CompTIA A+ 220-1002

¡Supera tus tareas y exámenes ahora con Quizwiz!

A Linux command-line command allowing a user to change his/her own password is known as:

passwd

What is the name of a Linux command-line utility used for displaying statistics of running processes?

ps

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

pwd

Which of the following system utilities in MS Windows provides access to a database containing system configuration information?

regedit

Which other command-line command besides regedit can be used to launch registry editor in Windows?

regedt32

A command-line command in Linux used for deleting files and directories is known as:

rm

Which of the following system utilities in Windows enables managing background applications?

services.msc

The following command can be used for turning off or restarting a Linux host.

shutdown

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

su

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

sudo

Which of the following commands is used for invoking a text editor in Unix-like operating systems?

vi

Which of the Microsoft Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network? (Select 2 answers)

xcopy robocopy

In Windows Disk Management utility, a partition's size can be extended into: (Select 2 answers)

Adjacent space on the same disk Unallocated space on the same disk

A shortcut icon to the Windows Memory Diagnostic tool (mdsched.exe) can be found in:

Administrative Tools folder in Control Panel

Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in?

Administrative Tools menu in Windows Control Panel

Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed?

Advanced

The App Store menu in macOS provides access to:

All of the above

The User Accounts applet in Windows allows to:

All of the above

Which of the following can be used by system/network administrators to restrict a user's ability to install software?

All of the above

Which of the following locations/steps allows to view network shares in Windows?

All of the above

Which of the following are advantages of the New Technology File System (NTFS) over FAT32 file system?

All of the above features are improvements implemented in NTFS not available in FAT32

The Devices and Printers applet in Windows: (Select 3 answers)

Allows to add/remove wired and wireless devices Provides a simplified view of all connected devices Allows to troubleshoot a device that isn't working properly

Which of the following describe(s) the function of Windows Task Manager? (Select all that apply)

Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users

Which of the following provides physical security measure against laptop theft?

Cable lock

Network connections implemented with the use of a cable modem take advantage of: (Select 3 answers)

Cabling that carries TV signals Coaxial cabling Shared bandwidth

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, a set of initial steps required to establish a network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

False

Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers)

Host-based firewall Software firewall

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

Hub

TCP port 80 is assigned to:

Hypertext Transfer Protocol (HTTP)

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:

IP address

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)

IP address Subnet mask Default gateway DNS server address

Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers)

IPsec TLS

Which of the following provides access to the User Accounts applet in MS Windows?

Control Panel

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)

Dial-up phone number User name Password

LDAP is an example of a(n):

Directory access protocol

Which of the following is a macOS disk maintenance tool?

Disk Utility

Which of the following macOS utilities allows to create/restore a disk image?

Disk Utility

Which of the locations listed below enable access to computer display configuration settings in Windows 7/8/8.1? (Select 3 answers)

Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)

Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer.

False

The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet.

False

The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host.

False

The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings.

False

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

False

Which of the following is a Microsoft-proprietary remote-access protocol providing users with a graphical interface that allows them to connect to another computer on a network?

RDP

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

RFID badge

Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?

Recovery partition

In Windows 8 and newer releases of the Microsoft OS, contents of the MSConfig's Startup tab can be viewed and managed via:

Task Manager

Which of the following system utilities provides access to different command-line shells in macOS?

Terminal

Which of the following enable a newly added disk to show up in Windows File Explorer? (Select 3 answers)

The disk needs to be initialized The disk requires a drive letter The disk can be mounted as a folder

Which of the following characters indicates that a Windows network share is intended for administrative access?

$

Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file?

/y

Which copy command switch verifies that the new files are written correctly?

/v

An SNMP management station receives SNMP notifications on which of the following UDP ports?

162

Which of the following UDP ports is assigned to DNS?

53

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:

ACL

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

ACL

Which of the following is a file sharing network protocol?

AFP

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions?

APT

An infrastructure device designed for connecting wireless/wired client devices to a network is known as a(n):

Access Point (AP)

Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply)

Access based on one-time password Temporal remote access The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting

What is the function of a laptop's smart card reader?

Access control

Which of the following answers apply to Windows BitLocker? (Select 3 answers)

Accessed via BitLocker Drive Encryption applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)

A drive letter in Windows can be changed by:

Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:

Active Directory

Which of the following is an open-source mobile OS designed for smartphones and tablets

Android

Which of the following locations in macOS provides access to application updates menu?

App Store

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers)

Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad

Which of the following is an example of a soft token?

Authenticator app

Which of the following are disk storage types used with MS Windows? (Select 2 answers)

Basic Dynamic

In MS Windows, a newly added drive is by default partitioned as a:

Basic disk

An MS Windows feature that enables full drive encryption is known as:

BitLocker

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?

Boot Camp

Which of the configuration features listed below can be managed through the MSConfig Boot tab? (Select all that apply)

Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options

Which of the following is a file system designed for optical media?

CDFS

In Windows Disk Management utility, a disk status set to Failed indicates that the basic or dynamic volume: (Select 3 answers)

Cannot be started automatically Is damaged Contains corrupted file system

What is the function of the Linux chmod command?

Changes file access permissions

What is the function of the Linux chown command?

Changes file owner and group permissions

What is the name of a lightweight operating system designed by Google for small-factor PCs, laptops, tablets and mobile devices?

Chrome OS

Which of the following OSs uses a Web browser as its main user interface?

Chrome OS

Which of the following statements describing features of Windows HomeGroups are true? (Select 3 answers)

Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10

Which of the following is an MS Windows utility designed both for system administrators and for application developers?

Component Services (dcomcnfg.exe)

Which of the following can be used to launch the Disk Management utility in Windows? (Select 3 answers)

Computer Management Windows Run dialog box Quick Access Menu (displayed after right-clicking on the Windows Start button)

Many of the utilities available in the Administrative Tools menu in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this menu (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called:

Computer Management (compmgmt.msc)

Which of the following locations provide direct access to the Device Manager applet in MS Windows? (Select 3 answers)

Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel

The Internet Properties applet tab containing an option for configuring VPN settings is called:

Connections

Which of the Windows Internet Properties system utility tabs provides access to proxy settings?

Connections

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks?

Credential Manager

Windows Task Manager can be launched by: (Select all that apply)

Ctrl+Shift+Esc key combination Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter

Which of the following are methods of storing and accessing data over computer network? (Select 2 answers)

DFS NFS

Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:

DHCP

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

DLP

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

Which of the following describe characteristics of DSL modems? (Select 3 answers)

Dedicated bandwidth Twisted-pair copper cabling Telephone lines

If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:

Device Manager

Which of the following Internet access types takes advantage of PSTN lines?

Dial-up

What is the name of a macOS equivalent of Windows Taskbar?

Dock

Windows repair installation: (Select 3 answers)

Does not affect user applications Preserves application configuration settings Does not affect user files

What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers)

Door lock Proximity card reader Smart card reader

The System Configuration utility in MS Windows can be launched by: (Select 3 answers)

Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter

Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer?

Drive imaging

Which of the following is an MS Windows diagnostic tool for detecting display, sound, and input related problems?

DxDiag

Which of the following is an MS Windows component that enables encryption of individual files?

EFS

Which of the following terms refers to a software that no longer receives continuing support?

EOL

Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?

Email filtering

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:

Enabled in the advanced BIOS settings menu

An antivirus software is kept up to date via: (Select 2 answers)

Engine updates Virus signature updates

Which of the following terms describes the most common type of wired connections used in modern networks?

Ethernet

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:

Event Viewer

The practice of allowing a program through a firewall is described as creating a(n):

Exception

The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

FAT32

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files.

False

What is the name of a GUI-based file and folder manager application in Windows 10?

File Explorer

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

File Explorer -> This PC -> Computer tab -> Map Network drive

Which of the following provides access to file/folder management settings in Windows 10?

File Explorer Options applet in Windows Control Panel

A macOS file manager application is known as:

Finder

Software or hardware that checks information coming from the Internet and either blocks it or allows it to pass through depending on the applied configuration settings is called:

Firewall

Which of the following macOS utilities can be used for detecting and repairing disk-related problems?

First Aid (in Disk Utility)

Which of the following provides access to file/folder management settings in Windows 7?

Folder Options applet in Windows Control Panel

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?

Folder redirection

An unresponsive application/process in macOS can be terminated with the use of:

Force Quit

In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the OS is labeled as:

Foreign

What are the characteristic traits of a network switch? (Select all that apply)

Forwarding decisions made in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge

Which of the following describe the features of a network bridge? (Select 3 answers)

Forwarding decisions made in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch

A type of transmission that takes place in two directions simultaneously is known as:

Full duplex

Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms?

General

Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option?

General

Which tab of the MSConfig utility in Windows lists choices for startup configuration modes?

General

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

Group Policy

Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network? (Select 2 answers)

Hardware firewall Network-based firewall

Which of the power-saving states in MS Windows uses the least amount of power?

Hibernation

In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden

Which of the installation types provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings?

Image deployment

Which of the following is a dedicated device designed to supply power to PoE equipment?

Injector

Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers)

Internet Options (Connections tab) Network and Sharing Center Settings menu

Which of the following locations in MS Windows provide(s) access to the Internet Properties (inetcpl.cpl) system utility? (Select all that apply)

Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)

Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)

Which of the following acronyms is used in an emerging field of new technologies, such as wearable tech or home automation?

IoT

Which of the following are examples of hardware tokens? (Select 3 answers)

Key fob RFID badge Smart card

A password management system in macOS is known as:

Keychain

TCP port 389 is the default network port for:

LDAP

Which of the following Microsoft Windows components allow system administrators to enable/disable user accounts? (Select 2 answers)

Local Users and Groups in Computer Management User Accounts in Control Panel

Which of the following statements apply to Windows domains? (Select 3 answers)

Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on client-server networking architecture

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

Login script

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?

MAC address filtering

Which of the following are examples of partition styles? (Select 2 answers)

MBR GPT

Which type of software enables a centralized administration of mobile devices?

MDM

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as:

MMC

Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)?

MSTSC

A network switch with configuration features that can be modified via a user interface is a:

Managed switch

A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as:

Mission Control

Which of the following is a computer hardware component designed to enable network access?

NIC

Which of the following statements are true? (Select 2 answers)

NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file

Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?

Network and Sharing Center

What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)

Network name Encryption type Security type Security key

Which of the following disk status options in Windows Disk Management utility indicates Input/Output (I/O) errors on a dynamic disk/volume? (Select 2 answers)

Online (Errors) Healthy (At Risk)

If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place:

Only in one direction at a time

A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need for specifying path to the application's executable file location is called:

Notepad

Which of the following would be the most important considerations when installing computer applications? (Select 3 answers)

OS compatibility Minimum amount of drive space Minimum amount of RAM

Which of the following disk status options in Windows Disk Management utility indicates that a dynamic disk might be corrupted or intermittently unavailable?

Offline

What is the correct sequence of steps required to close a non-responsive user application in Task Manager in Windows 7?

On the Applications tab, right-click the program that isn't responding, click End Task button

Which of the following answers describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8/8.1/10?

On the Processes tab, right-click the program/process that isn't responding, click End Task button

In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations is labeled as:

Online

Which of the following acronyms describes using a single twisted-pair Ethernet cable to carry both data and electrical power?

PoE

Which of the following allows to hide extensions for known file types in Windows 8/8.1/10?

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following allows to view hidden files, folders, and drives in Windows 8/8.1/10?

Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

Which of the following allows to hide extensions for known file types in Windows 7?

Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following allows to view hidden files, folders, and drives in Windows 7?

Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

A type of technology that enables sending data over wiring used for transmission of electrical power is known as:

PLC

A simple device consisting of multiple connector blocks and ports used for cable management is a:

Patch panel

Which of the Windows Task Manager tabs in Windows 8/8.1/10 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS?

Performance

Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance?

Performance Monitor (perfmon.exe)

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)

Permanent remote access Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer

Protection provided by security guards is an example of:

Physical security control

Which of the following port numbers are reserved for NetBIOS services? (Select 3 answers)

Port 137 Port 138 Port 139

An SNMP Agent receives requests on UDP port:

Port 161

In Windows Disk Management utility, a dynamic disk status set to Offline/Missing indicates that the missing disk may be: (Select 3 answers)

Powered down Corrupted Disconnected

In Windows Disk Management utility, initializing a disk: (Select 2 answers)

Prepares a newly added disk for use by Windows Erases data on disk

Which of the following allow for administering print devices in Microsoft Windows? (Select 3 answers)

Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called:

Privacy

What is the name of a Windows Internet Properties applet tab providing access to advanced cookie management options?

Privacy

A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser add-ons is called:

Programs

Which of the following are characteristic features of SMB/CIFS? (Select 2 answers)

Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

Proximity card

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Proxy

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:

Public

Which network profile in Windows by default disables the network discovery feature?

Public

Which of the Windows network profiles imposes the strongest security settings?

Public

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?

Quality of Service (QoS)

Which of the built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings?

Refresh

Which of the macOS features enables access to optical drive of another computer over a network?

Remote Disc

Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows?

Remote settings in the System applet in Windows Control Panel

Which of the following is a simple network device that amplifies a received signal so it can be transmitted over greater distance without loss of quality?

Repeater

The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:

Restore points

Which of the following enables decreasing partition size in Windows Disk Management utility?

Right-click on a disk and select the Shrink Volume menu option

A device designed to filter and transfer IP packets between dissimilar types of computer networks is called a:

Router

Which of the following protocols permits automated discovery of networked services on Local Area Networks (LANs)?

SLP

Port 445 is used by: (Select 2 answers)

SMB CIFS

TCP port 25 is used by:

SMTP

Which of the following is a complimentary instruction set that extends the capabilities of a CPU?

SSE2

A unique WLAN identifier (a.k.a. wireless network name) is called a(n):

SSID

Which of the following built-in macOS tools enables remote access to another Mac computer?

Screen Sharing

The System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup is called:

Services

An MS Windows Administrative Tools folder applet for managing background applications is called:

Services (services.msc)

A type of user interface that enables the execution of operating system commands is commonly referred to as:

Shell

Which of the following enables partition split in Windows Disk Management utility?

Shrink a volume, then create a new simple volume from the adjacent unallocated space

An antivirus database entry used for identifying malicious code is known as virus:

Signature

Which of the volume types available in Windows Disk Management utility do not offer fault tolerance? (Select 3 answers)

Simple volume Spanned volume Striped volume

A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command is known as: (Select 2 answers)

Sleep/suspend Standby

Which of the following answers refers to an example implementation of certificate-based authentication?

Smart card

Which of the following macOS features allows to create switchable desktop environments?

Spaces

Which of the following is a macOS system search utility?

Spotlight

The Task Manager utility in Windows 8/8.1/10 contains a tab previously included as part of the System Configuration (MSConfig) utility. The tab allows system administrators to control user applications that should be enabled/disabled during system boot. This tab is called:

Startup

Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality?

Storage Spaces

Which of the following tools enable creation of disk arrays in Windows? (Select 2 answers)

Storage Spaces Disk Management

Which volume type in Windows Disk Management utility uses RAID 0 setup for performance gains?

Striped volume

Which volume type in Windows Disk Management utility uses RAID 5 setup for performance gains and fault tolerance?

Striped with parity volume

Which of the following allows to determine which network segment an IP address belongs to?

Subnet mask

A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called: (Select 3 answers)

Swap file Paging file Virtual memory

Which device improves network performance by dividing a given network segment into separate collision domains?

Switch

A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as:

Sync Center

Which Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM?

System

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

System

Which Microsoft Windows tool can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly?

System Configuration (msconfig.exe)

An MS Windows system utility that allows to roll back system files and settings to an earlier point in time is called:

System Restore

Which of the following is a Windows system utility that allows to roll back system files and settings to an earlier point in time?

System Restore

Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows? (Select 2 answers)

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

POP3 uses:

TCP port 110

The System Configuration tab in MS Windows providing access to MMC snap-ins is called:

Tools

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.

True

Installing an app in Windows requires administrative-level access on a local machine. In cases where installation files are stored on a remote server, users may also need appropriate permissions to be able to access the installation folder/file.

True

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.

True

Common methods of application installation and deployment include removable media (e.g. CD/USB) used locally in home networks and remote installation methods over a network popular in enterprise environments.

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas.

True

In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories.

True

In Windows 10, the Windows Firewall system component was renamed to Windows Defender Firewall. In similar fashion, the Windows Firewall with Advanced Security known from previous Windows versions changed its name to Windows Defender Firewall with Advanced Security.

True

In Windows 8 and newer releases of the Microsoft OS, the real-time information about resources used by user applications and system processes in Task Manager can be found grouped in one place under the Processes tab.

True

In Windows Disk Management utility, a volume status set to Failed Redundancy indicates that the data on a mirrored or RAID 5 volume is no longer fault tolerant because one of the underlying disks is not online.

True

In Windows Disk Management utility, assigning a mount point folder path to a drive enables a newly added drive to show up in File Explorer as a regular folder.

True

In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu.

True

In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.

True

In addition to its native routing functionality, a SOHO router is an all-in-one device that can serve the same purposes as many other devices. It can provide the functionality of a network switch and an Access Point (AP). A SOHO router can also provide extensive network configuration options that include a DHCP, firewall, and wired/wireless security settings.

True

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token.

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

True

In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive.

True

Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic.

True

One of the measures for securing networking devices is the practice of disabling unnecessary services and unused ports.

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

True

Prior to Windows 8, the MSConfig Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSConfig utility shipped with Windows 8/8.1/10.

True

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.

True

The "Run as administrator" option in MS Windows available after right-clicking on the Command Prompt application icon allows for execution of shell commands reserved for a system administrator.

True

The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser.

True

The Task Manager's Users tab in MS Windows allows system administrators to disconnect a user (invoke a Windows lock screen) or to sign them off (force a user to log off).

True

The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 provides access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security.

True

The basic countermeasures against application-related security risks include avoiding applications from unknown sources and keeping the already installed apps up to date with current patches and bug fixes.

True

The function of the ODBC Data Sources (odbcad32.exe) configuration utility in Windows is to facilitate communication between applications and varying types of databases.

True

The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

True

The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based computer uses power. Available configuration options for managing power in MS Windows 8/8.1/10 can be accessed via Power Options applet in Control Panel. Windows 10 provides additional way for managing basic power settings in the Settings menu.

True

Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.

True

USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer.

True

Used without any parameters, the help command in MS Windows displays a list of available system commands along with a brief description of each command.

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks).

True

Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU.

True

Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system.

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.

True

Which of the following ensures the privacy of a VPN connection?

Tunneling

DHCP runs on: (Select 2 answers)

UDP port 67 UDP port 68

A type of automated OS installation process that uses an answer file and does not require user interaction or presence is known as:

Unattended installation

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)

Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates

Which of the following disk status options in Windows Disk Management utility indicates that a basic or dynamic disk is not accessible and might have experienced hardware failure, corruption, or I/O errors?

Unreadable

Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as:

User Account Control (UAC)

Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface?

VNC

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?

VPN concentrator

Which tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane?

View

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

Virtual Private Network (VPN)

Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows?

Visibility of hidden files, folders, or drives

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

WEP

Which of the following is the best method to secure a small network lacking an authentication server?

WPA2-PSK

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WWAN

A solution that allows to turn on a network host remotely by sending a broadcast frame is called:

Wake-on-LAN

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?

Whitelist

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply)

Windows Defender Firewall Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers)

Windows Defender Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers)

Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

Windows Explorer -> Computer -> Map network drive

Which of the following is a Windows built-in software component that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

Windows Firewall

Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?

Windows Firewall (Advanced settings)

In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply)

Windows Firewall Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

Which of the following locations provides access to Windows Firewall settings in Windows 7?

Windows Firewall applet in Control Panel

Which of the following locations provide access to proxy settings in Windows? (Select 2 answers)

Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers)

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers)

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Which of the following locations provide access to display settings in Windows 10? (Select 2 answers)

Windows Start button -> Settings -> System -> Display Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area

Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10? (Select 2 answers)

Windows Taskbar notification area Sound applet in Control Panel

A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as:

Windows Update

Which of the following terms describes a large network of Windows-based PCs under single administration?

Windows domain

Which of the following key combinations can be used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows?

Windows logo key + E

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)

Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup

Which of the statements listed below apply to Windows workgroups? (Select 3 answers)

Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?

apt-get

Which of the following Linux command-line commands enables directory traversal?

cd

Which of the following commands launches a command interpreter utility in Windows?

cmd

The following command-line command can be used to copy one or more files from one location to another.

copy

Which Linux command enables copying files and directories?

cp

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

dd

An MS Windows system utility designed to improve file access speed by rearranging data stored on a disk or drive is called:

defrag

Which of the following launches the Device Manager tool in Microsoft Windows?

devmgmt.msc

Which of the following launches a GUI system utility for managing HDDs in Windows?

diskmgmt.msc

A Microsoft-proprietary file system optimized for flash drives is known as:

exFAT

For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk.

format

A command-line command in MS Windows that displays Group Policy information for a machine or user is known as:

gpresult

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:

grep

Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select 2 answers)

help [command name] [command name] /?

A service that enables storage of data on Apple cloud servers is called:

iCloud

An Apple-proprietary OS designed for tablets, smartphones and mobile devices is called:

iOS

A Linux command-line utility used for displaying and modifying network interface configuration settings is called:

ifconfig

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?

iwconfig

Which of the Linux command-line commands allows to terminate a running process?

kill

Which of the following Linux commands is used to display information about files and directories contained within the current working directory?

ls

Time Machine is a built-in backup utility for:

macOS

A Microsoft Windows application utility that displays details about computer's hardware configuration, computer components, software, and device drivers is known as:

msinfo32.exe

What is the name of the Linux command used for renaming files and directories?

mv

Which of the following is a Linux command for transferring files/directories to a different directory?

mv

Which of the following Command Prompt commands in Windows is used for listing a computer's connections to shared resources?

net use

Which of the MS Windows command-line commands lists the user accounts for the computer?

net user

Which of the following answers describe the characteristics of a non-persistent VDI? (Select 2 answers)

At the end of a session, user desktop reverts to its original state Virtual desktop is shared among multiple users

Which edition of Microsoft Windows 8/8.1 cannot participate in a Windows domain?

Core

Which of the Microsoft Windows 8/8.1 editions does not include the BranchCache feature?

Core

All modern applications are designed as cross-platform software which allows them to be run on different operating systems (e.g. Windows, Linux, or macOS) without any modifications in the application source code.

False

Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.

False

The maximum amount of supported physical memory for all editions (Home/Pro/Education/Enterprise) of the 32-bit (x86) Windows 10 is 8 GB.

False

Which edition of Microsoft Windows 10 cannot participate in a Windows domain?

Home

Which of the following Windows 10 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

Home

What is the name of an operating system installation type that preserves system settings, personal files, and applications from the older OS version?

In-place upgrade

Examples of workstation operating systems include:

Microsoft Windows Apple Macintosh OS Linux

Which of the following enable installation of an OS via network interface? (Select 2 answers)

Netboot PXE

A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory locations is known as:

No-eXecute bit (NX bit)

Which of the following are examples of partition types? (Select 3 answers)

Primary Logical Extended

A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?

TCP port 3389

Which of the following ports is used by HTTPS?

TCP port 443

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

True

The maximum amount of supported physical memory for all editions (Core/Professional/Enterprise) of the 32-bit (x86) Windows 8/8.1 is 4 GB.

True

Which of the following Windows 8/8.1 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

Core

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

DHCP

If a computer's hard disk has an adequate free disk space, it is possible to install more than one operating system and then choose which OS to use during each startup. This type of configuration setup is known as:

Multiboot

What are the advantages of organizing hard drive space into multiple partitions? (Select 3 answers)

Multiboot environment Separated disk space used for virtual memory Separation of user files from the operating system and application files

Which of the following is used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?

NetBIOS

Match an OS boot method on the left with the corresponding media type from the drop-down list.

Optical disc: CD-ROM/DVD/Blu-ray External drive:eSata Flash drive: USB Network boot:PXE Internal fixed disk:HDD/SSD Internal hard drive: Partition

Which of the following answers describe the available options of the Master Boot Record (MBR) partition style? (Select 3 answers)

Overall number of partitions limited to four Up to three primary partitions and one extended partition Up to four primary partitions

Which of the following OS boot methods takes advantage of a network interface?

PXE

The practice of dividing hard disk space into isolated logical storage units that behave like separate disk drives is known as:

Partitioning

Which of the following statements describe the characteristic features of open-source applications and OSs?

Permission to modify and redistribute the application Free access to the application code

Starting with the May 2019 OS release update, the minimum hard disk space requirement for both 32-bit (x86) and 64-bit (x64) editions of Windows 10 was increased to 32 GB.

True

The term "BranchedCache" refers to a Wide Area Network (WAN) bandwidth optimization technology implemented in some versions of MS Windows. BranchCache accelerates the process of serving network content by saving previously requested WAN resources on local servers or client computers which allows the subsequent requests to be served locally rather than from a remote server.

True

Which of the following are the limits on physical memory for 32-bit (x86) Microsoft Windows 7? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Windows 7 Starter:2Gb Windows 7 Home Basic:4Gb Windows 7 Home Premium:4Gb Windows 7 Professional:4Gb Windows 7 Enterprise:4GB Windows 7 Ultimate:4GB

What is the theoretical limit of addressable RAM for a 64-bit CPU?

8 GB 16 GB 32 GB 64 GB None of the above (Answer)

A type of protocol used in network management systems to monitor network-attached devices is called:

SNMP

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7?

1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space 1 GHz CPU

Which of the following answers describe the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7?

1 GHz CPU 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1?

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Which of the following answers describe the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10?

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10?

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

The GPT partition style extends the MBR's primary partition limit to:

128 primary partitions

Which of the following are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1?

2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GHz CPU with support for PAE, NX, and SSE2

A 32-bit system typically provides support for up to:

4 GB of RAM

Which of the following statements is true?

A computer with a 64-bit CPU can run most 32-bit OSs and applications without compatibility issues

A type of Windows installation that erases the contents of target partition is called:

Clean install

In a persistent VDI: (Select 2 answers)

Each user runs their own copy of virtual desktop At the end of a session, user data and personal settings are saved

Which Microsoft Windows 10 editions include the BranchCache feature? (Select 2 answers)

Education Enterprise

In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.

False

On a 64-bit MS Windows OS, both 32-bit and 64-bit applications are stored in the Program Files folder.

False

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

HTTPS

Which of the following are not examples of proprietary software?

Linux Android OS

What is the application of No-eXecute bit (NX bit)?

Malware protection

Which of the following is a Microsoft Windows home theater software included in MS Windows versions prior to Windows 10?

Media Center

Which of the following TCP port numbers is assigned to IMAP?

Port 143

Which of the following TCP ports does Telnet use?

Port 23

Which port number is used by SLP?

Port 427

AFP runs by default on TCP port:

Port 548

Which port enables FTP's Data Connection to send file data?

TCP port 20

FTP's Control Connection for administering a session is established through:

TCP port 21

SSH protocol runs on:

TCP port 22

An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type.

True

In MS Windows, dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).

True

In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.

True

Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory.

True

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 10? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Windows 10 Home: 128Gb Windows 10 Pro: 2TB Windows 10 Education: 2TB Windows 10 Enterprise: 6TB

Which of the Microsoft Windows 7 editions include the BranchCache feature? (Select 2 answers)

Windows 7 Enterprise Windows 7 Ultimate

Which edition(s) of Microsoft Windows 7 cannot participate in a Windows domain? (Select all that apply)

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

Which of the following Windows 7 editions do(es) not include EFS? (Select all that apply)

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 7? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Windows 7 Starter:N/A Windows 7 Home Basic:8GB Windows 7 Home Premium:16GB Windows 7 Professional:192GB Windows 7 Enterprise:192GB Windows 7 Ultimate:192GB

Which of the following are the limits on physical memory for 64-bit (x64) Microsoft Windows 8/8.1? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Windows 8 core: 128GB Windows 8 Professional: 512GB Windows 8 Enterprise: 512GB


Conjuntos de estudio relacionados

CHAPTER 6 Audit Planning, Understanding the Client, Assessing Risks, and Responding

View Set

ENT241 Midterm Ball State University

View Set

Ch. 7 Sales Comparison Approach - Principles and Data Sources

View Set

CURRENT PSYCHOTHERAPIES all chs excluding 12,13

View Set

Chapter 18: regulation of gene expression

View Set