Professional Documents
Culture Documents
Refer to the exhibit. In what situation would a technician use this tab?
When a device is behind a firewall and software is being used that needs access to a
remote network.
When the computer will be using a VPN connection and accessing the Internet while
connected through the VPN.
When a laptop is used both at work with DHCP and at home with a static IP
address.
CCNA 5 Page 1
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
System Restore
Startup Repair
3. After complaints from users, a technician identifies that the college web server
is running very slowly. A check of the server reveals that there are an unusually
large number of TCP requests coming from multiple locations on the Internet.
What is the source of the problem?
4. A user reports that a laser printer is printing shadow images and letters. Which
part should the technician replace to correct this problem?
pick up roller
fuser
drum
network cable
5. A user has determined that the computer hard drive is failing. Before the failure,
the user implemented a backup scheme running a normal backup every end of the
month and then incremental backups every other day. What is the correct
sequence that the user has to follow in order to restore the backup?
Restore the last incremental backups in inverse order, and then restore the last normal
backup.
Restore the last normal backup first, then restore the incremental backups in
order.
CCNA 5 Page 2
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
Restore the last incremental backup and then restore the last normal backup.
Restore the last normal backup first, then restore the last incremental backup.
6. What are two possible causes of a computer running slowly? (Choose two.)
7. A technician connects a new LCD monitor for the first time and finds the display
very pixilated. What is a possible solution to this problem?
64-bit software requires a 64-bit processor but can run on a 32-bit operating system.
64-bit software can run on a 32-bit processor but requires a 64-bit operating system.
64-bit software can run on a 32-bit processor using a 32-bit operating system but the
software performance will be slower.
9. Which user account should be used only to perform system management and
not as the account for regular use?
standard user
CCNA 5 Page 3
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
administrator
guest
power user
Msconfig
ipconfig
ipconfig/renew
tracert
11. What are two features of the Android operating system? (Choose two.)
Android has been implemented on devices such as cameras, smart TVs, and e-
book readers.
All available Android applications have been tested and approved by Google to run on
the open source operating system.
Android is open source and allows anyone to contribute to its development and
evolution.
12. Which two guidelines are appropriate for creating strong passwords? (Choose
two.)
CCNA 5 Page 4
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
Configure encryption on the wireless router and the connected wireless devices.
15. Which two methods are used to directly connect mobile devices such as
tablets and smartphones to a data network? (Choose two.)
wired Ethernet
Bluetooth
Wi-Fi
WiMax
cellular communications
CCNA 5 Page 5
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
16. A user is viewing the Disk Management utility on a PC that is running Windows
XP and notices that one of the disks is marked as Foreign. What does this mean?
This is a basic disk that has just been converted to a dynamic disk.
17. What action should a technician take before upgrading computers from Vista
to Windows 7?
Details
general
archive
read-only
security
Worm
Trojan
spyware
adware
CCNA 5 Page 6
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
20. A technician has successfully removed malware from a PC and finds that
when the system is rebooted error messages are displayed about missing and
corrupt system files. What utility can the technician use to replace or fix any
corrupted system files?
Regedit
ASR
Fixboot
SFC
Fixmbr
21. An “OS not found” error message is displayed when a computer is started.
The technician determines that the single hard drive is configured as a slave.
What needs to be done to correctly configure the hard drive as a master?
22. A technician is troubleshooting a server and wants to see all open shared files
on it. What command could the technician use to do this?
net accounts
net file
nbtstat
net group
ntstat
CCNA 5 Page 7
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
current and resets these to the correct settings. The previously inaccessible
websites are now accessible. However, when the computer is restarted the same
problem reoccurs. What can the technician do to prevent the date and time from
resetting?
24. Which two issues are likely to cause BSOD errors? (Choose two.)
RAM failing
out-of-date browser
25. A technician wants to use Remote Desktop to configure another PC. Which
firewall port on the remote PC should be open in order for Remote Desktop to
work?
23
20 and 21
80
115
389
3389
CCNA 5 Page 8
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
27. What kind of tool or substance is better to use to remove spilled toner on a
laser printer?
compressed air
Users have to be added to the user accounts on the home entertainment PC.
Users on the PC that is running Windows Home Basic will have to be manually added to
the homegroup.
Nothing has to be done. All users accounts on all the PCs will automatically be
added to the homegroup.
Users on the PC that is running Windows Starter cannot join the homegroup.
29. A user wants to extend a primary partition formatted with the NTFS file system
with the unallocated space on the hard disk. What must the user do after the
primary partition is extended to make it usable?
CCNA 5 Page 9
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
30. A user has detected that one of the virtual machines in a computer is infected
with a virus. Which statement about the situation is likely to be true?
All of the virtual machines running on the host are infected with a virus.
31. What type of file system allows the use of files larger than 5 GB and is mostly
used on internal hard drives?
exFAT
FAT64
CDFS
FAT32
NTFS
32. A user purchases a new 802.11n wireless router and sets it up at home. The
user notices that 802.11n devices can connect to the wireless router but 802.11g
devices cannot connect. What is the problem?
The wireless router has not been set for mixed mode.
CCNA 5 Page 10
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
33. Which two possible errors may be displayed when a laser printer does not
have enough memory to handle the type of printing jobs that the users are trying
to print? (Choose two.)
memory overload
out of memory
buffer overflow
Chkdsk
Sfc
Regedit
Sysprep
36. A user reports that a computer is unable to print on an inkjet printer. The
technician has determined that there is no paper in the paper bin. What is the next
step in the troubleshooting process?
CCNA 5 Page 11
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
37. A user wants to map a network drive on a PC that is named “WORK2″ and
runs Windows 7. The name of the shared resource the user wishes to map to is
called “installs” and is located on a workstation called “WORK1″. What would be
the correct path for mapping the network drive?
WORK2|installs
work1installs
usernamepassword/WORK1/installs
usernameWORK2installs
usernameWork2installs
// WORK2/installs
to protect the host from malware infection from the virtual machines
CCNA 5 Page 12
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
40. What is required in order to connect a Wi-Fi enabled laptop to a WPA secured
wireless network?
a MAC address
41. Which security threat hides the resources that it uses from antivirus
programs?
Rootkit
worm
Trojan
spyware
43. Which feature of a mobile device uses sensors to detect the orientation of the
screen and changes the display to landscape or portrait as required?
Synchronization
CCNA 5 Page 13
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
GPS
screen calibration
accelerometer
44. A Windows XP PC that was formatted with the NTFS file system displays a
missing or corrupt DLL error message when a certain program is run. What is the
cause of this?
The DLL file was not registered during installation of the program.
45. A user has a computer that is infected with spyware. What should be
performed before removing the spyware?
46. This is a flash item. Please click below to answer this item.
CCNA 5 Page 14
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
47. Which expansion card can assist in troubleshooting a computer problem when
no video is available?
BIOS card
POST card
48. A wired network is undergoing several changes that could leave it vulnerable
to connection by unauthorized devices while the work is in progress. Which two
temporary measures would enable the authorized devices to continue to have
network access but prevent unauthorized devices from connecting? (Choose
two.)
Disable DHCP.
Disable DNS.
CCNA 5 Page 15
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
49. A technician successfully removes malware from an infected PC. When the PC
is rebooted it displays error messages about missing system files. How can the
technician fix this problem?
Run Chkdsk.
Run Sfc.
50. A user has shared a directory on the network. The files in the directory can be
modified, created, and deleted when accessed from the local computer, but when
accessed from another computer, the files can only be viewed. What can the user
do to gain all the permissions when the files are accessed over the network?
52. Which statement is correct about installing a 32-bit operating system on a x64
architecture?
CCNA 5 Page 16
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
53. What tool can be used to find and attempt to fix file structural errors on a hard
disk in Windows 7?
Fixmbr
Scandisk
Chkdsk
Format
54. What type of partition has the ability to create volumes spanning across more
than one disk?
Dynamic
primary
active
extended
55. A user needs to frequently access data from a shared folder on a remote
computer. Which command would be used to map a network drive to the remote
share?
net use
nbtstat
tasklist
ipconfig
56. A user reports that a PC is losing files, not opening some files, and is
performing slowly. The technician suspects problems with the hard drive. What
CCNA 5 Page 17
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
should be done to protect the data that is on the PC and to determine the source
of the problem, without risking total drive failure?
57. Which Windows utility can be used to schedule a regular backup for
preventive maintenance?
System Restore
Disk Cleanup
58. Which two mobile device components are field replaceable? (Choose two.)
internal SSD
battery
touch screen
accelerometer sensors
59. Which two common connection types are used to synchronize mobile devices
with a PC or laptop? (Choose two.)
GPS
Bluetooth
CCNA 5 Page 18
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
Wi-Fi
USB
SSD
60. A business organization is configuring security on the mobile devices that are
used in the organization. The security policy states that business data on mobile
devices should only ever be accessed by employees. Which mobile device
security feature can be used to best ensure that business data is rendered
completely inaccessible if the device is lost or stolen?
Sandbox
remote wipe
passcode lock
remote lock
61. For mobile devices, what are two advantages of using flash memory storage
technology that is the equivalent of solid state drives? (Choose two.)
high capacity
power efficiency
ease of upgrading
Ping
tracert
ipconfig/release
CCNA 5 Page 19
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
ipconfig/renew
63. A computer technician has successfully returned a laptop to full operation and
verified system functionality. Actions the technician performed included
modifying the registry and applying patches to the operating systems. What is the
next step in the troubleshooting process that the technician should do?
64. This is a flash item. Please click below to answer this item.
65. How can a user prevent specific applications from accessing a Windows
computer over a network?
CCNA 5 Page 20
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
67. A computer locks up frequently, and no error message can be seen on screen.
The problem occurs every time the user attempts to restart the computer. What is
the most likely reason for this problem?
68. A technician has replaced the power supply unit of a PC, but notices that when
the PC boots up the RAID array cannot be found. The technician verifies that the
wattage of the replaced power supply unit matches the original one and that the
RAID controller is receiving adequate power. What is the problem?
CCNA 5 Page 21
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
69. A user notices that there is intermittent wireless connectivity on a laptop that
is running a wireless PCI Express Micro card using the wireless 802.11n standard.
What should the user do to fix the problem?
Administrator
Guest
Standard user
Power user
71. A cleaner attempts to enter a computer lab but is denied entry by the
receptionist because there is no scheduled cleaning for that day. What type of
attack was just prevented?
shoulder surfing
social engineering
war driving
Trojan
phishing
CCNA 5 Page 22
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
73. A user is able to only access files required to perform a specific task. What
type of security practice is being applied?
principle of privileges
74. A user replaced a PC CPU with a faster one, but now the PC displays a BSOD
on bootup. What is the problem?
75. A user receives an email requesting verification of the password that is used
to access bank files. What type of security threat is this?
Malware
social engineering
virus
phishing
76. A company has replaced five desktop computers in the accounting and
finance department with new computers. The plan is to donate the recovered
computers in a fully functional state to a not-for-profit community organization.
CCNA 5 Page 23
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
How can the company ensure that sensitive financial data cannot be accessed
once the computers are donated?
77. Which ping command option would be used to resolve the hostname when
testing connectivity to a specific IP address?
ping –a
ping –t
ping –s
ping –n
78. Which two precautions can help prevent social engineering? (Choose two.)
79. A company has a guest wireless network available for visitors while on the
company premises. A technician has noted that unauthorized users are
connecting to this wireless network from outside the premises. Which action can
be taken to reduce unauthorized connections to the guest wireless network while
enabling visitors to still connect quickly and easily without assistance while on
the company premises?
CCNA 5 Page 24
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
80. Which three items are biometric security devices? (Choose three.)
voice recognition
fingerprint reader
retina scanner
smart card
password
key fob
The firmware updates can be installed automatically using the Windows Service Pack
utility.
82. When a user tries to run a program a missing or corrupt DLL message is
displayed. What are two possible solutions to this problem? (Choose two.)
Use the msconfig command to adjust the startup settings for the program.
CCNA 5 Page 25
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net
CCNA 5 Page 26