902

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which Mac OS utility provides access to the operating system command line? A. cmd B. scripts C. terminal D. shell E. cmdlet

terminal

What Windows technology is the primary focus of the Windows Data Sources utility? A. Active Directory B. ODBC C. COM+ D. DLL

. ODBC Windows Open Database Connectivity is a common framework for interfacing applications with data in databases. The Windows Data Sources utility provides a central facility for managing database drivers and connectivity.

What USMT application gathers user data and settings to use for a migration? A. LoadState.exe B. Windows Easy Transfer C. ScanState.exe D. Files and Settings Transfer Wizard

. ScanState.exe

Which of these best describes the extension of an Apple Disk Image file? A. .img B. .tar C. .zip D. .dmg E. .iso

.dmg

Which of these Windows Vista versions allow an incoming connection using Remote Desktop Connection? Pick two. A. Windows Vista Ultimate B. Windows Vista Home Premium C. Windows Vista Business D. Windows Vista Home Basic

: A. Windows Vista Ultimate and C. Windows Vista Business There are many differences between Windows Vista versions, but only the higher-end Business and Ultimate versions include incoming connections through Remote Desktop Connection

Which of the following utilities are commonly used to backup information in Linux? Pick two. A. tar B. yum C. rsync D. filer E. apt-get F. ps

: A. tar and C. rsync

You're planning an in-place upgrade from your existing Windows Vista Business system to Windows 7 Ultimate. Which one of these methods can be used to perform this upgrade? A. Boot from the Windows 7 Ultimate installation media and choose "Install" B. Boot Windows Vista Business and start the Windows 7 upgrade from the Windows 7 installation media C. Backup the hard drive, boot from the Windows 7 installation media, install Windows 7, and restore your files D. You cannot perform an in-place upgrade from Windows Vista Business to Windows 7 Ultimate

: B. Boot Windows Vista Business and start the Windows 7 upgrade from the Windows 7 installation media One of the simplest ways to begin the upgrade from Windows Vista Business to Windows 7 Ultimate is to boot your Windows Vista Business computer normally, log in, and start the Windows 7 Ultimate upgrade from the Windows 7 installation media. Windows 7 will see that Windows Vista is currently running and prompt you for upgrade options.

Which of these would be an authentication factor that is something you have? Pick two. A. Password B. Hardware Token C. User Name D. Answer to a security question E. Smart Card

: B. Hardware Token and E. Smart Card

Which of these commands would remove a directory called \FILES ? A. ED \FILES B. RD \FILES C. FORMAT \FILES D. MD \FILES E. ?\FILES

: B. RD \FILES The Remove Directory (RD) command is used to erase an empty directory from the directory structure.

Which of these programs would be the best choice for mirroring all of the files in a directory tree? A. copy B. robocopy C. sfc D. xcopy

: B. robocopy Robocopy (robust copy) is a very functional file copy utility for Window

You need to install the 64-bit version of Windows 7 onto a video editing workstation. What is the minimum memory required to install Windows 7 x64? A. 512 MB B. 1 GB C. 2 GB D. 4 GB

: C. 2 GB Windows 7 x64 requires a minimum of 2 GB of RAM for installation, but you'll probably need more than that for a video editing workstation!

Which of the following will launch the Windows command line? A. CMD B. PROMPT C. CMD64 D. COMMAND32

A. CMD The CMD command launches the Windows Command Prompt.

Which of the following would not meet the minimum requirements for the 32-bit version of Windows 8.1? A. 15 GB of drive space B. 1 GHz processor C. 1 GB of RAM D. DirectX 9 graphics device

A. 15 GB of drive space

What is the maximum amount of RAM supported by the 32-bit version of Windows 7 Professional? A. 4 GB B. 8 GB C. 16 GB D. 192 GB

A. 4 GB

Your company's security team has announced the rollout of a new VPN for each laptop in the organization. What will this VPN provide? A. A secure network channel back to the corporate office when traveling outside the building B. Additional encryption mechanisms for data stored on the hard drive C. New security options for USB and other external storage devices D. An additional dongle that provides random numbers to use during the login process

A. A secure network channel back to the corporate office when traveling outside the building A Virtual Private Network provides an encrypted tunnel of information between two points. This allows you to send private information over public networks without the worry of someone examining the data.

Which of these Windows 7 functions contain a consolidated view of alerts, an overview of OS features, and a color coded status display? A. Action Center B. Event Viewer C. Security Center D. Device Manager

A. Action Center In Windows 7 and 8/8.1, all of the scattered alerts and information features have been consolidated into the Control Panel's Action Center.

Which of these can be used in a Windows Firewall rule? A. Application name B. NTFS permission C. Username D. UAC setting E. Workgroup name

A. Application name

Which of these utilities would be the best choice for managing COM+ apps? A. Component Services B. Computer Management C. Command Prompt D. Computer Registry

A. Component Services The Windows Component Services utility is designed to help you support the distributed Component Object Model applications. In the Component Services utility, you'll find Component Service configurations, integrated Event Viewer, and access to Windows Services management.

Which of the following would be the best way to remove a feature of the Windows operating system? A. Control Panel / Programs and Features B. The Windows setup utility C. Windows Safe Mode D. Control Panel / System E. Control Panel / Administrator Tools / Uninstall

A. Control Panel / Programs and Features The Programs and Features applet in the Control Panel can be used to install or remove 3rd-party applications, and it can also be used to add or remove specific Windows features.

n Windows 7, where would you make a change to a user's certificate information? A. Control Panel / User Accounts B. Administrative Tools / Global Security Policy C. Administrative Tools / Device Manager D. Control Panel / Certificate Manager

A. Control Panel / User Accounts The User Accounts Control Panel applet allows you to configure user-specific information such as the account name, type, password, picture, and certificate.

Which of these are most associated with CHKDSK? Pick two. A. Corrects file system errors B. Provides S.M.A.R.T. error reports C. Rebuilds the boot sector D. Checks every disk sector for physical errors

A. Corrects file system errors and D. Checks every disk sector for physical errors

What is the fundamental purpose of a network proxy? A. Creates a functional separation between users and the Internet B. Increases bandwidth capacity of network communication C. Routes network traffic between subnets D. Encrypts traffic between users and a remote location

A. Creates a functional separation between users and the Internet A proxy is designed to limit direct access between users and Internet sites by terminating the user's network connections on the proxy. The proxy then completes the request and sends the results to the end user. Since the proxy is always in the middle of the connection, there's no possible way for users and Internet sites to directly communicate with each other.

. Which of these can be used to launch the Windows Task Manager? Pick two. A. Ctrl-Shift-Esc B. Right-click the task bar and choose "Task Manager" C. Ctrl-Alt-Esc D. Start menu / Control Panel / Task Manager

A. Ctrl-Shift-Esc and B. Right-click the task bar and choose "Task Manager" The Task Manager is one of the most useful real-time utilities that you'll use. You can also type Ctrl-Alt-Del and select Task Manager to launch the utility

Which of the following would be associated with a DNS server? A. Device names are converted to IP addresses B. IP addresses are automatically assigned to network devices C. Responses are provided to browser messages D. An intermediate device performs network requests in place of the requesting device E. Centralized authentication credentials are evaluated

A. Device names are converted to IP addresses

You've recently purchased a used hard drive for your desktop computer. After installing the drive, you notice that the drive has not been erased and it already has an existing partition. Which of these Windows utilities can be used to examine the details of the disk and its partitions? A. Disk Management B. CHKDSK C. Device Manager D. Event Viewer

A. Disk Management There are a number of command line utilities that can help gather information about a hard drive, but the best option from these answers is the graphical Windows Disk Management utility. The incorrect answers: B) CHKDSK - The CHKDSK program is used to examine a drive for logical and physical errors. C) Device Manager - The device manager can confirm the installation of the hard drive and display some hardware information, but it doesn't show any detailed partition information. D) Event Viewer - The event viewer would have messages if the disk wasn't working properly, but it doesn't display the disk details

Which of these tasks would be the best choice for the Windows Disk Management utility? A. Extend the size of a partition B. Eject a removable storage device C. Defragment a hard drive D. Rebuild a disk's master boot record

A. Extend the size of a partition The Windows Disk Management utility can perform many administrative disk functions, such as mounting drives, changing drive letters, modifying partition sizes, and much more.

Which of the following is not commonly used for geolocation tracking? A. GPS B. WiFi network C. Mobile phone tower D. FM radio

A. GPS

Which of the following identifies a physical mobile device? A. IMEI B. PRL C. IMSI D. PRI E. NPA-NSS

A. IMEI A unique IMEI (International Mobile Station Equipment Identity) identifier is associated with a mobile device. No two devices share the same IMEI.

Which of these features would you find in Windows Firewall with Advanced Security? A. Inbound and outbound port-based filtering B. Malware filtering C. Web-site filtering by URL D. Virus filtering

A. Inbound and outbound port-based filtering

Which of these methods would be the best way to determine if you can upgrade from Windows Vista to Windows 7? A. Run the Windows 7 Upgrade Advisor B. Refer to the computer manufacturer's web site C. Run Windows 7 Setup and follow the prompts D. Use MSCONFIG to inventory the computer

A. Run the Windows 7 Upgrade Advisor

Which Windows feature can create a backup that contains different versions of the same file? A. System Protection B. Task Manager C. Windows Defender D. System Restore E. User Account Control

A. System Protection Windows System Protection is the feature that not only can revert your system to a previous system configuration, but it can also maintain different versions of your files. You can enable System Protection in Control Panel / System / System Protection tab.

You've just updated a device driver, but you've run into a problem with the new version of the driver. Which Windows feature would be the best choice for reverting to the previous configuration? A. System Restore B. Volume Shadow Copy C. Windows Backup D. Compatibility Mode E. Windows Easy Transfer

A. System Restore The System Restore feature will create restore points when drivers are updated, applications are installed, or any other major system change occurs. System Restore will also make occasional restore points even if nothing major has occurred. If you need to quickly go back in time to a previous configuration, then System Restore is your best choice.

Which of the following would be the best command to use to duplicate a file in Linux? A. mv B. cp C. tar D. dup E. mirror

Answer: B. cp

Which of these is a characteristic of a stateful firewall? A. The firewall keeps track of the state of each traffic flow and only allows traffic that matches an existing connection B. The firewall relies on static rules to determine the state of incoming traffic C. The firewall identifies potential attackers and their attack vectors D. The firewall understands and provides access based on the state of the remote device

A. The firewall keeps track of the state of each traffic flow and only allows traffic that matches an existing connection

Which of these would be a valid upgrade path from Windows 7 Home Premium? Pick two. A. Windows 7 Professional B. Windows 7 Home Basic C. Windows 7 Starter D. Windows 7 Enterprise E. Windows 7 Ultimate

A. Windows 7 Professional and E. Windows 7 Ultimate You can upgrade Windows 7 to a higher-level edition, excluding Enterprise editions of Windows 7. If you are upgrading Windows 7 Home Premium, the only two valid higher-level editions would be Windows 7 Professional and Windows 7 Ultimate.

You'd like to check your hard drive for problems. Which chkdsk option will examine every sector of the disk and attempt to correct any bad sectors? A. chkdsk /r B. chkdsk /e C. chkdsk /f D. chkdsk /s

A. chkdsk /r The /r option on the chkdsk command will both identify and repair logical errors and scan the drive in an attempt to recover data from bad sectors

Which of these specifications meets the minimum hardware requirements for installing Windows 7 Professional x86? A. 1 GHz processor B. 15 GB of free disk space C. 512 MB of RAM D. DirectX 8 graphics device

Answer: A. 1 GHz processor

Which of the following would meet the minimum requirements for Windows Vista Ultimate? A. 16 GB free hard drive space B. 512 MB of RAM C. CGA graphics adapter D. 700 MHz processor

Answer: A. 16 GB free hard drive space

Which of these specifications meets the minimum hardware requirements for the 64-bit version of Windows 7? A. 2 GB RAM B. 16 GB free disk space C. DirectX 8 graphics device D. 1 GHz x86 CPU

Answer: A. 2 GB RAM

The master boot record (MBR) is an important part of the computer's boot process. What is one of the items contained in the MBR? A. A table of the computer's primary partitions B. A list of hard drive controllers inside the computer C. A summary of operating system memory locations D. A table of BIOS capabilities

Answer: A. A table of the computer's primary partitions

Which of these would prevent tailgating? A. After scanning a badge, only allow one person to enter a secure area at a time B. Computer desktops should be manually locked before leaving your desk C. Physical papers and work documents should be locked in your desk when unattended D. When connecting to the corporate network from outside the building, always use a VPN E. Require multiple factors of information when authenticating

Answer: A. After scanning a badge, only allow one person to enter a secure area at a time

Which one of these capabilities is not a characteristic of dynamic disk storage? A. Allows data to be transmitted to remote disks for off-site backup B. Allows the spanning of multiple disks to create larger volumes C. Allows data to be split across physical disks (striping) D. Allows data to be duplicated across physical disks (mirroring)

Answer: A. Allows data to be transmitted to remote disks for off-site backup

Where are operating system updates managed in Mac OS? A. App Store B. System Information C. Mission Control D. System Preferences E. Spaces

Answer: A. App Store

Which of these would be a common result of using Windows ReadyBoost? A. Application loading and operations are faster B. Files on storage drive are redundant C. The BIOS boot sequence is faster D. Windows configurations can be rolled back to an earlier date E. Applications built for older operating systems can run in the latest OS version

Answer: A. Application loading and operations are faster

Which of these would be a best practice for workstation security? A. Assign rights and permissions based on groups B. Use a minimum password length of 6 characters C. Administrator rights are only assigned to IT staff and users with specific application requirements D. Passwords can contain only alphanumeric characters E. All accounts on the workstation should be enabled

Answer: A. Assign rights and permissions based on groups

Which of these of mobile device apps is commonly used when connecting to a VPN? A. Authenticator app B. Tunnel monitor C. Encryption app D. Network monitor E. Key manager

Answer: A. Authenticator app

What type of security technology uses a part of the body to provide access? A. Biometrics B. Two-factor authentication C. Smart card D. Token generator E. RFID

Answer: A. Biometrics

Which of these utilities would be the best choice for dual-booting between the Mac OS and Windows operating systems? A. Boot Camp B. Hypervisor C. App Switcher D. Toggle OS E. Boot Manager

Answer: A. Boot Camp

. Your Windows 7 workstation is not booting, and some of the error messages appear to be related to a missing or corrupted Boot Configuration Data store. Which of these would be the best way to rebuild the BCD? A. Boot the computer into the recovery console and run BOOTREC /RebuildBCD B. Boot the computer into the recovery console and copy a new version of NTLDR and NTDETECT.COM C. Boot the computer into the recovery console and run BOOTREC /fixboot c: D. Boot the computer with the original installation media and reinstall Windows 7

Answer: A. Boot the computer into the recovery console and run BOOTREC /RebuildBCD

One of your associates is troubleshooting a system, and he uses the command 'sfc.' What does this command provide? A. Checks the operating system files for corruption or modifications B. Documents the hops between two devices across the network C. Resolves an IP address from a hostname D. Locates bad sectors on the hard drive

Answer: A. Checks the operating system files for corruption or modifications

Which of these would be a characteristic of a phishing attack? A. Clickable link in an email B. Intermittent server availability C. Increased bandwidth D. Sluggish operating system

Answer: A. Clickable link in an emails

ou've built a cloud service that is used simultaneously by many different organizations. Which of the following would best describe this deployment model? A. Community B. Public C. Hybrid D. Shared E. Private

Answer: A. Community

You are adding another hard drive to a server, and you'd like to configure the drives as a single mirrored RAID array. Which Windows utility allows you to set the RAID configuration? A. Computer Management / Disk Management B. Computer Management / Removable Storage C. Computer Management / Device Manager D. Computer Management / System Tools

Answer: A. Computer Management / Disk Management

You're installing a monitor onto a Windows 7 computer, and you'd like to modify the video resolution to support the larger display. Where can you find the resolution properties? A. Control Panel / Display B. Control Panel / Device Manager C. My Computer/ Display D. Control Panel / Administrative Tools / Display

Answer: A. Control Panel / Display

Which of the following would be the best way to define granular access permissions to a Windows file? A. Define NTFS permissions for the file B. Configure access rights in Windows Firewall C. Only allow external access through a VPN D. Encrypt the file E. Use a proxy to provide access to the file

Answer: A. Define NTFS permissions for the file

Which of these would be the best way to modify the Mac OS search results? A. Define search categories in System Preferences / Spotlight B. Enable indexing in the System Utilities C. Clear the browser cache and stored data D. Update the search application signatures E. Move all personal files to an external drive

Answer: A. Define search categories in System Preferences / Spotlight

In which of these cases would you be most likely to use Task Manager? A. Determine the CPU usage of a specific application B. Gather long-term metrics on application response time C. Enable or disable a startup application D. Safely remove a USB flash drive E. Start an application in Administrator Mode

Answer: A. Determine the CPU usage of a specific application

You have been using a new USB-connected external hard drive, but you're finding that the drive letter disappears from Windows Explorer at random times. What Windows utility can provide you with the real-time status of the USB ports? A. Device Manager B. Event Viewer C. Disk Manager D. msinfo32

Answer: A. Device Manager

Which of the following Windows utilities would be the best choice to setup and configure hard drives and partitions? A. Disk Management B. Check Disk C. Defragment D. Event Log

Answer: A. Disk Management

hich of the following would be associated with a certificate of destruction? A. Documentation is provided after a third-party has disposed of storage devices B. An operating system crash log is copied to a debug server C. A receipt is provided when selling used computers D. A report is provided after a network outage E. A document is provided with new storage devices to show bad sectors

Answer: A. Documentation is provided after a third-party has disposed of storage devices

. Which of the following would best describe a Windows Workgroup? A. Each device is a standalone system with its own authentication requirements B. A single shared password allows all devices to network with each other C. All authentication credentials are stored on a centralized server D. Information can be encrypted and protected through a secure tunnel E. All printers must be on the same Workgroup

Answer: A. Each device is a standalone system with its own authentication requirements

You received a new computer as a gift, and you've installed about 30 different applications in a couple of days. Unfortunately, you now get the message "Error 44" when starting the computer, with no other references or application names. Which of these utilities would be the best choice to determine which program is giving this generic error message? A. Event Viewer B. Services C. Performance Monitor D. Disk Manager

Answer: A. Event Viewer

Which of these would you use to synchronize your Android mobile device to the cloud? A. Google account B. iCloud C. Microsoft account D. iTunes E. Amazon Cloud Services

Answer: A. Google account

In virtualization software, which of these is responsible for managing guest operating system resources? A. Hypervisor B. Virtual System Administrator (VSM) C. Windows OS Manager D. Virtualization Technology (VT) E. Virtual Memory Manager

Answer: A. Hypervisor

When looking through some Windows documentation, you find a command line utility called "dxdiag." Which of the following features can dxdiag provide? Pick two. A. Identifies video and audio components B. Tests video and audio components C. Installs and uninstalls video and audio drivers D. Tests the speed of your CPU

Answer: A. Identifies video and audio components and B. Tests video and audio components

Which of the following features are included with all editions of Windows 8.1? A. Integrated anti-virus and anti-malware B. Support for BitLocker C. Group Policy support D. Support for joining Windows Domains E. Integrated EFS file encryption

Answer: A. Integrated anti-virus and anti-malware Windows Defender is Microsoft's integrated anti-virus and anti-malware application, and it's included free with all editions of Windows 8.1

Which of these features is included with Windows 7 Home Premium? A. Internet Information Services web server B. Ability to join a Windows Domain C. Full-disk encryption with BitLocker D. Remove Desktop service E. Support for 192 GB of RAM

Answer: A. Internet Information Services web server

Which of these interface types would you use when synchronizing data on an iOS device? Pick two. A. Lightning B. 802.11 C. FireWire D. eSATA E. USB Micro-B

Answer: A. Lightning and B. 802.11

. Which of these would you expect to find in Windows Device Manager? A. List of unknown hardware B. Real-time CPU statistics C. A log of boot messages D. A list of pending operating system updates

Answer: A. List of unknown hardware

Which of the following would be the most likely reason to run the Linux ls command? A. List the contents of a directory B. Find text in a file C. Change the ownership of a file D. View the wireless network configuration E. Perform a command with elevated rights

Answer: A. List the contents of a directory

Which of the following would be common filtering points for spam? A. Local email relay B. Firewall C. Switch interface D. Internet router E. Switch trunks

Answer: A. Local email relay

What kind of IP address is 127.0.0.1? A. Loopback address B. Default Gateway C. Class C D. DNS Server

Answer: A. Loopback address

What would you type at the command line to start Remote Desktop? A. MSTSC B. REMDESK C. RDP D. RDESK

Answer: A. MSTSC

Which of these would best describe WiFi calling? A. Make calls over a wireless network using a mobile phone B. Use Skype to make traditional phone calls C. Enable VoIP protocols in your Internet router D. Connect a traditional phone to a WiFi network E. Add a VoIP phone to an existing Ethernet network

Answer: A. Make calls over a wireless network using a mobile phone

Which of these would you find in Windows Task Manager? A. Memory utilization by application B. A list of disabled hardware devices C. A log of application errors D. A schedule of tasks to be executed at a predefined time

Answer: A. Memory utilization by application

Which Mac OS feature displays all running applications into a single zoomed-out view on the desktop? A. Mission Control B. Spaces C. Spotlight D. Iconify E. Finder

Answer: A. Mission Control

What two file systems are common options when installing Windows? Pick two. A. NTFS B. FAT32 C. CDFS D. HFS+

Answer: A. NTFS and B. FAT32

What term best describes the fraudulent gathering of sensitive information through look-alike web pages? A. Phishing B. Adware C. Spam D. Trojan

Answer: A. Phishing

You have applied some read-only NTFS permissions to an important folder containing spreadsheets, and you've applied it to all users. However, a member of the accounting department connects across the network and has share permissions that allow writing to the folder. What type of access to the spreadsheet would the accounting department user ultimately have? A. Read only B. Write only C. Read and write D. No access

Answer: A. Read only

Which of these would best describe the concept of using one large set of computing resources in one geographic location? A. Resource pooling B. High availability C. Caching D. Link aggregation E. Redundancy

Answer: A. Resource pooling

You need to update the operating system and apps on your Linux machine. Which of these would be the best way to accomplish this? A. Run apt-get B. Check the App Store for updates C. Run Linux Update D. Check the Linux repository and application web pages for any updates E. Run update scripts from the original Linux installation media

Answer: A. Run apt-get

What process should you follow in Windows 8.1 to edit system configuration files? A. Run the editor as Administrator B. Start Windows 8.1 in Safe Mode C. Run the Windows Startup Repair utility D. Modify the files in System Information E. Make the changes in the Windows Registry Editor

Answer: A. Run the editor as Administrator

Which of the following protocols are used to send mail from a mobile device? A. SMTP B. POP3 C. S/MIME D. IMAP E. FTP

Answer: A. SMTP

What security feature keeps mobile apps from accessing your private information? A. Sandbox B. VPN C. On-device encryption D. Anti-virus E. Mobile device manager

Answer: A. Sandbox

Which of these data types would not commonly be synchronized between a mobile device and a standalone computer? A. Security PIN B. Contacts C. Calendar events D. eBooks E. Location data F. Social media data

Answer: A. Security PIN

Which of the following would be the best way to view the available space on a storage device? A. Select the drive properties from Windows Explorer B. Save a file from any Windows application C. Use the DISKPART command D. View the drive information from the system BIOS E. Perform a defragmentation on the storage drive

Answer: A. Select the drive properties from Windows Explorer

. Which of these would be the best choice for booting your system into a minimal safe mode? A. System Configuration B. Device Manager C. Startup Manager D. Performance Monitor E. Windows Services

Answer: A. System Configuration

You have just installed a new application on your Windows 7 computer and you've rebooted to complete the setup process. Unfortunately, your system hangs immediately after login at a black screen. The only way to gain control of the system is to power cycle the computer. Which of these tools would provide the easiest way to return your computer to its previous configuration? A. System Restore B. Windows Backup C. Add/Remove Programs D. Windows Setup

Answer: A. System Restore

Which of these would be the best choice for examining real-time system statistics, such as CPU utilization and memory usage? A. Task Manager B. Event Viewer C. Windows Services D. Task Scheduler

Answer: A. Task Manager

One of your customers has a set of reports that needs to be generated on the 15th of every month. Which of these Windows utilities would allow the automation of this report generation? A. Task Scheduler B. Task Panel C. Task Manager D. Task Connection

Answer: A. Task Scheduler

Which of these utilities would you expect to find in the default Windows Computer Management console? A. Task scheduler B. Windows Easy Transfer C. Print Management D. Windows Firewall

Answer: A. Task scheduler

You are using Windows Vista to share a printer that is directly connected to your computer. However, other people on the network are not able to print to your printer. You can print normally to your local printer and to other printers on the network. Which of these would be the most likely issue? A. The Windows Firewall is enabled B. Your anti-virus program is enabled C. Your anti-spyware program is enabled D. Your IP addressing is incorrect

Answer: A. The Windows Firewall is enabled

What would you commonly expect if too many invalid login attempts are made to Windows Domain credentials? A. The account will be administratively locked B. The login device will be blocked from making any additional login attempts C. The account will be automatically deleted D. A message will be sent to the system administrator E. The device that's authenticating will automatically shut down

Answer: A. The account will be administratively locked

Which of these would best describe an embedded system? A. Timecard system B. Mail server C. IPS D. Web server E. Authentication server

Answer: A. Timecard system. An embedded system does not commonly allow access to the operating system of the devices. Systems such as alarm systems, door security, and timecard systems are common examples of embedded systems

What type of security technology is commonly active when security token generators are used? A. Two-factor authentication B. Anti-malware C. Strong encryption D. Hashing

Answer: A. Two-factor authentication

Which of the following criteria does the Windows Firewall use to allow or disallow network communication? Pick two. A. UDP port B. OS version C. Geographic location D. Application name

Answer: A. UDP port and D. Application name

Which of these physical connectors would you expect to find on a cable used to synchronize information to an Android device? Pick two. A. USB Standard Type A B. USB Micro-B C. Lightning D. 30-pin E. Thunderbolt

Answer: A. USB Standard Type A and B. USB Micro-B

You're currently running Windows Vista Home Premium, and you'd like to run Windows 7 Ultimate. Assuming your hardware is sufficient to run Windows 7 Ultimate, what's the best way of moving from Vista Home Premium to Windows 7 Ultimate? A. Upgrade directly from Windows Vista Home Premium to Windows 7 Ultimate B. Backup all of your documents and load Windows 7 Ultimate as a clean install C. Install Windows 7 Ultimate onto a new partition and dual-boot D. Install Windows 7 Ultimate on a new computer and migrate your settings from the Windows Vista Home Premium computer

Answer: A. Upgrade directly from Windows Vista Home Premium to Windows 7 Ultimate

A customer has accidentally deleted some operating system files from the root of his hard drive, and he's brought the system to you. The system will not boot. Which of the following would be the best way to investigate the extent of the damage? A. Use the Windows Recovery Command Prompt B. Launch Safe Mode C. Use "Last Known Good Configuration" D. Use Automated System Recovery

Answer: A. Use the Windows Recovery Command Prompt

You need to upgrade a large number of computers on your corporate network to Windows 8.1. What Microsoft utility can assist you with a large-scale automated upgrade? A. User State Migration Tools B. Files and Settings Transfer Wizard C. Windows Easy Transfer D. Windows Backup and Restore

Answer: A. User State Migration Tools The User State Migration Tools of ScanState.exe and LoadState.exe can assist in the creation and migration of user files and settings when upgrading an operating system. These tools are designed to be used in automated environments where many systems must be upgraded automatically.

Which of these does Windows HomeGroup allow you to share? Pick two. A. Vacation photos B. Monthly operating system updates C. Firewall settings D. Classical music library E. User account settings

Answer: A. Vacation photos and D. Classical music library

In which of these cases would you be most likely to use Windows Performance Monitor? A. View a 24-hour graph of drive read and write statistics B. Identify which application is using the most CPU utilization C. Restart the print spooler D. Change the list of applications that launch during startup E. View your hard drive S.M.A.R.T. information

Answer: A. View a 24-hour graph of drive read and write statistics

Which of these functions would commonly be performed from the Computer Management console? A. View the events that occurred on the last system boot B. Repair a volume boot record C. Add a BIOS startup password D. Configure DHCP settings E. Check the Windows operating system for corrupted files

Answer: A. View the events that occurred on the last system boot

Which of these Windows features provides volume backups while Windows is running? A. Volume Snapshot Service B. System Restore C. File Properties D. Smart Cache

Answer: A. Volume Snapshot Service

You need to upgrade your Windows Vista Business workstation to Windows 7. Which of these Windows 7 editions would be valid upgrade paths? Pick two. A. Windows 7 Ultimate B. Windows 7 Business C. Windows 7 Professional D. Windows 7 Home Premium

Answer: A. Windows 7 Ultimate and C. Windows 7 Professional

Your organization has upgraded one of your older Windows XP systems to Windows 8.1, but you've found that an important application no longer works properly in the new operating system. Which of the following Windows 8.1 features might help you resolve this issue? A. Windows Compatibility Mode B. Windows Version Detection C. MSCONFIG D. Task Manager

Answer: A. Windows Compatibility Mode

One of your clients has deleted a critical system file from the Windows boot partition, and now the operating system won't start. Which of these options provides you with the best method to replace the files? A. Windows Recovery Environment B. Safe Mode C. Automated System Recovery D. Last Known Good Configuration

Answer: A. Windows Recovery Environment

Which of these operating systems can be upgraded in-place to Windows Vista Business? A. Windows XP Home B. Windows XP Professional x64 C. Windows 2000 D. Windows XP Media Center

Answer: A. Windows XP Home Windows XP Home and the 32-bit version of Windows XP Professional can both be upgraded to Windows Vista Business.

Which of these are commonly seen when the speed and duplex is mismatched on an Ethernet link? Pick two. A. You'll have poor throughput B. Only half of the data will be received C. You won't see a link light D. File transfers will randomly be corrupted E. Some web sites will be accessible and others will not

Answer: A. You'll have poor throughput and C. You won't see a link light

One of your customers would like to have their Windows 8.1 user documents backed up onto an external hard drive. Where would you find the customer's documents? A. \Users B. \Windows C. \My Documents D. \Documents and Settings

Answer: A. \Users

What is the default directory for user files in Windows Vista? A. \Users B. \Documents and Settings C. \My Documents D. \User Files

Answer: A. \Users

. What utility can correct file system integrity problems? A. chkdsk B. defrag C. format D. msconfig

Answer: A. chkdsk

Which of these command lines will copy a file and overwrite any destination files with the same name, without any message or warning? A. copy /y temp.doc \temp B. copy /v temp.doc \temp C. copy temp.doc \temp /ignore D. xcopy temp.doc \temp

Answer: A. copy /y temp.doc \temp

Which Windows command line utility provides you with an easy method of modifying the applications that load during startup? A. msconfig B. msinfo32 C. dxdiag D. regedit

Answer: A. msconfig

Which of these commands is used to view Windows shared resources on the local computer? A. net share B. net use C. net resource D. net folder E. net cache

Answer: A. net share

Which of the following would be the best way to shutdown a Windows computer after a 60-second delay? A. shutdown /s /t 60 B. halt /s /t 60 C. restart /s /t 60 D. reboot /in 60 E. power /s /t 60

Answer: A. shutdown /s /t 60

How much graphics memory is required to install Windows Vista Business? A. 32 MB B. 128 MB C. 512 MB D. 1 GB

Answer: B. 128 MB

What is the minimum amount of graphics card memory required for Aero? A. 64 MB B. 128 MB C. 256 MB D. 512 MB

Answer: B. 128 MB

Which of these would best describe a biometric access mechanism? Pick two. A. The outline of a door key B. A fingerprint C. A four digit PIN D. Voice recognition E. A physical access card F. A pseudo-random token generator

Answer: B. A fingerprint and D. Voice recognition

Which of these can devmgmt.msc tell you about your computer? A. The number of installed applications B. A list of hardware that may be missing a driver C. The number of uninstalled OS patches D. A list of IP routes known by your computer E. A list of devices discovered across the local network

Answer: B. A list of hardware that may be missing a driver

Which of the following would best describe virtual memory? A. Memory that is only used in virtual machines B. A section of the hard drive that behaves similar to physical memory C. Memory that is not seen by the operating system D. Memory that does not contain executable programs

Answer: B. A section of the hard drive that behaves similar to physical memory

You've been asked to upgrade a user's workstation from Windows Vista to Windows 7 with a clean install. What does this mean? A. All files remain in place during the upgrade and a clean desktop is provided on the upgraded system B. All data is wiped from the drive and a new version of the operating system is installed C. All user-installed applications must be removed before the upgrade D. The existing registry must be cleaned before the upgrade

Answer: B. All data is wiped from the drive and a new version of the operating system is installed

Which of these would be commonly associated with a Windows service? A. Media player B. Anti-virus scanner C. Downloading a file from a browser D. Multiplayer network-based game E. Word processor

Answer: B. Anti-virus scanner

Which of the following features would you find exclusively in Windows 8.1 Enterprise? Pick two. A. BitLocker B. AppLocker C. BranchCache D. Windows Media Player E. Domain Membership

Answer: B. AppLocker and C. BranchCache

Which of these would be considered an untrusted software source? A. Applications from well-known publishers B. Applications from third-party sites C. Digitally-signed applications D. Applications created internally

Answer: B. Applications from third-party sites

Which of these would be a benefit of using VSS? Pick two. A. Faster storage read and write times B. Backup Windows volumes while the OS is running C. Better network response time D. More efficient memory use for multimedia applications E. Real-time access to previous document versions

Answer: B. Backup Windows volumes while the OS is running and E. Real-time access to previous document versions

Which of these best describes a rootkit? A. Replicates itself without any human intervention B. Can be invisible to the operating system C. Tricks the user into providing private information D. Controlled from a central network source E. Encrypts drive contents and requires payment to decrypt

Answer: B. Can be invisible to the operating system

Which of these would be a common function from the Computer Management console? A. Restore the master boot record B. Change a local user's password C. Modify the BIOS device boot sequence D. Add a Windows Firewall rule E. Update the Windows operating system file

Answer: B. Change a local user's password The Computer Management console includes many administrative tools, such as Task Scheduler, Event Viewer, Device Manager, and Local Users and Groups.

You often use the separate management utilities available under Administrative Tools, but you'd like to use a centralized management view rather than individual icons. Where would you find a consolidated point for most operating system administrative management functions? A. Control Panel B. Computer Management C. Start Menu D. System Tray

Answer: B. Computer Management

Which of these utilities consolidate the Task Scheduler, Event Viewer, Performance, Device Manager, and other administrative tools into a single "pane of glass?" A. System Configuration B. Computer Management C. Local Security Policy

Answer: B. Computer Management Computer Management is a predefined set of administrative utilities that have been consolidated into the Microsoft Management Console framework.

Which of the following would be the best way to manage all login credentials from a centralized location? A. Use the NTFS file system on all volumes B. Configure an authentication server C. Require a proxy server between the users and network resources D. Use both passwords and a pseudo-random number code during login E. Use a single operating system across all devices

Answer: B. Configure an authentication server

Which of the following would be the best way to protect a laptop from physical theft when outside of the office? A. Require a secondary factor of user authentication B. Connect the laptop to a cable lock C. Make sure all operating system patches are installed D. Use a VPN on all external networks E. Keep your anti-virus signatures updated

Answer: B. Connect the laptop to a cable lock

Which of the following would be the best way to share personal documents across multiple Mac OS and iOS systems? A. Synchronize all devices to a single computer B. Connect to iCloud in all of the operating systems C. Use OneDrive to synchronize all files D. Perform periodic backups of all devices E. Use the Apple App Store to manage all applications

Answer: B. Connect to iCloud in all of the operating systems

Which of these would be the best choice for configuring the Windows indexing options? A. Windows Firewall B. Control Panel / Folder Options C. Disk Management D. Control Panel / System E. Control Panel / Internet Options

Answer: B. Control Panel / Folder Options

You're running a legacy application in Windows 7 that needs access to the registry, and this access causes the User Account Control Secure Desktop prompt to appear. Unfortunately, the application doesn't operate properly when the UAC messages appear. Which of these would be a method of modifying an individual user's UAC configuration? A. Control Panel / User Account Control B. Control Panel / User Accounts C. Control Panel / Administrative Tools / Computer Management D. Control Panel / Administrative Tools / User Account Control

Answer: B. Control Panel / User Accounts

Which of these would best describe the effect a degausser would have on a hard drive? A. Remove all encrypted files B. Delete all data and render the drive unusable C. Delete all duplicate files D. Delete all data and prepare the drive for a fresh OS install E. Delete data in unused drive sectors

Answer: B. Delete all data and render the drive unusable

You are trying to use a new webcam by plugging it into your USB port, but your new webcam software doesn't find any cameras connected to your computer. Which of these Windows utilities would be the best source of information about your new webcam? A. Control Panel / System B. Device Manager C. Disk Manager D. msconfig

Answer: B. Device Manager

You need to erase and reformat a used USB flash drive. Which of these Mac OS utilities would be the best choice for this task? A. Storage Control B. Disk Utility C. USB Tools D. System Information E. Drive Center

Answer: B. Disk Utility

Where is user information stored in a Windows Workgroup? A. On the master Active Directory server B. Each computer maintains unique user information C. In an LDAP database D. A portion of the master Workgroup database is maintained on each computer

Answer: B. Each computer maintains unique user information

Which of the following would be considered open-source? A. Windows Mobile B. Google Android C. Apple Mac OS D. Windows 8.1 E. Apple iOS

Answer: B. Google Android

Which of these would you expect to find in a user's account profile? A. Smart card information B. Group memberships C. Password hash D. PIN code

Answer: B. Group memberships

What mobile identifier is associated with a user on a mobile network and can be moved between phones? A. PRL B. IMSI C. PRI D. NPA E. IMEI

Answer: B. IMSI The IMSI (International Mobile Subscriber Identity) is used to associate a mobile account with a device. You can use the SIM card to move the IMSI from one device to another.

Which of these would be the best description of social engineering? A. Guessing a password based on the most common options B. Impersonating a help desk technician over the phone C. Installing malware that is invisible to the operating system D. Malware that self-replicates between computers E. Viewing another user's computer screen from a distance

Answer: B. Impersonating a help desk technician over the phone

You're installing a new adapter card, and you have a device driver CD that was shipped with the adapter card. When you visit the adapter card web site, you find a newer driver has been released. What is the best way to proceed? A. Install the driver that shipped with the card B. Install the driver from the web site C. Install the driver from the web site, then the one that shipped with the adapter card D. Don't install any drivers manually; Windows will install the drivers automatically

Answer: B. Install the driver from the web site

Which of the following would be the best reason not to use WPS on your wireless router? A. The WPS process contains a cryptographic vulnerability B. It's easy to brute force the WPS PIN C. WPS is only available for Windows devices D. The WPS process is too complex for most people E. WPS only protects outgoing traffic

Answer: B. It's easy to brute force the WPS PIN

What does autorun do? A. Starts the operating system from the boot loader B. Launches a program when a removable storage devices is connected C. Automatically loads previously closed tabs when a browser is started D. Starts the cooling fan when the internal temperature reaches a threshold

Answer: B. Launches a program when a removable storage devices is connected

Which of the following describes the process of closely tracking costs and utilization metrics? A. Cost accounting B. Measured service C. Budgeting D. SaaS E. Quality of service

Answer: B. Measured service

hich of these would be best practices for creating complex passwords? Pick two. A. Use single words B. Mix upper and lower case C. Use special characters D. Use 7 characters or fewer E. Use something you can remember, i.e., child or pet name

Answer: B. Mix upper and lower case and C. Use special characters

What type of laptop communication interface allows you to communicate to the Internet from nearly any remote location? A. WiFi B. Mobile broadband C. Bluetooth D. Ethernet

Answer: B. Mobile broadband

What would you expect to receive during a PRL update? A. A list of available 802.11 wireless networks B. Mobile device connectivity information C. Operating system security patches D. A list of available network printers E. Updated device drivers

Answer: B. Mobile device connectivity information

Which of these would a mantrap prevent? A. Simultaneous logins from multiple locations B. More than one person through an entrance at a time C. Database injection attacks from outside of the network D. Inappropriate use of company assets

Answer: B. More than one person through an entrance at a time

Which of these is most associated with the 802.1X standard? A. Ethernet topology B. Network Access Control C. Ethernet trunking D. Spanning Tree Protocol

Answer: B. Network Access Control

Which of the following would not be true of a VPN concentrator? A. Includes specialized cryptographic software B. Only available as a hardware appliance C. Can often use built-in software on the end station D. Encrypts and decrypts all data traversing the concentrator

Answer: B. Only available as a hardware appliance

. Which of these would be the best choice for retrieving mail on a mobile device? Pick two. A. SMTP B. POP3 C. IMAP D. SNMP E. SMAIL

Answer: B. POP3 and C. IMAP

Which of the following would be a common practice when using patch management? A. Patches and updates are installed immediately after release B. Patches are tested and then scheduled for deployment C. Operating system patches always take priority over application patches D. Minor patches are often skipped for efficiency E. Patches are commonly deployed during production hours

Answer: B. Patches are tested and then scheduled for deployment

Which of these would be most associated with NFC? A. Receive emergency messages on your mobile device B. Pay for groceries with your phone C. Get assistance by talking to your phone D. Make phone calls over a WiFi connection E. Get turn-by-turn directions

Answer: B. Pay for groceries with your phone

One of your Windows 7 computers has worked just fine for months, but it's now hanging just after the login screen. Over the last week, you've added a number of new applications, a new wireless keyboard, and a new external USB drive. Which of the following would be the best first step to recover from this problem? A. Wipe the drive and perform a clean install B. Perform a System Restore from either safe mode or from the Windows 7 installation media C. Restore the operating system and use files from a backup D. Use the Windows 7 installation media to perform an in-place installation over the existing Windows 7 installation

Answer: B. Perform a System Restore from either safe mode or from the Windows 7 installation media

Which of the following would be the best way to ensure the recoverability of your data? A. Implement RAID 5 arrays in your server B. Perform scheduled backups C. Provide ongoing monitoring of S.M.A.R.T. statistics D. Enable dual-booting to different operating system versions E. Enable the Windows File History feature

Answer: B. Perform scheduled backups

The theft of personal information is a widespread problem for network security professionals. What's the most common method for tricking a user into divulging their personal account details? A. Spam B. Phishing C. Social engineering D. Spyware E. Trojan horse

Answer: B. Phishing

What kind of server would use IPP? A. Web server B. Print server C. DHCP server D. Proxy server E. Mail server

Answer: B. Print server

You're troubleshooting a computer, but you're not sure if the problem is related to the display device or the operating system. What Windows utility can perform a series of video output tests? A. regedit B. dxdiag C. msinfo32 D. msconfig

Answer: B. dxdiag

n which of these scenarios would you most likely use DSCP? A. Automatically assign IP addresses B. Prioritize network traffic C. Resolve an IP address from a fully qualified domain name D. Prevent loops on a switched network E. Dynamically route around network problems

Answer: B. Prioritize network traffic

In Windows 7, which of these would delete all data from a hard drive so that the data was unrecoverable? A. DISKPART B. Regular format C. FDISK D. Quick format

Answer: B. Regular format

What would you commonly secure with BitLocker To Go? A. Windows system volumes B. Removable USB flash drives C. DVD-ROM volumes D. VPN connections E. Laptop storage drives

Answer: B. Removable USB flash drives

Which of the following would be a characteristic of a GUID partition? A. Limited to 4 GB file sizes B. Requires a UEFI BIOS C. Supports 256 primary partitions D. Can only be used on Windows Ultimate or Enterprise editions

Answer: B. Requires a UEFI BIOS

A device driver upgrade has prevented your system from properly booting. Which of these methods would be the best recovery option? A. Start the recovery Command Prompt and run BOOTREC /FIXMBR B. Run System Restore from the Advanced Boot Options C. Run a Windows repair installation D. Change the BIOS to boot from the DVD-ROM drive E. Recover the operating system to factory defaults

Answer: B. Run System Restore from the Advanced Boot Options

One of your computers has been experiencing ongoing graphical problems with an application that displays very detailed electronics schematics. Which of these options would be your best next step to help resolve this issue? A. Reinstall Windows from scratch to remove any possible conflict B. Run dxdiag to check for any driver issues C. Use msconfig to disable every startup application D. Uninstall the application and install the previous version to check for differences

Answer: B. Run dxdiag to check for any driver issues

Which of the following would be the most likely use of the Linux tar utility? A. Copy files from one directory to another B. Scheduled data backup C. Change the name of a directory D. Modify the default startup device E. Check a storage device for logical errors

Answer: B. Scheduled data backup

In Windows Vista and Windows 7, which of these events would normally activate a User Account Control prompt? A. Starting the Event Viewer B. Scheduling a Backup task C. Viewing the Task Manager D. Launching the Windows Firewall GUI

Answer: B. Scheduling a Backup task

Which of the following Mac OS features allows you to configure multiple independent desktops? A. Desktopper B. Spaces C. App Switcher D. Desktop Central E. Switchtop

Answer: B. Spaces The Spaces feature of Mac OS gives you a way to set up multiple desktops and easily switch from one to the other.

Which of the following categories of malware is designed to monitor your surfing habits? A. Worm B. Spyware C. DDoS D. Shoulder surfing E. Spoofing

Answer: B. Spyware

Which of the following would be the best way to view device driver information in Mac OS? A. Mission Control B. System Information C. System Preferences / General D. Driver Manager E. System Tools

Answer: B. System Information

Which Windows utility is the best choice for monitoring real-time global memory usage? A. Performance Monitor B. Task Manager C. Device Manager D. Event Log

Answer: B. Task Manager

One of your customers has an internally written application that manages inbound file transfers from remote locations. After upgrading their computer to Windows 7, the application stops working and remote clients are complaining that their file transfers are rejected before they even start. Which of these is the most likely cause of this issue? A. The application is licensed only for Windows XP B. The Windows Firewall is blocking the application C. The hard drive is out of disk space D. The end users must also upgrade their operating systems to Windows 7

Answer: B. The Windows Firewall is blocking the application

You have installed a new wireless mouse, but you can't seem to get the mouse to operate properly. When you access the Windows Device Manager, you find that the new mouse is listed without any unusual icon or message next to the name of the mouse. What can you infer from the Device Manager status? A. The device driver is for a different model of mouse B. The device driver is loading properly C. The device driver is missing D. The device driver has failed during the loading process

Answer: B. The device driver is loading properly

One of your associates is using Windows Vista Ultimate, but she is experiencing poor performance and slowdowns. She is using a laptop with a 1 GHz processor, 512 MB of RAM, and 40 GB of free disk space. Which of these would be true about this configuration? A. The processor does not meet the recommended requirements B. The memory size does not meet the recommended requirements C. The hard drive does not have enough free disk space D. Windows Vista Ultimate is not supported on laptop computers

Answer: B. The memory size does not meet the recommended requirements

Which of these would you expect to find in the Windows Local Security Policy? Pick two. A. A log of failed login attempts B. The minimum password length C. The behavior of User Account Control prompts D. The hash algorithm used for NTFS file encryption E. The number of files allowed in a single subdirectory

Answer: B. The minimum password length and C. The behavior of User Account Control prompts

What is the significance of a dollar sign ($) at the end of a network share? A. The share is given priority over other shares B. The share is hidden from the network browser C. The share is marked as read-only D. The share is used by the operating system for administrative purposes

Answer: B. The share is hidden from the network browser

Which of these best describes the policy of least privilege? A. A safe combination is shared among multiple people B. The shipping department is able to view orders but not modify orders C. All key owners must be present to option a lockbox D. A security audit is performed at regular intervals E. A network administrator has configuration rights to all switches and routers

Answer: B. The shipping department is able to view orders but not modify orders

Which of these Windows technologies use flash memory to increase the speed of the operating system? A. Disk Defragmenter B. DNS Caching C. ReadyBoost D. Prefetching

Answer: C. ReadyBoost

Which of these would be the result of SSID broadcast suppression? A. All wireless data will be encrypted B. The wireless network will not appear in the list of available networks C. Non-authenticated users will not be able to connect to the wireless network D. The network will be configured as an open wireless network E. Large bandwidth wireless transfers will be restricted

Answer: B. The wireless network will not appear in the list of available networks

You would like to improve the security on your network by adding an additional authentication requirement to access network resources, especially over a VPN. What's the best network security technology to address this requirement? A. BIOS passwords B. Token generators C. Software firewalls D. Require NTFS file systems

Answer: B. Token generators

Which of these would commonly be identified by DLP? A. Known operating system vulnerabilities B. Unencrypted credit card numbers C. Unauthorized web site URLs D. Port scans E. Zero-day vulnerabilities

Answer: B. Unencrypted credit card numbers

One of your executives has asked you to remove a sensitive file from your server, and the removal must not be reversible. What is the most efficient and effective way to ensure that this file cannot be recovered? A. Format the entire volume and reload the data B. Use a secure file delete utility C. Remove all permissions from the file and delete it normally D. It is not possible; files can always be recovered from disk

Answer: B. Use a secure file delete utility

Which of the following would be the best way to update a text-based configuration file in Linux? A. Run notepad B. Use vi C. Delete the configuration file and run the installation script D. Use FTP to transfer and edit the file on another computer E. Boot Linux into single user mode

Answer: B. Use vi

Which of the following would be the best use of a virtual assistant? A. Update the operating system on a mobile device B. Use voice commands to set a timer C. Write a weekly status report while you check emails D. Distribute an application update to your internal servers E. Sort all incoming mail shipments

Answer: B. Use voice commands to set a timer

Which of these security features would prevent a computer from booting an operating system without the correct password? A. Windows Login Screen B. User BIOS password C. Encrypting File System D. NTFS

Answer: B. User BIOS password

. Which of these would be the best use of Task Manager? A. Track CPU utilization across a full work week B. View the memory utilization of an application C. Determine the space utilization of a storage device D. View a list of installed applications E. View a list of operational and non-operational hardware device

Answer: B. View the memory utilization of an application

You're configuring a wireless access point, and you want to be sure your communications are secure. Which wireless configuration setting can render your network communication unreadable to others? A. SSID broadcast B. WPA2 C. MAC filtering D. Channel/Frequency

Answer: B. WPA2

What kind of service responds to browser requests? A. File server B. Web server C. Print server D. DNS server E. DHCP server

Answer: B. Web server

Which of these Windows 7 editions can provide full disk encryption? A. Windows 7 Professional B. Windows 7 Enterprise C. Windows 7 Home Premium D. Windows 7 Starter

Answer: B. Windows 7 Enterprise

Which of these operating systems can be directly upgraded to Windows 7 Professional with an in-place upgrade? A. Windows XP Media Center B. Windows Vista Business C. Windows XP Professional D. Windows Vista Ultimate

Answer: B. Windows Vista Business

In which of these would you find Aero? Pick three. A. Windows XP Media Center B. Windows Vista Business C. Windows XP Ultimate D. Windows 7 Ultimate E. Windows XP 64-bit Professional F. Windows 7 Professional

Answer: B. Windows Vista Business and D. Windows 7 Ultimate and F. Windows 7 Professional

Which of these versions of Windows Vista provide Active Directory support? Choose all that apply. A. Windows Vista Home Basic B. Windows Vista Enterprise C. Windows Vista Ultimate D. Windows Vista Business E. Windows Vista Home Premium

Answer: B. Windows Vista Enterprise, C. Windows Vista Ultimate, and D. Windows Vista Business

Which of these operating systems cannot be upgraded to Windows 8? A. Windows 7 Starter B. Windows Vista Ultimate C. Windows 7 Home Premium D. Windows 7 Ultimate

Answer: B. Windows Vista Ultimate

Which of these Windows Vista editions support BitLocker? Pick two. A. Windows Vista Home Premium B. Windows Vista Ultimate C. Windows Vista Business D. Windows Vista Enterprise

Answer: B. Windows Vista Ultimate and D. Windows Vista Enterprise

Which of these is most associated with a WWAN? A. WAP2 encryption B. Wireless provider C. SSID broadcasts D. VPN concentrator E. Integrated web server

Answer: B. Wireless provider

Which of these situations would be the best use of BitLocker? A. You need to prevent access to a spreadsheet in the public shared folder B. You have a USB flash drive that needs to be unreadable by others C. You need to copy an encrypted presentation onto a DVD-ROM with other non-encrypted files D. You need to create a series of hidden shares for a top-secret project

Answer: B. You have a USB flash drive that needs to be unreadable by others

In which of these situations would you NOT use MSCONFIG? A. You need to troubleshoot programs that start during the boot process B. You need to configure a drive partition C. You need a central point to launch other tools, such as the registry editor. D. You need to disable certain services from starting

Answer: B. You need to configure a drive partition

In which of these cases would you be most likely to implement a Windows HomeGroup? A. You need a drive array that displays all of the drives in your home as a single group B. You need to share files with everyone in the house C. You need to connect from a remote device to a computer in your home D. You need to upgrade all of your systems at home as a single group E. You need a wireless network for everyone in your house

Answer: B. You need to share files with everyone in the house

Where are most of the operating system files stored in Windows 7? A. \Users B. \Windows C. \System D. \OS7 E. \System32

Answer: B. \Windows

You need to copy a file from the Windows installation media, but the contents of the install DVD contain Microsoft's compressed files. What command line utility allows you to decompress the files that are stored on the installation media? A. uncompress.exe B. expand.exe C. unzip.exe D. extract.exe

Answer: B. expand.exe

Which of the following Linux commands would be the best choice to find a specific serial number inside of a group of files? A. find B. grep C. locate D. yum E. vi

Answer: B. grep

You are concerned that a virus has corrupted some of your system files. Which command line utility can check system file integrity? A. net B. sfc C. format D. fsc

Answer: B. sfc

Which of these commands would you be most likely to use in Linux to update your operating system and applications? A. tar B. yum C. grep D. update E. patchd

Answer: B. yum

What is the minimum requirement of RAM for Windows Vista Business? A. 256 MB B. 512 MB C. 1 GB D. 2 GB E. 24 GB

Answer: C. 1 GB

What is the minimum amount of memory required to install the 32-bit version of Windows 7? A. 512 MB B. 768 MB C. 1 GB D. 2 GB

Answer: C. 1 GB To install the 32-bit version of Windows 7, you'll need a 1 GHz processor, 1 GB of RAM, and at least 16 GB of free disk space

Which of the following hardware requirements would not meet the minimum requirements for the 32-bit version of Windows 8.1? A. 1 GHz processor B. 1 GB RAM C. 15 GB of storage space D. Microsoft DirectX 9 graphics device with WDDM driver

Answer: C. 15 GB of storage space

Which of these would you be most likely to find in Windows Performance Monitor? A. BIOS version information B. The Windows Experience Index rating C. A daily report of hard drive space utilization D. A description and status of hard drive partitions

Answer: C. A daily report of hard drive space utilization

Which of these would you need to deguass a hard drive? A. An industrial shredder B. The original Windows installation media C. A large magnet D. A drill E. None of these

Answer: C. A large magnet

Which of these would you commonly find in the Windows System Configuration utility? A. A list of applications currently loaded in memory B. Display resolution settings C. A list of services that launch automatically on startup D. Windows HomeGroup password E. A list of all network adapters

Answer: C. A list of services that launch automatically on startup

What kind of document would detail a specific set of rules for network use? A. End User License Agreement B. Statement of Work C. Acceptable Use Policy D. Shrink-wrap License E. Privacy Policy

Answer: C. Acceptable Use Policy

Which of these would be the best way to avoid showing a Windows share in a list of available resources? A. Configure Windows Firewall to filter the share name B. Modify the registry on the device hosting the share C. Add a dollar sign to the end of the share name D. Enable the "Hidden" share permission E. Disable NetBIOS over IP

Answer: C. Add a dollar sign to the end of the share name

Which of these would be the most likely result of a device driver upgrade? A. New options in the BIOS B. Faster boot times C. Additional options when printing D. More frequent notification of possible hard drive problems E. New typefaces are available in the operating system

Answer: C. Additional options when printing

Which of these would be the best reason for adding users to a Windows Group? A. Improves file server performance for a logical group of users B. Maintains a logical reporting group for Human Resources C. Allows you to simultaneously set rights and permissions across many users D. Determines which options are available on the Windows login screen

Answer: C. Allows you to simultaneously set rights and permissions across many users

here is the most common place to download applications to an iOS device? A. Apple Play B. Google Play C. Apple App Store D. From the developer's web site

Answer: C. Apple App Store

Which of the following Windows 7 commands can write a new boot sector to a partition from the Windows Recovery Command Prompt? A. FIXBOOT B. CHKDISK C. BOOTREC /FIXBOOT D. FIXMBR

Answer: C. BOOTREC /FIXBOOT

Which of these features are not part of Windows 7 Professional? A. Windows Domain membership B. Remote Desktop Host C. BitLocker Encryption D. EFS E. Internet Connection Sharing

Answer: C. BitLocker Encryption

Which of these would best describe the operation of Windows Firewall? A. Stop malware from running on the operating system B. Identify a known buffer overflow exploit C. Block remote users from accessing a shared folder D. Block the browser from viewing inappropriate web sites E. Scan the network for devices with open ports

Answer: C. Block remote users from accessing a shared folder

Which of these would best describe DNS? A. Automatically assign IP addresses B. Transfer email from server to server C. Browse the Internet by web site name D. View the screen of a remote device E. Transfer files from one device to another

Answer: C. Browse the Internet by web site name

Which of the following would you commonly block with an IPS? A. A URL category of "sports news" B. Virus infection C. Buffer overflow D. Social media posting E. Unknown malware downloads

Answer: C. Buffer overflow

Which of these characteristics best describes a Microsoft Windows domain? A. Loose structure of local devices B. Resources are managed on each individual computer C. Centralized authentication D. Designed for small- to medium-sized office

Answer: C. Centralized authentication

Which of the following shortcut keys can be used to launch the Force Quit dialog in Mac OS? A. Control-Alt-Delete B. Command-Q C. Command-Option-Escape D. Command-Start E. Option-F-Q

Answer: C. Command-Option-Escape

Which of these would be the best way to prioritize application traffic in your network adapter properties configuration? A. Configure separate NICs for each application type B. Run critical applications on IPv6 instead of IPv4 C. Configure DSCP values to match the application priorities D. Configure the important applications with a higher-priority subnet mask

Answer: C. Configure DSCP values to match the application priorities

What does the /y option do when using COPY at the command line? A. Copies the files without any attributes B. Copies the files but does not replace any existing files C. Copies the files and overwrites existing files without prompting D. Verifies that the newly copied files have been copied without errors

Answer: C. Copies the files and overwrites existing files without prompting

Which of these functions are not provided by Windows Disk Management? Pick two. A. Split a single partition into multiple partitions B. Add and configure a RAID array C. Defragment a hard drive D. Assign a drive letter to a storage device E. Rebuild a storage device's master boot record

Answer: C. Defragment a hard drive and E. Rebuild a storage device's master boot record

Which of these Windows utilities would be the best choice for determining the installed version of a video card driver? A. Task Manager B. Event Viewer C. Device Manager D. Performance Monitor

Answer: C. Device Manager

What kind of attack breaks into a system by trying the most common passwords? A. Man-in-the-middle B. Denial of service C. Dictionary attack D. Spoofing E. Rootkit

Answer: C. Dictionary attack

Which of these would be the best way to enable manual IP addressing on a SOHO network? A. Create a pool of IP address in the wireless router B. Configure each device to be in a different VLAN C. Disable DHCP on the wireless router D. Configure NAT on the SOHO router E. Build a separate DMZ network for all servers

Answer: C. Disable DHCP on the wireless router

Which of these would best describe a file system that is natively supported in Windows 2000 and newer and supports 2 TB volume sizes and a maximum file size of 4 gigabytes? A. FAT B. NTFS C. FAT32 D. CDFS

Answer: C. FAT32

Which of the following would provide services over SMB or AFP? A. Proxy server B. DNS server C. File server D. IPS E. Authentication server

Answer: C. File server

Which of these would be most likely to proxy network traffic? A. Anti-virus software B. NTFS file permissions C. Firewall D. Anti-malware software E. IPS

Answer: C. Firewall

Where are the core set of Linux device drivers located? A. In the system BIOS B. In the /etc directory C. In the Linux kernel D. On the boot sector of the system drive E. Linux doesn't use device drivers

Answer: C. In the Linux kernel

Which of the following would be the best way to avoid infecting a mobile device with malware? A. Only install APK files B. Sideload all mobile device applications C. Install apps from the mobile device app store D. Only install apps that have been emailed directly to you E. Download the app from a non-curated website

Answer: C. Install apps from the mobile device app store

Which of the following should be the first step after a fresh installation of Windows 7? A. Install all required applications B. Perform an upgrade of storage and/or RAM C. Install security patches D. Pair with any Bluetooth devices E. Perform a full system backup

Answer: C. Install security patches

In which of these cases would you most likely use MSTSC? A. Manage jobs on network printers B. Rebuild the system MBR C. Manage a remote device D. Reset Windows to factory defaults E. Select programs that run during system startup

Answer: C. Manage a remote device

To which of the following would you commonly connect when tethering your computer? A. WiFi network B. VoIP network C. Mobile phone D. Ethernet network E. Bluetooth

Answer: C. Mobile phone

Which of the following would be the best way modify the duplex setting of the Ethernet adapter in Windows 7? A. Update the Ethernet adapter device driver B. Start the computer in Safe Mode C. Modify the adapter settings in Control Panel / Network and Sharing Center D. Change the duplex setting in the BIOS E. Modify the Windows Registry

Answer: C. Modify the adapter settings in Control Panel / Network and Sharing Center

Which of these file permissions would apply to someone local on a computer as well as someone connecting to the computer over the network? A. Share B. Ethernet C. NTFS D. TCP/IP

Answer: C. NTFS

Your computer has a 1 GHz processor, 1 GB of RAM, and 10 GB of free disk space. Can these components support the minimum requirements for Windows Vista Ultimate? A. No, the processor doesn't meet minimum specifications B. No, the memory doesn't meet minimum specifications C. No, the free disk space doesn't meet minimum specifications D. Yes, these components meet the minimum requirements for Windows Vista

Answer: C. No, the free disk space doesn't meet minimum specifications

On a single MBR-partitioned hard drive, you have created three primary partitions. You have also created an extended partition that contains two logical partitions. Which of these statements would be true of the logical partitions? A. There can only be four logical partitions per physical disk B. The logical partitions cannot be partitioned with the NTFS file system C. Operating systems loaded onto logical partitions are not bootable D. One of the logical partitions can be marked as active

Answer: C. Operating systems loaded onto logical partitions are not bootable

Over the last week, you've installed some new software, upgraded your video card drivers, and updated some existing applications. You are now having intermittent performance problems, and you would like to revert back to your old configuration. What is the easiest way to change your configuration back to the way it was a week ago? A. Rebuild the system from a recent backup B. Uninstall the software and drivers in reverse order C. Perform a System Restore D. Reinstall Windows from the original installation media

Answer: C. Perform a System Restore

You're troubleshooting an intermittent problem in Windows, and you need to capture a series of system metrics over two days. Which of these utilities would be the best choice for this? A. Statistics Monitor B. Event Log C. Performance Monitor D. Task List E. Data Sources

Answer: C. Performance Monitor

Which of the following would be most associated with the NX bit? A. Enhanced encryption support B. Booting to multiple operating systems C. Protection against malicious software D. Virtualization support E. Enhanced graphics support

Answer: C. Protection against malicious software

Which Windows 7 account provides the highest level of access? A. Admin B. Root C. Power User D. Administrator E. Super User

Answer: D. Administrator

Which of the following would be the best choice for repairing a master boot record in Windows Vista? A. Run FIXMBR from a command prompt with administrative rights B. Run BOOTREC /FIXBOOT from the Windows Recovery Command Prompt C. Run BOOTREC /FIXMBR from the Windows Recovery Command Prompt D. Use DISKPART to rebuild the MBR

Answer: C. Run BOOTREC /FIXMBR from the Windows Recovery Command Prompt

Which of these would be the best choice for monitoring storage devices? A. RAID B. SATA C. S.M.A.R.T. D. SSD E. SAN

Answer: C. S.M.A.R.T.

. Which of the following would be commonly seen in the output of the iwconfig command? A. Default route B. Volume storage space C. SSID name D. Duplex setting E. QoS statistics

Answer: C. SSID name

Which of these configuration settings is most associated with an 802.11 wireless network? A. DHCP server address B. Tunnel peer IP address C. SSID name D. Duplex setting

Answer: C. SSID name

Which of these would best describe a provider that offers on-demand applications with no requirement of local installation or hardware costs? A. IaaS B. ISP C. SaaS D. WAN E. LEC

Answer: C. SaaS Software as a Service (SaaS) is a common way to take advantage of applications without the requirement of hardware costs or on-site software installations

Where in Windows can you find a list of dependencies that might exist between services? A. Event Manager B. Task Manager C. Services D. Performance Monitor

Answer: C. Services

Which of the following is enabled when logging into Windows 8.1 with a Microsoft account instead of a local account? A. Screen sharing is automatically enabled across multiple PCs B. Powering off one computer will also power down other logged in devices C. Settings are synchronized across multiple computers D. Windows Domain features are automatically used

Answer: C. Settings are synchronized across multiple computers

Your company has just digitally imaged a year of corporate tax documents. Which of these would be the best way to dispose of the paper copies? A. Personally take the paper copies to the garbage bin B. Dispose of the paper at an off-site garbage facility C. Shred the paper documents D. Leave the documents with building security

Answer: C. Shred the paper documents

Which of the following are not common methods of unlocking the screen of a mobile device? A. Fingerprint B. Passcode C. Smart card D. Face recognition E. Swipe pattern

Answer: C. Smart card

During a normal workday, you receive a call at your desk asking for information about a recently submitted help desk ticket. Two things are remarkable about this particular call; you notice that the call is coming from an outside line, and you don't have any recent help desk tickets. What security exploit should you be concerned about? A. Phishing B. Spyware C. Social Engineering D. Baiting

Answer: C. Social Engineering

You've found a USB memory stick in the parking lot at your office. Which of these security exploits may be at work? A. Spyware B. Virus C. Social engineering D. Application vulnerability

Answer: C. Social engineering

Which of these events would commonly involve a hash? A. Copy data to a USB memory stick B. Start your browser C. Store a password D. Install a new hardware driver

Answer: C. Store a password

Which of these utilities allows you to "back in time" to automatically revert your computer to a previous configuration without changing any of your documents and personal files? A. Recovery Console B. Task Scheduler C. System Restore D. Backup and Restore

Answer: C. System Restore

It's relatively easy to see the icons in the taskbar or system tray that are associated with running applications, but identifying the services running behind the scenes isn't quite as obvious. Which one of these methods could be used to view all of your computer's services? A. Event Viewer B. Local Security Policy C. Task Manager D. User Account Control

Answer: C. Task Manager

What does it mean when a mobile device application runs in a "sandbox?" A. The application has full access to the mobile device storage and memory B. The application will only use a specific amount of memory C. The application will only have access to specific data sources D. The application will automatically build links to other data sources as required

Answer: C. The application will only have access to specific data sources

What happens if the failed passcode lock attempt security option is activated in Android OS? A. The device erases itself after 10 failed attempts B. The passcode will randomly change after every 10 attempts C. The device locks and requires a Google login D. An email will be sent to the device owner after 10 failed attempts

Answer: C. The device locks and requires a Google login

Why would a device driver be unsigned? A. The driver has not yet been associated with the hardware B. The driver is for a 64-bit operating system C. The driver has not been certified by the manufacturer D. The driver was developed for a different Windows version E. The driver supports many different hardware devices

Answer: C. The driver has not been certified by the manufacturer

You've moved a file from one folder on an NTFS volume to another folder on the same NTFS volume. What has happened to the permissions of the file after the move? A. The permissions are inherited from the new parent object B. The permissions are reset to default C. The original permissions are retained D. The permissions are inherited from other files in the new folder

Answer: C. The original permissions are retained

Which of the following would be true of a password recovery process? A. The process should be automated and seamless B. Passwords can be sent to registered email addresses C. The recovery process should not be trivial D. Server passwords do not need to be regularly changed E. The recovery process should reset to a well-known password

Answer: C. The recovery process should not be trivial

What category of malicious software gains access to your system by disguising itself as something nonthreatening? Choose the best answer. A. Virus B. Worm C. Trojan horse D. Spyware E. Rootkit

Answer: C. Trojan horse

The hard drive in a computer must be formatted with a file system type before it can be used by the operating system. Which of the following is not a file system type? A. FAT32 B. NTFS C. FAT D. NTFS32

Answer: D. NTFS32

Which of the following would be the best way to prevent malware infections? A. Always use the latest BIOS version B. Only install well-known applications C. Update your anti-virus signatures regularly D. Install the latest manufacturer's device drivers E. Run Windows in Safe Mode

Answer: C. Update your anti-virus signatures regularly

Which of these would be a reason for using Remote Disc on Mac OS? A. Connect to Windows shares B. Transferring files from network-connected file servers C. Use a DVD-ROM drive on a remote device D. Connect through an encrypted tunnel from a remote location E. Synchronize the contents of a drive across the network

Answer: C. Use a DVD-ROM drive on a remote device

Your Windows startup process is crashing with a Windows Stop error before you can get a login screen. You suspect that a service is crashing the system, but you obviously can't use your normal login process to disable the service. What is the next best option for ensuring the service is disabled? A. Reinstall Windows from the original installation media B. Boot into Safe Mode C. Use the Windows Recovery Command Prompt to disable the service from the command line D. Select the Last Known Good Configuration boot option

Answer: C. Use the Windows Recovery Command Prompt to disable the service from the command line

How are Android applications commonly packaged and distributed? A. Compressed and transferred using the TAR format B. Deployed using the Xcode application C. Using the Android Application Package format D. Using the Visual Studio app packager E. Through the Apple App Store

Answer: C. Using the Android Application Package format

What is the security threat that best describes malicious software that uses humans as the method of distribution? A. Social engineering B. Worm C. Virus D. Tailgating E. Man-in-the-middle

Answer: C. Virus

Which of these would be the best encryption type to use on a wireless network? A. 802.1X B. WEP C. WPA2 D. TKIP

Answer: C. WPA2

Which of these would be the best way to migrate files and settings between an older computer running Windows XP and a new computer running Windows 7? A. File and Settings Transfer Wizard B. User State Migration Tools C. Windows Easy Transfer D. File Manager E. Windows Backup

Answer: C. Windows Easy Transfer

Which of these would be associated with the chkdsk command? Pick two. A. New drives have been added to a computer and need to be checked in B. Files fragments need to be made contiguous C. You need to check every physical sector of a hard drive D. File system integrity needs to be validated

Answer: C. You need to check every physical sector of a hard drive and D. File system integrity needs to be validated

In which of these cases would best describe a multiboot installation of Windows? A. Your computer has multiple storage drives installed B. You need to install Windows from both a DVD-ROM drive and a USB C. Your computer will use more than one operating system D. Your Windows desktop will use two or more monitors E. Your Windows installation will support multiple CPU cores

Answer: C. Your computer will use more than one operating system

Which of these commands would be the best choice for moving between directories in Linux? A. mv B. cp C. cd D. ls E. dir

Answer: C. cd

Which of the following would you use to verify policy settings for a computer or user? A. grouppolicy B. adpolicy C. gpresult D. gpupdate

Answer: C. gpresult

You are organizing the files on your hard drive, and you'd like to create separate directories to organize your spreadsheets by month and year. What command line function can be used to create a directory? A. rmdir B. cd C. mkdir D. xcopy

Answer: C. mkdir

Which of these port numbers are commonly used when using IMAP over SSL? A. tcp/110 B. tcp/143 C. tcp/993 D. tcp/995 E. tcp/443

Answer: C. tcp/993

Which of these would fit the minimum requirements for Windows Vista Business? A. 32 MB of graphics RAM B. 20 GB hard drive C. 800 MHz processor D. 1 GB memory

Answer: D. 1 GB memory

Which of the following meets the minimum requirements for the 64-bit version of Windows 8.1? A. Microsoft DirectX 7 graphics device B. 1 GB RAM C. 16 GB free storage space D. 1 GHz processor

Answer: D. 1 GHz processor

What does the PAE feature of a CPU provide? A. Provides a standard set of processor instructions B. Protects against malicious software C. Streaming media features are more efficient D. 32-bit processors can use more than 4 GB of physical memory

Answer: D. 32-bit processors can use more than 4 GB of physical memory

What is the maximum file size supported in a FAT32 file system? A. 4 TB B. 2 GB C. 2 TB D. 4 GB

Answer: D. 4 GB

Which of these is not true about 32-bit and 64-bit architectures? A. Memory can use a 64-bit bus, even when the CPU is 32-bit B. A 64-bit data bus can move twice as much as a 32-bit data bus in the same clock cycle C. Software must be optimized to take advantage of a 64-bit architecture D. 64-bit applications can run on 32-bit processors

Answer: D. 64-bit applications can run on 32-bit processors

Which of these is true about high-level formatting? A. A drive cannot be used again after a high-level format B. The high-level formatting process is always done at the factory C. All data is securely deleted after a high-level format D. A high-level format can be performed by the operating system

Answer: D. A high-level format can be performed by the operating system

When working with Windows Disk Management, you see that one of your disks is identified as "resynching." What is the most likely reason for this status type? A. A drive in a RAID 1 array has failed B. A replacement drive was added to a RAID 5 array C. A drive in a RAID 5 array has failed D. A replacement drive was added to a RAID 1 array

Answer: D. A replacement drive was added to a RAID 1 array The Windows resynching process occurs when a bad drive is replaced in a RAID 1 array. As the information from the array is copied to the new drive, the status will show as "resynching."

What is the fundamental characteristic that defines a computer worm? A. A worm causes massive operating system outages B. A worm intentionally modifies the contents of files C. A worm captures keystrokes D. A worm can replicate itself without any user intervention E. A worm pretends to be a legitimate application

Answer: D. A worm can replicate itself without any user intervention

How does a blacklist of outbound traffic work in a SOHO network? A. All traffic is blocked by default, and only specified traffic types are allowed B. All inbound traffic to a server is redirected to the internal address C. All outbound traffic uses a proxy D. All traffic is allowed, but certain traffic types are administratively blocked E. No outbound traffic is allowed

Answer: D. All traffic is allowed, but certain traffic types are administratively blocked

In which of these would you be most likely to use Performance Monitor? A. Defragment the hard drive B. Determine the BIOS version in use C. Remove a malware infection D. Analyze long-term system metrics E. Modify the video refresh rate

Answer: D. Analyze long-term system metrics

Which of the following would be the best way to stop malicious code when it tries to execute in main memory? A. Host-based firewall B. DLP application C. Access control list D. Anti-virus application E. NTFS file system

Answer: D. Anti-virus application

Which of the following would not be commonly seen in a UTM? A. URL filter B. Router C. CSU/DSU D. Application distribution E. Firewall F. Bandwidth shaper

Answer: D. Application distribution A UTM (Unified Threat Management) device is commonly given to all-in-one network and security devices. It's common to see a UTM with URL filtering, malware inspection, spam filtering, routing, firewall features, and more. A UTM does not manage the applications used on a desktop computer.

Which of these would be the most likely reason for using DHCP? A. Provides a method for the computer to resolve IP addresses from a domain name B. Allows the file system to be read by many different operating systems C. Runs applications as an older version of Windows D. Automates the process of assigning IP addresses to devices

Answer: D. Automates the process of assigning IP addresses to devices

The NTFS file system includes many advantages over FAT32, but there may be some instances where using FAT32 is preferable over NTFS. Which one of these would be a good reason to choose FAT32 over NTFS? A. Additional security features B. Support for large files C. Built-in encryption D. Compatibility between diverse operating systems

Answer: D. Compatibility between diverse operating systems

In which of these cases would you be most likely to use Remote Desktop? A. Transfer files from a remote device across a network link B. Configure the Windows boot manager of a remote device C. Configure the Windows boot manager of a remote device D. Control another desktop across the network E. Modify the BIOS settings of a remote computer

Answer: D. Control another desktop across the network

Which of the following would be the most effective way to prevent the use of an Ethernet adapter on a computer? A. Connect the Ethernet adapter to a loopback plug B. Disable the Ethernet adapter in the Windows Device Manager C. Uninstall the device driver for the Ethernet adapter D. Disable the Ethernet adapter in the BIOS E. Enable the Windows Firewall

Answer: D. Disable the Ethernet adapter in the BIOS

. You'd like to disable a device so that it never works when you're using Windows 8.1. Which of these would be the easiest way to accomplish this? A. Delete the device driver from the hard drive B. Uninstall the device in Add/Remove programs C. Uninstall the driver in Device Manager D. Disable the device in Device Manager

Answer: D. Disable the device in Device Manager

How does the Windows AutoRun feature work with USB drives in Windows 7? A. Enabled by default B. Enabled with a registry change C. Disabled with a security path D. Disabled completely

Answer: D. Disabled completely

Which of the following would be the best way to disable all radios on a mobile device? A. Move out of range of all access points B. Tether the mobile device to a computer C. Turn off all Bluetooth devices D. Enable airplane mode E. Disable LTE

Answer: D. Enable airplane mode

You're troubleshooting a problem that appears intermittently on a user's workstation. The user has complained of error messages and slowdowns that occurred yesterday, but they didn't write down any of the messages and the slowdowns aren't happening today. Which of the following would be the best for gathering more information on this problem? A. Task Manager B. Services C. Performance Monitor D. Event Viewer

Answer: D. Event Viewer

Which of the following is true regarding explicit and inherited permissions in Windows? A. Implicit permissions take precedence over explicit permissions B. Inherited permissions are propagated from the child object to the parent object C. Implicit permissions must be administratively assigned D. Explicit permissions take precedence over inherited permissions E. If you apply a permission to a parent object, it does not apply to any child objects

Answer: D. Explicit permissions take precedence over inherited permissions

When searching for files in Windows Vista, you find that it takes at least five minutes to complete the search, and you notice that the hard drive light is flashing the entire time. The computer works fine, otherwise. What is the most likely cause of this delay? A. The computer hard drive is faulty B. File caching is disabled C. Windows Vista is running in Safe Mode D. File indexing is disabled

Answer: D. File indexing is disabled

Which of the following is the best utility to use when moving files from one volume to another in Mac OS? A. Filer B. File Manager C. Mac Explorer D. Finder E. File Wizard

Answer: D. Finder

What type of business policy would provide you with only the rights necessary to perform your job? A. Split knowledge B. Dual control C. Separation of duties D. Least privilege

Answer: D. Least privilege

Which of these utilities would be the best choice for modifying the account lockout policy on your computer? A. Windows Firewall B. Security Center C. System Configuration D. Local Security Policy

Answer: D. Local Security Policy

You're reading through a Linux script, and you see the command "mkdir." What function does this provide? A. Moves a directory of files B. Modifies a Linux directive C. Matches a set of files across directories D. Makes a directory E. Merges two directories together

Answer: D. Makes a directory

Which of the following file systems can support EFS? A. FAT B. FAT32 C. HPFS D. NTFS

Answer: D. NTFS

You've been asked to install Windows Vista Home Basic onto a computer that has a 800 MHz processor, 512 MB of RAM, 10 gigabytes of available hard drive space, and VGA graphics. Will this computer run Windows Vista Home Basic? A. Yes, but only at the minimum specifications B. Yes, at both the minimum and the recommended specifications C. No, the computer doesn't have enough processing power D. No, the computer doesn't have enough disk space

Answer: D. No, the computer doesn't have enough disk space

Which of these would be the most likely reason for creating a BIOS user password? A. Disable the Windows login prompt B. Restrict the sharing of resources across the network C. Prevent the modification of any BIOS settings D. Prevent booting until the correct password is provided E. Reset the Windows login credentials

Answer: D. Prevent booting until the correct password is provided

Which of these would be most associated with IPP or LPD? A. Web server B. IPS C. DHCP server D. Print server E. Mail server

Answer: D. Print server

Which of these security prevention methods would be the most useful when traveling with your laptop? A. Mantrap B. Access control list C. Data loss prevention D. Privacy filter E. Email filtering

Answer: D. Privacy filter

Which of these flash memory features can increase the performance of Windows 7? A. Smart Cache B. Hyper-threading C. Multi-core D. ReadyBoost

Answer: D. ReadyBoost

Which of these tasks would be the best fit for Performance Monitor? A. Determine which applications launch during the Windows startup process B. Run a comprehensive memory diagnostic C. View the details of a BSOD that occurred yesterday afternoon D. Run a report on memory utilization

Answer: D. Run a report on memory utilization Performance Monitor includes many resource monitors, including some comprehensive built-in reporting.

Which of these multi-factor authentication methods is integrated into the Windows 7 VPN client? A. Token generator B. Fingerprint reader C. Smart phone app D. Smart card

Answer: D. Smart card

Which of the following would best describe emulation? A. Running a Windows virtual machine on your Linux desktop B. Using Remote Desktop to connect to a Windows computer from Mac OS C. Running a Linux Live CD on your Windows computer D. Testing an iOS application on a Mac OS desktop E. Dual-booting between Windows and Linux

Answer: D. Testing an iOS application on a Mac OS desktop

Which of these would be a common reason to receive a Wireless Emergency Alert? A. A traffic accident has caused a delay on the roadways B. Your office fire alarm has activated C. One of your family members is having a medical emergency D. The President of the United States has sent an important message E. There is a power outage in your area

Answer: D. The President of the United States has sent an important message

ou've been asked to backup a large video file that is just over 5 gigabytes of disk space. You have a new empty 500 gigabyte external USB hard drive to store the backup file. However, when you try to copy the file to the empty USB drive, you get an error message that there's not enough disk space to complete the file transfer. What's the most likely cause of this error? A. USB connections can't support large file transfers B. The new USB drive is faulty C. The video file is corrupted D. The USB drive is formatted with a FAT32 file system

Answer: D. The USB drive is formatted with a FAT32 file system

You've configured one of your workstations to act as a host for Remote Desktop Connection, but other workstations on the network cannot connect to the host. All of the settings in Remote Desktop appear to be correct. Which of these is the most likely cause of this issue? A. The Remote Desktop service is not running B. Your Windows credentials do not have permission to use Remote Desktop C. Windows is not using the correct network adapter D. The Windows Firewall is not properly configured

Answer: D. The Windows Firewall is not properly configured

Which of the following would best describe application pinning? A. The application will use the same memory resources each time it is launched B. The application can not be uninstalled C. The application will only run in Administrator mode D. The application will always be shown in the Windows taskbar E. The application will use a limited amount of CPU when active

Answer: D. The application will always be shown in the Windows taskbar

Why are most 802.11b access points configured to use channels 1, 6, or 11, but rarely the channels in- between? A. The other channels are government-restricted B. The other channels provide slower bandwidth C. The other channels are reserved for VoIP communication D. The other channel frequencies overlap each other

Answer: D. The other channel frequencies overlap each other

A client is having a problem printing to their locally connected laser printer. When you look at the Windows 8.1 Device Manager, you see that the printer has a down-arrow marked on the printer icon. What does this down-arrow represent? A. The printer is notifying the operating system of a hardware fault B. The printer is out of toner C. The printer driver is not loading properly D. The printer is administratively disabled

Answer: D. The printer is administratively disabled

Which of these would you need to connect to a Windows Homegroup? A. The Windows administrator username and password B. The username and password of any Active Directory user C. The owner's Microsoft Live password D. The shared Homegroup password

Answer: D. The shared Homegroup password

When you boot your Windows workstation, one of the disks is labeled "At risk" in the Disk Management utilities. What does this mean? A. The disk has less than 1% of available space free B. The disk has a different file system than the boot disk C. A basic disk was added to a system with dynamic disks D. The volume has experienced a number of disk errors

Answer: D. The volume has experienced a number of disk errors

Which of these tools can be used at the command line to automate the large-scale migration of user information between Windows operating system versions? A. File and Settings Transfer Wizard B. System Migration Tool C. System Configuration D. User State Migration Tool E. Windows Easy Transfer

Answer: D. User State Migration Tool

Which of these Windows utilities would be the best choice for rolling back a device driver to a previous version? A. Windows Backup and Restore B. System Information C. Component Services D. Task Manager E. Device Manager

Answer: E. Device Manager

There are 40 people in your company's Accounting department, and you need to provide everyone with access to a confidential department share. Which of these would be the best choice for combining all of the Accounting department employees together for this share access? A. Local Security Policy B. Windows Firewall C. User Access Control D. Users and Groups

Answer: D. Users and Groups

Which Windows 7 x64 edition supports of maximum of 16 GB of RAM? A. Windows 7 Professional B. Windows 7 Starter C. Windows 7 Ultimate D. Windows 7 Home Premium

Answer: D. Windows 7 Home Premium

You'd like to use your laptop at the local coffee shop, but you're concerned about the open Wi-Fi access. What Windows component can prevent others at the coffee shop from accessing your computer? A. Anti-virus software B. NTFS file system C. Windows Update D. Windows Firewall

Answer: D. Windows Firewall

On your Windows Vista computer, you notice that your hard drive access light is constantly blinking, even when your computer is idle. Which of the following is the most likely cause of this constant drive access? A. The hard drive is constantly retrying a bad sector on the hard drive B. The computer is configured to constantly check the hard drive performance C. The hard drive throughput can't keep up with the data requests D. Windows Vista is indexing the files on your hard drive

Answer: D. Windows Vista is indexing the files on your hard drive The Windows indexing process can speed searches, but it often requires the scanning of files in user folders and other parts of the hard drive. While this indexing is occurring, the increased access to the hard drive can be quite noticeable.

In which of these cases would you be using an encryption technology? A. You need to make a file writable by you, but read-only for everyone else B. You need to ensure that all data is removed from a hard drive C. You want to provide for stateful network access D. You want to access your office file servers and printers while traveling

Answer: D. You want to access your office file servers and printers while traveling

In which of these situations would you be most likely to use a network proxy? A. You want to provide automatic IP addressing to your local networks B. You want to deploy applications automatically to your end users C. You want to backup data from user workstations D. You want to block known malicious web sites from your end users

Answer: D. You want to block known malicious web sites from your end users

When would you use MAC filtering on your wireless network? A. You want to prevent your wireless network from appearing in a search list B. You want to require encrypted communication on your wireless network C. You want to restrict all Apple computers from joining the wireless network D. You want to prevent specific workstations from joining the wireless network

Answer: D. You want to prevent specific workstations from joining the wireless network

Which of the following would be the best way to terminate a Linux process by name? A. kill B. halt C. taskkill D. killall E. net stop

Answer: D. killall

What is the minimum processor speed required for Windows Vista Business? A. 800 MHz B. 1 GB C. 40 GHz D. 300 MHz E. 1 GHz

Answer: E. 1 GHz

Which of the following would be the easiest way to access frequently-used folders and applications in Mac OS? A. Use a third-party application manager B. Launch applications from the App Store utility C. Define separate hotkeys for all apps and folders D. Hold the Command key when starting the application E. Add applications and folders to the Dock

Answer: E. Add applications and folders to the Dock

Which of the following tasks can be performed from the Linux terminal? A. Manage files B. Run scripts C. Update the operating system D. Configure application settings E. All of the above

Answer: E. All of the above

Which of the following would be a feature associated with proxy servers? A. URL destinations and categories can be blocked or allowed B. Web requests can be cached for faster performance C. Downloaded files can be scanned for viruses D. A username and password is required before accessing network resources E. All of the above

Answer: E. All of the above

Which of the following would be true when using a company's mobile device manager? A. Screen locks and PINs would be required B. The camera can be administratively disabled C. The name and type of applications can be specifically defined D. Data can be encrypted by default E. All of these would be common when using a mobile device manager

Answer: E. All of these would be common when using a mobile device manager

. In which of these cases would you use the MMC? A. Rebuild the boot sector B. Repair an operating system installation C. Recover a deleted file D. Upgrade the CPU E. Build your own management framework

Answer: E. Build your own management framework

Which of the following would best describe the process of sharing a local printer? A. Add the printer to the Windows Desktop B. Connect the printer and confirm the Test Print is working properly C. Configure the Windows registry to allow shared printers D. Add the printer to the "Shared Devices" section of the BIOS E. Click the "Share this printer" from the printer properties in the Sharing tab

Answer: E. Click the "Share this printer" from the printer properties in the Sharing tab

In Windows 8.1, where would you find information about the Windows version in use? A. Control Panel / Administrative Tools / System Manager B. Program Files / Windows Setup C. Control Panel / Startup Options D. Program Files / System Information E. Control Panel / System

Answer: E. Control Panel / System

Which of these would be the best use of the Linux command "dd"? A. Compress and decompress a list of files B. Force a file system check C. Administratively halt a running process D. Share a remote screen E. Create a drive image

Answer: E. Create a drive image

Which of these would be a characteristic of the Windows SSO process? A. Access times to stored data is increased B. Wireless network encryption is integrated C. File permissions can be defined for all Windows users D. All network communication is encrypted by default E. Credentials are only required during the initial login process

Answer: E. Credentials are only required during the initial login process

Which of the following would be the best way to allow a system account to operate properly, but prevent any logins across the network? A. Change the ownership of the user documents B. Only allow access during certain hours of the day C. Disable the network connection on the device D. Change the password for the system account E. Disable interactive logins on the account

Answer: E. Disable interactive logins on the account

Which of these would be the best way to communicate securely between your mobile phone and your corporate office? A. Tether the phone to your computer B. Connect to a WiFi network that uses WPA2 C. Use the phone with an external modem D. Disable the WiFi radio E. Enable the VPN on the phone

Answer: E. Enable the VPN on the phone

. In which of these cases would you be most likely to use a PXE? A. Adding a storage device to an existing Windows server B. Updating Windows 7 video drivers C. Connecting to a Windows Media Center server D. Replacing a motherboard E. Installing Windows from a network server

Answer: E. Installing Windows from a network server

Which of these would require a user on a stand-alone computer to change their password every 30 days? A. Windows Security Center B. Component Services C. Windows Firewall D. BIOS Security E. Local Security Policy

Answer: E. Local Security Policy

Which of these would best describe a device that was not an SOE? A. Upgradable B. Disabled C. Embedded D. Secure E. Non-compliant

Answer: E. Non-compliant

. What cloud-based document storage solution is integrated with Windows 8.1? A. Microsoft Drive B. Dropbox C. CloudStore D. Cloud Backup E. OneDrive

Answer: E. OneDrive

How are PRI updates usually distributed? A. During operating system updates B. Through the mobile device app store C. At an authorized service center D. On the manufacturer's web page E. Over the air

Answer: E. Over the air

Which of the following would best describe a cloud deployment model that was hosted entirely in your own data center? A. Core cloud B. Collapsed cloud C. Hybrid cloud D. Internal cloud E. Private cloud

Answer: E. Private cloud

What's the best way to run an application with elevated permissions in the Linux operating system? A. Right-mouse click and select "Run as Administrator" B. Boot the system to single user mode C. Use chown to change the ownership to root D. Run in Safe Mode E. Run the program with the sudo command

Answer: E. Run the program with the sudo command

Which of these would be the best choice for permanently disabling a background service from starting when Windows launches? A. Add / Remove Programs B. Remove the service from the Startup folder C. Safe Mode D. Modify the startup options in the Windows Registry E. Services utility

Answer: E. Services utility

Which of these would be the most likely reason for using the pwd command in Linux? A. Change your password B. Remove a file C. Change the ownership of a directory D. View the current running processes E. Show the current directory name

Answer: E. Show the current directory name

Which of the following commonly contain a digital certificate? A. DVD-ROM B. PIN C. Strong password D. MBR E. Smart card

Answer: E. Smart card

Which of these is true of virtual machines? A. The hypervisor's memory requirements are similar to a standard workstation B. You must route between different virtual machines C. Virtualization renders anti-virus and anti-malware unnecessary D. Virtualization features are limited to Windows operating systems E. Some CPUs include virtualization capabilities in hardware

Answer: E. Some CPUs include virtualization capabilities in hardware

If you modify your MAC address to appear as if you are a legitimate device on the network, what security threat would you be using? A. Social engineering B. Phishing C. Brute force D. Tailgating E. Spoofing

Answer: E. Spoofing

Which of the following best describes remote backup on a mobile device? A. The backups occur when the device is physically connected to a computer B. The backups are stored in decrypted form for easy access C. The backups only contain mail, contacts, and calendar events D. The backups must restore to the same physical device E. The backups occur constantly to the cloud backup servers

Answer: E. The backups occur constantly to the cloud backup servers

Which of these would be the best reason for regularly changing a login password? A. The login process becomes more difficult when a history of passwords has been saved B. Secondary passwords are a separate factor of authentication C. The security of a password will age out over time D. Changing the password will refresh the firewall timers E. The scope of a potential attack would be reduced

Answer: E. The scope of a potential attack would be reduced

What is the maximum amount of data that is retained in Mac OS Time Machine? A. The past hour B. The past 24 hours C. The past week D. The past month E. Until the Time Machine volume is full

Answer: E. Until the Time Machine volume is full

Which of these would be an example of an APIPA address? A. 192.168.10.10 B. 169.254.192.168 C. 172.20.169.254 D. 10.77.2.22 E. 127.0.0.1

B. 169.254.192.168 An APIPA (Automatic Private IP Addressing) address is assigned by the operating system when a static IP address isn't assigned and a DHCP server does not respond.

What is the minimum memory requirement for the 64-bit version of Windows 8.1 Pro? A. 1 GB B. 2 GB C. 4 GB D. 8 GB E. 16 GB

B. 2 GB All 64-bit editions of Windows 8/8.1 require a minimum of 2 GB of RAM.

You are planning on installing multiple bootable operating systems on a single storage drive. What is the maximum number of primary partitions on an MBR-partitioned drive? A. 2 B. 4 C. 8 D. 16

B. 4 A drive with an MBR partition style can have a maximum of 4 primary partitions.

What character is used to separate folder names at the command prompt? A. Forward slash (/) B. Colon (:) C. Semi-colon (;) D. Backslash (\) E. Tilde (~)

Backslash

Which of these is necessary to create a Windows Homegroup? A. All devices must have DVD-ROM drives B. All devices must have the network set to "Home" C. The network router must support Windows Homework settings D. All devices must disable the Windows Firewall

B. All devices must have the network set to "Home" The Windows Homegroup will only work when Windows is set to the "Home" network.

What kind of device uses an 8-pin Lightning connection as a wired synchronization connection? A. Samsung Galaxy B. Apple iPhone C. Amazon Kindle reader D. Microsoft Windows Phone E. Google Nexus

B. Apple iPhone

Which of the following would best describe PowerShell? A. Manage the power usage of the computer and monitor B. Automate system administration function C. Monitor the power consumption of your computer D. View your home or business power usage E. Display memory and CPU utilization on the Windows desktop

B. Automate system administration function PowerShell is an advanced version of the Windows command line that can automate and control almost anything in the operating system. PowerShell is included with Windows 8.1 and can be downloaded and installed into previous Windows operating system versions.

Which of these network types would you expect to find on an iOS or Android mobile device? Pick two. A. Gigabit Ethernet B. Bluetooth C. irDA D. DSL E. WiFi

B. Bluetooth and E. WiFi

Which of these Windows utilities would be the best choice to check for physical disk problems? A. Disk Information B. Check Disk C. Disk Defragmenter D. Disk Tools E. Disk Test

B. Check Disk

Which of the following commands could be used to improve the read and write performance of a hard drive volume? A. DISKCACHE B. DEFRAG C. SSD D. DISKSPEED E. WINDISK

B. DEFRAG The DEFRAG command is used to move fragments of files around until they are contiguous. Once these files are more arranged on the drive, the read and write process can be more efficient

Your computer has just restarted after a Windows Stop Error, but you didn't see the details of the error. What Windows utility can provide you with the details of this most recent crash? A. Task Manager B. Event Viewer C. Services D. Performance Monitor

B. Event Viewer The Event Viewer keeps detailed information on system and application problems, and the specifics of the BSOD will be within the most recent events.

Which of the following features is unique to NTFS when compared to FAT or FAT32? A. Native support in Windows 2000 and newer B. File system level encryption C. 2 terabyte volume sizes D. Maximum file size of 4 gigabytes

B. File system level encryption Although many of these options are available in NTFS, the only one of these that's unavailable in FAT or FAT32 is the file-system level encryption

Which of the following is used in Mac OS to securely store passwords, certificates, and notes? A. Password Manager B. Keychain C. Certificate Storage D. Digital Safe E. Lockbox

B. Keychain

In which of these situations would you make use of UAC? A. Prevent write access to a network share B. Limit applications from making changes to network settings C. Force periodic updates to a Windows Domain password D. Convert IP addressing from a public address to private addresses

B. Limit applications from making changes to network settings

Your computer has 512 MB of RAM, 100 GB of free disk space, and a 1 GHz processor. Does your computer have the proper hardware requirements to run Windows Vista Business? A. Yes, the hardware will run Windows Vista B. No, you'll need more RAM C. No, you'll need more disk space D. No, you'll need a bigger processor

B. No, you'll need more RAM

Which of the following would be the best way to keep your operating system up to date? A. Image the operating system on a set schedule B. Run Windows Update in automatic mode C. Perform nightly automated backups D. Install the periodic Windows Service Packs E. Update anti-virus signatures each day

B. Run Windows Update in automatic mode The Windows Update process can be configured to automatically update the operating system, download and wait for your manual update process, or it can be disabled completely as needed.

Which of the following would be the best way to control applications that run exclusively in the background? A. REGEDIT B. SERVICES.MSC C. MSTSC D. DXDIAG E. MSINFO32

B. SERVICES.MSC The Windows Services utility can be launched with the SERVICES.MSC command. From the Windows Services utility, you can control all of the Windows background services

What are the minimum IP configuration settings required to communicate on a local network? Pick two. A. DNS server B. Subnet mask C. DHCP server D. IP address E. Default gateway

B. Subnet mask and D. IP address For local IP communication, the only two required parameters are the IP address and the subnet mask. If you need to communicate outside of your subnet, you'll also need a default gateway. If you're using the fully- qualified domain name and not an IP address, then you'll also need to configure the IP addresses for your DNS servers.

You've recently installed a new large LCD monitor on your computer, but you've found that Windows won't increase the display resolution. When you look at Device Manager, you see that the display is listed as "Generic VGA." What of these is the most likely cause of this issue? A. The monitor is not identifying itself properly to the Windows OS B. The LCD monitor driver is not loaded C. The computer's video adapter is not compatible with the LCD display D. The LCD display only supports generic VGA resolutions

B. The LCD monitor driver is not loaded When new devices are added to the Windows operating system, the OS automatically installs the necessary drivers. In some cases, however, the driver must be manually installed. The operating system won't know the hardware details about the monitor until the driver is loaded, so to give you a little bit of functionality a generic driver is installed

You are trying to ping a Windows 7 system on your local subnet. Although the destination device can browse web sites, it won't respond to any of your ping requests. Which of these could most likely cause this lack of response? A. Windows 7 does not support ping B. The Windows Firewall is enabled C. Your network manager has disabled ping on your switches D. The ping protocol does not work to devices on the same subnet

B. The Windows Firewall is enabled The Windows Firewall limits inbound access to the operating system, including ping

What is a side-by-side migration? A. The migration occurs on the same computer, with each system using half of the display B. The migration is done in real-time with computers that are sitting next to each other C. Data is exported, the system is rebuilt with the new system, and the original data is imported D. The application data is exported to one system, and the user data is exported to a different system

B. The migration is done in real-time with computers that are sitting next to each other A side-by-side migration is often performed when you're moving from one physical computer to the other and you have access to both systems at the same time

You need to migrate from one computer running Windows Vista to another computer running Windows 8. Which of these would be the easiest way to complete this migration? A. Use Windows XP mode on your Windows 7 computer B. Use Windows Easy Transfer to perform a side-by-side migration C. Run your application in Windows 7 using Windows Vista compatibility mode D. Configure Windows 7 with ReadyBoost

B. Use Windows Easy Transfer to perform a side-by-side migration Windows Easy Transfer will move your profile and person settings from one operating system version to another. The utility supports both side-by-side migrations and wipe-and-load migrations. Although user files and settings are migrated, you'll still have to reinstall your applications on the new operating system.

Which of these would be the easiest way to see all of the printers in your office that are not ready to print? A. Query the Active Directory database B. Use a custom filter in Print Management C. Access the management tools from the printer manufacturer D. Query all printers using SNMP

B. Use a custom filter in Print Management

Which of these network types would be the best choice for mobile Internet connectivity? A. WiFi B. WWAN C. VPN D. Ethernet E. Dialup

B. WWAN A Wireless Wide Area Network, or WWAN, provides Internet connectivity using mobile network providers. Since our mobile phone networks can be used across large geographies, they provide Internet connectivity from nearly anywhere a mobile phone would operate.

Which of these Windows 7 editions provide support for Active Directory domains? Pick two. A. Windows 7 Home Premium B. Windows 7 Professional C. Windows 7 AD D. Windows 7 Ultimate E. Windows 7 Starter

B. Windows 7 Professional and D. Windows 7 Ultimate You can add your computer to an Active Directory domain in Windows 7 Professional, Ultimate, and Enterprise.

Which of these operating systems can be upgraded directly to Windows 7 Professional with an in-place upgrade? A. Windows XP Professional B. Windows Vista Business C. Windows Vista Enterprise D. Windows XP Professional (x64)

B. Windows Vista Business Windows Vista Business is the only OS edition in this list that can be upgraded to Windows 7 with an in-place upgrade, leaving all of the configurations and applications intact after the install is complete. No Windows XP versions can be directly upgraded to Windows 7.

Which of these would you be most likely to edit with NOTEPAD? A. Windows 7 Boot Configuration Data B. Windows log file C. Partition configuration file D. Master boot record E. Ethernet MAC address configuration

B. Windows log file Log files are commonly stored in text format and can be edited with any text editor like NOTEPAD.

Which of these commands will copy your file and verify that the copied file matches the original? A. copy /a original.txt copy.txt B. copy /v original.txt copy.txt C. copy /y original.txt copy.txt D. copy /d original.txt copy.txt

B. copy /v original.txt copy.txt The /v command line option on the copy command will verify that any new files are written properly to the destination.

Which of the following file systems would be commonly seen in the Linux operating system? A. NTFS B. ext4 C. FAT32 D. CDFS E. exFAT

B. ext4 Linux operating systems commonly use file systems such as ext3 or ext4.

You need to copy a large library of digital photos from one computer to another. Which of the following command line tools would be the best choice to simultaneously copy both files and directories? A. copy B. robocopy C. fcopy D. ncopy

B. robocopy The robocopy (robust copy) command is quite versatile, and can be used to bulk copy and verify data after the copy is complete.

The screen on your mobile device is responding to your stylus, but the location you're tapping is slightly offset from the area that's actually registering. Which of the following would be the best way to correct this issue? A. Replace the display B. Use a capacitive stylus C. Calibrate the display D. Update the operating system E. Enable the GPS

C. Calibrate the display

Which of these applications would be the best choice to provide device COM+ management, access to the Event Viewer, and management of Windows Services? A. Computer Management B. Data Sources C. Component Services D. System Configuration

C. Component Services The Component Services utility is designed to manage Microsoft Component Object Model (COM+) distributed applications. In a single utility, you have access to COM+ management, the Event Viewer, and the Services utility.

In which of these would you find the Windows Memory Diagnostics Tool in Windows 7? A. Control Panel / Services B. Maintenance C. Control Panel / Administrative Tools D. All Programs / Accessories E. Control Panel / System

C. Control Panel / Administrative Tools You can start the Windows Memory Diagnostics from the Control Panel under Administrative Tools, or from the Advanced Boot Options during startup

What kind of Windows environment is best suited for large enterprises and organizations that need centralized management of their Windows environment? A. Workgroup B. Cluster C. Domain D. Virtual Server

C. Domain A Windows Domain provides centralized management of a Windows environment, including the management of end users devices, centralized authentication, and centralized rights and permissions to resources.

What kind of Windows disk would allow you to create a single large volume by combining separate physical drives? A. Basic Disk B. Advanced Disk C. Dynamic Disk D. Enhanced Disk

C. Dynamic Disk A Windows Dynamic Disks supports spanning multiple drives to create a large volume, disk striping, redundant mirroring, and other enhanced features.

Which of these Windows accounts should normally be disabled? A. Administrator B. Power User C. Guest D. Domain Administrator E. IEUser

C. Guest

Which of these would require a stand-alone Windows user to select a different password each time it is changed? A. Windows Scheduler B. Windows Firewall C. Local Security Policy D. Task Manager E. Windows System Configuration

C. Local Security Policy The Windows Local Security Policy utility is used to manage settings and configurations of Windows devices. Local Security Policy includes policies for passwords, user rights assignments, security options, and more.

Which of the following would you not expect to find in the Windows 8.1 Charm bar? A. Search B. Share C. Logout D. Devices E. Settings F. Start

C. Logout The logout option is not included in the Windows 8.1 Charm bar.

In which of these situations would you be most likely to use DISKPART? A. Check for logical and physical errors on a storage device B. Recover a deleted file from flash drive C. Manage the partitions of a storage device D. Perform a secure wipe of all drive contents

C. Manage the partitions of a storage device The DISKPART is the command line tool that has replaced the FDISK command found in previous Windows versions.

Which Windows file system provides capabilities such as quotas, file compression, encryption, and large file support? A. FAT B. FAT32 C. NTFS D. HPFS

C. NTFS

hich of these technologies allows an application to use a database without any specific knowledge of the database engine? A. COM+ B. Access C. ODBC D. SQL E. dBASE

C. ODBC ODBC (Open Database Connectivity) allows application developers to create and access information in a database without requiring any specific knowledge of the database service in use.

Which of these would be a common use of Wake on LAN? A. Clear the screen saver so the desktop is accessible B. Prevent the hard drive from spinning down C. Patch the operating system during non-work hours D. Move the computer to a high-speed VLAN

C. Patch the operating system during non-work hours Wake on LAN is used to "wake" a system out of a suspended session to provide remote administration. With WoL, network administrators can push out updates and patches while the rest of the organization is out of the office. When an update is not required, the computer systems remain in a suspended mode, saving power and ongoing wear to the computer.

In which of these cases would you be most likely to use DISKPART? A. Copy file contents from one disk to another B. Check a drive for logical errors C. Prepare a storage device for formatting D. Prepare a storage device for removal

C. Prepare a storage device for formatting

You are converting some video from one format to another, and you want to participate in a videoconference at the same time. Unfortunately, the video conversion is causing the videoconference feed to stutter. What Windows utility can you use to lower the priority of the conversion process? A. Device Manager B. Event Viewer C. Task Manager D. Services

C. Task Manager Task Manager provides many useful performance metrics, and it can also be an invaluable tool for managing the priorities of your applications and services.

One of the selections on the shutdown selection on a Windows 8.1 laptop is "hibernate." Which of the following best describes the hibernate option? A. CPU execution is halted but power continues to be provided to both CPU and memory B. All active processes are stopped and only RAM is powered C. The contents of memory are saved to disk and all power is halted D. The operating system shuts down, clears itself from memory, and the laptop powers off E. The system shuts down normally, and when it restarts it loads the applications that were previously running

C. The contents of memory are saved to disk and all power is halted

In which of these cases would you be most likely to use the Windows Computer Management console? A. Determine the upgradability of devices on your corporate network B. Upgrade the BIOS of a computer C. Troubleshoot a computer using the Device Manager and Event Viewer D. Replace a faulty video adapter E. Configure DHCP and DNS settings

C. Troubleshoot a computer using the Device Manager and Event Viewer

You'd like to upgrade your computer from Windows 7 to Windows 8.1. Which of the following utilities can test your computer for its upgrade compatibility to this new operating system version? A. Windows Upgrade Wizard B. Upgrade Evaluation Tool C. Upgrade Assistant D. System Upgrade Recommendation E. Windows Upgrader

C. Upgrade Assistant The Windows Upgrade Assistant utility can be used to check for upgrade compatibility when moving to Windows 8 or 8.1. In Windows 7, this utility was called the Upgrade Advisor.

. Your organization uses an important application that written in-house. Unfortunately, this application conflicts with portions of the UAC process. Which of the following is the easiest way to disable portions of the UAC but still keep other aspects of UAC operating normally? A. Make a change to the system registry B. Modify the access permission of each user C. Use the Local Security Policy console to change the UAC configuration D. Modify the application to work better with Windows UAC

C. Use the Local Security Policy console to change the UAC configuration The Local Security Policy console allows you to make very granular changes to the UAC configuration, allowing almost any conflicting application to work with the maximum amount of UAC control still in place.

Your organization has decided to upgrade fifty of their workstations from Windows XP to Windows 7, and you'd like to find an automated way to seamlessly move all user files and settings from one operating system to another. Which of these methods would meet this requirement? A. Files and Settings Transfer Wizard B. Windows Easy Transfer C. User State Migration Tool D. Upgrade Advisor

C. User State Migration Tool

Which Windows 8.1 version is a valid upgrade path from the Enterprise edition of Windows 8? A. Windows 8 Core B. Windows 8 Pro C. Windows 8 Enterprise D. All of these E. None of these

C. Windows 8 Enterprise

Which of these would be the best way to upgrade a 32-bit Windows 7 Professional system to a 64-bit version of Windows 7 Professional? A. Windows Anytime Upgrade B. In-place upgrade using the x64 installation media C. Windows Easy Transfer D. Windows Upgrade Advisor from the x64 installation media E. In-place upgrade using the x86 installation media

C. Windows Easy Transfer You cannot perform an in-place upgrade when moving from an x86 version of Windows 7 to an x64 version. If you want to keep your documents and some settings, you'll need to perform a migration. You can alternatively perform a clean install and move any personal documents to the new system

What is the maximum amount of memory supported in Windows 7 Professional x64? A. 4 GB B. 16 GB C. 64 GB D. 192 GB

D. 192 GB

Which of the following would be the best way to repair problems with a Mac OS volume? A. Check Disk B. Drive View C. Partitioner D. Disk Utility E. Volume Manager

D. Disk Utility

Which of these features are NOT exclusive to dynamic disk storage? A. Spanning of multiple disks to create a single large volume B. Splitting of files across multiple physical disks (striping) C. Duplicating of files across multiple physical disks (mirroring) D. Creation of both primary and extended partitions

D. Creation of both primary and extended partitions The creation of primary and extended partitions can be accomplished on both basic disks and dynamic disks. The incorrect answers: A) Spanning of multiple disks to create a single large volume - In basic disk configurations, each separate physical hard drive would be referenced as a separate volume. With dynamic disks, multiple physical disks can be configured to appear as a single large volume. B) Splitting of files across multiple physical disks (striping) - The only way to enable RAID striping across disks is to configure the disks as dynamic disk storage subsystems. C) Duplicating of files across multiple physical disks (mirroring) - Another RAID technique is to duplicate data across multiple physical disks for redundancy and fault-tolerance. This type of storage is only available on dynamic disks.

Which of the following best describes the function of an accelerometer in a mobile device? A. Provides multi-axis motion sensing B. Provides precise navigation based on longitude, latitude, and altitude C. Determines the amount of ambient light around the device D. Detects the orientation of the device

D. Detects the orientation of the device

You've just installed a new audio card into your Windows computer, but it doesn't seem to provide any output. Which Windows utility can give you information on the status of your new audio card? A. Performance Monitor B. Task Manager C. Event Manager D. Device Manager

D. Device Manager The Windows Device Manager provides an at-a-glance view of hardware status, and bad hardware will be visually flagged with an icon that designates a problem.

Which technology would be applicable if you were monitoring S.M.A.R.T. statistics? A. Printer B. Network interface C. CPU D. Hard drive

D. Hard drive Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) is an embedded set of metrics that can provide health and availability statistics from hard drives and other storage devices.

Which of these cloud architectures would be most closely associated with a web hosting provider? A. SaaS B. PaaS C. Hybrid D. IaaS E. Community

D. IaaS Infrastructure as a Service (IaaS) is sometimes called Hardware as a Service (HaaS), and it's a model that provides hardware but not much else.

Which of the following would commonly be used to automatically assign IP addresses to your network devices? A. IP server B. Authentication server C. IPS D. Proxy server E. DHCP server

E. DHCP server

. Which of these would best describe a network location set to Public? A. You can see all of the devices on the network B. Your computer is managed by the Active Directory domain C. All of the devices on the network can see you D. Network discovery is turned off E. You can join an available HomeGroup

D. Network discovery is turned off When Windows 7 is set to a Public network location, discovery is disable and other devices are not able to see you on the network.

Which of these utilities will allow you to manage all of the printers on your network from one central console? A. Print Spooler B. Event Viewer C. Device Manager D. Print Management

D. Print Management The Windows Print Management utility can manage all of your printers and add and manage printer drivers for your entire network from one single console.

Which of the following would be the best choice for making changes to the Windows Registry? A. EDITREG B. NOTEPAD C. HIVEDIT D. REGEDIT E. CMD

D. REGEDIT

Which of these would be best associated with Windows Defender? A. Control access to a TCP port number on your computer B. Automatically install operating system patches C. Encrypt a volume or entire hard drive D. Stop malware from executing on your system E. Restrict access to the system BIOS

D. Stop malware from executing on your system Windows Defender is designed to stop malware from running in your operating system, and it's included with Windows Vista, Windows 7, and Windows 8.

You would like to allow your organization to use USB flash drives, but you are concerned that the private information on the drives might be easily lost or misplaced. Which of these would ensure that the USB drives would always be secure? A. Use EFS to encrypt the drives B. Only allow USB drive access from secure computers C. Format the drives with the NTFS file system D. Use BitLocker to encrypt the drives

D. Use BitLocker to encrypt the drives BitLocker is a Windows technology that is designed for the security of entire drives, regardless of the contents. Unlike EFS which only encrypts certain files, BitLocker can be configured to automatically encrypt the entire drive.

Which of the following would be the best way to view the list of current Linux processes? A. Task Manager B. sudo C. tasks D. ps E. cpustats

D. ps

Which of the following attacks would most likely cause a web server to become unresponsive? A. Man-in-the-middle B. Social engineering C. DDoS D. Brute force E. Trojan horse

DDoS

hat type of Windows 7 disk supports the mirroring of data? A. Basic B. Hybrid C. Advanced D. Dynamic E. Active

Dynamic

Which of the following Anti-virus applications is included with Mac OS? A. Security Control B. Anti-Virus Manager C. Innoculator D. Virus Firewall E. None of the above

E. None of the above

Which of these utilities would be the best choice for configuring Windows boot options? A. Boot Manager B. Device Manager C. Services D. Local Security Policy E. System Configuration

E. System Configuration

Which of these would be the best choice for running a daily backup program? A. SFC B. Component Services C. Task Manager D. Device Manager E. Task Scheduler

E. Task Scheduler The Windows Task Scheduler can be used to schedule the execution of any program or process.

What feature is used in Mac OS to customize your trackpad? A. Practice Pad B. Clicker C. Gestures D. Mouse Trap E. Track Builder

Gestures

During your Windows installation you have the option to define file system types for your data. Which of these file systems would provide the most compatibility with other operating systems? A. NTFS B. CDFS C. FAT D. MBR

FAT

What mobile device component detects pitch, roll, and yaw of the device? A. Capacitive touchscreen B. Gyroscope C. Accelerometer D. Stylus E. Global positioning system receiver

Gyroscope

Which of these protocols are used when retrieving email from a commercial email provider such as Google Mail or Outlook.com? A. FTP B. IMAP C. SNMP D. MAILPOP E. SMTP

IMAP

Which of these protocols would be exclusively used to retrieve mail on an Android device? A. HTTP B. SSL C. IMAP D. SNMP

IMAP

Which Windows utility can give you information about the make, model, and version of your BIOS? A. Event Viewer B. MSINFO32 C. Task Manager D. BIOSINFO

MSINFO32

Which of these technologies provides a virtual machine with a shared IP address? A. NAT B. Bridging C. Load balancing D. Spanning tree E. Routing

NAT

What type of malware would encrypt all of your personal documents and require you to pay to obtain the decryption key? A. Phishing B. Trojan horse C. Man-in-the-middle D. Ransomware E. Spyware

Ransomware

What email protocol uses TCP port 995 as the default communications port? A. POP3 B. IMAPS C. SMTP D. POP3S E. IMAP

POP3S

You'd like to build your own applications without the time and expense of writing everything from scratch. Which of the following would be a good choice for this requirement? A. IaaS B. Object-oriented development C. Hybrid cloud services D. PaaS E. SaaS

PaaS

hich of these permissions apply only to connections made over the network? A. NTFS B. Ethernet C. FAT32 D. Share

Share

Which of these commands would you use to delete a folder from your hard drive? A. CD B. RD C. MD D. FD

RD

Which of these would be the best description of a security vulnerability that modifies core system files and can be invisible to the operating system? A. Worm B. Phishing C. Rootkit D. Virus E. Botnet

Rootkit

What is commonly used by Microsoft Outlook to encrypt and digitally sign email messages? A. POP3S B. S/MIME C. SSL D. IMAPS E. PGP

S/MIME

You are troubleshooting a printing issue on a client's Windows XP computer, and have found that the Windows Spooler is stopping unexpectedly. Which of these would be the best choice for restarting the Windows Spooler? A. Print Manager B. Task Manager C. Computer Management D. Services

Services

Which of these applications is compatible with Mac OS Screen Sharing? A. Microsoft Remote Desktop B. TeleCommute C. VNC D. iShare E. RDP

VNC

Which of these CPU technologies provides hardware support for virtualization in the CPU hardware? A. Hyper-threading B. VT C. Multi-core D. DMA E. L1 cache

VT

Which of these would best describe the component on a mobile device that can detect motion and determine which way is "up?" A. Calibrator B. Global positioning system C. 802.11 radio D. Accelerometer E. IR sensor

Which of these would best describe the component on a mobile device that can detect motion and determine which way is "up?" A. Calibrator B. Global positioning system C. 802.11 radio D. Accelerometer E. IR sensor

You suspect your Windows XP hard drive is having problems, so you'd like to check the drive for bad sectors. How can you start this test from the command line? A. chkdsk /f B. chkdsk /r C. chkdsk /d D. chkdsk /z

chkdsk /r

You need to configure a Linux file attribute to be read-only. Which of the following commands would be the best choice? A. chmod B. attrib C. filemod D. chown E. filemod

chmod

Which of the following Linux commands allows you to modify the group ownership of a file? A. groups B. modifygrp C. grouping D. grpown E. chown

chown

Which of the following commands would be the best choice for backing up an entire Linux partition? A. backupd B. Backup Manager C. dd D. Disk Manager E. Partitioner

dd

. You are working at the windows command prompt, and you need to know the size of a file on the hard drive. Which of these commands would provide you with this information? A. chkdsk B. format C. dir D. edit

dir

Which of the following would be the best choice to check for file system problems in Linux? A. chkdsk B. diskcheck C. apt-check D. fsck E. rpmchk

fsck

Which of the following would be the best choice for synchronizing an Apple iPhone to a Windows desktop? A. Windows Phone app B. Terminal C. App Store D. iPhone Sync E. iTunes

iTunes

Which of the following would be the best way to view IP address configuration information in Linux? A. ipinfo B. ifconfig C. addr D. ipconfig E. stackinfo

ifconfig

. You need to delete a file from a Linux directory. Which of the following would be the best command to use? A. del B. mv C. rm D. erase E. delete

rm

Which of the following commands can restart a Linux computer from the command line? A. kernel B. halt C. load D. shutdown E. start

shutdown

. Which of these Linux commands would you use to execute a command with the credentials of a different user? A. ps B. sudo C. chmod D. dd E. apt-get

sudo


Conjuntos de estudio relacionados

Principles of Microeconomics Chapter 12: Perfect Competition

View Set

Final Exam Prep Research Methods

View Set

Chapter 8: Lifting and Moving Patients

View Set

Nurs3554 Exam 3 Violence and Anger

View Set