CIST 1130 Midterm Practice CH.2,4,7 & 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

What does Windows 11 do when you log in with an administrator account with elevated privileges? -Assign you a unique administrator token. -Use your credentials to assign you administrative privileges. -Notify you that you have administrative privileges. -Assign you a user and an administrator token.

Assign you a user and an administrator token.

Which of the following documents might a new employee need to sign during the onboarding process? (Select two.) -Acceptable Use Policy (AUP) -Bring Your Own Device (BYOD) Policy -Backup Policy -User Education and Awareness Policy

-Acceptable Use Policy (AUP) -Bring Your Own Device (BYOD) Policy

Which of the following are features of the Windows taskbar component? (Select two.) -Includes a search field for quick location of applications. -Can be hidden. -Can be moved to the left or left-centered on the screen. -Displays breadcrumb navigation when accessing components.

-Can be hidden. -Can be moved to the left or left-centered on the screen.

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by the DataComLink corporation. What should you do to ensure this? (Select two.) -Check the DataComLink website regularly for patches and updates to the software. -Configure the application to automatically download and install updates as they are released. -Download any patches from the company as you are notified of them. -Configure Windows Update to download updates for other Microsoft products when Windows is updated.

-Check the DataComLink website regularly for patches and updates to the software. -Configure the application to automatically download and install updates as they are released.

Which of the following settings can you modify in the Time & Language category in the Windows 10 Settings app? (Select three.) -Manage sound devices Choose the language you speak with your device -Choose your input device -Choose the language you speak with your device -Show additional calendars in the taskbar -Let websites provide locally relevant content by accessing my language list

-Choose the language you speak with your device -Show additional calendars in the taskbar -Choose the language you speak with your device

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.) -Configure the VPN connection to use MS-CHAPv2. -Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. -Configure the VPN connection to use IPsec. -Configure the browser to send HTTPS requests through the VPN connection.

-Configure the VPN connection to use IPsec. -Configure the browser to send HTTPS requests through the VPN connection.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run on Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select two.) -Run the application in its own memory space. -Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. -Make all users who need to run the application members of the local Administrators group. -Run the application in Compatibility Mode.

-Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. -Run the application in Compatibility Mode.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from an employee who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what might be causing the problem. Which of the following is the BEST way to provide the assistance the employee needs? (Select two.) -Establish a Quick Assist session with the employee and watch what he is doing. -Establish a Remote Assistance connection and watch what the employee is doing. -Establish a Remote Desktop connection and perform the task on the employee's system. -Schedule the employee to receive more training on using the application

-Establish a Quick Assist session with the employee and watch what he is doing. -Establish a Remote Assistance connection and watch what the employee is doing.

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.) -Device drivers are loaded into memory. -Power is supplied to the CPU. -The CPU and chipset are verified and fully initialized. -System memory is initialized, verified, and allocated.

-The CPU and chipset are verified and fully initialized. -System memory is initialized, verified, and allocated.

You are responsible for updating your company's onboard training for all new employees.Which of the following items are important to include in that training? (Select three.) -The network diagram -The Data Backup Policy -The help desk's contact information -The process for reporting suspicious behavior -The User Education and Awareness Policy -The Security Policy

-The help desk's contact information -The process for reporting suspicious behavior -The Security Policy

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.) -Use Task Manager to monitor memory utilization. -Use Task Manager to monitor disk activity. -Use Resource Monitor to monitor memory utilization. -Use Resource Monitor to monitor disk activity.

-Use Task Manager to monitor memory utilization. -Use Resource Monitor to monitor memory utilization.

You are the system administrator for several Windows servers in your company. Instead of scheduling the same updates for all the Windows servers, your systems engineer would like to begin approving the updates based on specific groups of servers. In addition, the systems engineer would like you to begin checking the update logs on the servers on a regular basis to determine if and how the updates were applied. Which of the following tools would BEST help you meet the new requirements requested by the systems engineer? (Select two.) -WSUS -Windows Insider Program -Update History -Advanced Options

-WSUS -Update History

Which of the following BEST describes a Security Policy? -A document that outlines how long a password should be and which characters can be used in the password. -A document that defines how often backups shouldrun and where they should be saved. -A document that outlines who has access to company resources. -A document or collection of documents that provide information about an organization's network security.

A document or collection of documents that provide information about an organization's network security.

What tool can you use to create a full system image of your Windows drive? -Recovery drive -Backup and Restore -Windows Installation Media -System Repair

Backup and Restore

Which of the following describes the grandfather backup in a grandfather-father-son (GFS) rotation scheme? -An incremental backup that is stored offsite. -A full backup that is stored offsite. -An incremental backup that is stored onsite. -A full backup that is stored onsite.

A full backup that is stored offsite.

You experience startup errors after you install a new device. What should you do FIRST to resolve the issue? -Recover the system image. -Boot in Safe Mode and roll back the driver. -Boot in Safe Mode and disable all unnecessary devices. -Disable automatic restart.

Boot in Safe Mode and roll back the driver.

You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business? A workgroup A tree A domain A forest

A workgroup

Which of the following is currently the most in-use operating system in the world? -Chrome OS -Windows -macOS -Ubuntu

Windows

Which operating system uses the Time Machine backup program? -macOS -Linux -Windows -Android

macOS

You've just installed a new USB card reader on your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. Which of the following actions should you perform FIRST? -Install the device on another computer. -Check the manufacturer's website for information about the error. -Uninstall the device and then reinstall it. -Replace the card reader with a new device.

Check the manufacturer's website for information about the error.

Which of the following is a web-browser based operating system? -Chrome OS -Linux -macOS -Windows

Chrome OS

Which of the following operating systems was derived from Linux? -Unix -macOS -Chrome OS -Windows

Chrome OS

You have been given a .app file for your Macintosh computer. The file is a graphics editor that you plan to install. What would you normally do to install the graphics editor? -Copy the .app file to the Applications directory. -Launch the .app file from the Terminal application. -Launch the .app file and follow the installation instructions. -Drag the .app file from Mission Control to the Dock.

Copy the .app file to the Applications directory.

As an IT technician for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being familiar with domains, you are fairly confident you know what the issue is. But just to be safe, you take the applicable time to gather additional information and to identify what, if anything, has changed.Which of the following is the BEST next step? -Create a hypothesis. -Determine the appropriate fix. -Implement the fix. -Identify what has changed.

Create a hypothesis.

You are the manager in charge of maintaining desktop computers. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning.Which of the following actions should you perform next? -Fix the problem. -Determine whether escalation is required. -Document the problem. -Create an action plan.

Create an action plan

You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to testthe power supply. Which multimeter setting should you use? -DC volts -AC volts -Ohms -Watts

DC volts

Candace is a purchasing manager for a large metropolitan hospital and is responsible for making purchasing decisions for millions of dollars worth of equipment each year.The hospital board has recently decided that many of the older hospital devices need to be upgraded to IoMT (Internet of Medical Things) equipment to become more efficient and effective in their procedures. Candace has decided to start by ordering new IoMT heart-monitoring devices that track a patient's heart information remotely. She immediately talked to her equipment sales representative and ordered several new IoMT heart-monitoring devices. However, after deploying them, she finds that they do not provide all the data that nurses and doctors were expecting. Which of the following steps did Candance fail to complete during the asset management Procurement phase that led to this issue? -Obtain a list of suppliers -Finalize the purchase order -Negotiate with the supplier -Determine goods and services required

Determine goods and services required

You have a new employee that is left-handed and needs the mouse for her computer to have the right button be the primary button for ease of use. Under which of the following Windows 10 Settings app categories can you change the mouse settings to make the right button the primary button? Devices Systems Personalization Ease of Access

Devices

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and access specific folders? -Spotlight -Terminal -Dock -Mission Control

Dock

A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector.Which of the following troubleshooting strategies should you perform next? -Identify the problem. -Document the solution. -Establish what has changed. -Test the solution.

Document the solution.

Aaron is a system administrator for a school district and have been assigned to maintain and decommission computer equipment throughout the district schools.He has been assigned to review all the workstations currently being used by the administrative staff at the district and school levels to determine if they need to be replaced or upgraded to meet current administrative requirements. He decides to replace the workstations with new equipment,decommission the existing computers, and sell them to the public as surplus.After selling several of the decommissioned computers, a local paper publishes an article about financial corruption in the school district with documentation to prove the accusations.Which of the following steps in the Decommissioning process did Aaron fail to do that might have BEST prevented this situation? -Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public. -Remove the workstations from the production network. -Remove the workstations from the asset management database. -Determine whether the workstations should have been destroyed or disposed of properly in the trash.

Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue? -Escalate the call to another technician or your supervisor. -Establish a Remote Desktop connection and update the driver. -Tell the user to wait until you are scheduled to be in that location. -Drive to the other location as soon as possible and update the driver.

Establish a Remote Desktop connection and update the driver.

You are removing screws within a computer, but several have fallen into places you can't reach. Which tool would help retrieve the small screws? -Screwdriver -IC extractor -Extension magnet -Needle-nose pliers

Extension magnet

The Control key (D) is used for application and navigation shortcuts. For example, Option + right/left arrow navigates between words in a text document. True False

False

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: *Only customer data files created by the financial consultants need to be backed up. *Data backed up to a flash drive. *Backed up files must be uncompressed. *Include contact lists and desktop preferences. Which of the following backup solutions BEST meets your requirements? -System Image -File History -Differential -File Backup

File History

You have decided to use the Apple Remote Disc feature to share CDs and DVDs among employees on your company headquarters office network. Which of the following DVDs can you share with the employees using Remote Disc? -Human Resource Blu-ray training videos -Financial application documentation -Audio files from the latest company conference -Graphics editor installer

Financial application documentation

Your organization has expanded into an adjacent office. You have been tasked with laying cables to connect the new space with the existing space.Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure? -Network topology diagram -Knowledge base -Physical security diagram -Floor plan

Floor plan

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled? -GPOs linked to organizational units that contain this user's object. -The Default Domain Policy GPO. -The Local Group Policy. -GPOs linked to the domain that contains this user's object.

GPOs linked to organizational units that contain this user's object.

Which of the following VPN protocols was developed by Cisco and can be used to route any Layer 3 protocol across an IP network? GRE L2TP IPSec SSL

GRE

As an IT technician for your company, you are in the process of setting up several servers in your network. During the process, one of the servers was misconfigured and is having trouble synchronizing information with the other servers.Which of the following is the BEST next step? -Create a hypothesis. -Gather information. -Implement the fix. -Determine the appropriate fix.

Gather information.

Which of the following keys let you switch between keyboard languages? -Globe key -Option key -Control key -Command key

Globe key

Which of the following is true of groups on a Windows system? -Users and local resources, such as printers and shared folders, can be made members of a group. -A group allows multiple users to share a single logon. -Group members have the access rights that are assigned to the group. -Users can log on as the group and have all the assigned access rights.

Group members have the access rights that are assigned to the group.

A user calls to report a problem. She is trying to install an application on her new Windows 11 system, but the installation will not proceed. Her user account is a member of the Users group. What is MOST likely causing the installation issue? -She is not using an app from the Microsoft Store. -Her group membership does not allow her to install new software. -She is not a member of the Power Users group. -The application is incompatible with Windows 11

Her group membership does not allow her to install new software.

Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis? Hotfix Windows as a Service Service pack Targeted software patch

Hotfix

Which tool would be the best choice for removing and replacing the motherboard BIOS chip? -Screwdriver -Needle-nose pliers -Combination ratchet -IC extractor

IC extractor

Which of the following protocols provides authentication and encryption services for VPN traffic? TCP IPsec L2TP SSL

IPsec

You are currently running the latest version of Windows 10 on your laptop. You want to install Windows 11 to take advantage of several new features. However, you have critical data on the OS hard drive that you want to preserve while installing Windows 11. Which of the following installation methods should you use? -In-place upgrade -SetUpDiag -Clean install -SCCM

In-place upgrade

What backup method backs up every file that has changed since the last full or incremental backup? -Incremental -Full -Synthetic -Differential

Incremental

Which of the following actions directly improves system security on a Windows workstation? -Disable automatic reboot on an error. -Install the latest updates. -Create regular restore points. -Create a password reset disk.

Install the latest updates.

Don is an accountant in the finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the MOST likely reason Don could not install the application? -Insufficient permissions -Incorrect service pack level -Failed device driver -Insufficient system RAM

Insufficient permissions

Which of the following processors allowed macOS users to run Windows on their computers? -M1 -IBM -AMD -Intel

Intel

You are creating a Linux program that needs to write data to a hard disk. In order to save time, you decide to have your program call a pre-written code element that tells the operating system to perform the task. What is this focused pre-written code element called? -Library -Embedded -Distribution -Kernel

Library

Which of the following Linux software applications provides word processing, spreadsheets, and presentations? -GIMP -Distro -LightWorks -LibreOffice

LibreOffice

Ruth has a startup business and limited resources. She wants to save money by using an operating system on her business computers that has no associated fees for installation. Which of the following operating systems could Ruth install for free? -Windows -macOS -Chrome OS -Linux

Linux

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? -ping command -Multimeter -Cable tester -Loopback plug

Loopback plug

Which of the following is a valid distinguished name for the MarketSpace common domain name? MarketSpace_com MarketSpace.org MarketSpace/com Market.Space.org

MarketSpace.org

Linux has been a mainstay operating system in server rooms for many years, and it has grown even more pervasive in recent times. Which of the following types of devices has Linux taken over a large percentage of the market for? -Wi-Fi routers -Printers -Desktop workstations -Mobile devices

Mobile devices

Which utility allows you to choose Selective Startup in Windows? Msconfig (System Configuration) Event Viewer Msinfo32 Regedit

Msconfig (System Configuration)

What is the ability to run multiple apps simultaneously? -Multitasking -Multiprocessing -Multithreading -Multiples

Multitasking

What is the ability to run multiple parts of an app simultaneously? -Multithreading -Multiprocessing -Multitasking -Multiples

Multithreading

You need to back up user data on a Windows 11 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: *Use Backup and Restore to back up user data. *Run the backup automatically every night at 11:00 p.m. *Store the backups in the C:\Backups folder. *Include a system image in each backup. Will this configuration work? -No, Windows 11 does not include the Backup and Restore utility. You must use File History instead. -No, system image backups can't be scheduled with Backup and Restore. You must run them manually. -No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up. -Yes, all of the requirements for using Backup and Restore have been met.

No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements? -Organize the OUs at the top level by department; then use group accounts to help control resource rights. -Organize the OUs at the top level by employee and resource; then assign specific rights to each user. -Organize the OUs at the top level by office (country); then use group accounts to help control resource rights. -Organize the OUs at the top level by resource and office (country); then assign specific rights to each user.

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS? POST Winload.exe Boot Loader WININIT

POST

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? PPTP PPP NetBEUI SLIP

PPTP

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.) PPTP L2TP VNC RDP

PPTP L2TP

Which tool can you use to gather data and display statistics (in counters) that help you monitor the operation of a Windows system? -MSinfo -Performance Monitor -Computer Management -Event Viewer

Performance Monitor

In which of the following Windows 10 Settings app categories can you find reports on your device's health? -Devices -Privacy -Apps -System

Privacy

Your financial investment company has recently completed development of a custom application for maintaining customer portfolios. You want to install this application on each Windows laptop that was assigned to each investment advisor. Which of the following Windows 11 settings do you need to configure to sideload this custom app? -Update & Security > For developers > Sideload apps > Yes -Right-click Start > Apps & Features > Developer Mode: On -Privacy & security > For developers > Develop Mode: On -Right-click the application's tile > Sideload app > Yes

Privacy & security > For developers > Develop Mode: On

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility? SSD storage capacity VRAM capacity CPU capacity RAM capacity

RAM capacity

A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups should you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) Guests Remote Desktop Users Administrators Power Users

Remote Desktop Users Administrators

Your computer is not performing properly; an update was recently installed. Which of the following actions from the Windows 10 Settings app is the BEST troubleshooting choice to try first for this situation? -Remove the installed Windows update. -Reset your PC. -Use the Startup Repair function. -Go back to a previous version of Windows.

Remove the installed Windows update.

Which tool can you use to display hardware utilization statistics that tell you about your computer's operation? -Event Viewer -Advanced System Settings -Computer Management -Resource Monitor

Resource Monitor

You are a network engineer for a large financial institution. While monitoring a server on your WAN network, you notice that it is experiencing a bottleneck, slow cursor movements, and lagging application function. You want to determine if a particular process is causing the problem. Which of the following tools would BEST help you troubleshoot an issue with a process by providing information such as process ID, status, and threads, as well as how much CPU is being used in real time and the 60-second average of how much CPU utilization is being consumed by each process? -Task Manager -Resource Monitor -Performance Monitor -Reliability Monitor

Resource Monitor

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware? -Format Fred's disks and perform a clean installation of the operating system. -Restore Fred's computer back to a previous restore point. -Purchase a new disk and deploy a backup image of Windows. -Perform an image deployment from a backup image to restore Fred's computer to a known good point.

Restore Fred's computer back to a previous restore point.

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what's going on and how to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to immediately stop the application from running? Right-click > Disconnect Right-click > End task Right-click > Stop Right-click > Switch to

Right-click > End task

You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access and manage your newly-installed application? (Select two.) -Right-click the Start menu, select the application, and then select Settings. -Right-click the Start menu's application tile. -Right-click Start and select Apps & Features. -Right-click the Start menu, select All apps, and then right-click the application.

Right-click the Start menu's application tile. Right-click Start and select Apps & Features

Jason is a sales rep with an computer company that sells customized laptops to the public. He is opening a ticket to help resolve a customer issue with a malfunctioning laptop, which was purchasedby an important customer who is relying on the laptop to complete a critical project.Which of the following items in the ticket can Jason use to help the support team immediately determine the time sensitivity of resolving this issue? -Department assignment -Tier assignment -Detailed issue description -Severity level

Severity level

Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account? -Users and Groups -Family & other users -Manage my accounts -Sign in with a Microsoft account instead

Sign in with a Microsoft account instead

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering on your computer, Windows 11 will not start. Which of the following tools should you use FIRST to try and resolve the issue? -Restore Files -Startup Repair -Recovery Drive -Backup and Restore

Startup Repair

Your job functions have recently changed. As a result, you find that you need to work with more programs running on your Windows computer at the same time. As a result, you're now starting to receive error messages warning you of low virtual memory, but there's no additional RAM that can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? System Programs Device Manager Troubleshooting

System

A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change? -System Properties > System Protection -System Properties > Advanced -System Properties > Remote -System Properties > Computer Name

System Properties > Computer Name

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue? -System Restore -Go Back to the Previous Build -Use BOOTMGR -Reset this PC

System Restore

Which of the following is true about System Restore? -System changes made since the restore point was taken are undone. -Device drivers installed since the restore point will not be affected. -User data will be affected. -If the restore freezes, you can cancel the restore process.

System changes made since the restore point was taken are undone.

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card.Which of the following actions should you perform NEXT in your troubleshooting strategy? -Explain what you did to fix the problem. -Document the solution. -Implement preventative measures. -Test the solution.

Test the solution.

Jared, an employee in Human Resources, left the company two months ago as part of a company downsizing initiative. A new Human Resources VP is now running the department and has re-hired Jared to work as a manager in Human Resources.As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared.What should have been done during Jared's off boarding process to make sure his accounts were still available for a period of time? -The accounts should have been deleted, but not removed from the trash. -The accounts should have been left in place for a required period of time. -The account passwords should have been changed. -The accounts should have been disabled instead of deleted.

The accounts should have been disabled instead of deleted.

Tyler has a computer with a Windows 32-bit operating system. He wants to install an application that requires a 64-bit operating system. Which of the following is likely to happen if he tries to install it anyway? -Windows will isolate the 64-bit binaries by redirecting Registry calls to allow the program to run. -The installation will fail. -Windows will use WOW64 to run the application, but the program will run slowly. -The program will install a 64-bit driver and will run normally.

The installation will fail.

As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been escalated from a Level 1 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop? -The remote session from the Level 1 operator has not been disconnected. -The employee's computer is turned off. -Your firewall is not set up to allow the connection through port 3389. -You have the wrong IP address for the employee's computer.

The remote session from the Level 1 operator has not been disconnected.

Jesse, a professional graphic designer, has just installed a new application on his system, which needs a lot of memory for timely processing and high-quality images. Jesse's computer has an integrated graphics card. Which of the following is MOST likely to happen when Jesse runs the application on his computer? -The whole system will run slowly. -The battery life will diminish quickly when running the app. -The graphics card will generate a lot of heat. -The graphics card will produce high-quality images without delay.

The whole system will run slowly.

Which of the following BEST describes the primary role of Tier 1 support operators? -They track the progress of and open and close tickets. -They use their specialized training and experience with the organization to help resolve an issue. -They solve issues behind the scenes and handle the most complex situations. -They gather information about a problem and perform basic troubleshooting.

They gather information about a problem and perform basic troubleshooting.

Why should you store backup media offsite? -To reduce the possibility of theft. -It is required by government regulations in the USA. -To prevent the same disaster from affecting both the system and its associated backup media. -To improve the efficiency of the restoration process.

To prevent the same disaster from affecting both the system and its associated backup media.

A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable.Which of the following tools would the technician MOST likely use to identify which wall jack connectsto the severed cable? -Cable stripper -Loopback plug -Tone generator and probe -Multimeter

Tone generator and probe

The Option key (A) is used for application and navigation shortcuts. For example, Option + right/left arrow navigates between words in a text document. True False

True

True or False: A full backup backs up all files (even those that have not changed). True False

True

True or False: Infrastructure as a Service (IaaS) provides access to virtual machines through your organization's network connection. True False

True

True or False: Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks. True False

True

True or False: Storage as a Service (STaaS) provides access to storage devices through the cloud. True False

True

True or False: The Fn key (B) is typically only found on Apple notebooks and is used to access the F12 keys on the keyboard. True False

True

True or False: The Pro for Workstations edition of Windows 11 is intended for those whose work requires high-end hardware for intense computing. True False

True

You have just finished installing a new Windows Update when your computer locks up. What should you do first? -Reset your PC -Run a System Repair -Uninstall the Windows Update -Complete a System Restore

Uninstall the Windows Update

Your computer has a quad-core processor installed that supports multithreading. Given that the system is running Windows, how can you BEST use Task Manager to verify whether multithreading has been enabled? -Use Task Manager to show a single process running on multiple processors simultaneously. -Use Task Manager to display CPU utilization graphs for eight processors. -Use Task Manager to show each application running with two processes. -Use Task Manager to report CPU utilization values up to 800%.

Use Task Manager to display CPU utilization graphs for eight processors.

You have an application that renders videos for your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application? -Use Task Manager to modify the process priority. -Use Task Manager to modify the processor affinity. -Use Task Manager to switch to the running application. -Use the Services console to change the startup type to Automatic.

Use Task Manager to modify the process priority.

You work in the computer repair department of a large retail outlet. A customer comes in with aworkstation that randomly shuts down. You suspect that the power supply is failing.What should you do first to troubleshoot the issue? -Use a power supply tester on the power supply. -Use a cable tester to check the power supply's connections. -Use a known good spare to swap with the existing power supply. -Use a multimeter to test the power supply's electrical properties.

Use a known good spare to swap with the existing power supply.

You have a business where employees are often called away from their desks for 30 minutes or more at a time. Many do not shut down or lock their computers before walking away because they don't want to take time to log on again when they return. Which of the following options from the Windows 10 Settings app is the BEST choice for keeping these computers secure considering the employees' behavior and situation? -Have each person use the Windows key plus the L key to lock the screen when they leave and use a PIN when they return to log on again. -Have each person shut down their computer when leaving and use Windows -Hello Fingerprint when signing on again. -Have each person sleep their computer when leaving and use a password to sign on again when they return. -Use a paired device that employees always keep on their person to lock and unlock their computer through the Dynamic lock option that works through proximity

Use a paired device that employees always keep on their person to lock and unlock their computer through the Dynamic lock option that works through proximity

You have created a system image of Windows 11 on your laptop before updating several applications on your hard drive. The system image is stored on an external hard drive. After updating one of the applications, you are required to restart your laptop. However, during the restart, you receive an error message that the system is unable to reboot. You try to restore the system image from the external hard drive, but you are unsuccessful. Which of the following do you need to do BEFORE successfully restoring your Windows 11 system using the system image? -Set the BIOS/UEFI settings to boot from the external hard drive first. -Use a recovery disc to restore the operating system. -Copy the system image to a network computer and access the image from there. -Copy the system image to the Windows hard drive and then start the recovery process.

Use a recovery disc to restore the operating system.

Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? -Security Policy -Acceptable Use Policy (AUP) -User Education and Awareness Policy -Bring Your Own Device (BYOD) Policy

User Education and Awareness Policy

While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using? Access control list VPN Firewall DLP

VPN

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement? VPN concentrator Screened subnet Site-to-site VPN Host-to-host VPN

VPN concentrator

Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue? -Use System Restore from Safe Mode to select a working restore point. -Verify that the BIOS/UEFI is configured to use the correct video adapter. -Boot the system from the installation disc and repair the system. -Check the motherboard documentation for information on beeps

Verify that the BIOS/UEFI is configured to use the correct video adapter.

Which of the following is the purpose of the Services snap-in? -View logs about programs, system events, and security. -Display statistics that tell you about the operation of your computer. -View and manage software programs running in the background. -View historical data that describe the operating system's stability.

View and manage software programs running in the background.

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches, you are concerned that your Windows 11 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? Antivirus updates Scheduled backups Windows updates Scheduled disk maintenance

Windows updates

You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it. What is the MOST likely cause of the issue? -You assigned the application user account to the Users group. -You deleted a group that was created by the third-party application. -You assigned the wrong permissions to your user account. -You switched from a domain account login to a local login.

You deleted a group that was created by the third-party application.

You are one of the IT administrators for your company. Your coworker, Rachel, says that when she boots her computer, it displays a message saying that one of her programs had an error while loading and is not working. To fix this issue, you would like to see if Windows can provide a log file that may give you a hint about what is failing at boot time. Which of the following Microsoft tools or consoles would MOST likely give you the ability to create such a log file? -msconfig -Device Manager -Task Manager -System Information

msconfig

You plan on including Employee Education and Awareness Policy training for all new employees. Aspart of that training, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.) -Click on links in a phishing email. -Bring your own devices to work. -Respond to social engineering attacks. -Access restricted areas in the company building. -Connect unauthorized devices. -Install software on their company laptops.

-Click on links in a phishing email. -Respond to social engineering attacks. -Connect unauthorized devices.

Which of the following are procedures that should be included when off boarding (ending a relationship with) an employee? (Select two.) -Disable electronic access for the employee. -Review the Acceptable Use Policy (AUP) with the employee. -Collect physical access items from the employee. -Make sure the employee has access to the company's knowledge base.

-Collect physical access items from the employee. -Disable electronic access for the employee.

Which of the following statements about an SSL VPN are true? (Select two.) -Uses UDP port 500 -Uses port 443 -Provides message integrity using HMAC -Encrypts the entire communication session.

-Uses port 443 -Encrypts the entire communication session

Which of the following is the process of tracking and managing an organization's assets? -Decommissioning -Deployment -Asset management -Procurement

Asset management

Which of the following is designed to provide a Linux command line interface? -GIMP -Bash -GPL -GCC

Bash

What is normally disabled by default on most Linux servers? -TUI -Embedded Linux -GUI -IaaS

GUI

Which of the following is an open-source operating system? -Linux -Windows -macOS -Chrome OS

Linux

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written? Boot.log Bootlog.txt Ntbtlog.txt Myboot.txt

Ntbtlog.txt

Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer? Remote Desktop Telnet Remote Assistance Screen Sharing

Remote Desktop

Which remote access solution is built into macOS? Screen Sharing Remote Desktop Remote Assistance Quick Assist

Screen Sharing

You need to download a large file on your computer, but you are concerned about having enough space for the file. In which of the following Windows 10 Settings app categories can you find out exactly how much storage space is currently being used on your local disk? -Network & Internet -Devices -Apps -System

System

Which user type is the Windows Beta channel recommended for? -The average user -Commercial users -Administrators -Highly technical users

The average user

Which of the following is true of Remote Assistance? -It is designed to improve user productivity. -The user initiates the session. -Only one user is logged in at a time. -The remote user initiates the session.

The user initiates the session.


Conjuntos de estudio relacionados

Chapter 9 Teaching and Counseling

View Set

Chapter 22: Prokaryotes - Bacteria and Archaea

View Set

My Praxis II Elem Edu Practice test Questions

View Set

Chapter 38 assessment and management of patients with rheumatic disorders prep u

View Set

Government and Civics: Semester 1 Exam

View Set

Fundamentals Nursing Prep U Chapter 14 Implementing

View Set