ITE v6.0 Final Exam Answers 2018

What type of device provides power to a computer and allows it to be safely shut down in the event of a power loss? surge suppressor uninterruptible power supply standby power supply power inverter Which measure can help control RFI effects on wireless networks? Ensure the humidity and temperature levels are set as low as […]
Continue reading…

 

ITE v6.0 Chapter 14 Exam Answers 2018

What usually causes the BSOD in the Windows OS? CPU overheating a fragmented hard drive insufficient RAM device driver compatibility errors A user reports that WiFi is not working on a laptop. A technician checks the laptop and notices that the wireless networking icon is missing from the notification area of the task bar. The […]
Continue reading…

 

ITE v6.0 Chapter 13 Exam Answers 2018

Fill in the blank. The   SLA       is a contract defining the agreed-on level of support between a customer and a service vendor. During the process of troubleshooting, a technician gains access to customer private information. What is expected that the technician do with this information? Document all information in a log […]
Continue reading…

 

ITE v6.0 Chapter 12 Exam Answers 2018

What is the name given to the programming-code patterns of viruses? grayware mirrors signatures virus definition tables What is the most effective way of securing wireless traffic? WPA2 SSID hiding WEP wireless MAC filtering Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 […]
Continue reading…

 

ITE v6.0 Chapter 11 Exam Answers 2018

What is a characteristic of global and per-document options in print settings? Per-document options override global options. Global options take precedence over per-document options. It is not possible to configure per-document options. It is not possible to configure global options. A user discovers that an inkjet color printer is printing different colors from those that […]
Continue reading…

 

ITE v6.0 Chapter 10 Exam Answers 2018

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)   The device must be powered on. The device must be connected to a network. The passcode must be disabled. The GPS locator must be enabled. Sandboxing must be enabled. Which two location […]
Continue reading…

 

ITE v6.0 Chapter 9 Exam Answers 2018

Which technology provides laptops the ability to function on a cellular network? mobile hotspot Bluetooth infrared 802.11 Wi-Fi A technician is trying to remove a SODIMM module from a laptop. What is the correct way to do this? Press outward on the clips that hold the sides of the SODIMM. Pull outward by holding the […]
Continue reading…

 

ITE v6.0 Chapter 8 Exam Answers 2018

1-A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem? (Choose two.) The wireless router is not broadcasting the SSID. The laptop has not received an IP address from the wireless router. The wireless router […]
Continue reading…

 

ITE v6.0 Chapter 7 Exam Answers 2018

1-What is the correct order of the layers of the TCP/IP model from the top layer to the bottom? application, session, network, data link, physical application, internet, network access, transport network access, transport, internet, application application, transport, internet, network access 2-What TCP/IP model layer is responsible for MAC addressing? network access internet transport application 3-What […]
Continue reading…

 

ITE v6.0 Chapter 6 Exam Answers 2018

1-What are two advantages of using PC virtualization? (Choose two.) It protects the host machine from viruses attacks. It allows multiple operating systems to run on a single PC simultaneously. It boosts the performance of the host machine through virtualization. It can provide cost savings. It allows network threat identification. 2-A college uses virtualization technology […]
Continue reading…