A+ Essentials and Practical Applications Ch. 9-12

¡Supera tus tareas y exámenes ahora con Quizwiz!

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not.

1. Trusted 2. Untrusted

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?

ps -e

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details

Which of the following is an extra button or knob on a laptop keyboard that moves the mouse cursor?

Pointing stick

Which of the following are true of libraries? (Select TWO.)

1. A single folder can be added to multiple libraries. 2. Each library can contain multiple folders from different file system locations.

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

Which of the following file extensions indicates a Windows system file? (Select TWO).

1. .dll 2. .vxd

Which of the following file extension types can be run from the command prompt? (Select THREE).

1. .exe 2. .bat 3. .com

You are purchasing a PC system that will be used as a file and print server in a small business. Which of the following hardware selection criteria is the MOST important for this system? (Select TWO).

1. 64-bit multi-core processor 2. RAID 1+0 array

A technician is assisting Ann, who reports that the display on her company-issued smartphone is too dim to read in a dark room, even after she adjusts the brightness setting. Which of the following actions should the technician perform FIRST? (Choose TWO).

1. Adjust the adaptive or automatic brightness control. 2. Adjust the battery saver setting.

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select TWO.)

1. Administrators 2. Remote Desktop Users

A company executive has just bought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select TWO.)

1. Anti-virus apps are available for purchase from Android app stores. 2. App reviews and ratings will help you choose an effective anti-virus app.

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to Active Directory? (Select TWO.)

1. Centralized configuration control 2. Centralized authentication

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO).

1. Configure both share and NTFS permissions. 2. Place the files on an NTFS partition.

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select TWO.)

1. Configure the application to automatically download and install updates as they are released. 2. Check the DataComLink Website regularly for patches and updates to the software.

Vera has brought her notebook computer to you for repair. After listening to her describe its symptoms, you hypothesize that the notebook may have a malfunctioning keyboard. Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced? (Select TWO).

1. Connect an external keyboard. 2. Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks.

A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO).

1. Disable the Guest Account. 2. Rename the Administrator account.

A user wants to use a laptop to display a presentation on a large TV monitor that has an HDMI connection. Which of the following laptop ports or connections can be used to add this display device? (Select TWO).

1. DisplayPort using a DisplayPort-to-HDMI cable 2. USB port using a USB-to-HDMI adapter

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO. Each option is part of the complete solution.)

1. Enable the Erase Data option. 2. Disable the Simple Passcode option.

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright to the user. Which of the following technologies is uses to detect this device movement? (Select TWO).

1. Gyroscope 2. Accelerometer

You have just purchased a new home and want to purchase a home theater computer system. Which of the following hardware selection criteria are the MOST important for this system? (Select TWO).

1. HTPC form factor 2. Video card with HDMI output

You want to configure Power Plans on your Windows 10 laptop computer. Which of the following can do this? (Select TWO.)

1. In the Notification Area, double-click the battery icon. Click Power Options. 2. Go to Settings > System > Power & sleep.

You have a notebook computer with a built-in wireless network card. One day, it stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard. What can you use to connect to the wireless network? (Select TWO.)

1. Insert an ExpressCard wireless network card. 2. Insert a wireless USB network card.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's accounting department. She received a single Windows 10 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select TWO).

1. Install one system and image it to the other systems. 2. Use a network installation.

Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select THREE.)

1. Locator applications 2. Remote wipe 3. A screen lock

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

1. Lock the screen with some form of authentication. 2. Keep the operating system up to date.

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use? (Select TWO.)

1. Mobile device management software that performs full device encryption. 2. Mobile device management software that performs remote wipes.

Which of the following statements about virtual NICs are true? (Select TWO.)

1. Multiple virtual NICs can be added to a virtual machine. 2. Virtual NICs need the appropriate driver installed to function.

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select THREE.)

1. Network 2. This PC 3. File Explorer

To protect user data on a Windows 10 system, you've configured System Restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select TWO).

1. No. You need to create a backup of your user data as well. 2. No. You need to enable File History.

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how her computer is running? (Select TWO).

1. Performance 2. Processes

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select TWO.)

1. Performance Monitor 2. Task Manager

Which of the following is true of online software activation? (Select THREE.)

1. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. 2. Before running a newly installed application, the user must activate their license online on the software vendor's website. 3. With personal software licenses, the limit is usually one to three online activations.

You've just opened a text file in the vi editor, and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode? (Select THREE).

1. Press Insert and then press Insert again 2. Press the S key and then press Insert 3. Press the 'i' key and then press Insert

You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running? (Select TWO).

1. Processes 2. Performance

What is the purpose of the Microsoft Management Console (MMC)? (Select TWO).

1. Provide a common user interface for performing system administration tasks. 2. Provide a shell for running snap-ins.

You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning? (Select TWO).

1. Verify that the computer meets the minimum requirements. 2. Create a system backup of the hard drive prior to running the upgrade.

You have been tasked with designing a workstation that will run VMware Workstation virtualization software. A software engineer will use it to run virtual machines for application development and testing. Which of the following criteria should MOST likely be included in your design for this system? (Select TWO).

1. RAM configured to run in quad-channel mode 2. 64-bit processor with eight cores

Which of the following paths opens the Computer Management tool in Windows 10? (Select TWO).

1. Right-click the Windows icon and select Computer Management. 2. In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select TWO)

1. Run the application in Compatibility Mode. 2. Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs.

You have configured your Windows systems to automatically back up user data every night at midnight. You also take a system image backup once per month. What else should you do to ensure that you are protected from data loss? (Select TWO.)

1. Store a copy of all backups off-site. 2. Regularly test restoration procedures.

Your iPad is configured to do remote backups everyday to iCloud. Which conditions are required for the iCloud backup to take place? (Select THREE.)

1. The iPad has to be plugged into a power source. 2. The iPad screen has to be locked. 3. The iPad has to have an internet connection.

You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working. Which of the following is the MOST likely cause? (Select TWO).

1. The inverter in the LCD assembly has malfunctioned. 2. The cold cathode fluorescent lamp has burned out and needs to be replaced.

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select TWO.)

1. They are moving away from DRM because of several key shortcomings in the technology. 2. They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files.

Which of the following statements are true regarding administrative shares? (Select TWO).

1. To connect to an administrative share, you must use the UNC path. 2. By default, Windows automatically creates an administrative share for every volume.

A user hibernates a laptop after giving a video presentation. Now, when it resumes, the display flickers for a moment, but remains blank. A technician suspects a bad graphics processing unit (GPU). Which of the following troubleshooting steps should be completed? (Select TWO).

1. Toggle the dual display function key. 2. Connect an external display device.

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 10 PC to the device. How can you connect the device to the PC? (Select TWO. Each option is a complete solution.)

1. USB cable 2. Wi-Fi wireless connection

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.)

1. Use Resource Monitor to monitor memory utilization 2. Use Task Manager to monitor memory utilization.

You are in the process of preparing a storage device and must determine which file system to use. Under which of the following conditions are you MOST likely to you choose exFAT over FAT32 or NTFS? (Select TWO).

1. When storing files larger than 4 GB in size. 2. When formatting removable flash devices.

You need to protect the user data on a Windows 10 system. Which tools could you use to do this?

1. Windows 7 (Backup and Restore) 2. File History

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.)

1. You risk losing your job. 2. You expose your company to litigation by violating the software license agreement.

While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select TWO).

1. Your user files were not affected when the system was reverted to the restore point. 2. You must reinstall any applications that were installed after the restore point was taken.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).

1. less /var/log/auth.log 2. more /var/log/auth.log

Which commands can you use to create a new directory? (Select TWO).

1. mkdir 2. md

After installation, you Windows 10 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this? (Select TWO. Each response is a complete solution.)

1. w32tm /query /source 2. w32tm /query /status

Which feature makes it possible to close some notebook computers and still use the touchscreen?

180 degree rotating touchscreen

You need to replace the hard disk in your laptop computer. Which of the following hard drive sizes would you likely choose for the laptop?

2.5"

Which port does Telnet use?

23

While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is MOST likely being used?

Hotspot

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

Drivers for a small trucking company rely on a smartphone navigation application. When the smartphone loses internet connectivity, the maps don't update properly. Also, the company pays extra for a premium data service plan to support the application. Which of the following mobile devices could replace the smartphone navigation application, could provide map coverage when internet connectivity is lost, and does not require a data plan?

A GPS-enabled personal navigation device

A sales person typically carries a laptop computer to several off-site customer meetings each day, but needs the flexibility to quickly attach other peripherals and charge the laptop battery while at their office desk. Which of the following laptop feature would BEST meet these requirements?

A laptop docking station

Mobile devices can connect to the internet and other devices using a variety of connection types. Drag the connection type on the left to the appropriate description on the right.

A physical location where you can obtain wireless internet access using a WLAN.: Hotspot A connector used to emulate cryptographic smart card functionalities.: NFC Provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.: Mobile VPN Allows you to share the internet connection of a phone with a laptop.: Tethering A wireless technology standard for exchanging data over short distances.: Bluetooth

A manufacturing company has customized a computer application that supervisors will use to track line worker efficiency. Supervisors will interact with the application while walking within and between work areas and will also use the laptop while sitting at their desks. Which of the following laptop features would BEST minimize the awkward movement of carrying a bulky laptop with a hinged display while providing the flexibility to use the device at a desk?

A rotating or removable screen

When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use?

A runaway application does not respond to user input.

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business?

A workgroup

You are currently managing a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device?

ARM

You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

Accounts

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory

Joe is working on a design team that uses a computer-aided design (CAD) system. Joe has been complaining that it takes too long to perform tasks such as panning, rotating, and zooming. You have been asked to look at Joe's computer and to make any changes required to increase Joe's productivity. Which of the following changes would BEST meet Joe's needs?

Add a very high-end video board.

You want to upgrade your Windows 7 Professional computer to Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10. What should you do?

Add more memory.

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators

You need to configure File History to automatically delete any stored snapshots that are older than one month. Click the Control Panel option you would use to do this.

Advanced Settings

Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot, but is still unable to connect to the internet. Which of the following is the MOST likely cause of this issue?

Airplane mode has been set on the tablet.

A technician is tasked with increasing the RAM memory on a laptop by adding a SODIMM module to an empty memory slot. Which of the following processes will seat the module in the slot?

Align the notch on the long side of the memory module with the rise in the memory slot. Insert the module pins into the slot at a 45-degree angle. Rotate the module by pressing down until the side hold-down clips snap into place.

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control to both.

Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control to both.

You have removed the bezel from a notebook display that has stopped functioning. You see a DC-to-AC power inverter at the base of the screen. Which of the following BEST describes the type of display you are working with?

An LCD display that uses CCFL backlighting.

The integrated mouse, the small monitor, and the compact nature of the keyboard are impeding your work when you use your notebook, but you still need a system that is portable if necessary. You currently own a spare USB mouse and keyboard, as well as a nice monitor. Which option will give you the portability you need while at the same time save money and not impede your work?

Buy a docking station for your notebook.

Which file attribute identifies the file as having been modified since the last backup?

Archive

A technician is tasked with replacing a Wi-Fi antenna in a laptop computer. Which of the following places would the antenna MOST likely to be located?

Around the laptop's bezel

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.

Buttons

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so?

Back up all data to an attached computer or a cloud backup service.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files?

Back up her files using File History.

You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following MUST you complete to accomplish this task?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used?

Biometric authentication

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

Where system root is the C: drive, where are fonts stored on a Windows 10 system?

C:\Windows\Fonts\

You want to configure your Windows 10 workstation so that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft. Click the Settings app option you would use to do this.

Choose how updates are delivered

A technician installs a new touch screen on a laptop. Directly touching on an on-screen button doesn't depress or activate the button, but touching near the button does. Which of the following actions will correct the misalignment?

Calibrate the touchscreen.

Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right.

Causes the policy to be enforced: Enabled Does not change the current setting for the policy: Not configured Prevents the policy from being enforced: Disabled

Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem?

Check the number apps that are running.

A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access?

Check the tablet for unauthorized root access.

Which category can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?

Clock and Region

Match the mobile operating systems on the left with the descriptions on the right. Each mobile operating system may be used once, more than once, or not at all.

Closed source and second most popular mobile device operating system.: iOS Device manufacturers are countless.: Android Open source and most popular mobile device operating system.: Android Device manufacturers include Microsoft, Samsung, and HTC.: Windows Devices solely designed and developed by Apple.: iOS Closed source and third most popular mobile device operating system: Windows

System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System Protection for the C: volume. Click the option you would select to do this.

Configure

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D:\ drive.

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely back up important data to the Cloud.

You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager?

Control Panel

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: Allow Full Control to the D:\Reports folder. Deny Full Control to the D:\Sales folder. Deny Full Control to the D:\Reports\2010reports.doc file. Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc.

Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc.

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue. What should you do next?

Deploy the hotfix on a test computer.

A technician is troubleshooting a company cell phone that is overheating. Which of the following is the FIRST action the technician should perform?

Determine whether the battery is warped or swollen.

Which of the following input devices uses a stylus?

Digitizer

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?

Directory permissions

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable Secure Desktop

Drag each definition on the left to its corresponding performance counter on the right. Each definition may be used once, more than once, or not at all.

Disk queue length: The number of read and write requests that are waiting to be processed. Processor utilization: The amount of time the processor spends performing non-idle tasks. Commit charge: The amount of memory that has been assigned to running processes. Disk time: The amount of time that the disk subsystem is busy reading from and writing to disk. Memory pages per second: The number of hard faults that occur each second.

Which component lets you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard monitor, and speakers?

Docking station

Match the Active Directory definition on the left with its corresponding term on the right. (Some definitions do not have an associated term on the right.)

Domain Controller: A server that holds a copy of the Active Directory database that can be written to. Site: Represents a group of networks that are connected with high-speed links. Subnet: Represents a physical network segment. Forest Root Domain: The first domain created in an Active Directory forest. Tree Root Domain: The highest-level domain in a tree.

Your company has issued you a new laptop computer that contains a lot of memory and two very large hard disks. Since your computer at home is old and slow, you want to use your work computer for personal use as well. To keep your applications and files totally separate from the company's, you have been told you can run more than one version of Windows on the same computer, one for work, and one for personal use. Which of the following technologies would BEST meet your needs?

Dual boot

You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected?

During the installation, browse to and select the appropriate driver for your RAID controller when prompted.

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?

Edit settings in the Local Security Policy.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users?

Edit the properties for the file; assign Rachel the Deny Full Control permission.

You have just purchased a new laptop with built-in 802.11 wireless and Bluetooth capabilities. When you boot into Windows, you do not see a Bluetooth adapter listed in Device Manager. Which of the following would be BEST to perform first?

Enable Bluetooth in the BIOS/UEFI configuration.

Rachel, an employee in the support department, wants to run a virtual machine on her computer from which she can troubleshoot customer issues. Which of the following must you complete before virtualization will work on her computer?

Enable virtualization support in the BIOS settings.

You want to use Hibernation on your Windows notebook. What does it need to have?

Enough free hard drive space

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a Remote Assistance connection and watch what the user is doing.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

Which component within a tablet device, senses rotation to measures acceleration horizontally and vertically at the same time?

Gyroscope

You need to replace the video card in a laptop. What is the first step?

Find a service manual with correct disassembly procedures.

You have just purchased a used laptop, and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. Which of the following will BEST resolve this issue?

Free up disk space.

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

Full Control

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?

Full device encryption

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object.

You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this? (Select TWO).

Get 64-bit drivers for all hardware.

You are purchasing several PC system that will be used as thin clients in a large organization. Which of the following hardware selection criteria would be the MOST important for this system?

Gigabit Ethernet adapter

On a Windows system, which of the following is true of groups?

Group members have the access rights assigned to the group.

After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration, and he knows it to be correct because it was working yesterday. What should you do first?

Have him verify that the wireless card's hardware switch is in the On position.

A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software.

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfil Ben's needs?

Hidden share

A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the SIMPLEST way to power down the laptop?

Hold down the power button for several seconds.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

Hotfix

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs on in a virtualization environment?

Hypervisor

You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use?

IaaS

Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?

If the battery dies during the update, the operating system could become corrupted.

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete?

If you disconnect during the update, the operating system could become corrupted.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops?

Image deployment

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select TWO. Each choice is complete solution.)

In the Control Panel, select System and Security and then Security and Maintenance.

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the library.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert Mode

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 10 on this system?

Install Windows the same way you would a system that uses a standard hard disk drive.

Which of the following actions directly improves system security on a Windows workstation?

Install the latest updates.

You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. Which of the following will BEST resolve this issue?

Instruct the employees to activate their Windows installation.

Don is an accountant in the Finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones?

NFC chips

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?

Open source

A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device. Which of the following connection types is being used?

Lightning

Which of the following battery types offers the greatest storage capacity in the smallest amount of space?

Lithium ion (LIB)

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

Match each Active Directory term on the left with its corresponding definition on the right.

Logical organization of resources: Organizational unit Collection of network resources: Domain Collection of related domain trees: Forest Network resource in the directory: Object Group of related domains: Tree

You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability?

MMC

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?

Make Manuel the owner of the file.

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. Which of the following is the BEST next step?

Make sure that all installed applications run correctly.

A user complains that his notebook display has started to go dim intermittently. You suspect the backlight might need to be replaced, but you want verify that the backlight is failing before you replace it. Which of the following would be BEST to check before replacing the backlight?

Make sure that the dimming isn't being caused by a power saving method that has been configured to conserve notebook power.

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer. Which of the following steps is the BEST course of action?

Manually install applications, copy data, and configure settings on the new computer.

Which of the following is a 172-pin DIMM often used in laptops?

MicroDIMM

As an IT technician, you are often asked to work on laptop computers that included internal wireless network cards. Which of the following is the MOST commonly used type of card for these internal wireless adapters?

Mini-PCI

Which type of interface is typically used for internal wireless networking cards in laptops?

Mini-PCI

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document.

Which utility allows you to choose Selective Startup in Windows?

Msconfig (System Configuration)

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32

Which feature allows a tablet to recognize multiple finger touches at the same time?

Multi-touch

After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

Multifactor authentication

Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works. Which tool will help you troubleshoot this problem?

Multimeter

What key advantage does a virtual router have over a physical router?

Multiple networks can be connected to a single interface.

You have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates. What is this process called?

Mutual authentication

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

Network share

Which of the following battery types has the greatest need to be completely drained before being recharged?

Nickel cadmium (NiCad)

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

You need to back up user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to backup user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work?

No. Backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

You are an IT administrator for your company. You have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances?

PXE

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

Performance

Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system?

Performance Monitor

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files

You are troubleshooting a malfunctioning laptop computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?

Plug in an external monitor.

While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this.

Pointer Options

A user needs to use her laptop to give a presentation using a video projector. She called asking you how to switch the display to the external monitor port on her laptop. What should you tell her?

Press and hold the Fn key; then press the monitor function key (image of a monitor on it).

Match each cloud computing definition on the left with the appropriate characteristic on the right. Each characteristic may be used once, more than once, or not at all.

Provides resources to a single organization.: Private cloud Combines public, private, and community cloud resources from different service providers.: Hybrid cloud Designed to be shared by several organizations.: Community cloud Provides computing resources that are accessible by the general public.: Public cloud Keeps one organization data separate and secure from any other organization using the same service provider.: Private cloud

You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the lowest cost and least effort. Which of the following would be the BEST way to install Windows 10?

Purchase a 64-bit upgrade version of Windows 10 and perform an in-place upgrade.

You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. Which of the following would BEST meet your needs?

Purchase a full version of Windows 10 and perform a custom installation.

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution?

Set login time restrictions.

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change?

System Properties > Computer Name

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services to these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent?

Rapid elasticity

You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus registers taps about one inch to the right of where the taps actually occur. Which of the following actions would MOST likely fix this issue?

Recalibrate the digitizer pad.

Which tool lets you view and directly edit the registry?

Regedit

Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?

Remote Assistance

A user reports that an older laptop is having trouble connecting with newer wireless networks. Which of the following actions should a technician consider as an alternative to replacing the laptop?

Replace the internal wireless card.

A technician is servicing a laptop that works properly when the power adapter is plugged in. Even though the battery icon shows that the battery is fully charged, when the laptop is unplugged, the laptop immediately shuts down. Which of the following actions should the technician perform?

Replace the laptop battery.

For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. Which of the following is the BEST step the user can take to fix this problem?

Reset to factory default

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor

You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 7 to Windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 7 operating system?

Restore her system using the recovery partition.

A technician is replacing a hard drive in a laptop. Which of the following is the FIRST action the technician should perform before opening the laptop case?

Review the laptop manufacturer's documentation.

An internal laptop keyboard is generally connected to the laptop's system board using a:

Ribbon cable

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running?

Right-click > End task

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to stop the application from running?

Right-click > End task

Which of the following can be used to create a secure connection to a remote server?

SSH

Which of the following network services or protocols uses TCP/IP port 22?

SSH

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue?

Run an anti-malware scan.

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used?

S/MIME

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?

SaaS

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

Scheduled backups

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?

Screen Sharing

A technician finds that after restoring the operating system on a mobile device, the touch screen operates unpredictably. This happens in both the default orientation or when the screen is rotated. Which of the following would BEST correct the problem?

Screen calibration

A user is trying to log into Windows on her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is MOST likely causing this problem?

She has turned Num Lock on, causing the keyboard to register numbers instead of letters.

Travis, a long-haul truck driver, reports that when driving on remote highways, his smartphone battery drains faster than normal, and his phone calls often cut out. Which of the following is the MOST likely reason for the fast battery drain? Limited data plan

Signal drop or weak signal

Which ACPI power state allows a system to start where it left off, but all other components are turned off?

Sleeping

System Restore has been enabled for all volumes on a Windows system. Recently, a new network driver was installed on the system. However, the driver code contained bugs, and now your network board no longer functions. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed. Click the option you would use to do this.

System Restore

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. Click the Control Panel option you use to accomplish this task.

System and Security

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

A technician is tasked with repairing a laptop keyboard with sticking keys. Which of the following actions should the technician perform before replacing the keyboard?

Spray compressed air between the keys.

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

Startup

You have just installed the latest Windows updates on your Windows 10 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Since your computer won't start, you have booted your computer into the Advanced Options section of the Windows 10 recovery environment (see image). While troubleshooting this issue, which of the advanced options would be the BEST to try first?

Startup Repair

A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure?

Swipe lock

A company is considering providing smartphones to their employees and is investigating the interaction of the phones with iTunes, iCloud, Google Drive, Dropbox, and OneDrive. Which of the following data synchronization methods is being considered?

Synchronization to the cloud

Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages?

System

You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update?

System protection

You manage a Windows system. You want to view information about all of the programs running on your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?

Task Manager

Your computer has a quad-core processor that supports multithreading installed. Given that the system is running Windows, how can you verify whether multithreading has been enabled?

Task Manager can display CPU utilization graphs for eight processors.

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task Scheduler

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

The Hide Programs option setting is configured for a specific user as follows: Policy Setting Local Group Policy Enabled Default Domain Policy GPO Not configured GPO linked to the user's organizational unit Disabled After logging in, the user is able to see the Programs option. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?

The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

Sound isn't coming from the internal speaker on a tablet device, even after a user checks its volume settings and makes sure it is not muted. Which of the following is the MOST likely reason?

The audio output is being directed to a Bluetooth speaker.

A technician is tasked with replacing an internal laptop hard drive. Which of the following hard drive standards would be of MOST concern when selecting a replacement?

The hard drive's form factor

A technician is unable to install virtualization software on a host computer. The host has more free disk space than required. Which of the following is MOST likely to be the cause?

The motherboard UEFI/BIOS doesn't support hardware assisted virtualization.

A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would BEST help the technician diagnose the problem?

Toggle the touchpad function key.

Match the virtualization implementations on the left with the appropriate characteristic on the right. Each type of implementation may be used once, more than once, or not at all.

The virtual machine completely simulates a physical computer system.: Full virtualization Operating systems do not need modification to run within virtual machines.: Full virtualization Only some of the components of a virtual machine are virtualized.: Partial virtualization Guest operating systems directly access hardware resources in the hypervisor host system.: Paravirtualization

You are the IT administrator for your company. You have several users who want to work from home by connecting to a server running at the corporate headquarters. Your manager has asked you to keep costs to a minimum as you provide computers for this environment. Which of the following types of PCs would work BEST for these remote users?

Thin client

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?

Time & Language

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

When a presenter at a conference connects a laptop to a projector, the projector mirrors the laptop's display. The presenter would like it to extend the laptop's desktop instead. Which of the following options is the QUICKEST way to make the change?

Toggle the dual display function key on the laptop.

You have been asked to install Windows 10 on 30 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend?

Unattended

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages?

Unintended Wi-Fi connections

After replacing a laptop touchpad, a technician finds that the touchpad does not move the cursor. However, the attached USB mouse does. Before opening the laptop case to re-check the connection, which of the following actions should the technician perform?

Unplug the USB mouse and re-check touchpad movements.

In preparation to use your notebook on the airplane as you travel to a conference, you disconnected the external USB mouse. The cursor drifts consistently to the left side of the screen while using the built-in trackpad and mouse buttons on the notebook. Which of the following actions would MOST likely stop the mouse from drifting?

Update the trackpad drivers.

You are preparing to install a 64-bit version of Windows 10 on a computer that is currently running a 32-bit version of Windows 7. You perform a hardware inventory on the computer and note the following: Processor = 2.0 GHz Free hard drive space = 200 GB RAM = 1 GB DVD drive = 18x 100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 10. What should you do?

Upgrade to at least 2 GB of RAM.

The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful. Which of the following types of mobile devices should you tell them to search for?

Wearable devices

A user normally connects a laptop to a company's network using the laptop's internal wireless NIC. The laptop does not have an Ethernet port. The wireless network has failed, and the replacement part will take two days to arrive. Which of the following solutions will connect the laptop to the company's wired network?

Use a USB-to-RJ45 dongle and connect to a wall jack with an Ethernet cable.

Which term refers to a software implementation of a computer system that executes programs like a physical machine?

Virtual machine

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.

You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. Prior to the upgrade, you need to verify the compatibility of each computer with Windows 10. You want to gather the necessary information as quickly as possible. Which of the following will BEST collect the required information?

Use the Microsoft Assessment and Planning Toolkit (MAP).

You recently purchased a copy of Windows 10 from a retail store. The system you want to install Windows on doesn't have an optical drive. What is the BEST option for installing Windows in this scenario?

Use the Windows USB/DVD Download Tool to copy the installation files to a USB flash drive.

A user opens a help desk ticket to replace a laptop keyboard. The user reports that the cursor randomly moves when typing using the laptop keyboard, causing the user to make frequent typing corrections. The problem does not occur when the laptop is attached to a docking station and an external keyboard is used. You want to find a more affordable solution than replacing the keyboard. Which of the following actions would mitigate the problem?

Use the special function key to disable the touchpad when the laptop keyboard is used.

Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation?

User Account Control (UAC)

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

Users

A technician was tasked with implementing a solution that would allow the IT department to push OS updates to mobile devices in order to keep them updated and secure. Which of the following would provide that capability?

Using Mobile Device Management (MDM).

The servers for the company are all virtual machines and hosted on the same hypervisor. You need to keep users in all other departments from accessing the virtual servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

VLANs

A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at off-site locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

What is the purpose of the Services snap-in?

View and manage software programs running in the background.

What is the purpose of the dxdiag tool?

View information related to DirectX operation.

Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.

View your update history

From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future?

When I close the lid: Hibernate

You have a fairly new computer that was installed with an old version of Windows Vista. This was required to fix some software your company is still supporting. To maintain the data collected while running Vista, you decide that it would be best to upgrade this computer to Windows 10 instead of doing a clean install. Knowing that you can't upgrade directly to Windows 10 from Vista, you plan to first upgrade to Windows 7 and then upgrade from Windows 7 to Windows 10. Which of the following would BEST help you determine whether the computer will support Windows 7?

Windows Upgrade Advisor

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

You currently use the Exchange email client on your desktop PC. You use it to connect to an email server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server. Which of the following BEST describes whether this task can be accomplished?

You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\Home1\Pictures

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt-get install httpd

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?

biometric authentication

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo

Which command would you use to change the current directory to the immediate parent directory?

cd ..

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use?

chmod

What type of resources offer the following advantages? Flexibility of access Ease of use Self-service provisioning of resources API availability Metering of services Ability to try out software applications

cloud

Which Windows command displays a list of files and subdirectories in a directory?

dir

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task?

gpupdate

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

grep

While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

What command lets you see a list of valid command parameters for the net use command?

net use /?

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Your Windows client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?

w32tm /tz

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

yum install httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system?

yum list available

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd


Conjuntos de estudio relacionados

Ch. 12.3- Investing in Equities, Futures, and Options

View Set

A Level Geography - Hazardous Earth Continued

View Set

III (Infection, Inflammation, & Immunity)

View Set