You are on page 1of 26

IT Essentials (ITE v5.0 & v5.

02) A+ Cert Practice Exam 1 Answers 100%


2016 WWW.CCNA-v5.Net

IT Essentials (ITE v5.0 & v5.02) A+ Cert


Practice Exam 2 Answers 100% 2016
1

Refer to the exhibit. In what situation would a technician use this tab?

When the device will not be using the Internet.

When a device is behind a firewall and software is being used that needs access to a
remote network.

When the computer will be using a VPN connection and accessing the Internet while
connected through the VPN.

When a laptop is used both at work with DHCP and at home with a static IP
address.

2. A technician is attempting to repair a Windows 7 laptop that has a missing or


corrupt OS file that prevents Windows 7 from starting up. The technician reboots
the laptop and accesses the WinRE via the F8 key. Which option must the
technician choose in the System Recovery menu to locate and fix the missing or
corrupt system files?

CCNA 5 Page 1
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

System Restore

Windows Memory Diagnostic

Startup Repair

System Image Recovery

3. After complaints from users, a technician identifies that the college web server
is running very slowly. A check of the server reveals that there are an unusually
large number of TCP requests coming from multiple locations on the Internet.
What is the source of the problem?

The server is infected with a virus.

There is insufficient bandwidth to connect to the server.

There is a replay attack in progress.

A DDoS attack is in progress.

4. A user reports that a laser printer is printing shadow images and letters. Which
part should the technician replace to correct this problem?

pick up roller

fuser

drum

network cable

5. A user has determined that the computer hard drive is failing. Before the failure,
the user implemented a backup scheme running a normal backup every end of the
month and then incremental backups every other day. What is the correct
sequence that the user has to follow in order to restore the backup?

Restore the last incremental backups in inverse order, and then restore the last normal
backup.

Restore the last normal backup first, then restore the incremental backups in
order.

CCNA 5 Page 2
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Restore the last incremental backup and then restore the last normal backup.

Restore the last normal backup first, then restore the last incremental backup.
6. What are two possible causes of a computer running slowly? (Choose two.)

The RAM is not compatible with the motherboard.

The hard drive has been partitioned.

Not enough RAM is installed in the system.

The hard drive is full.

The CPU has been overclocked.

7. A technician connects a new LCD monitor for the first time and finds the display
very pixilated. What is a possible solution to this problem?

Set the screen to native resolution.

Change the monitor video connector from DVI to HDMI.

Power cycle the monitor.

Set the screen resolution to VGA.

8. Which statement that is related to running 64-bit software is correct?

64-bit software requires a 64-bit processor but can run on a 32-bit operating system.

64-bit software can run on a 32-bit processor but requires a 64-bit operating system.

64-bit software requires a 64-bit processor and a 64-bit operating system.

64-bit software can run on a 32-bit processor using a 32-bit operating system but the
software performance will be slower.

9. Which user account should be used only to perform system management and
not as the account for regular use?

standard user

CCNA 5 Page 3
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

administrator

guest

power user

10. A technician is troubleshooting a network connectivity problem. Pings to the


local wireless router are successful but pings to a server on the Internet are
unsuccessful. Which CLI command could assist the technician to find the location
of the networking problem?

Msconfig

ipconfig

ipconfig/renew

tracert

11. What are two features of the Android operating system? (Choose two.)

Android has been implemented on devices such as cameras, smart TVs, and e-
book readers.

Each implementation of Android requires a royalty to be paid to Google.

All available Android applications have been tested and approved by Google to run on
the open source operating system.

Android applications can only be downloaded from Google Play.

Android is open source and allows anyone to contribute to its development and
evolution.

12. Which two guidelines are appropriate for creating strong passwords? (Choose
two.)

Use only upper case and numeric values in passwords.

Include letters, numbers, and symbols.

Use at least eight characters.

CCNA 5 Page 4
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Change the password once each year.

Passwords should contain symbols only.


13. A technician is about to install and configure a wireless network at a small
branch office. What is the first security measure the technician should apply
immediately upon powering up the wireless router?

Disable the wireless network SSID broadcast.

Configure encryption on the wireless router and the connected wireless devices.

Enable MAC address filtering on the wireless router.

Change the default user-name and password of the wireless router.

14. A technician is troubleshooting a Windows 7 laptop that takes significantly


longer than expected when performing a file search. What is the possible cause?

The file permissions are not set.

The disk type is dynamic.

The disk type is basic.

The file system is corrupt.

The index service is not running.

15. Which two methods are used to directly connect mobile devices such as
tablets and smartphones to a data network? (Choose two.)

wired Ethernet

Bluetooth

Wi-Fi

WiMax

cellular communications

CCNA 5 Page 5
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

16. A user is viewing the Disk Management utility on a PC that is running Windows
XP and notices that one of the disks is marked as Foreign. What does this mean?

This is a dynamic disk whose partition has been deleted.

This is a dynamic disk from another PC running Windows XP.

This is a basic disk that has just been converted to a dynamic disk.

This is a disk that does not contain a valid signature.

17. What action should a technician take before upgrading computers from Vista
to Windows 7?

Uninstall all programs.

Run Vista Upgrade Analyzer.

Run Windows 7 Upgrade Advisor.

Upgrade the video card.

18. What are two file attributes? (Choose two.)

Details

general

archive

read-only

security

19. Which type of malware is disguised as a legitimate program?

Worm

Trojan

spyware

adware

CCNA 5 Page 6
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

20. A technician has successfully removed malware from a PC and finds that
when the system is rebooted error messages are displayed about missing and
corrupt system files. What utility can the technician use to replace or fix any
corrupted system files?

Regedit

ASR

Fixboot

SFC

Fixmbr

21. An “OS not found” error message is displayed when a computer is started.
The technician determines that the single hard drive is configured as a slave.
What needs to be done to correctly configure the hard drive as a master?

Change the master/slave setting in System Tools.

Replace the hard drive.

Change the master/slave setting in BIOS.

Change the jumper settings on the hard drive.

22. A technician is troubleshooting a server and wants to see all open shared files
on it. What command could the technician use to do this?

net accounts

net file

nbtstat

net group

ntstat

23. A technician is troubleshooting a problem where many websites return a


“certificate not valid” error. The technician notices that the date and time are not

CCNA 5 Page 7
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

current and resets these to the correct settings. The previously inaccessible
websites are now accessible. However, when the computer is restarted the same
problem reoccurs. What can the technician do to prevent the date and time from
resetting?

Replace the CMOS battery.

Reinstall the OS.

Upgrade the BIOS.

Change the power settings in the BIOS.

24. Which two issues are likely to cause BSOD errors? (Choose two.)

RAM failing

power supply failure

out-of-date browser

lack of antivirus software

device driver errors

25. A technician wants to use Remote Desktop to configure another PC. Which
firewall port on the remote PC should be open in order for Remote Desktop to
work?

23

20 and 21

80

115

389

3389

26. A technician needs to permanently destroy data on some drives before


disposing of them. What is the best way to do this?

CCNA 5 Page 8
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Shatter the drive platters with a hammer.

Overwrite the drives

Partition the hard drives.

Perform a full format.

27. What kind of tool or substance is better to use to remove spilled toner on a
laser printer?

compressed air

mild detergent solution

regular vacuum cleaner

special vacuum cleaner

28. On a PC that is running Windows 7 Ultimate, a user sets up a home


entertainment system and creates a homegroup. The user then joins two other
PCs to the workgroup, one PC running Windows 7 Starter and the other running
Windows 7 Home Basic. What else must the user do in order to have the user
accounts on the Windows 7 Home Basic and Windows 7 Starter PCs access the
shares on the home entertainment system?

Users have to be added to the user accounts on the home entertainment PC.

Users on the PC that is running Windows Home Basic will have to be manually added to
the homegroup.

Nothing has to be done. All users accounts on all the PCs will automatically be
added to the homegroup.

User accounts on all three PCs have to be added to the homegroup.

Users on the PC that is running Windows Starter cannot join the homegroup.

29. A user wants to extend a primary partition formatted with the NTFS file system
with the unallocated space on the hard disk. What must the user do after the
primary partition is extended to make it usable?

CCNA 5 Page 9
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Format the disk with the FAT64 file system.

Convert the disk type to dynamic.

Ensure that the disk type is basic.

Partition the new space as a basic disk.

30. A user has detected that one of the virtual machines in a computer is infected
with a virus. Which statement about the situation is likely to be true?

The host machine antivirus program requires an update.

The host operating system is not necessarily infected with a virus.

All of the virtual machines running on the host are infected with a virus.

The host machine operating system has a bug.

31. What type of file system allows the use of files larger than 5 GB and is mostly
used on internal hard drives?

exFAT

FAT64

CDFS

FAT32

NTFS

32. A user purchases a new 802.11n wireless router and sets it up at home. The
user notices that 802.11n devices can connect to the wireless router but 802.11g
devices cannot connect. What is the problem?

The wireless router is set to use the wrong channel.

The wireless router has not been set for mixed mode.

The wireless router is faulty.

The wireless router is using the wrong SSID.

CCNA 5 Page 10
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

33. Which two possible errors may be displayed when a laser printer does not
have enough memory to handle the type of printing jobs that the users are trying
to print? (Choose two.)

incorrect type of memory

memory overload

incorrect slot of memory used

print job incomplete

out of memory

buffer overflow

34. What is true about restore points?

Restore points should always be created before making changes to a system.

Once System Restore is used to restore a system, the change is irreversible.

Restore points back up personal data files.

Restore points recover corrupted or deleted data files.

35. A technician has created a customized image of Windows 7 and wants to


deploy it to 30 PCs. Which utility can the technician use to do this?

Chkdsk

Sfc

Regedit

Sysprep

36. A user reports that a computer is unable to print on an inkjet printer. The
technician has determined that there is no paper in the paper bin. What is the next
step in the troubleshooting process?

Determine the exact cause.

CCNA 5 Page 11
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Establish a plan of action.

Document the findings.

Verify system functionality.

37. A user wants to map a network drive on a PC that is named “WORK2″ and
runs Windows 7. The name of the shared resource the user wishes to map to is
called “installs” and is located on a workstation called “WORK1″. What would be
the correct path for mapping the network drive?

WORK2|installs

work1installs

usernamepassword/WORK1/installs

usernameWORK2installs

usernameWork2installs

// WORK2/installs

38. What are two functions of hypervisors? (Choose two.)

to allocate physical system resources to virtual machines

to manage virtual machines

to partition the hard drive to run virtual machines

to protect the host from malware infection from the virtual machines

to share the antivirus software across the virtual machines

39. What is a possible situation when it might be necessary to boot Windows 7


from a USB device, a CD, or a DVD?

to repair the system

to disable background services

CCNA 5 Page 12
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

to delete registry keys

to partition the hard drive

40. What is required in order to connect a Wi-Fi enabled laptop to a WPA secured
wireless network?

an updated wireless driver

a security encryption key

a username and password

a MAC address

41. Which security threat hides the resources that it uses from antivirus
programs?

Rootkit

worm

Trojan

spyware

42. A technician is troubleshooting a workstation in a domain that has been


infected with a virus. What is the first step the technician should take to clean the
infected workstation?

Run the antivirus software.

Update the antivirus software.

Turn off system restore.

Disconnect the workstation from the network.

43. Which feature of a mobile device uses sensors to detect the orientation of the
screen and changes the display to landscape or portrait as required?

Synchronization

CCNA 5 Page 13
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

GPS

screen calibration

accelerometer

44. A Windows XP PC that was formatted with the NTFS file system displays a
missing or corrupt DLL error message when a certain program is run. What is the
cause of this?

The OS must be 64 bit in order to support the DLL.

The NTFS file system does not support DLLs.

The DLL file was not installed with the program.

The DLL file was not registered during installation of the program.

45. A user has a computer that is infected with spyware. What should be
performed before removing the spyware?

Run Windows Update.

Disable System Restore.

Create a full backup.

Run a disk defragmentation.

46. This is a flash item. Please click below to answer this item.

CCNA 5 Page 14
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

47. Which expansion card can assist in troubleshooting a computer problem when
no video is available?

BIOS card

USB expansion card

POST card

advanced graphics card

48. A wired network is undergoing several changes that could leave it vulnerable
to connection by unauthorized devices while the work is in progress. Which two
temporary measures would enable the authorized devices to continue to have
network access but prevent unauthorized devices from connecting? (Choose
two.)

Subnet the network.

Disable DHCP.

Disable SSID broadcast.

Disable DNS.

Assign static IP addresses to the authorized devices.

CCNA 5 Page 15
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

49. A technician successfully removes malware from an infected PC. When the PC
is rebooted it displays error messages about missing system files. How can the
technician fix this problem?

Disable unknown services using Msconfig.

Write a new boot record with Fixboot.

Run Chkdsk.

Run Sfc.

50. A user has shared a directory on the network. The files in the directory can be
modified, created, and deleted when accessed from the local computer, but when
accessed from another computer, the files can only be viewed. What can the user
do to gain all the permissions when the files are accessed over the network?

Update to the NTFS file system.

Adjust firewall settings.

Run a full antivirus scan.

Adjust share permissions.

51. A technician is trying to troubleshoot a Windows 7 PC remotely and finds that


pings to the target machine fail and that telnetting into it fails as well. What
changes should the technician make on the Windows 7 firewall in order to telnet
into the target PC remotely?

Open ports 20 and 21 on the target machine.

Open port 23 on the target machine.

Open port 80 on the target machine.

Allow ICMP messages on the target machine.

52. Which statement is correct about installing a 32-bit operating system on a x64
architecture?

The OS will run correctly.

CCNA 5 Page 16
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

This combination will provide better security.

The OS will always make use of all the RAM available.

The OS can address more than 128 GB of memory.

53. What tool can be used to find and attempt to fix file structural errors on a hard
disk in Windows 7?

Fixmbr

Scandisk

Chkdsk

Format

54. What type of partition has the ability to create volumes spanning across more
than one disk?

Dynamic

primary

active

extended

55. A user needs to frequently access data from a shared folder on a remote
computer. Which command would be used to map a network drive to the remote
share?

net use

nbtstat

tasklist

ipconfig

56. A user reports that a PC is losing files, not opening some files, and is
performing slowly. The technician suspects problems with the hard drive. What

CCNA 5 Page 17
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

should be done to protect the data that is on the PC and to determine the source
of the problem, without risking total drive failure?

Run CHKDSK, then back up all important files.

Run CHKDSK, then run FDISK.

Run FDISK, then replace the hard drive.

Back up all important files, then replace the hard drive.

Back up all important files, then run CHKDSK.

57. Which Windows utility can be used to schedule a regular backup for
preventive maintenance?

Windows Task Manager

System Restore

Windows Task Scheduler

Disk Cleanup

58. Which two mobile device components are field replaceable? (Choose two.)

internal SSD

battery

Subscriber Identity Module card

touch screen

accelerometer sensors

59. Which two common connection types are used to synchronize mobile devices
with a PC or laptop? (Choose two.)

GPS

Bluetooth

CCNA 5 Page 18
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Wi-Fi

USB

SSD

60. A business organization is configuring security on the mobile devices that are
used in the organization. The security policy states that business data on mobile
devices should only ever be accessed by employees. Which mobile device
security feature can be used to best ensure that business data is rendered
completely inaccessible if the device is lost or stolen?

Sandbox

remote wipe

passcode lock

remote lock

61. For mobile devices, what are two advantages of using flash memory storage
technology that is the equivalent of solid state drives? (Choose two.)

light weight components

high capacity

flash memory storage is field-serviceable

power efficiency

ease of upgrading

62. A technician troubleshooting a network problem has used CLI commands to


determine that a computer has not been allocated a correct IP address from the
DHCP server. Which command can the technician use to solve this problem?

Ping

tracert

ipconfig/release

CCNA 5 Page 19
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

ipconfig/renew

63. A computer technician has successfully returned a laptop to full operation and
verified system functionality. Actions the technician performed included
modifying the registry and applying patches to the operating systems. What is the
next step in the troubleshooting process that the technician should do?

Consult manufacturer manuals and repair logs.

Reboot the computer.

Re-attach and test all peripherals.

Document the solution.

64. This is a flash item. Please click below to answer this item.

65. How can a user prevent specific applications from accessing a Windows
computer over a network?

Enable MAC address filtering.

Disable automatic IP address assignment.

CCNA 5 Page 20
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Block specific TCP or UDP ports in Windows Firewall.

Change default usernames and passwords.

66. When a Windows XP computer starts, a “Missing NTLDR” message is


displayed after the POST. What are two possible solutions to this problem?
(Choose two.)

Use the last known good configuration to boot the computer.

Run fdisk/mbr from the command prompt.

Run the bootrec/fixmbr command from the System Recovery console.

Restore the BOOTMGR file from the Windows installation media.

Restore ntdetect.com from the Windows installation media.

67. A computer locks up frequently, and no error message can be seen on screen.
The problem occurs every time the user attempts to restart the computer. What is
the most likely reason for this problem?

The power supply has failed.

The computer is overheating.

The index service is not running.

A startup file has become corrupted

68. A technician has replaced the power supply unit of a PC, but notices that when
the PC boots up the RAID array cannot be found. The technician verifies that the
wattage of the replaced power supply unit matches the original one and that the
RAID controller is receiving adequate power. What is the problem?

The RAID controller requires a higher voltage setting.

The CMOS settings have not been saved.

The power cables were incorrectly reconnected to the array of drives.

The power supply unit is not supplying the correct voltage.

CCNA 5 Page 21
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

69. A user notices that there is intermittent wireless connectivity on a laptop that
is running a wireless PCI Express Micro card using the wireless 802.11n standard.
What should the user do to fix the problem?

Replace the OS on the laptop.

Move the laptop to a new location.

Replace the PCI Express Micro card with a Mini-PCIe card.

Replace the PCI Express Micro card with a Mini-PCI card.

70. Which type of user account is created automatically during a Windows XP


installation?

Administrator

Guest

Standard user

Power user

71. A cleaner attempts to enter a computer lab but is denied entry by the
receptionist because there is no scheduled cleaning for that day. What type of
attack was just prevented?

shoulder surfing

social engineering

war driving

Trojan

phishing

72. After consulting the manufacturer manuals, a technician applies a series of


recommended solutions that resolve a problem with a workstation computer.
What is the next step in the troubleshooting process that the technician should
perform?

Determine the next steps to resolve the problem.

CCNA 5 Page 22
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Test the theory of probable cause.

Document the findings, actions, and outcomes.

Verify the solution and confirm full system functionality.

73. A user is able to only access files required to perform a specific task. What
type of security practice is being applied?

principle of least privilege

principle of necessary privilege

principle of most privilege

principle of privileges

74. A user replaced a PC CPU with a faster one, but now the PC displays a BSOD
on bootup. What is the problem?

The CMOS settings have not been saved on bootup.

The CPU multiplier has not been set.

The front side bus is set too low.

The CPU voltage is set too high.

75. A user receives an email requesting verification of the password that is used
to access bank files. What type of security threat is this?

Malware

social engineering

virus

phishing

76. A company has replaced five desktop computers in the accounting and
finance department with new computers. The plan is to donate the recovered
computers in a fully functional state to a not-for-profit community organization.

CCNA 5 Page 23
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

How can the company ensure that sensitive financial data cannot be accessed
once the computers are donated?

Perform a high-level format on the hard drives.

Drill holes through the hard drive platters.

Data wipe the hard drives by using specialized software.

Delete all the files and directories on the hard drives.

77. Which ping command option would be used to resolve the hostname when
testing connectivity to a specific IP address?

ping –a

ping –t

ping –s

ping –n

78. Which two precautions can help prevent social engineering? (Choose two.)

Always require a user name and password to be configured.

Keep your password securely under your keyboard.

Escort all visitors.

Do not allow any customers into the workplace.

Always ask for the ID of unknown persons.

79. A company has a guest wireless network available for visitors while on the
company premises. A technician has noted that unauthorized users are
connecting to this wireless network from outside the premises. Which action can
be taken to reduce unauthorized connections to the guest wireless network while
enabling visitors to still connect quickly and easily without assistance while on
the company premises?

Disable SSID broadcast.

CCNA 5 Page 24
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Configure WPA encryption.

Reduce the radio power level.

Enable MAC address filtering.

80. Which three items are biometric security devices? (Choose three.)

voice recognition

fingerprint reader

retina scanner

smart card

password

key fob

81. Which statement is correct about applying firmware updates?

Firmware updates should not be included as part of the preventive maintenance


program.

It is possible to use the Roll Back feature to reverse the change.

Firmware updates are sometimes irreversible.

The firmware updates can be installed automatically using the Windows Service Pack
utility.

82. When a user tries to run a program a missing or corrupt DLL message is
displayed. What are two possible solutions to this problem? (Choose two.)

Run sfc/scannow in Safe Mode.

Run Windows Startup Repair.

Use the msconfig command to adjust the startup settings for the program.

Register the DLL file using the regsvr32 command.

CCNA 5 Page 25
IT Essentials (ITE v5.0 & v5.02) A+ Cert Practice Exam 1 Answers 100%
2016 WWW.CCNA-v5.Net

Reinstall the correct drivers.

CCNA 5 Page 26

You might also like