220-1002 CompTIA A+ Various Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in?

.ps1

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1 GB - OBJ-1.7: For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.

What is the minimum amount of hard drive space needed to install Windows 8.1 on a 32-bit system?

16 GB - OBJ-1.7: For the Windows 8.1 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.

What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system?

2 GB - OBJ-1.7: For the Windows 8.1 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

20 GB

What is the maximum amount of memory that can be used in a 32-bit version of the Windows operating system?

4 GB - OBJ-1.1: Any operating system that is a 32-bit can only access up to 4 GB of memory. Every byte of RAM requires its own address, and the processor limits the length of those addresses. A 32-bit processor uses addresses that are 32 bits long. There are only 4,294,967,296, or 4 GB, possible 32-bit addresses. This 4 GB limit applies to the total system memory, so if the system has memory dedicated to the graphics, it is also considered a part of this 4 GB total limit.

Judith is trying to install Windows 10 (64-bit) on a virtual machine on her Mac OS X laptop. The installation is continually failing and producing an error. You look at the virtual machine's specifications and see that Judith has configured a VM with a dual-core 1 GHz processor, 2 GBs of memory, a 15 GB hard drive, and a 1024x768 screen resolution. What would you recommend increasing to fix the installation issues being experienced?

Amount of hard drive space (Windows 10 64-Bit requires 20 GB of HDD/SSD space)

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active - OBJ-3.1: This issue may occur if one or more of the following conditions are true: (1) the basic input/output system (BIOS) does not detect the hard disk, (2) the hard disk is damaged, (3) sector 0 of the physical hard disk drive has an incorrect or malformed master boot record (MBR), (4) an incompatible partition is marked as Active, or (5) a partition that contains the MBR is no longer active. The only option provided in this question from this list is that an incompatible partition is marked as active.

You are working on a customer's computer when your cellphone begins to ring. What should you do?

Apologize and send the call to voicemail

Sam and Mary both work in the accounting department and use a web-based software as part of their job. Sam is unable to login to the website using his credentials from his computer, but Mary is able to login with her credentials on her computer. Sam asks Mary to login to her account from his computer to see if the problem is with his account or his computer. When Mary attempts to login on Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to login to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer?

Ask Sam about the program and what new program he installed & verify browser settings are correct. - OBJ-3.2: Since Mary was able to log in to the website from her computer but not from Sam's, this indicates an issue with Sam's computer and/or web browser. The pop-up notification about the new program being installed is a clue that something exists on Sam's computer that doesn't exist on Mary's computer. Therefore, it could be the cause and should be investigated further. Additionally, the browser's configuration should be checked to ensure the correct settings are being used.

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

Ask Tier 2 to take the call - OBJ-4.7: Since the Tier 2 technician already knows that this will take some time to resolve, it would be best to ask another technician to help the user since they are scheduled for their break. It would be improper to either ask the user to call back later or to put them on a long hold. While the technician may opt to troubleshoot the issue for the user right now, depending on the organization's break structure, that may not be possible. Often in large organizations, break times are scheduled, and if the technician postpones their break, it could have a cascading effect across numerous other technician's schedules.

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's servers must have a daily backup conducted on them. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when they are needed for restoration. Which of the following should you recommend?

Attempt to restore a test server from one of the backup files to verify them - OBJ-1.9: The only way to fully ensure that a backup will work when needed is to attempt to restore the files from the backups. To do that, it is best to restore them to a test server since this will not affect your production environment

You are a member of a project team that is being contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the SOW and change request prior to its approval?

Backout plan - OBJ-4.2: A backout plan is an IT governance integration approach that specifies the processes required to restore a system to its original or earlier state, in the event of failed or aborted implementation. Any installation or upgrade should include a backout plan as part of the change request and change plan. That way, if something goes wrong with the installation, then the team can "backout" and restore service on the legacy/previous system.

You are setting up the Remote Desktop Services on a Windows 2019 server. In order to increase the security of the server, which TWO of the following actions should you take?

Block all unused ports and place the server in a DMZ - OBJ-4.8: To best secure the server, you should logically place the Windows 2019 server into the network's DMZ and block all unused ports on the switch, router, and firewall. Since the server will be used to allow remote connections from across the internet to access the server directly, the server must be placed into the De-Militarized Zone (DMZ) of the network and not in the internal trusted portion of the network. Additionally, any server or services that are going to be forward-facing to the internet (like a Remote Desktop Services server) should have all of the unused ports blocked on the switch, router, and firewall to minimize the footprint of the network. By blocking unused ports, there are fewer ways for an attacker to get into the network and to attack the server.

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

Brownouts - OBJ-4.5: A brownout is an intentional or unintentional drop in voltage in an electrical power supply system. Intentional brownouts are used for load reduction in an emergency. The reduction lasts for minutes or hours, as opposed to short-term voltage sag (or dip).

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are extremely poor, and numerous pop-ups are created by the browser. Jonathan asks for your assistance in fixing this issue. Whic

Check startup apps in MSCONFIG and reset web browser settings to default - OBJ-3.2: Browser redirection and pop-ups are a common symptom of malware being installed on a computer. It is recommended that the web browser be reset to its default settings and configurations in order to remove any redirection settings that the malware may have made to the browser. Additionally, any unapproved applications should be unchecked from the Startup tab in MSCONFIG to ensure the malware isn't reloaded during the next reboot.

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

Check the status of the printer queue - OBJ-3.1: When this issue occurs, it is often because the system properly sent the print job to the print queue, but the print queue has become stuck. If no error is shown in the taskbar's printer icon, the user should open the print queue to determine if the print job has become stuck. If it is, then the print queue can be emptied or reset.

A user is having an issue with a specific application on their Android devices. The user works for LearnCorp, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

Clear local app cache (before reinstalling if possible) - OBJ-3.4: To solve an issue with a mobile application, you should normally attempt the following steps. First, clear the application cache since this locally stored information can become glitchy and cause an app to crash. If you have two of the same smartphones having the same issue, it is unlikely to be the application cache causing the issue. In this case, the technician would then attempt to update the OS of the smartphones. Updating the operating system can minimize compatibility issues and fix crashing applications. Third, you can try reinstalling the application if the other two options don't work.

Your company recently suffered a small data breach that was caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?

Data Loss Prevention (DLP) - OBJ-2.2: Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage). Since the user was an authorized user (employee), changing your password policy, reconfiguring the firewall, or setting up a MDM solution would not solve this problem. Instead, a DLP solution must be implemented.

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and to destroy the data on their hard disk drives. Which of the following methods would be the MOST effective?

Degauss the hard drive - OBJ-2.9: Degaussing is the process of erasing/wiping a hard disk drive or magnetic tape. When exposed to the powerful magnetic field of a degausser, the magnetic data on a hard disk is neutralized or erased. Degaussing is the guaranteed form of hard drive erasure and is considered fast and efficient, especially with large numbers of hard drives. While the other options will erase or delete the data, they are much more time consuming since each drive must be formatted or destroyed individually. With an industrial degausser, multiple hard drives can be destroyed at once, and they take less than a minute to degauss the hard drives.

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password?

Disabled WPS - OBJ-2.10: WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered. Unfortunately, WPS is vulnerable to a brute-force attack and is easily compromised. Therefore, WPS should be disabled on all wireless networks. If Bob was able to enter your apartment and press the WPS button, he could have configured his laptop to use your wireless network without your WPA2 password.

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine and removed the infection from the system. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

Educate the end-user on how to avoid malware - OBJ-3.3: If a technician neglects to educate the end-user about how to avoid malware in the future, it is very likely that they will get their computer infected again. For example, educating the user on best practices like being cautious when opening an attachment or clicking a link in an email, instant message, or post on social networks can help them prevent future infections.

Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes, that a password must be entered prior to booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST?

Enable screen lock, UEFI password, and BitLocker OBJ-2.7: These requirements can be met by enabling BitLocker to encrypt the hard drive, enable a UEFI password to require a password to be entered prior to booting an operating system, and enabling a screen lock that turns on after 2 minutes of inactivity.

After installation or change has been implemented, which of the following is necessary prior to closing out the change request?

End-user acceptance - OBJ-4.2: After the installation or implementation of the change, the end-user acceptance must be received. If the end-user hasn't approved the installation or change, then the project or ticket cannot be closed out.

An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. But, if the user enters a room with normal lights on then, the phone's display is dim and hard to read. What is MOST likely the problem?

Faulty ambient light sensor - OBJ-3.4: The ambient light sensor appears to be broken or malfunctioning. The ambient light sensor may be too sensitive as it is taking in more light than usual. This can occur if the sensor is faulty or if the screen was replaced incorrectly, and the technician forgot to install the black gasket around the ambient light sensor.

Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email's username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error in regard to Chris's email client?

His email account required MFA - OBJ-2.8: If a user or system has configured their email accounts to require two-factor authentication (2FA) or multifactor authentication, then even if they enter their username and password correctly in the third-party email client they will receive the "Invalid credentials" error message. To overcome this, some email servers will allow the user to create an Application Specific Password to bypass the multifactor authentication requirement, or the user will have to use an email client that supports multifactor authentication.

A user is unable to open some files on a file server and contacts the help desk for support. The help desk technician begins to troubleshoot the server and notices that all of the data backups for the server are operational, but there are large portions of time missing within the event log. The technician remembers that there have been several bad thunderstorms recently during those missing time periods. What might the technician do to prevent these server issues in the future?

Install a backup battery (UPS) - OBJ-4.5: The missing time periods in the event logs indicate that the server was powered off during those periods. This is likely to have occurred due to a power loss during the thunderstorms. To prevent these power losses, it is recommended that the servers be connected to a battery backup. When a server is powered off due to a power loss, files can become corrupted and unusable.

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to come up with a plan to prevent this type of issue from occurring again in the future. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus/anti-malware solution that uses heuristic analysis - OBJ-2.2: The only solution provided that could STOP this from reoccurring would be to use an anti-virus or anti-malware solution with heuristic analysis. The other options might be able to monitor and detect the issue, but not stop it from spreading. Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should be able to detect the issue in the scenario provided and stop it from spreading throughout the network.

Your supervisor has requested remote access to a particular server in order to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do prior to granting remote access to the server to your supervisor?

Install the latest security updates and patches to the server - OBJ-2.7: To prevent infection, it is important that all servers and workstations remain patched and up to date on their security updates. After that, the next best thing would be to set up the anti-virus to automatically update itself daily and run a full scan nightly. Beyond that, educating your supervisor would be a good idea, as well.

Which version should you use when installing a Linux operating system and are concerned with end-of-life support?

LTS Support - OBJ-1.1: The LTS (Long-Term Support) release is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. These LTS releases are supported for a long time (approximately 10 years), so they are great to use in production systems like servers.

A user is complaining that every time they reboot their computer, a music application loads up. Which of the following commands would you use to disable the program from starting up each time Windows reboots?

MSCONFIG (not to be confused with Task Manager unless it's Windows 10) - OBJ-1.5: The MSCONFIG utility has 5 tabs: General, Boot, Services, Startup, and Tools. If you click on the Startup tab, you will see every program that is configured to start up when Windows is booted up. This can be used to disable unwanted programs from launching during the boot-up process.

You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?

MSDS - OBJ-4.5: The Material Safety Data Sheet (MSDS) is a document that contains information on the potential hazards (health, fire, reactivity, and environmental) and how to work safely with the chemical product. It is an essential starting point for the development of a complete health and safety program. The MSDS also includes the directions for proper handling and disposal of the chemicals.

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it law enforcement authorities. What should you do when turning over the laptop to the police?

Maintain the chain of custody - OBJ-4.6: Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It is important that the chain of custody be maintained from the time you arrived at the laptop until you turn it over to law enforcement officials.

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following is the appropriate data destruction and disposal technique that should be utilized for these papers?

Micro-cut shredder - OBJ-2.9: The three most common types are; strip-cut, cross-cut, and micro-cut. The strip-cut machines shred long vertical pieces, as cross-cut adds horizontal cuts to make the shred pieces even smaller. Micro-cut machines shred to an even higher level of security, essentially converting your documents into tiny particles.

A cybersecurity analyst is auditing your company's network logs and identifies that a USB mass storage device was previously inserted into many of the company's servers. The logs also showed that there were dozens of failed login attempts prior to a successful login occurring on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst?

Modify Autorun settings and lockout the account after 3 failed attempts - OBJ-2.7: Since the USB mass storage device was used to connect to the servers, it is recommended to modify the AutoRun settings. To prevent the password guessing attacks used, the servers should be configured to lock out any account after 3 failed login attempts.

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client is unable to download any new messages and states "Network Offline". Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve the issue?

Open a web browser, type google.com, and see if a redirect page is displayed - OBJ-1.8: Many hotels use a captive portal with a redirect page with their wireless networks. When a user connects to the wireless network, they have to open a web browser and are then redirected to the hotel's Acceptable Use Policy page. Until the user accepts the terms and conditions, none of their network traffic will be routed to the internet. If the redirect page is shown, Michael can then accept the terms and conditions, and his email client will be able to download his mail again.

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

RADIUS - OBJ-2.3: With RADIUS and SSO configured, users on the network can provide their user credentials one time (when they initially connect to the wireless access point or another RADIUS client), and they are automatically authenticated to all of the network's resources.

You have been asked to install a computer in a public workspace. The computer should only be used by an authorized user. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?

Require authentication on wake-up - OBJ-1.8: To prevent the computer from being used inadvertently to access the network, the system should be configured to require authentication whenever the computer is woken up. Therefore, if an authorized user walks away from the computer and it goes to sleep, when another person tries to use the computer, it will ask for a username and password prior to granting them access to the network.

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com". What should Michelle do to fix this problem?

Reset the web browser's proxy settings - OBJ-3.2: When a browser redirect occurs, it usually is the result of a malicious proxy server setting being added to the browser. Michelle should first check her web browser's configuration for any malicious proxies under the Connections tab. Next, she should check the hosts.ini file to ensure that no single sites are being redirected.

A macOS user is browsing the internet in Google Chrome when they see a notification that says "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?

Rogue Anti-Virus - OBJ-3.2: Rogue anti-virus is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer, and to pay money for a fake malware removal tool (that actually introduces malware to the computer). It is a form of scareware that manipulates users through fear and a form of ransomware. Since the alert is being displayed on a macOS system but appears to be meant for a Windows system, it is obviously a scam or fake alert and most likely a rogue anti-virus attempting to infect the system.

Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?

Signal strength or power level - OBJ-2.10: Since Dion Training wants to keep the wireless network open, the BEST option is to reduce the signal strength of the power level of the network. This will ensure the wireless network can only be accessed from within the company's classrooms and not from the coffee shop next door. Changing the SSID won't prevent the coffee shop's customers from accessing the network. While MAC filtering could be used to create an approved whitelist of MAC addresses for all of Dion Training's students, this would also require it to be continuously updated with each class of students that is very time-intensive and inefficient. Therefore, the BEST solution is to reduce the signal strength.

A smartphone user notices that their phone gets very hot, and their batter is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?

Smartphone is infected with malware and using a lot of processing power - OBJ-3.4: When a smartphone is being heavily used (runaway processes, GPS, heavy data transfer), the device generates more heat. If the device is generating a lot of heat and the battery is draining quickly even with the phone in "sleep mode" in your pocket, this could be an indication that the phone is infected with malware. If the phone is powered down and still generates a lot of heat, this could be a faulty battery.

Which TWO of the following devices should have a grounding wire attached to them when being installed per the manufacturer's recommendations?

UPS and Server Rack - OBJ-4.4: A server rack and UPS should be installed with a grounding wire attached to them. Grounding is not for functionality, but rather for safety. Numerous issues are involved when there is no ground, including potential for electric shock, signal attenuation, and unpredictable operation.

Which type of installation would require an answer file in order to install the operating system?

Unattended - OBJ-1.3: An unattended installation is a traditional method of deploying a Windows operating system in a large enterprise environment. Unattended installations use an answer file that contains user input to various GUI dialog boxes that would otherwise appear during the installation process. Unattended installation is the most practical way to install Windows when the client computers have different hardware components, and an image file cannot be used. Unattended installations save deployment time and can be used either for clean installs or in-place upgrades.

A factory worker suspects that a legacy workstation is infected with malware. The workstation is running Windows XP and is used as part of an ICS/SCADA system to control some industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation, and after its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent a reinfection?

Update the anti-malware solution - OBJ-3.3: Since the workstation is isolated from the internet, the anti-malware solution will need to be manually updated to ensure it has the latest virus definitions. Without the latest virus definitions, the system can easily become reinfected.

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?

Verify the digital certificate is installed - OBJ-3.4: If an encrypted email does not open in your mail app, you most likely need to verify that your digital certificates are properly installed on the device as these are used to decrypt encrypted emails.

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all of the malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

Verify the hosts.ini file has not been maliciously modified - OBJ-3.2: Browser redirection usually occurs if the browser's proxy is modified or the hosts.ini file is modified. If the redirection occurs only for a small number of sites or is occurring in all web browsers on a system, then it is most likely a maliciously modified hosts.ini file. The hosts.ini file is a local file that allows a user to specify specific domain names to map to particular addresses. It works like a very basic DNS server and can be used to redirect a system's internet connection. For example, if your children are overusing YouTube, you can change YouTube.com to resolve to YourSchool.edu for just your child's laptop.

A user has an older laptop running Windows XP with only has 2 GB of RAM, a 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows XP is now end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

Windows 10 - OBJ-1.2: All four of these versions of Windows have the same minimum requirements. For a 32-bit operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space. For a 64-bit operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space. Since all four have the exact same minimum requirements, it is recommended that the user install the most modern operating system on this laptop for the best support for updates in the long-term.

Which command on a macOS or Linux system is used to change the permissions of a file?

chmod - OBJ-1.9: The chmod command is used to change the permissions of a file or directory from the command line or terminal. The chown command is used to change the owner of the file, but not its permissions. The sudo command allows a command to be executed as the superuser (root) instead of as the current user. The pwd is used to display the path to the present working directory (current directory) to the terminal or display.

Which command is used to create a new disk partition on a Windows system?

diskpart - OBJ-1.4: DiskPart is a command-line disk-partitioning utility available for Microsoft operating systems. You can use it to view, create, delete, and modify a computer's disk partitions.


Conjuntos de estudio relacionados

Chapter 33 - Environmental Emergencies

View Set

Bio Exam2 (43, 45, 46, 47, 48) [83%]

View Set

Human Resource Development Exam 2 (ch 7-11)

View Set