IT Essentials (ITE v6.0 + v7.0) Chapter 14 Exam Answers 100%.
IT Essentials (ITE v6.0 + v7.0) Chapter 14 Exam Answers 100%. 1. What is a common responsibility of a level one call center technician? entering a concise description of a customer problem into a ticketing system * remotely connecting to customer devices and implementing driver and software updates calling back customers and asking additional questions to solve the problem receiving escalated work orders from a lower level technician Explanation: The primary responsibility of a level one technician is to gather pertinent information from a customer and to enter the information into a work order or ticket system. 2. Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.) PowerShell VBScript C# * Java * Python Explanation: Compiled languages like C, C++, C#, and Java need to be converted into executable code using a compiler. 3. A programmer used an operator to compare values within a program and the resulting logical data type was “false”. Which test condition would have provided the result of “false”? 8 != 8 4 >= 1 6<=6 3 == 3 Explanation: == represents equal != represents not equal < represents less than > represents greater than <=r epresents less than or equal to >= represents greater than or equal to Because 8 is equal to 8, and the != operator is used, the resulting output is “false”. 4. What is the definition of a script file? A simple file with a single statement that loops repeatedly. A file that is compiled and translated into machine language before executing. A simple text file used to automate processes and tasks. * A file that is the output of a conditional statement. Explanation: A script file is a simple text file written in a form of scripting languages to automate processes and tasks on various operating systems. The commands can be entered HERE Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners on the command line one at a time. A script file, however, provides a more effective way to execute multiple commands. 5. A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network? Telnet client Windows Remote Desktop client Windows Remote Assistance client SSH client * Explanation: The Windows administrator should use Secure Shell (SSH) TCP port 22. SSH allows the administrator to connect remotely and securely to the Linux workstation in order to safely authenticate and then perform updates on the workstation. 6. A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through? UDP port 23 TCP port 23 TCP port 22 * UDP port 22 TCP port 3389 UDP port 3389 Explanation: Secure Shell (SSH) is a secure remote service that encrypts the entire session. The port number for SSH is TCP port 22. 7. A worker in the records department of a hospital in the United States accidentally sends a patient’s medical record to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. Which two types of compliance standards best match the breach of confidentiality? (Choose two.) PII PHI * PCI ePHI * DRM GDPR Explanation: Both protected Health Information (PHI) and Electronic Protected Health Information (ePHI) includes patient name, addresses, visiting dates and more. The Health Insurance Portability and Accountability Act (HIPAA) regulates and provides severe penalties for breaches of PHI and ePHI. 8. What are two examples of personally identifiable information (PII)? (Choose two.) credit card number * first name street address * language preference IP address Computer Networking Tutorials-Labs-Tips, Exam & Answers for Student & Beginners Explanation: Personally identifiable information (PII) is any data that could potentially identify and track a specific individual. A credit card number and street address are the best examples of PII. 9. What is the definition of cyber law? a single law defining criminal acts that are committed online the collection of international, country, and local laws that affect computer security professionals * a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices Explanation: Cyber law describes the collection of international, regional, country, and state laws that affect computer security professionals. 10. What is a characteristic of the open source license of an application software? It requires registration instead of purchasing. It cannot be used for campus-wide deployment. It allows users to modify and share the source code. * It does not require purchase in order to use the software. It requires acknowledged completion of a professional training course prior to use. Explanation: An open source license is a copyright license for software that allows developers to modify and share the source code that runs the software. Open source software could be free to use or require purchase. In either case, users have access to the source code. Open source software could be used as personal software or deployed enterprise wide. User registration is an encouraged optional feature. 11. Which statement is characteristic of most personal software licenses? Developers are allowed to modify and share the source code that runs the software. A company is allowed to use the software campus wide. A user is allowed to share the software with friends. A user is allowed to install the software on only one computer. * Explanation: Most personal software licenses allow a user to run the software on only one PC. Some personal software licenses allow a user to copy the software onto multiple PCs. These licenses usually specify that the copies cannot be run at the same time. Some personal software licenses are for commercial products that require purchase. There are personal software licenses for open source software that are free to use. Personal software licenses are intended for personal use of the product. Software to be deployed campus wide needs site licenses or enterprise licenses.
École, étude et sujet
- Établissement
- Raa Middle School
- Cours
- IT Essentials Chapter 14
Infos sur le Document
- Publié le
- 23 septembre 2022
- Nombre de pages
- 11
- Écrit en
- 2022/2023
- Type
- Examen
- Contient
- Questions et réponses
Sujets
-
it essentials ite v60 v70 chapter 14 exam answers 100
-
it essentials ite v60 v70 exam answers 100
-
it essentials ite v60 v70 chapter 14 exam answers
-
it essentials ite v60 v70