user and other sources constitutes a
previous step of the troubleshooting process.

84. What is the next troubleshooting step once


that a theory of probable cause has been established?

Document the findings and results.


Identify the exact problem.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 44/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Practical Final Exam (chapters 10-14) Answers

Explanation: The troubleshooting process involves six


steps.
1. Identify the problem.
2. Establish a theory of the probable cause.
3. Test the theory to determine the cause.
4. Establish an action plan to solve the problem.
5. Check all the functionalities of the system.
6. Document the findings.

A technician was informed of a problem on the network.


After investigation, the technician determines that a computer
the company's internal network launches an attack on
other computers of the company. What type of malware
is used?

rootkit
Troyan
Spoofing
Lit

Explanation: A proxy Trojan horse is a type of


malicious software that uses a computer as
source device to launch attacks against
other devices. Malware is evolving
quickly, it is therefore important to obtain the updates
recent anti-malware programs by
protective measure.

86. What is the recommended best practice for


a technician who must perform tasks requiring a
administrative access?

Ask the current user to log out, to


restart the computer, then log in with the
administrator account.
Prevent the computer from contacting the server
network authentication by disabling the network card,
then log in with an administrator account.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 45/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Practical Final Exam (chapters 10-14) Answers

Use a standard account with permissions


limited, then use the Run as option
as an administrator to perform the task that
requires elevated privileges.

Explanation: Besides the non-technical users


having a standard user account, it is
also recommended to ensure that the
technical personnel use a limited account. Then,
when an administrative task is necessary, the
technician uses the Run as option
when the administrator provides the information
appropriate identification of an account holding
high-level identification information for the task.

87. A technician is troubleshooting a Windows 10 PC that


has a .dll file for an application that does not have
was recorded. What tool or command line
administrative command can be used for
solve this problem?

RoboCop
type
regsvr32
Net user

88. A manager asked a technician to


recommend a security solution to protect a

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 46/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

antimalware
TPM
Two-factor authentication

89. True or false? When a user works on a


système qui utilise un système de fichiers réseau, il n’y a
no difference between accessing a stored file
locally or on another computer on the network.

Fake
True

90. An instructor discusses facts about different software


operation of mobile devices. The instructor states:
To synchronize a mobile device with a PC,
iTunes must be installed on the PC.
Does this relate to: iOS, Android or the
two?

the two
Android
Ios

91. A customer installed a new driver for a


device three weeks ago; However, this driver
causes the system to freeze from time to time and the
the client wishes to revert to the old driver. What option
Can we use to solve this problem without loss of
data or applications?

Reset this PC.


Use Advanced Start-up.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 47/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Practical final exam (chapters 10-14) Answers

92. When a security audit is conducted in a


the company, the auditor reports that the new
users have access to network resources beyond
their usual roles. Furthermore, users who
changing positions while retaining their authorizations
previous. What kind of violation is taking place?

least privilege
password
audit
Network Policy

Explanation: Users should have access to


information according to the principle of need to know.
When a user switches from one role to another, the same
the concept applies.

93. An instructor discusses facts about different software.


of mobile device operation. The instructor states:
To prevent malware from infecting
the device, mobile device applications are
executed in a sandbox that isolates them from others
resources. » Which operating system does this apply to?
Does he report?

Ios
Android
or both

94. True or false? Hard drives partitioned with a


Master Boot Record (MBR) cannot
not having an extended partition or logical drives.

True
Fake

95. A technician repairs a Windows 10 computer that


Displays an error message "Boot disk not found"
valid." What should be the first action that the
What action must the technician take to resolve the issue?

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 48/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Modify the boot order in the settings


UEFI/BIOS to select the drive on which the
operating system is installed as first
boot device.
Start the computer in safe mode and run
sfc / scanno w .
Use the last known good configuration for
start the computer.
Run the chkdsk command.

Explanation: The first thing that the technician must


to do when he sends an error message 'Disk of '
Invalid startup" is to ensure that the order of
startup in the UEFI/BIOS settings is set to
the drive on which the operating system is installed
as the first boot device.

96. A technician is troubleshooting a Windows 10 PC. The PC


has an application that displays an error message
regarding a missing DLL. The technician has located
the DLL file on the PC and wants to save it. Which tool
command line can the technician use for the
task?

regsvr32
dism
Sfc

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 49/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Explanation: The administrative command line tool


regsvr32 in Windows 10 can be used to
register and unregister .dll files and
ActiveX controls in the Registry.

97. A technician wants to split a large partition on a


reader in a Windows 10 PC without data loss.
How can this be accomplished?

Reduce the existing partition and create a new one


partition from unallocated space.
Delete the existing partition and format the disk
with two new partitions.
Reset the disk and create new partitions.
Delete the existing partition and create two new ones.
partitions.

Explanation: Use Disk Manager to reduce the size


from the existing partition. This creates unallocated space
which can be used to create a new partition without
data loss on the existing partition.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 50/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

from a chief technician. The chief technician provides


the graph to illustrate the configuration options.
What is the purpose of the configuration feature?
alternative?

It allows an administrator to choose a card


secondary network interface card (NIC) that the PC can
use it if he encounters difficulties in contacting a
DHCP server.
It allows an administrator to specify the IP address
from a DHCP server when a PC is having difficulties
to receive an IP address dynamically.
It allows an administrator to configure another
IP address that the PC can use if it cannot
to contact a DHCP server.
It allows an administrator to change the MAC address.
from the PC in order to receive another IP address from a server

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 51/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

Explanation: The Properties window of the protocol


Internet Windows version 4 (TCP/IPv4) includes a
other configuration tab that allows a
administrator to configure another IP address than the
PC can use if it fails to contact a server
DHCP.

99. What are the two storage locations of


data that contains persistent data that
can be used by computer specialists
judiciary? (Choose two.)

ARIES
CPU Registers
Hard drives
cache
SSD drives

Explanation: Persistent data is data


stored on an internal or external hard drive, or a
optical reader. Data is retained when
The computer is off.

100. Chad, level one call center technician,


receives a phone call from a client. The client has a
problem that Chad does not have the knowledge to
respond. The client is irritated that Chad cannot
provide immediate assistance. What are the two
What should Chad do next? (Choose one)
two.)

Inform the client of the need to call back later.


Document the reason why the customer called
and create a support ticket.
Escalate the client to a level technician.
two.
Ask more questions to the client to diagnose and
try to solve the problem.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 52/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Explanation: When a customer contacts a center


of calls, the level one technician must always create a
ticket and document the issue encountered by the client.
If the level one technician is unable to
provide help, he must forward the ticket to a
level two technician.

101. What is the best definition of information


personally identifiable information (PII)?

Data collected by companies to track the


digital behavior of consumers.
Data collected from servers and browsers
Web using cookies to track a consumer.
Data collected from servers and websites
for anonymous browsing.
Data collected by companies for
distinguish the identity of individuals.

Explanation: Personally identifiable information


(PII) are data that could be used to
distinguish a person's identity, such as their name
young girl of the mother, the social security number and /
or the date of birth.

102. An instructor discusses facts about different software


of mobile device operation. The instructor states:
Remote backups are a compatible service.
with the cloud for mobile devices. " To what
operating system does it relate to: iOS, Android
or both?

Ios
the two
Android

103. A Windows 10 computer suddenly


started to experience connectivity issues
network after the latest Windows updates

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 53/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Use Advanced Start-up.


Reset this PC.
Restoration using Sysprep.
Return to the initial version of Windows.

104. A user wants to display and modify some


information about computer users. What tool
command line administration command
can be used to solve this problem?

diskpart
Net user
MSTSC
check disk
105. A user wishes to display the content of a
text file in a command interpreter. What
tool or command line command
administration can be used to resolve this
problem?

type
Net user
chkdsk
Robocop

106. True or false? Modern operating systems


start the computer, manage the file system and do not
only support one user, task or
processor.

True
Fake

107. A user is trying to install an application on a


PC Windows 10 Pro but fails. The user attempts to
uninstall the application but the uninstallation fails.
What option can we use to solve this problem?
without loss of data or applications?

Use Advanced Start-up.


Use the restore point.
Uninstall and reinstall the device using the

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 54/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final Practical Exam (Chapters 10-14) Answers

108. True or false? Multitasking describes a system


computer exploitation capable of executing several
applications at the same time.

True
Fake

109. A technician is working on a Windows 10 PC that does not


stops freezing occasionally after an update
the driver. System restore has been disabled.
What option can we use to solve this problem
without data or application loss?

Reset this PC.


Uninstall and reinstall the device using the
device manager.
Restart the Windows Update services.
Restoration using Sysprep.
110. A technician repairs a Windows 10 PC that
will not perform any automatic or manual updates
from Windows. What option can we use to resolve
this problem without loss of data or applications?

Delete all the files from the folder


C:\Windows\SoftwareDistribution and restart the PC.
Perform a Windows repair using the media
of installation.
Restart the Windows Update services.
Uninstall and reinstall the device using the
device manager.

111. A user wants to search for errors in


a file system, including errors with a
physical support. What tool or command line
administrative command can be used to
solve this problem?

chkdsk
type
Net user
Robocop

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 55/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

administration command can be used to


solve this problem?

dism
RoboCop
type
chkdsk

113. A user wishes to terminate a process by


execution course on a computer. What tool or
command line administrative command can
to be used to solve this problem?

Elimination task
Robocop
type
chkdsk
114. A technician wants to copy files and
directory trees of entire directories from a volume to a
another volume on a Windows 10 PC. Which tool or
command line administrative command can
to be used to solve this problem?

Robocop
type
Net user
chkdsk
115. A technician is troubleshooting a Windows 10 PC whose
System files have been corrupted. What tool or
command line administration command can
to be used to solve this problem?

Sfc
chkdsk
Robocop
diskpart
116. A user wants to see a summary of
software information and system components, y
understanding the hardware components, on a Windows PC
10. What tool or command line command

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 56/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

chkdsk
Robocop
diskpart

117. A technician has just configured the security policy


on a Windows 10 PC and wants to ensure the policy is
implemented immediately. Which administrative
command-line tool or command can be used to address
this?

gpupdate
diskpart
chkdsk
mstsc
118. A technician has been asked by a manager to
recommend a security solution for protecting a computer
against keyloggers. Which security technique should the
technician recommend?

antimalware
IPS
encryption
SSL

119. A technician has been asked by a manager to


recommend a security solution for protecting a computer
against adware programs. Which security technique
Should the technician recommend?

antimalware
ping sweep
encryption
SSL
120. A technician has been asked by a manager to
recommend a security solution for protecting a computer
against rootkits. Which security technique should the
technician recommend?

antimalware
port scan
encryption

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 57/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

against Trojans. Which security technique should the


technician recommend?

antimalware
RAID
dual authentication
encryption

122. A technician was invited by a manager to


recommend a security solution to protect a
computer against firmware viruses. Which
What security technique should the technician recommend?

antimalware
TPM
Two-factor authentication
encryption
123. True or false? Smartphones require a
operating system before they can be used.

True
Fake

124. True or false? When a hardware device is


installed, the operating system must use a driver for
device to access this equipment and use it.

True
Fake
125. True or false? The 10-bit version of Windows 64 can
be installed on as little as 1 GB of disk space.

Fake
True

126. True or false? DirectX is a collection of related APIs


to multimedia tasks for Microsoft Windows.

True
False
127. True or false? The Register is a database.
which contains only information about the drivers
of peripherals on a computer.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 58/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

128. True or false? Multithreading describes a system


exploitation that can support two
processors or more.

False
True

An instructor discusses facts about different software.


of mobile device exploitation. The instructor states:
The voice command function for starting can
to be carried out with the home button. " To which system
Does it relate to: iOS, Android or the
two?

Ios
the two
Android
130. An instructor discusses facts about different software.
of operating mobile devices. The instructor states:
"Mobile devices have a feature called
Spotlight is a search tool that provides
information from numerous sources." To what
operating system does it relate to: iOS, Android
or both?

Ios
the two
Android

An instructor discusses facts about different software.


of mobile device operation. The instructor states:
This operating system can be used by the
programmers to operate devices such as
laptop computers, smart televisions
and e-book readers." To which system
Does this relate to: iOS, Android or the
two?

Android
the two
Ios

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 59/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

the application." Which operating system does this relate to?


Does it report: iOS, Android or both?

Android
the two
Ios

133. An instructor discusses facts about different software


of mobile device operation. The instructor states:
"To prevent malware from infecting"
the device, mobile device applications are
executed in a sandbox that isolates them from others
resources. » Which operating system does this relate to?
Does it report: iOS, Android or both?

both
Android
iOS
134. An instructor is discussing facts about different
mobile device operating software. The instructor states:
WIFI hotspots are a location data source that can be
used by locator apps to determine the position of a
mobile device.” To which OS does this relate: iOS,
Android or both?

both
Android
iOS

135. An instructor is discussing facts about different


mobile device operating software. The instructor states:
GPS signals are used to enable geocaching, geotagging
and device tracking on these mobile devices.” To which
Which operating system does this relate to: iOS, Android, or both?

both
iOS
Android
136. An instructor is discussing facts about different
mobile device operating software. The instructor states:
The user interface can be extensively customized using

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 60/74
22/08/2023 03:46 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

Android
iOS

137. What is the purpose of 'branching' in high-level


programming languages?

to add programming code that links to another application


to have a series of control flow statements
to add a different programming language to existing code
to add sequential programming code

Branching is a series of control flow


statements in high-level programming languages.
Branching occurs when an instruction tells a computer to
begin executing a different part of a program rather than
executing statements individually.

138. Which statement is true regarding mobile devices


using the Wireless Wide Area Network (WWAN)?

The bandwidth available over WWAN connections is fixed


and is independent of the technologies supported by the
adapter and the transmitter.
They require a 64-bit operating system.
They can only be connected through external WWAN
USB adapters.
They require an adapter to link to a cellular provider’s
network through the nearest base station or
transmitter.

Mobile devices use Wireless Wide Area


Network (WWAN) or cellular Internet access technology.
WWAN requires using an adapter to link to a cellular
provider network through the nearest base station or
transmitter. WWAN adapters can be internally or
externally connected by USB. The bandwidth available
over WWAN connections depends on technologies
supported by the adapter and the transmitter, such as 3G
or 4G. Connection to the WWAN is automatic once the

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 61/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

139. A user is trying to execute a file using elevated


permission. The user right-clicks the file, chooses Run as
Administrator, and chooses Yes in the User Account
Control (UAC) window. The operation fails. What is the
reason?

The UAC does not have the elevated privileges option.


The directory housing the file is read-only.
The user is not a member of the administrator group.
The login password of the user is invalid.

An administrator password is required to


open or execute a file using elevated permission, or the
current user must belong to the Administrator group.

140. A technician has just purchased a new Windows 10


PC and wants to transfer selected files, folders, profiles,
and applications from the old Windows PC. What tool or
Which utility does Microsoft recommend to do this?

Upgrade Assistant
PCmover Express
User State Migration Tool
WindowsTask Manager

Explanation: PCmover Express is the software tool


recommended by Microsoft to move
automatically the files, the settings and the profiles
user from an old PC to a new one. The version
free is no longer available and its use from
LapLink incurs fees.

141. What tool is available to transfer data


and the user settings of an old Windows 10 PC
towards a new Windows 10 PC?

Windows Upgrade Assistant


Windows User Manager
User State Migration Tool

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 62/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Explanation: When the data and parameters


existing users must be migrated from the old PC
Windows 10 to the new Windows 10 PC, the tool for
User migration can be used for this.

142. What is the default file system used when


of a new installation of Windows 10?

The
FAT16
NTFS
FAT32

Explanation: The default file system for a


installation of Windows 10 is NTFS.

143. What is a possible situation where it could be


necessary to start Windows 10 from a
bootable recovery USB drive?

To delete registry keys


To disable background services
To partition the hard drive
To repair the operating system

Explanation: You can start Windows 10 from


from a bootable repair USB drive and repair
your computer with the recovery tools
correspondents, such as the bootrec commands. A
Windows 10 repair startup USB is a drive
bootable recovery created with USB.

144. A manager starts a tablet on which


Windows 10 is installed. The startup process
currently working on the following step: The core
Windows supports the boot process.
What is the next step that will occur in the
start-up process?

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 63/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

The code in the bootstrap sector is executed and the


control of the startup process is given to
Windows Startup Manager.
WinLoad loads two files that make up the core of
Windows: NTOSKRNL.EXE and HAL.DLL.
Winload uses the path specified in BOOTMGR for
find the boot partition.

Explanation: The Windows 10 startup process


1. Pre-start:
the power-on self-test (POST) or the self-test for assessment
under voltage load the firmware parameters. It
check if a valid disk system is ready to proceed to
the next phase. If the computer has an MBR
valid, that is to say Master Boot Record, the process of
startup moves further away and loads the Manager
Windows startup.
2. Windows Startup Manager: This step
determine if multiple operating systems are
installed on your computer. If so, then it offers a
menu with the names of operating systems.
When you select the operating system, it
load the right program, namely Winload.exe
to get you started on the right OS.3.
Windows OS Loader: WinLoad.exe loads the drivers
important for starting the Windows kernel. The kernel
use the drivers to communicate with the hardware and
do the rest of the necessary things for the
continuous startup process.
4. Core of the Windows NT operating system: It is the
final step that retrieves the registry parameters,
the additional drivers, etc. Once this was done
the control is taken by the manager's process
system. It loads the user interface, the rest of
hardware and software. It is at that moment that you
you can finally see your Windows 10 login screen

145. An accountant starts a PC on which Windows 10 runs

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 64/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

CMOS. What is the next step that will happen in


the startup process?

The code in the bootstrap sector is executed and the


control of the startup process is given to
Windows Startup Manager.
The BIOS starts the computer using the first
reader that contains a valid boot sector.
WinLoad loads two files that make up the core of
Windows: NTOSKRNL.EXE and HAL.DLL.
Winload uses the path specified in BOOTMGR to
find the boot partition.

Explanation: The process of starting Windows 10


1. Pre-startup:
the power-on self-test (POST) or the self-test of setting
under load, charge the microprogram parameters
(CMOS). It checks if a valid disk system is ready.
to move on to the next phase. If the computer has a
Valid MBR, that is to say Master Boot Record,
the startup process moves further and loads
the Windows Boot Manager.
2. Windows Startup Manager: This step
determine if multiple operating systems are
installed on your computer. If so, then it offers a
menu with the names of operating systems.
When you select the operating system, it
load the correct program, that is to say Winload.exe
to get you started in the right OS.
Windows OS Loader: WinLoad.exe loads drivers
important for starting the Windows kernel. The kernel
use the drivers to communicate with the hardware and
do the rest of the things necessary for the
continuous startup process.
4. Core of the Windows NT operating system: This is the
last step that retrieves registry parameters,
the additional drivers, etc. Once that has been
the control is taken by the manager's process
système. Il charge l’interface utilisateur, le reste du

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 65/74
22/08/2023 03:45 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

Explanation: The Properties window of the protocol


Internet Windows version 4 (TCP/IPv4) includes a
other configuration tab that allows a
administrator to configure another IP address than the
PC can use if it fails to contact a server
DHCP.

99. What are the two storage locations of


data that contains persistent data that
can be used by computer specialists
judiciary? (Choose two.)

ARIES
CPU Registers
Hard drives
cache
SSD drives

Explanation: Persistent data is data


stored on an internal or external hard drive, or a
optical reader. Data is retained when
The computer is off.

100. Chad, level one call center technician,


receives a phone call from a client. The client has a
problem that Chad does not have the knowledge to
respond. The client is irritated that Chad cannot
provide immediate assistance. What are the two
What should Chad do next? (Choose one)
two.)

Inform the client of the need to call back later.


Document the reason why the customer called
and create a support ticket.
Escalate the client to a level technician.
two.
Ask more questions to the client to diagnose and
try to solve the problem.

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 52/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

149. A corporate office is considering using an MDM


policy to enhance its security parameters. What is
achieved through the implementation of the MDM policy?

It can be used to inventory all corporate assets.


Sets policies for the applications that are allowed on a
device.
Blocks and tracks all incoming TCP connections.
It can be used to log the onboarding of BYOD
devices.

150. A technician receives a trouble ticket from a user


reporting that a website is no longer accessible. What two
questions would the technician ask to narrow down the
potential problem? (Choose two.)

Can you access other websites from this computer?


browser?
What operating system is installed on your computer?
Could you access this website previously from this?
device?
What model computer are you using to access this site?
Do you remember your password to this web site?

To narrow down the problem, the


technician asks if the computer was previously able to
access the website and if other websites are accessible.
If the answer is yes to both questions, the technician has
narrowed the issue to problems with the single website
on this day.

← Previous Article Next Article →


IT Essentials 7.0 8.0 Final IT Essentials 7.0 Chapter 1
Exam (Chapters 10-14) – 9 Skills Assessment
Answers Full Exam Answers

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 67/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Jointhediscussion

28COMMENTS

Anonymous 2 months ago

Where are 32-bit program files located in a 64-bit


version of Windows 10 Pro?

c:\Windows\system32
c:\Program files (x86)
c:\users
c:\Program files

Reply View Replies (1)

Java programmer 2 months ago

I encountered this question and it could possibly help


new people
A corporate office is considering using an MDM policy.
to enhance its security parameters. What is achieved
through the implementation of the MDM policy?

A. It can be used to inventory all corporate assets.


B. Sets policies for the applications that are allowed on
a device.
C. Blocks and tracks all incoming TCP connections.
D. It can be used to log the onboarding of BYOD
devices.
Reply View Replies (1)

Sunmathi.E 2 months ago

A technician receives a trouble ticket from a user

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 68/74
22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Can you access other websites from this computer?


browser?

What operating system is installed on your computer?

Could you access this website previously from this


device?

What model computer are you using to access this


site?

Do you remember your password to this web site?


Reply View Replies (1)

Winston B 2 years ago

Question 96: A computer repeatedly locks without


any error message. Which two conditions may be
the cause of the problem?
The correct answers should be:

An update has corrupted the operating system


The computer has a virus

Reply

Marius 2 years ago

What is a recommended best practice for a technician?


who must perform tasks that require administrative
access?

Correct
Response
Your
Response
Log off the computer and then log in with an
account with administrator privileges.
Prevent the computer from contacting the network
authentication server by disabling the network card

and then log in with an administrator account.


Use a standard account with limited

Sorry, I cannot access external content. 69/74


22/08/2023 03:47 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

Ask the current user to log off, restart the computer,


and then log in with the administrator account.

In addition to nontechnical users having a standard


user account, it is also a best practice to make
technical staff use a limited account. Then when an
an administrative task is needed, the technician uses
the Run as Administrator option and provides the
appropriate credentials of an account that has
elevated credentials for the one task.
Reply View Replies (1)

Ck75 2 years ago

Hi, I would like if CCNA Questions Answers would


respond to this, and anyone using this website for this
particular exam to read this, not all of the answers on
this page is correct. I have taken the exam 5 times
using the answers from this website and still get
around 10 wrong. There is a website called
infraexam.com which has this same exam and has all
the correct answers except for two questions. The first
one is:
What is a recommended best practice for a
technician who must perform tasks that require
administrative access?

Using a standard account with limited permissions,


use the Run as Administrator option to perform the
task that requires elevated privileges.
Prevent the computer from contacting the network
authentication server by disabling the network card
and then log in with an administrator account.
Log off the computer and then log in with an
account with administrator privileges.
Ask the current user to log off, restart the
computer, and then log in with the administrator
account.

The correct answer is Using a standard account with


limited permissions, use the Run as Administrator
option to perform the task that requires elevated

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 70/74
22/08/2023 03:48 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

A user calls the help desk and reports that invalid


system disk or invalid boot disk error messages
display on the workstation when it is powered on.
When a technician comes to the office, the user
mentions that the workstation was working well
the day before. The technician suspects that the
MBR is corrupted. Which process can the
What does a technician use to check and repair the MBR?

Run the bootrec command.

I would like the author CCNA Question Answers I


assume, to try and fix the answers on this page to
match the ones on infraexam.com with the questions I
listed above as exceptions. I really like this website
and I know a lot of people rely on it so I would really
I would appreciate it if you provide the correct answers. I mean this.

in the nicest way possible. Thanks, Have a nice day!

Reply View Replies (1)

BrianSveta 2 years ago

True or False? Multitasking describes a computer


operating system that is capable of running multiple
applications at the same time.

False
True

Reply View Replies (1)

Esther 2 years ago

True or False? Modern operating systems boot the


computer, manage the file system, and support only
one user, task, or CPU.

True
False

Reply View Replies (1)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 71/74
22/08/2023 03:48 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

David 2 years ago

A user tries to install an application on a Windows 10


Pro PC but it fails. The user tries to uninstall the
application but it fails to uninstall. What option can be
used to address this issue without loss of data or
applications?

Use Advanced Start-up.


Use Restore Point.
Uninstall and reinstall the device using device
manager.
Restart the Windows Update services.

Reply

GC 2 years ago

105 Answers should be


Ensure that the operating system software and
applications contain the latest updates.
Back up user data on a regular basis.

57
Turn off the GPS when not in use
Disable or remove apps that allow connections to the
GPS

Reply

Chawizzy 3 years ago

A user wants to display the contents of a text file in a


command interpreter. Which administrative command-
Which line tool or command can be used to address this?
a. type
b. net user
c. chkdsk
d. robocopy
Reply View Replies (1)

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 72/74
22/08/2023 03:48 IT Essentials 7.0 8.0 Final Practical Exam (chapters 10-14) Answers

aaa 3 years ago

107. Disk Utility


Reply

AAA 3 years ago

sSATA is a 7-pin connector used for external hard drives.


disk and the DB-15 has 15 pins in 3 rows

Reply

Mike 3 years ago

Hello, I am using this to help with answers and check.


answers there are several questions that are the same
but have different answers

Reply

Veronica 3 years ago

True or False? DirectX is a collection of APIs related to


multimedia tasks for Microsoft Windows.
Reply View Replies (1)

Jasleen 3 years ago

1 True or False? Hard drives partitioned with a master


The boot record (MBR) cannot have an extended partition.
or logical drives.

True
False
Reply

mrx 3 years ago

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 73/74
22/08/2023 03:48 IT Essentials 7.0 8.0 Final practical exam (chapters 10-14) Answers

isolates them from other resources.


does this relate: iOS, Android, or both?
Reply View Replies (2)

ITExamAnswers.netCopyright © 2023. Privacy Policy| Contact

https://itexamanswers.net/it-essentials-7-0-practice-final-exam-chapters-10-14-answers-full.html 74/74

You might also like