CrucialExams Practice Test

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which Windows tool can prevent programs from automatically opening upon start up on the Windows 7 Operating System? A) MSCONFIG B) CHKDSK C) DXDIAG D) DEVMGMT.MSC

A) MSCONFIG The MSCONFIG tool, officially called the System Configuration tool has several features for troubleshooting and modifying the start up process.

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform next? A) Re-establish a new theory or escalate B) Establish a plan of action to resolve the problem C) Document findings, actions, and outcomes D) Implement preventative measures

A) Re-establish a new theory or escalate Although the technician was able to locate and remove a virus, that virus was not the cause of the user's issues. The technician should continue to troubleshoot the computer.

You have just configured permissions for a set of folders on an NTFS disk, the folders also have another set of share permissions. When a user connects to one of these folders through a network share, which of the following is true? A) The most restrictive permissions from both NTFS and Share will apply B) The least restrictive permissions from both NTFS and Share will apply C) Only Share permissions will apply when accessing through a share folder D) Only NTFS permissions will apply when accessing through a shared NTFS folder

A) The most restrictive permissions from both NTFS and Share will apply When accessing through a network share both NTFS and share permissions will apply. When accessing a file or folder directly only NTFS permissions will apply. In either case the principle of least privilege will apply and the most restrictive permissions will always take priority.

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions? A) All file permissions must be reassigned B) All of the file permissions are lost C) The file owner is preserved D) The file name becomes case insensitive

B) All of the file permissions are lost Unfortunately the FAT32 file system does not allow for file and folder permissions like those that are commonly found on modern file systems, such as NTFS.

Which of the following is the default package manager for the Ubuntu Linux distribution? A) Yum B) Apt C) Wget D) Gzip

B) Apt APT (Advanced Packaging Tool) is the default package manager for the Ubuntu Linux distribution. A package manager is a system used to download, install, update and remove software applications.

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria? A) Users and Groups B) Local Security Policy C) Performance Monitor D) MSCONFIG

B) Local Security Policy Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task? A) NSLOOKUP B) NET C) NBTSTAT D) NETSTAT

B) NET The NET command in Windows provides many options, including the NET USE command tool. The NET USE command will show and configure mapped network drives from a shared resource like a NAS or a storage server.

You need to download and install a package using the apt-get command on an Ubuntu environment. After running the command you receive an error stating you do not have permissions to perform this action. What should you do next? A) Right click the terminal and select Run as Administrator B) Prepend sudo to your command C) Fast swap to root D) Switch to the administrative user accoun

B) Prepend sudo to your command Placing sudo (SuperUser Do) in front of a command in some Linux environments will run the command with the security privileges of the root account. Once the command finishes the privileges will be removed and are not applied to any further commands or applications. (unless they are also run with sudo)

After installing Windows 10 on a Laptop PC alongside an existing Red Hat Linux installation you receive a message stating that the GRUB file is missing when you try to boot the PC. Which of the following is the best option? A) Ignore the error and boot into Windows 10 for the first time B) Rebuild the GRUB using a Red Hat Disc C) Upgrade to GRUB for Windows to allow both Windows and Linux to operate D) Reinstall Windows 10, selecting allow multiboot under advanced installation options

B) Rebuild the GRUB using a Red Hat Disc GRUB (GRand Unified Bootloader) is an open source technology commonly used to allow multiple operating systems to boot on a single machine. GRUB is commonly used as the default boot loader for Linux, but it is compatible with Windows also. When Windows 10 was installed the GRUB was replaced or corrupted and using the Linux installation CD to restore it is your best option.

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives? A) Enable PATA in the BIOS B) Select load driver C) Press F8 when prompted D) Hit the refresh button to force a re-detect

B) Select load driver Often when installing Windows onto an external RAID array, a driver is required for Windows to detect the hard drive

Which of the following Windows commands can identify and repair corrupted information and other hard drive issues? A) FIXDSK B) DSKREP C) CHKDSK D) None of the abov

C) CHKDSK Check Disk (CHKDSK) is a Windows Repair tool for verifying volume integrity.

You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue? A) Check the networks firewall for unauthorized entries B) Reinstall the user's email client C) Change the user's account password D) Install a more expensive spam filter

C) Change the user's account password Changing the account password will most likely solve the issue, but better preventatives should be put in place as soon as possible. Spam filters typically ignore local emails, which is why this is not the correct answer.

Which of the following passwords is the MOST secure according to industry best practices? A) VeryStrongPassword B) SimpleAnswer1234 C) E@sy2Rememb3r D) Thisisthecorrectanswer1

C) E@sy2Rememb3r A good password can be defined in many different ways - however at a minimum it should contain letters, numbers, special characters and be at least 8 characters long.

What is step 3 in the trouble shooting theory? A) Document findings B) Verify full functionality C) Test the theory to determine the cause D) Consider corporate policies

C) Test the theory to determine the cause 1. Identify the problem, 2. Establish a theory of probable cause, 3. Test the theory to determine cause, 4. Establish a plan of action to resolve the problem and implement the solution, 5. Verify full system functionality and if applicable implement preventive measures, 6. Document findings, actions and outcomes

Recently the company you work for began investigating the possibility of replacing their payroll system with a cloud based service provided by a third party company. Which type of service is this? A) RaaS B) PaaS C) IaaS D) SaaS

D) SaaS Software as a Service (SaaS) is an internet or cloud based application accessible by consumers or customers. Crucial Exams, Google Search and Twitter are all common examples of SaaS.

Amanda, a user, has a laptop running Windows 7 Ultimate. She has asked the IT Department to update her laptop to run Windows 10 Pro. Which of the following should be done first? A) Run the Windows 10 Update Software B) Purchase a valid Windows 10 Pro License C) Reformat the laptop with NTFS10 D) Verify the laptop can support Windows 10 Pro requirements

D) Verify the laptop can support Windows 10 Pro requirements Windows 10 and Windows 7 were released 6 years apart. It is possible her laptop does not meet the minimum requirements for Windows 10 and the laptop's specs should be verified first.


Conjuntos de estudio relacionados

Патофизиология 2020 экзамен тесты

View Set

English Review Comprehensive Exam

View Set

Chapter 14- Developing and Pricing Goods and Services

View Set

Exam 1 - Psychiatric/Mental Health Nursing, Mental health nursing Chapter 1-10, Contemporary Psychiatric-Mental Health Nursing (test 1) chaps 1-5 8-10, 13, 23, Psychiatric Nursing - PRELIMS, Midterm: Psychiatric Nursing, PSYCHIATRIC NURSING FINAL, Fi...

View Set

Film exam 2 short answer questions

View Set

Nursing in Nutrition Chapter 19 diabetes mellitus

View Set