Sponsor

Advertisment

It-essentials Final Exam v6.0 2016 2015-2016

Thursday, June 30, 2016
1. What is the purpose of RAID adapters? to allow older PCI technology expansion slots to be used to provide enhanced audio and graphic capabilities to connect multiple storage devices for redundancy or speed* to connect peripheral devices to a PC to improve performance   2. Which type of interface should a customer choose if connecting...
Read more ...

It-essentials Practice Exam v6.0 2016 2015-2016

Thursday, June 30, 2016
1. What two motherboard components control the system boot operations? (Choose two.) BIOS chip* UEFI chip* Northbridge chip Southbridge chip CPU   2. What motherboard chip controls high speed CPU communication to RAM and the video card?   Northbridge* Southbridge BIOS UEFI   3. What is a possible use for virtual computing? to...
Read more ...

It-essentials Chapter 14 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016
1. A technician discovers that RAID has stopped working. Which two situations could cause this issue? (Choose two.) The external RAID controller loses power.* The RAID controller fails.* The cables connected to the hard drive are connected incorrectly. One of the hard drives fails. RAID has been configured incorrectly.   2. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than...
Read more ...

It-essentials Chapter 13 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016
1. What is the correct way to conduct a telephone call to troubleshoot a computer problem? Always gather information from the customer and escalate the problem. Maintain professional behavior at all times.* Ask personal questions to get better acquainted with the customer. Explain each step to help the customer understand the troubleshooting process.   2. What is a recommended technique for a technician who is both troubleshooting...
Read more ...

It-essentials Chapter 12 Exam v6.0 2016 2015-2016

Thursday, June 30, 2016
1. Which two security precautions will help protect a workplace against social engineering? (Choose two.) performing daily data backups encrypting all sensitive data stored on the servers registering and escorting all visitors to the premises* ensuring that all operating system and antivirus software is up to date ensuring that each use of an access card allows access to only one user at the time*   2. Which two characteristics...
Read more ...