A exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the maximum number of partitions allowed using the GUID Partition Table (GPT) method for partitioning a drive for Windows?

128

What type of OS should you install for best performance when you have enough RAM?

64-bit

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

802.11ac, 802.11n

Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device. What else does Jackson need in order for the thermostat to be considered an IoT?

App to control it over the Internet, IoT bridge

Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

What step in the laser printing process is responsible for conditioning the imaging drum in preparation for receiving an electrical charge?

Cleaning

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the Advanced button to open Advanced Security Settings for the file

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script

A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)

Crimper, Cable tester, Cable stripper

Jenny is preparing to install Windows 10 on a system that has a version of Windows 8.1 installed. This version of Windows 8.1 runs slowly and crashes occasionally. The optical drive also does not work, so Jenny decides to use a flash drive to install Windows 10. Jenny wants to remove all the programs and data from the computer and start over with Windows 10. What type of installation should Jenny perform?

Custom installation

A company purchased a high-quality color laser printer to print color brochures and sales proposals. The printer is connected to a marketing PC via USB and is configured as a shared local printer for use by the sales and marketing teams. The manager is concerned about the cost of consumables for the printer and does not want users to unintentionally print to the printer. What can be done to ensure that only authorized users can send print jobs to the printer?

Enable user authentication on the printer share.

Which of the following terms describes the software layer that is responsible for creating and running a VM on a host?

Hypervisor

A technician requires a file system on an internal 1.5 TB Windows 10 boot drive that supports file encryption, disk quotas, and security features such as file and folder permissions .Which of the following will support these requirements?

NTFS

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

Port 443, SSH

A user is experiencing garbled print on each page printed from her printer. Which of the following would be a probable cause for the garbled print? (Select TWO.)

Print drivers are corrupt or need to be updated, An application on the computer is sending garbled print.

A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remote Assistance to view a very detailed and cryptic error message on the user's desktop. Each attempt the technician makes to connect to the remote computer results in a message stating the connection was refused. Which of the following protocol and port number combinations should be opened on the remote computer's firewall to allow this connection?

RDP, port 3389

Which of the following are advantages of implementing cloud computing over services hosted internally? (Select THREE.)

Rapid elasticity, On-demand services, Metered services

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update?

Remove malware

Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings but freshen up all Windows components. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach?

Repair upgrade

A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen.What display setting will the user adjust?

Resolution

Scott has just completed installing Windows 8.1 and its current updates and now needs to install several applications on the computer before returning it to his client. What should Scott check prior to installing the applications? (Select all that apply.)

System requirements, Hard drive space

Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed on her computer. Where can Wanda find this information quickly in Windows 10?

System window

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual. Which of the following should you consider as a cause for these issues?

The device is infected with malware.

A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 TB. What is the most likely reason the user is unable to format the disk to its full capacity?

The disk is using the MBR partitioning scheme

A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an as-needed basis. Which of the following Storage Spaces features describes this functionality without the need to also reconfigure the available space to users?

Thin provisioning

Which of the following network categories is being used?

WMN

Which Microsoft command-line command should Henry use to check whether he can connect to the server?

ping

Which of the following Windows commands will delete the files and directories at the destination location that no longer exist at the source location?

robocopy /purge

Which of the following best describes a variable when implemented in a script?

A container for storing data values that can be assigned, referenced, and manipulated.

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Accelerometer

Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network?

Access control list

Which of the following tools are available in Windows 10 for backing up user data or complete system images? (Select TWO.)

Backup and Restore, File History

Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?

Boot Logging

Which of the following will meet these requirements?

Cable

James travels for business and is always worried that his laptop will be taken from his room.Which type of device will ensure that James's laptop will not be stolen while he travels?

Cable lock

erry is working at the desk of a client in the marketing department of his company. The client thinks that the problem is the video card, because he has a computer at home with the same problem. The client explains to Jerry that when he fixed the problem, he had to reseat the video card. What should Jerry do when dealing with the client? (Select all that apply.)

Compliment the client on his knowledge, Ask the client to backtrack to see what things he tried in order to fix the computer, Check the simple things first to make sure you do not miss anything

A technician wants to use a hosted virtual machine to provide shared files and folders on the company LAN. Which of the following will provide the necessary network connection for the VM?

Connect the virtual NIC to the host's physical NIC

Which of the following must be performed prior to creating a spanned, striped, or mirrored volume on unallocated space in Windows?

Convert basic disks to dynamic disks.

What network setting should you check to see the address of the server being used to resolve this address?

DNS

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?

Details

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device. Which of the following is the first step a technician should take in resolving this issue?

Determine if any other devices are experiencing the same issue.

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable AutoRun

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than your company computers have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting., Enable MAC filtering.

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process?

Educate the end user

James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. What setting in the Startup Settings screen will enable James to see which driver might be failing and causing his computer not to boot?

Enable Boot Logging

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Enable a hotspot on his smartphone.

Your company's email server has been filling up employee's email boxes with advertisements they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software. What will you recommend to your supervisor?

Enable the spam filter

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.Which of the following could be used to network this building?

EoP

George is working onsite at a client's desk. The client's phone rings during George's visit, and the client explains that she must take the call.What should George do in this situation?

Excuse himself and check back when the call is complete.

During your service call at the residence of a customer, you discover you will need a part that you don't currently have. What should you do in this case?

Explain the situation and give the customer options about ordering the part and when you will return to complete the repair

You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are available in Windows 10 for a local hard drive? (Select all that apply.)

FAT32, NTFS

The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity. Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)

FE80::feba:123:8:9343, 169.254.1.1

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

FEFE::2:0:0:1

Penny is setting up computers at a local nonprofit organization. The computers were donated by a company that was upgrading to new computers. Penny must decide whether to use a 32-bit or 64-bit version of Windows 8.1. What hardware on the computers should Penny check? (Select all that apply.)

Hard drive, RAM, Processor

You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. The private trusted network should not be accessible from the public untrusted network. If attacks are coming from the external network, the system should detect and prevent malicious activity. All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?

Implement a UTM appliance.

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

Tracy has completed installing Windows 8.1 on a computer and is ready to install a printer. Tracy attaches the printer to the computer and a message pops up that a new device is being installed. When the process is done, she tries to locate the printer, but the printer is not available. What can Tracy do to use the printer?

Install the driver from the manufacturer's website

A company is in the middle of an operating system update to Windows 10 from Windows XP, Windows 7, and Windows 8.x. The diverse nature of the update has made it imperative that the help desk techs have the ability to run several concurrent VMs. A few of the techs are experiencing frequent and extended periods of 100% CPU usage on their computers, and these spikes are limiting their ability to assist users in a timely manner. Which of the following is most likely causing this behavior?

Insufficient number of physical processor cores.

Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains. What can you tell Sara about the ESP partition?

It was created by GPT to store Windows boot and startup files

Sara receives a call from a customer who just purchased her first computer with Windows 10 installed. She is having some issues using the new computer and needs help setting up a printer. What should Sara do when working with the inexperienced customer? (Select all that apply.)

Keep a positive attitude, Frequently ask the customer what she sees on the screen, Avoid asking the customer to take steps that might destroy files or settings

Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is very upset about the email issue. He is complaining about the email service and the IT department in general. What should Derek do to defuse the situation?

Let the customer vent and then restart the conversation.

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1. ECHO This batch file deletes the temp files 2. DEL %TEMP%\*.* /Q 3. REM The temp files were deleted 4. PAUSEWhich of the lines is a comment?

Line 3

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?

Linux

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account. Which of the following describes the security method being used?

Multifactor authentication

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for making payments at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?

NFC

A technician needs to boot macOS over the network using an image stored on a server.What Apple technology will best assist the technician?

NetBoot

A Windows user is attempting to exit a locked up desktop application that is not responding to mouse or keyboard input. Which of the following steps can be taken to end the application process without exiting other open applications?

Open Task Manager and end the process associated with the application.

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard. Which wire color code will you use starting with pin 1 of the modular plug?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail. What is Becky's mistake called?

Out of scope modification

Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied. What type of data was taken?

PII

Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time?

Performance Monitor

A company asked you to help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

Require user account passwords, Require strong passwords, Set failed logon restrictions

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes

Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled. What kind of malware could be causing the issues on Frank's computer?

Rootkit

In Windows 10, you can find this user-friendly interface to access numerous Windows settings? What is the name of this user-friendly interface?

Settings app

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?

Settings app

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files.

What is responsible for getting a system up and going and finding an OS to load?

Startup BIOS/UEFI

Which of the following are natively supported by the Windows, Mac, and Linux operating systems?

Support for reading and writing to FAT32 partitions

A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available. Which of the following is the most likely reason for this issue?

System Restore is turned off.

user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all its apps were initially installed. Which backup type will be most useful in this scenario?

System image backup

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?

The command needs to be preceded by sudo.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?

The mobile device is on a different Wi-Fi network than the TV

A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally. Which of the following is the most likely reason for this issue?

The operating system or driver is causing the issue.

The laser printer in your accounting department is printing faded prints that are getting lighter over time. What is the most likely reason for the faded prints?

The printer is low on toner.

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy.

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?

The user had previously encrypted her data files and folders using EFS.

The accounting department has implemented thin clients and VDI. One of the users is complaining that each time she powers on her thin client, she has access only to a web browser. Which of the following is the most likely reason for this behavior? (Select TWO.)

The user has not signed in to the VDI server with her user account and password, The user has entered incorrect credentials to the VDI server

You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops. Which of the following is the most likely reason the user cannot find the company WLAN from her own device?

The user's laptop NIC has MAC address filtering enabled.

Henry is sent to work with a customer at the company's satellite branch in another town. During his visit, he notices that most of the computer users are not following the corporate guidelines on password safety and are looking at their personal emails, which is not allowed for security reasons. What can Henry do about these corporate policy issues?

Train the employees on why these issues are security concerns.

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer. What should she do before she runs the anti-malware program?

Update malware signatures.

Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?

Use Startup Repair.

Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in a workgroup. What is the easiest way for Sam to install the application on all the computers?

Use a network share to share the installation files.

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?

Use a third-party remote access app that uses a browser

A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt. Which of the following steps should the technician take next?

Use the tasklist utility to locate the PID for the explorer.exe process

Which of the following is a centrally hosted and managed desktop environment with the capability of spanning multiple offices across various countries in which each user's desktop instance is dynamically provisioned?

VDI

Which of the following steps can be taken to resolve limited or no network connectivity issues on a Windows computer? (Select the best TWO.)

Verify the network cable between the computer and router is connected and not damaged., Verify the SOHO router is powered on and the port LEDs indicate connectivity.

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs. What type of malware is on your computer?

Virus

Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the address bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?

Web server

Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to connect to the cloud and thus have security in case the laptops are stolen. What version of Windows 10 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop?

Window 10 Home

Larry wants to upgrade to Windows 10. He will use his computer both at home and at work and will need to connect to his company's Wi-Fi peer-to-peer network to share files over the network. Which version of Windows 10 would you recommend to Larry?

Windows 10 Home

Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues. What tool can Henry use to create a bootable flash drive in Windows 10?

Windows Media Creation tool

William's supervisor wants to create a test lab at the company in order to test Windows 10 updates. He has instructed William to create a virtual lab. William decides to use Hyper-V as the hypervisor for the virtual machines. When William tries to use Hyper-V, he realizes that it is not installed. What will William use to install Hyper-V in Windows 10?

Windows features

Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet. Where can Eric go to look up the device driver's filename to help him determine what device uses the device driver?

Windows\System32\drivers folder

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?

chown

A Windows 10 user wants to display all the files in all the subdirectories on the E: drive with the file extension of doc.What command would perform this function?

dir e:\*.doc /s

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?

ecurity tab

A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use?

ervices Console

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output. You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.

he cable run connecting the new keystone jack to the patch panel is bad, The patch panel connector for the new location's cable run is not connected to a switch.

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

macOS Recovery

What type of storage drive contains multiple spinning platters?

magnetic hard disk drives

A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool?

mdsched.exe

Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?

smss.exe

What is a partition called after it is formatted with a file system and assigned a drive letter?

volume


Conjuntos de estudio relacionados

Drugs and Society Chapter 9 Test Review

View Set

Ch. 6 Drugs Affecting the Parasympathetic nervous system

View Set

IB SEHS 2.2.9 - Systolic and Diastolic Blood Pressure

View Set