IT Essentials v4.1 Chapter 8 Exam

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

IT Essentials v4.1 Chapter 8 Exam
Rate this post

IT Essentials v4.1 Chapter 8 Exam

What is a good source for safely downloading Android apps?

the Apple App Store
freeware sites
Google Play

What two functions can be performed with the home button on an iOS mobile device? (Choose two.)

lock the device
the same functions as the Android navigation buttons
start voice control
reset the device to the factory default
start the TouchFLO interface

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

A custom OS may reduce sandboxing features.
The operating system can be fine-tuned to improve the speed of the device.
The operation of the carrier cellular network may be affected.
The user interface can be extensively customized.
The root directory of the device is blocked.

What are two purposes of the passcode lock feature on mobile devices? (Choose two.)

to erase all personal data from the device
to remotely lock the device if it is stolen
to return the device to the default factory state
to place the device into a power saving state
to restore and re-synchronize the device
to help prevent theft of private information

What is an advantage of using flash memory to store data in mobile devices?

Flash memory has a drive head that moves, reducing the seek time to locate data.
Flash memory requires very little power to store and retrieve data.
Flash memory is not affected by ESD.
Flash memory is highly resistant to water and cold.

What are two touchscreen characteristics that are used by most mobile devices? (Choose two.)

an electrical field of the screen that is interrupted when the user touches the screen
three layers responsible for conducting electricity with a small air gap between them
a glass screen that is coated with a capacitor
two transparent layers of material capable of conducting electricity
two colored layers of material capable of conducting electricity

Which component is field-replaceable in most mobile devices?

memory card

Which mobile device troubleshooting procedure is correct?

When a problem appears with a mobile device, the owner should analyze if it is cost-effective to fix it.
Mobile devices change so rapidly in design and functionality it is always better to replace the device rather than repair it.
Mobile device problems always result in sending the device to the manufacturer for troubleshooting.
Every time a mobile devices freezes, the owner can reinitialize it by pressing the reset button.

A user accidentally drops a mobile device into a pool. What corrective action should be taken?

Contact the manufacturer for repair or replacement.
Use a hair dryer to dry the phone.
Open the device and replaced damaged components.
If the mobile device does not turn on, throw it away and buy a new one.

After being left in a car for many hours on a hot day, an iPhone cannot be turned on. What should the user do to fix this problem?

Buy a new power button and replace it.
Disassemble the phone and look for heat related damage.
Return the phone to the manufacturer for repair.
Place the phone in a refrigerated space and allow the unit to cool down.

After an upgrade to a mobile device, some applications are no longer working, but some work fine. The user can make calls and send and receive email. Which two kinds of problems could be related to these issues? (Choose two.)

a software problem
a touchscreen problem
a cell service problem
a circuit board problem
a memory problem

Which scenario or situation would prevent a user from upgrading the OS on an Android device?

The software copyright was not obtained before the installation.
The correct patches were not installed.
The hardware does not meet specifications.
Permission was not obtained from the manufacturer.

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

The GPS locator must be enabled.
The passcode must be disabled.
Sandboxing must be enabled.
The device must be powered on.
The device must be connected to a network.

Which two items common to both Android and iOS devices can be remotely backed up? (Choose two.)


Which statement is true about wireless connectivity on an Android mobile device?

If the network SSID is not being broadcast, the device will not be able to connect to the network.
When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.
The Android OS does not support wireless connectivity that uses WPA2 security.
If a Wi-Fi network is secured with a password, the network must be manually configured on the device.

This is a flash item. Please click below to answer this item.

In the context of mobile devices, what does the term tethering involve?

connecting a mobile device to a USB port on a computer in order to charge the mobile device
connecting a mobile device to a hands-free headset
connecting a mobile device to another mobile device or computer to share a network connection
connecting a mobile device to a 4G cellular network

Which statement is true about industry standards for cellular networks?

First generation cellular standards are mostly digital standards.
Third generation cellular standards require a maximum of 1 Gb/s for devices moving slowly, such as when a user has a mobile device and is walking.
Cellular standards have made it more difficult and expensive to make calls to people that are on a different network.
Cell phones that use a single standard can often only be used in specific geographic areas.

Which statement about synchronizing a mobile device to a PC is true?

To synchronize data on an iOS device, iTunes must be installed on the PC.
Motocast USB can be used to synchronize data when using an iOS device.
iOS synchronization can only be performed over a USB connection.
Data on Android devices cannot be synchronized with a PC.

A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?


Which mobile device security feature requires the user to slide a finger over the screen in a specific sequence to unlock the device?

simple passcode
remote wipe

Which term describes the ability of a mobile device to recognize when two or more points of contact are made on the screen?

large touch
many touch
long touch

Which two factors are used to determine the different categories of UTP cabling? (Choose two.)

The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.

Which suite of protocols is used to transmit data across the Internet?


Which Windows XP command displays the route taken by packets crossing an IP network?


What is the most commonly used DSL technology?


Workers are required to access the company LAN when traveling. Which networking technology can provide secure and encrypted access to the LAN?


The Internet is an example of which type of network?


Which dotted decimal number is used to distinguish the network portion of an IP address from the host portion?

default gateway
MAC address
physical address
subnet mask

What is the maximum range a data signal can travel through a 1000BASE-T network segment?

3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
328 ft (100 m)

Why should network cables always be labeled?

to prevent cable wear
to improve appearance
to reduce network clutter
to save troubleshooting time

Which method is recommended in order to avoid problems with counterfeit network equipment?

Buy extra parts in case one fails.
Only install equipment that comes with a user manual.
Purchase equipment only through manufacturer-authorized partners.
Use items of uncertain authenticity only in non-mission critical applications.

A technician installs a new NIC in a PC and connects an Ethernet patch cord from the NIC to a wall jack. The technician then notes that the link lights are not active on the NIC. Which two problems could be indicated by this lack of activity? (Choose two.)

faulty NIC
bad IP address
faulty patch cord
unavailable DHCP server
incorrect protocol configuration


A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?

the laptop battery level
the IP address that is assigned to the laptop
the power level of the wireless antenna
the available wireless networks within range
the distance from the school-owned wireless device

Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?

Manually assign an IP address.
Configure the NIC for a MAC address.
Attach a cable that has an RJ-45 connector.
Configure the NIC for a specific network protocol.

Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)

The network is small with less than eight users.
The company network requires secure access to confidential information.
The users need a central database to store inventory and sales information.
Each user understands how to safely share files across a network.
The data gathered by the employees is critical and should be backed up on a regular basis.
All employees passed a strict background check as part of the corporate hiring practices.

Which two statements are true of network computing in contrast to non-network computing? (Choose two.)

File duplication is more likely.
Fewer peripherals are needed.
Resource conservation is decreased.
Application licensing costs are higher.
Centralized administration capabilities are enhanced.

What is true about the TIA/EIA?

It develops and maintains the 802 standards for LANs.
It establishes consensus processes among qualified groups.
It defined the Open Systems Interconnection networking model.
It developed standards to replace proprietary standards after U.S. telephone industry deregulation.

A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address What could cause a computer to get such an IP address?

a bad network cable
interference from surrounding devices
reduced computer power supply output
static IP addressing with incomplete information

Which two characteristics describe Ethernet technology? (Choose two.)

supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
uses a bus logical topology
uses a ring topology

Which device enables computers to be attached to a network without segmenting the network?


Which networking protocol translates a network name such as to a unique IP address?

Proxy ARP

One Response

  1. Anonymous

Leave a Reply

Time limit is exhausted. Please reload the CAPTCHA.

This site uses Akismet to reduce spam. Learn how your comment data is processed.