1.
Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)
Correct Answer
C. GPS
Explanation
GPS: global positioning system(a system by which signals are sent from satellites to a special device, used to show the position of a person or thing on the surface of the earth very accurately) : GSM : Global System For Mobile Communication : iOS : iPhone Operating System
2.
A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?
Correct Answer
A. Lock Rotation
Explanation
Enable Lock Rotation on Apple devices. On Android devices disable Autorotate.
The Accelerometer is a term used by Apple to describe the
hardware/software that controls the three axes of movement. The Gyroscope is
another term used by Apple to describe the device that measures the additional
three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration
is used to reset the device that measures the three axes
3.
What kind of display would an iPad2 use?
Correct Answer
B. Multitouch
Explanation
The correct answer is Multitouch. The iPad2 uses a multitouch display, which means it can detect and respond to multiple simultaneous touch inputs. This allows users to perform various gestures, such as pinching to zoom or swiping to scroll, making the device more intuitive and user-friendly. Multitouch technology has become a standard feature in modern touchscreen devices, providing a more interactive and versatile user experience.
4.
A user is having difficulty tapping on icons. What should you do to help theuser? (Select the two best answers.)
Correct Answer(s)
A. Clean the display.
D. Initiate a soft reset.
Explanation
To help the user who is having difficulty tapping on icons, you should clean the display to remove any dirt or smudges that may be affecting the touch sensitivity. Additionally, initiating a soft reset can help resolve any software-related issues that may be causing the problem. This can be done by restarting the device or performing a soft reboot. Installing a screen protector or tapping the Home button may not directly address the issue of difficulty tapping on icons, so they are not the best answers in this scenario. A hard reset should be avoided as it can potentially erase data and should only be used as a last resort.
5.
What are two common operating systems used by mobile devices? (Select thetwo best answers.)
Correct Answer(s)
B. IOS
D. Android OS
Explanation
Choose 2 compulsary 2 answers
6.
What type of CPU do mobile devices use?
Correct Answer
C. ARM
Explanation
PhenomII : Phenom II is a family of AMD's multi-core 45 nm processors using the AMD K10 micro architecture, succeeding the original Phenom. Advanced Micro Devices : ARM : Advanced RISC Machine : Corei7 : General Microprocessors used for Desktop & Laptop
7.
Which OS is considered to be closed-source?
Correct Answer
D. IOS
Explanation
iOS is considered to be closed-source because Apple does not release the source code to the public. This means that only Apple can modify and distribute the operating system. Users are not allowed to view or modify the source code, limiting customization and development options.
8.
What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)
Correct Answer(s)
A. Tablets have little or no field serviceable parts.
D. Tablets use flash memory as the hard drive.
Explanation
Tablets have little or no field serviceable parts, meaning that they are not easily repairable or replaceable. On the other hand, laptops can often be repaired or upgraded by replacing individual components. Additionally, tablets use flash memory as the hard drive, while laptops typically use traditional hard drives. Flash memory is faster and more durable than traditional hard drives, making it a common choice for tablets.
9.
Which of the following are valid Wi-Fi troubleshooting methods? (Select the twobest answers.)
Correct Answer(s)
A. Power cycle the device.
D. Make sure the device is within range.
Explanation
Power cycling the device is a valid Wi-Fi troubleshooting method because it can help reset the network connection and resolve any temporary issues. Making sure the device is within range is also a valid method as being out of range can cause a weak or no Wi-Fi signal, resulting in connection problems. Restarting Bluetooth, using a static IP, and renaming the SSID are not relevant to Wi-Fi troubleshooting and therefore not valid methods.
10.
Which of the following connections requires a username, password, and SMTPserver? (Select the two best answers.)
Correct Answer(s)
C. POP3 connection
E. IMAP connection
Explanation
POP3 and IMAP connections require a username, password, and SMTP server. POP3 (Post Office Protocol version 3) is an email retrieval protocol that allows users to access and download their emails from a remote server to their local device. IMAP (Internet Message Access Protocol) is another email retrieval protocol that allows users to access and manage their emails stored on a remote server. Both protocols require authentication with a username and password, and the SMTP (Simple Mail Transfer Protocol) server is used for sending outgoing emails.
11.
What is the most common connection method when synchronizing data from amobile device to a PC?
Correct Answer
C. USB
Explanation
The most common connection method when synchronizing data from a mobile device to a PC is USB. USB (Universal Serial Bus) cables are widely used to connect mobile devices like smartphones and tablets to computers for data transfer and synchronization. USB connections offer a fast and reliable way to transfer files, backup data, and perform other tasks between the mobile device and the PC.
12.
When configuring a Wi-Fi connection what step occurs after successfully enteringthe SSID?
Correct Answer
C. Enter a passcode for the network.
Explanation
After successfully entering the SSID, the next step in configuring a Wi-Fi connection is to enter a passcode for the network. This passcode, also known as the Wi-Fi password, is required to authenticate and gain access to the network. It ensures that only authorized users can connect to the Wi-Fi network and helps to secure the connection from unauthorized access.
13.
Which technology would you use if you want to connect a headset to yourmobile phone?
Correct Answer
A. Bluetooth
Explanation
Bluetooth is the correct answer because it is a wireless technology that allows for short-range communication between devices. It is commonly used for connecting peripherals such as headsets to mobile phones. GSM is a mobile network technology, Wi-Fi is a wireless networking technology, and Exchange is a messaging and collaboration server software.
14.
Which of the following allows other mobile devices to share your mobile device’sInternet connection?
Correct Answer
D. Wi-Fi tethering
Explanation
IMAP: Internet Message Access Protocol (IMAP) is a communications protocol for email retrieval and storage developed by Mark Crispin in 1986 at Stanford University . Wify tehtering : Wi-Fi tethering allows a mobile device to share its Internet connection with
other Wi-Fi capable devices. Internet pass-through is when the mobile device
connects to a PC to share the PC’s Internet connection. Locator applications are
used to find lost or stolen mobile devices through GPS. IMAP is another e-mail
protocol similar to POP3.
15.
What would a user need to synchronize contacts from an iPad to a PC?
Correct Answer
C. ITunes
Explanation
PC users need iTunes to synchronize contacts and other data from an iPad to
a PC. There are many Android sync programs, but they do not work on Apple
devices. Google Play is a place to get applications and other items. ActiveSync
is the older Microsoft sync program used to synchronize Windows CE and
Mobile to PCs.
16.
You want to prevent a person from accessing your phone while you step awayfrom your desk. What should you do?
Correct Answer
C. Configure a screen lock.
Explanation
To prevent a person from accessing your phone while you step away from your desk, you should configure a screen lock. This is a security feature that requires a password, PIN, pattern, or fingerprint to unlock the phone and access its contents. By setting up a screen lock, you ensure that even if someone gains physical access to your phone, they won't be able to use it without the correct authentication. This helps protect your personal and sensitive information from unauthorized access.
17.
What does the iOS Simple Passcode allow a person to enter?
Correct Answer
C. 4-digit passcode
Explanation
The iOS Simple Passcode allows a person to enter a 4-digit passcode. This means that the passcode consists of four numbers, allowing for a relatively simple and easy-to-remember code for accessing the iOS device. This passcode provides a basic level of security for the device, preventing unauthorized access.
18.
What do third-party apps such as Find iPhone rely on?
Correct Answer
D. GPS
Explanation
Third-party locator apps such as Find iPhone and Where’s my Droid rely on
GPS to locate the device. Passcodes are used to prevent unauthorized users
from accessing the mobile device. Google Apps Device Policy can initiate a
remote wipe on a mobile device. Bluetooth is used so the mobile device can
communicate with other devices over short range.
19.
Which of the following can be described as removing limitations on iOS?
Correct Answer
B. Jailbreaking
Explanation
Jailbreaking is the process of removing the limitations of an iOS-based device
so that the user gets superuser abilities. Rooting is a similar technique used on
Android mobile devices. Geotracking is the practice of tracking a device over
time. AV software is antivirus software, used to combat malware.
5. C. If you’ve already tried to stop the application within Running Services,
20.
An application won’t close on an Android smartphone. You’ve tried to ForceStop it to no avail. What should you do?
Correct Answer
C. Soft reset the device.
Explanation
If you’ve already tried to stop the application within Running Services,
attempt a soft reset. Pull the battery if the application is frozen. Hard resets on
Android devices should be used only as a last resort as they will return the
device to factory condition—wiping all the data. The question said that the application
won’t close, not a service, though you could try finding an underlying
service that might be the culprit. But try resetting the device before doing this or
bringing it to an authorized service center.
6. B. The remote wipe application is the most important one listed. This will
21.
Your organization is concerned about a scenario where a mobile device withconfidential data is stolen. What should you recommend first? (Select the bestanswer.)
Correct Answer
B. Remote wipe program
Explanation
A remote wipe program is recommended as the first measure to take in the scenario where a mobile device with confidential data is stolen. This program allows the organization to remotely erase all data on the stolen device, ensuring that sensitive information does not fall into the wrong hands. It is a proactive and effective solution to protect the confidentiality of the data and prevent any potential misuse or unauthorized access.
22.
You are concerned with the possibility of jailbreaks on your organization’siPhones, and viruses on the Android-based devices. What should you implement?
Correct Answer
D. Device reset
Explanation
You should implement antivirus (AV) software. This can protect against viruses
and other malware as well as jailbreaks on Apple devices. As of the writing of
this book, firewalls for mobile devices are not common, but that could change in
the future. Mobile Device Management (MDM) is software that runs at a central
computer enabling a user to configure and monitor multiple mobile devices.
Device resets are used to restart the mobile device, or to reset it to factor condition
depending on the type of reset, and the manufacturer of the device.
23.
Which of the following application stores are compatible with iOS?
Correct Answer
C. App Store
Explanation
The App Store is compatible with iOS because it is the official application store for Apple devices, including iPhones, iPads, and iPods. It is where users can download and install apps specifically designed for iOS operating system. The other options mentioned, such as Android Market and Windows Marketplace, are not compatible with iOS as they are designed for Android and Windows devices respectively. Amazon Appstore, though available on iOS, is not the primary application store for iOS devices.
24.
A company would like to increase the security on their company’s smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen?
Correct Answer
B. Remote wipe
Explanation
To increase the security on their company's smart phones, configuring the remote wipe feature is essential. This feature allows the company to remotely erase all the information stored on the smart phone if it is lost or stolen. By enabling remote wipe, the company can ensure that sensitive data does not fall into the wrong hands, safeguarding their information and preventing any potential security breaches.
25.
Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS?
Correct Answer
B. /C
Explanation
The correct answer is /C. This command line option is used to perform disk defragmentation on all volumes in Windows OS. This means that it will defragment all the drives and partitions present in the system, ensuring that the files are organized and stored contiguously on the disk for improved performance.
26.
A technician just finished removing spyware from a computer and now they are not able to connect to any websites. Which of the following is the MOST likely cause?
Correct Answer
C. Proxy settings
Explanation
The most likely cause for the technician not being able to connect to any websites after removing spyware from the computer is the proxy settings. Spyware often modifies the proxy settings on a computer to redirect internet traffic, and when the spyware is removed, the proxy settings may not be restored to their original state, causing connectivity issues.
27.
A customer reports that their computer crashes during usage. Which of the following is a common acronym used to describe this condition?
Correct Answer
C. BSOD
Explanation
RAID: Redundant Array Of Inexpensive Disk : VPN: Virtual Private Network BSOD : Blue Screen of Death : LAN : Local Area Network
28.
A user wishes to secure their tablet from unauthorized access. The BEST option is to:?
Correct Answer
C. Setup a strong passcode
Explanation
Setting up a strong passcode is the best option for securing a tablet from unauthorized access. A strong passcode is a combination of letters, numbers, and special characters that makes it difficult for others to guess or crack. This provides an extra layer of security to prevent unauthorized users from accessing the tablet and its contents. Enabling RFID authentication, establishing a remote wipe policy, and setting up strong email passwords are also important security measures, but setting up a strong passcode is specifically mentioned as the BEST option.
29.
Question 12 Which of the following is a common type of biometric authentication on a laptop? (Select TWO).?
Correct Answer(s)
A. Facial recognition
E. Fingerprint
Explanation
Facial recognition and fingerprint authentication are common types of biometric authentication on a laptop. Facial recognition uses the unique characteristics of a person's face to verify their identity, while fingerprint authentication uses the unique patterns and ridges on a person's fingertip. Both methods provide a secure and convenient way to access a laptop, as they require the physical presence of the user and cannot be easily duplicated or stolen.
30.
A user calls about their workstation not powering on in the morning. According to the troubleshooting theory, which of the following steps should the technician perform NEXT??
Correct Answer
D. Ask the user about any previous changes
Explanation
After troubleshooting the issue and determining that the workstation is not powering on, the next logical step would be to ask the user about any previous changes. This step is important as it can provide valuable information about any recent modifications or updates that may have caused the problem. By gathering this information, the technician can narrow down the potential causes and proceed with the appropriate solution.
31.
Which of the following should be performed regularly in order to help restore a computer’s data after a hard drive failure??
Correct Answer
D. Scheduled Backups
Explanation
Read the question 2 times , then answer
32.
What is the best way of maintaining data security for a mobile device that has been lost or stolen?
Correct Answer
C. Remote wipe
Explanation
The best way of maintaining data security for a lost or stolen mobile device is by using remote wipe. Remote wipe allows the user to erase all the data on the device remotely, ensuring that sensitive information does not fall into the wrong hands. This feature is particularly important in preventing unauthorized access to personal or confidential data stored on the device. Passcode lock, GPS, and login attempt restrictions are also important security measures, but remote wipe provides the most effective solution in case of a lost or stolen device.
33.
Of the following, which represent security vulnerabilities to mobile devices? (Select the two best answers.)
Correct Answer(s)
A. Viruses
D. Theft
Explanation
The correct answer is Viruses and Theft. Viruses can infect mobile devices and compromise their security, leading to data loss or unauthorized access. Theft of mobile devices can also result in security vulnerabilities as the thief may gain access to sensitive information stored on the device. Improper file permissions, phishing, and unauthorized downloads can also pose security risks, but they are not mentioned in the correct answer.
34.
Which of the following OSes supports full usage of 8 GB of RAM?
Correct Answer
D. Windows 7 Home Premium x64
Explanation
Windows 7 Home Premium x64 supports full usage of 8 GB of RAM because it is a 64-bit operating system. 64-bit operating systems can utilize more RAM compared to 32-bit operating systems, which have a RAM limit of around 4 GB. Therefore, Windows 7 Home Premium x64 is able to fully utilize the 8 GB of RAM.
35.
A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. What is the cause of the issue?
Correct Answer
C. The application was not developed to react to changes to the
gyroscope
Explanation
The issue is caused by the fact that the application was not programmed to respond to changes in the gyroscope. The gyroscope is responsible for detecting the orientation of the device, so when the user turns the tablet to landscape mode, the gyroscope sends a signal to the application to adjust accordingly. However, if the application does not have the necessary code to interpret this signal and adjust its display, it will not automatically switch to landscape mode.
36.
You are placing a computer back into service that has not been turned on in several months. It was healthy when taken out of service and boots quickly without any problems. What actions would be best practices to begin computer maintenance? (Select the two best answers.)
Correct Answer(s)
B. Run AV updates
D. Run Windows updates
Explanation
Running AV updates is important to ensure that the computer has the latest virus definitions and protection against any new threats that may have emerged during the time it was not in use. Running Windows updates is also crucial as it ensures that the computer has the latest security patches and updates for the operating system, which helps to protect against vulnerabilities and improve overall system performance.
37.
You previously installed a new application for a customer that has added three new services. Today, the customer informs you that the application will not start. You find out that one of the three new services has failed to start, and manual attempts to start it fail. Where should you look next for information? (Select the two best answers.)
Correct Answer(s)
A. Registry
D. Log files for the new application
Explanation
You should look in the Registry and the Log files for the new application for information. The Registry contains important configuration settings for the application and can provide insights into any issues that may be causing it to fail. The Log files for the new application can also provide valuable information about any errors or failures that occurred during the startup process.
38.
You are configuring a SOHO wireless network for a customer. The customer wants only five authorized computers to connect to the network within a defined IP range. What should you configure on the router? (Select the two best answers.)
Correct Answer(s)
C. DHCP
D. MAC filtering
Explanation
SSID: Service Set Identifier DMZ: (DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. Also called a "perimeter network," the DMZ is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall. Organizations typically place their Web, mail and authentication servers in the DMZ. DMZ is a military term that refers to the area between two enemies DHCP: Dynamic Host Configuration Protocol
39.
You are having issues booting a newly built PC. You notice the following jumper configurations on each IDE device: - Hard drive: Master - Optical drive: Cable Select Which of the following jumper configuration should you modify this to?
Correct Answer
C. HD: Cable Select, Optical drive: Cable Select
Explanation
The correct answer is to modify the jumper configuration to HD: Cable Select, Optical drive: Cable Select. This is because both devices are currently set to different configurations, which can cause conflicts and prevent the PC from booting properly. By setting both devices to Cable Select, the system will automatically determine the appropriate configuration for each device based on their placement on the IDE cable.
40.
What is an advantage of a PC-hosted virtual machine?
Correct Answer
A. It reduces the amount of pHysical hardware required.
Explanation
A PC-hosted virtual machine allows multiple virtual machines to run on a single physical PC, reducing the need for additional hardware. This means that instead of purchasing separate physical machines for different tasks or operating systems, a single PC can be used to host multiple virtual machines, saving costs and space. This advantage is particularly beneficial for businesses or organizations that need to run multiple operating systems or applications simultaneously.
41.
You are tasked with fixing a computer that is overheating after 30 minutes of use. What is the most likely cause?
Correct Answer
C. Internal dust buildup
Explanation
The most likely listed cause is internal dust buildup, especially if
the buildup is within the CPU fan. If the fan has too much dust and dirt, it will
stop spinning at the right speed, thus reducing its effective cooling ability,
and causing the CPU to overheat, shutting down the system. ACPI is the
Advanced Configuration and Power Interface, used by operating systems for configuration and management of power to the system. This can be disabled in the BIOS on some systems, but isn't recommended. Regardless, the older APM (Advanced Power Management) should take over if it is. "Incorrect input
voltage settings" is somewhat vague. Incorrect CPU voltage settings could cause the system to overheat—for example, if it was overclocked—but it is
more likely that there is dust and debris in one of the fans. Temporary
folders are folders in Windows. You can have as much data as you want in
your Windows folders; it shouldn't cause the system to overheat
42.
Which of the following can allow a hidden backdoor to be used by remote workstations on the Internet?
Correct Answer
B. Rootkit
Explanation
Rootkits are used to gain privileged
access to the computer, perhaps with a hidden backdoor. A remote access
Trojan (RAT) might be used to access the backdoor, which then uses the
rootkit code to gain that privileged access. XSS stands for cross-site
scripting, a vulnerability in web applications. Hidden backdoors are usually
found in software (operating systems or applications), not in firmware
(BIOS). SQL injection is another type of attack on websites that uses code to extract confidential information from website databases.
43.
Which of the following enables a user to reset their password with a series of security questions that only the user should know?
Correct Answer
D. Authentication
Explanation
Authentication enables a user to reset their password with a
series of security questions that only the user should know. An example of
verification would be if you logged in to a bank with your username (or
account number) and password, are authenticated, and are then asked to
type in a code, known as a verification code. Permission propagation is when NTFS rights (permissions) are automatically copied from the parent folder to
a subfolder. The subfolder inherits the permissions when they are propagated
from the parent. Administration could mean many things, but one example would be when an administrator sets a policy where a user needs to type a verification code after logging in.
44.
You need to set up an alert that will be sent to an administrator when the CPU stays above 90% for an extended period of time. Which tool will allow you to accomplish this?
Correct Answer
C. Performance Monitor
Explanation
Performance Monitor is the correct answer because it is a tool that allows you to monitor the performance of your system, including CPU usage. It can be configured to set up alerts that will be sent to an administrator when the CPU stays above a certain threshold, such as 90%, for an extended period of time. This allows the administrator to take appropriate action to address the high CPU usage and prevent any potential issues or performance degradation.
45.
You have been tasked with limiting computer access to certain users. Which of the following should you configure?
Correct Answer
B. Local Security Policy
Explanation
To limit computer access to certain users, you should configure the Local Security Policy. This policy allows you to define various security settings and restrictions for individual users or groups on a local computer. By configuring the Local Security Policy, you can control user rights, password policies, account lockouts, audit policies, and other security-related settings. This ensures that only authorized users have access to the computer and its resources, enhancing overall system security.
46.
One of your customers has set up a perimeter firewall and has implemented up-to-date AV software. She asks you what else she can do to improve on security. What will have the greatest impact on her network security? (Select the two best answers.)
Correct Answer(s)
B. Use strong passwords
D. Disable screen savers
Explanation
Using strong passwords and disabling screen savers will have the greatest impact on network security. Strong passwords help prevent unauthorized access to accounts and systems, while disabling screen savers reduces the risk of unauthorized access when the user is away from their computer. Conducting a daily security audit and installing additional antivirus software are also important security measures, but they may not have as significant an impact as using strong passwords and disabling screen savers.
47.
A computer has been infected with multiple viruses and spyware. What should you do first before the removal of this malware?
Correct Answer
A. Disable system restore
Explanation
Disabling system restore is the first step that should be taken before removing malware from a computer. System restore points can contain infected files, and if system restore is enabled, the malware can easily re-infect the computer after removal. Disabling system restore ensures that the infected files are not saved in the restore points and prevents the malware from returning.
48.
When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides e-mail? (Select the two best answers.)
Correct Answer(s)
D. Calendar
E. Address book
Explanation
When setting up a Microsoft Exchange mail account to synchronize with an iPhone, two items that can be configured to synchronize besides email are the calendar and the address book. This means that the user will be able to access and update their calendar events and contacts from their iPhone, ensuring that all their important scheduling and contact information is synchronized across devices.
49.
Newer smartphones have a feature that enables their data to be backed up to a remote location. What is this known as?
Correct Answer
A. ICloud
Explanation
Newer smartphones have a feature called iCloud that enables their data to be backed up to a remote location. iCloud is a cloud storage and cloud computing service provided by Apple Inc. It allows users to store their photos, videos, documents, and other data on remote servers and access them from any device. This feature ensures that users can easily restore their data if their smartphone is lost, damaged, or replaced.
50.
Which of the following has compatibility with the widest range of operating systems?
Correct Answer
B. FAT32
Explanation
FAT32 has compatibility with the widest range of operating systems compared to the other options. FAT16 is an older file system that is not as widely supported, while CDFS is a file system specifically designed for CDs and DVDs. NTFS, on the other hand, is a file system used primarily in Windows operating systems and is not compatible with other operating systems such as macOS or Linux. Therefore, FAT32 is the correct answer as it can be used on a variety of operating systems including Windows, macOS, and Linux.