2025/ EACH PRACTICE TEST CONTAINS QUESTIONS AND
ANSWERS/ C777 WEB DEVELOPMENT APPLICATIONS
Thomas, a user, reports that his mobile device is not working properly. When you research the issue,
you discover that he accidentally deleted all the data of his device. What has most likely occurred on
his mobile device?
Each correct ANSWER represents a complete solution. Choose all that apply.
A) Adjust device settings.
B) Perform a soft reset.
C) Perform a hard reset.
D) Perform a factory reset. - ANSWER-Perform a hard reset
Perform a factory reset
You receive a call from the customer. Your radio is on and you are in the process of eating your lunch.
What should you do?
A) Transfer the customer's call to a co-worker.
B) Get the customer's contact information and call them back later.
C) Turn off your radio, stop eating, and listen to your customer.
D) Continue what you are doing while talking to the customer. - ANSWER-Turn off your radio, stop
eating, and listen to your customer
Thomas, a technician, has the company's iPad that will be used for storing private data and photos of
clients. He needs to protect the integrity of the data on this device. What should he do?
Each correct ANSWER represents a complete solution. Choose two.
A) Turn on Touch ID & Passcode.
B) Turn on Bluetooth.
C) Turn on WiFi.
D) Turn on Find My iPhone in Settings. - ANSWER-Turn on Touch ID & Passcode
Turn on Find My iPhone in Settings
,You are saving some important data on your computer system and an interruption takes place in the
power supply at the same time. You want that your data is saved properly and also the system shuts
down properly. Which of the following tools should you use in this situation?
A) Surge suppressor
B) Surge protector
C) Electrical generator
D) Uninterruptible power supply - ANSWER-Uninterruptible power supply
Which of the following features will allow a user to run scripts and snippets on a Windows 8.1
operating system?
A) PowerShell
B) BitLocker
C) Action Center
D) XP mode - ANSWER-PowerShell
In which of the following modes are connecting clients allowed to communicate to an external
authentication server, usually RADIUS-based, with a username and password?
A) WPA2
B) WPA
C) WPA-Enterprise
D) WPA-Personal - ANSWER-WPA-Enterprise
You are working on the Windows operating system. You want to update your operating system as a
security problem has emerged, but the update fails. Which of the following is the reason for the
failure?
A) EOS
B) EOSL
C) EOA
D) EOL - ANSWER-EOL
Smith, a system engineer, has configured a new Linux based system and installed it in the network.
Now, he wants to determine if the network interface is working properly. He also wants to change
the status of the interfaces and their IP address. Which of the following commands will he use?
, A) tracert
B) nslookup
C) ifconfig
D) ping - ANSWER-ifconfig
James, a network analyst, wants to create broadcast domains to eliminate the need for expensive
routers. Which of the following will help him accomplish the task?
A) VLAN
B) NAT
C) VPN
D) SSH - ANSWER-VLAN
You are working on a batch file that runs in the Windows Command Prompt environment. You want
to add a comment in the script as a note or reminder to explain the operation of the nearby code.
Which of the following should you use for adding a comment?
A) Single quote (')
B) Double forward slash (//)
C) Hash character (#)
D) REM - ANSWER-REM
Which of the following is used to store the virtual memory which an operating system writes to the
disk in order to free the physical RAM?
A) ext
B) CDFS
C) UDF
D) Swap - ANSWER-Swap
Which of the following file systems will you use to define the storage of the files on the drive and
usage of the files by the Mac operating system?
A) ext
B) FAT
C) NTFS