Domain 1- Operating Systems

¡Supera tus tareas y exámenes ahora con Quizwiz!

Question 37: You have four volumes on a basic hard disk. Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? : Healthy (Basic) : Healthy (Logical Drive) : Healthy (Primary Partition) : Healthy (Dynamic) : Healthy

Explanation A basic hard disk can have only have four primary partitions. To get around this limitation on basic disks, the fourth partition is automatically configured as an extended partition that can hold logical drives, so the fourth partition would show a status of Healthy (Logical Drive). The first three partitions would show a status of Healthy (Primary Partition). If the disk had been a dynamic disk, the status would just be Healthy. If the disk gets converted from basic to dynamic, the status would be changed to show just Healthy.

Question 12: Why is it important to have your mobile device charger plugged in while it is receiving an operating system update? : It is not important for the charger to be plugged in, since the update can be received wirelessly. : Downloads run faster when the charger is plugged in. : The device must be connected to and charging from a computer so the update can be performed from the app store. : If the battery dies during the update, the operating system could become corrupted.

Explanation Being plugged in to the charger does not affect the speed of the update, but if the battery dies during the update, the operating system could become corrupted. Mobile devices can receive their operating system updates wirelessly so the device is no longer required to be logged into the app store (for example, iOS devices are no longer required to be updated through iTunes).

Question 233: A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use? : ps : grep : ls : chmod

Explanation The chmod command modifies the permissions on a files and defines who can access a file and the mode that can be used to access a file. The grep command is used to search text. The technician could save the output of the ps command in a text file and then search the files, or the technician could pipe the output from the ps command into the grep command. The ls command list the contents of a directory. The ps command lists information on the running processes on a Linux computer.

Question 205: Which term refers to the portion of the hard drive where print jobs are stored before going to the print device? : Print queue : Print device : Printer port : Print driver

Explanation The print queue is the portion of the hard drive where print jobs are stored before going to the print device. The print device is the physical device connected to the print server where print output occurs. The print driver is the software that allows the printer to communicate with the print device. The printer port is the hardware that allows a print device to connect to a print server.

Question 195: You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file? : Split between two storage devices : On the system volume : On a USB flash device : On a drive other than where the operating system files are stored

Explanation You must place the paging file on the system volume if you want Windows to be able to create a memory dump file when it crashes.

Question 31: You have just finished installing Windows on a system that contains four physical hard disks. The installation process has created a system volume and a C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2), but did not create any volumes on these disks. Which of the following would you expect to see as the status of Disk 1 and Disk 2? : Formatting : Unavailable : Unreadable : Healthy : Initializing : Unallocated

Explanation A disk that has been initialized will show as Unallocated if no volumes have been created. The Healthy or Online status indicates that the disk is turned on and can be accessed. The volume on the disk is valid and has no errors. The Formatting status is shown for volumes during the formatting process. After formatting, the status for the volume changes to Healthy. The Initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to Healthy. The Unavailable status indicates that errors have occurred on physical or dynamic disks. The Unreadable status indicates a hardware failure, I/O errors, or other corruption, but might also be caused by a delay in reading the disk in Disk Management.

Question 13: Your company has issued you a new laptop computer that contains a lot of memory and two very large hard disks. Since your computer at home is old and slow, you want to use your work computer for personal use as well. To keep your applications and files totally separate from the company's, you have been told you can run more than one version of Windows on the same computer, one for work, and one for personal use. Which of the following technologies would BEST meet your needs? : Recovery partition boot : NetBoot : PXE boot : Dual boot

Explanation A dual-boot or multiboot system is where two separate operating systems are installed on the same computer. This is accomplished by installing the second operating system on a separate partition or drive. After the second operating system has been installed, the computer, when started, will present a menu, letting you select which operating system from which to boot. When you are at home, you select the drive with your personal operating system. When at work, you select the driver with your work operating system. PXE is the Preboot eXecution Environment. A PXE boot is the process of loading a temporary operating system from the network from which you would normally install another operating system. Netboot is Apple's version of PXE and is used for the same basic purposes as PXE. The recovery partition boot is the process of booting to a partition that contains a backup image of your system. This is used to recover a corrupted operating system. You cannot run the operating from this recovery partition system as you would for work or home.

Question 49: You are installing Windows 10 on a drive that was previously used for Windows 8.1. This drive has one primary partition. While installing Windows, you want to ensure that the old files are deleted and any bad sectors are located and marked as bad. To achieve your desired goal, which of the following is the BEST option to run? : DiskPart : Quick format : Bootrec : Full format

Explanation A full format starting with Windows Vista will overwrite data on the drive and scan the hard disk for bad sectors. A quick format does not overwrite data and does not check for bad sectors. DiskPart is a disk partition utility operated with the command line. Since your drive already has a partition, this utility is not required. Bootrec, or the bootrec.exe utility, is a tool provided by Microsoft in Windows Recovery Environment, or the Windows RE. It is typically used for activities such as fixing the master boot record.

Question 36: Which of the following is true about primary partitions? : Primary partitions are subdivided into logical drives. : Primary partitions exist on dynamic disks. : The active partition must be a primary partition. : You can have a maximum of three primary partitions on a single disk.

Explanation A primary partition is a partition type used on basic disks. The active partition must be a primary partition. Each physical disk can have up to four primary partitions or three primary partitions and one extended partition. Logical drives are defined within an extended partition.

Question 218: You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the MOST likely cause of this problem? : A proxy server is filtering access to websites. : A firewall is blocking ports 80 and 443. : Port triggering is redirecting traffic to the wrong IP address. : The router has not been configured to perform port forwarding.

Explanation A proxy server can be configured to block internet access based on website or URL. Many schools and public networks use proxy servers to prevent access to websites with objectionable content. Ports 80 and 443 are used by HTTP to retrieve all web content. If a firewall were blocking these ports, access would be denied to all websites. Port forwarding directs incoming connections to a host on the private network. Port triggering dynamically opens firewall ports based on applications that initiate contact from the private network.

Question 212: Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? : Client/server : Extranet : Intranet : Peer-to-peer

Explanation Access to shared resources are controlled separately on each computer in the peer-to-peer model (a Windows peer-to-peer network is called a workgroup). For example, each computer in a peer-to-peer network maintains its own set of user accounts. An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses internet technologies, but its resources are made available to external (but trusted) users. The client/server model places shared resources on a server. Resources are accessed by clients.

Question 207: You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers. What should you do next? : Report to your supervisor that the job was completed. : Document the steps you took to complete the configuration. : Edit the printer properties to configure device-specific settings. : Share the printer over the network with the rest of the organization.

Explanation After installing a printer, you should configure device-specific settings before performing any further tasks. Documenting the steps you took to complete the configuration and reporting to your supervisor that the job was completed are good things to do, but not until after you have configured device-specific settings. Sharing the printer over the network is not required unless specified in the implementation plan or statement of work.

Question 206: You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers. Which of the following are the BEST steps to take next? (Select TWO). : Set the printer driver to print grayscale by default to reduce color toner consumption. : Edit the printer properties to configure paper tray and other device-specific settings. : Verify that it is working correctly by printing a test page. : Do nothing. Your work is done. : Use Driver Rollback to make a backup copy of the new printer driver. : Use the USBTEST utility in Windows to verify that the USB connection is working properly.

Explanation After you install a new printer for a customer, client, or user, configure device-specific settings and then print a test page to verify that the printer is working properly.

Question 39: Which of the following is a characteristic of extended partitions? : They are bootable. : There can be multiple extended partitions per drive. : They are subdivided into logical drives. : They can be set to active.

Explanation An extended partition is subdivided into logical drives. You cannot format an extended partition; you can only format the logical drives within the partition. You can have only a single extended partition per disk. The extended partition cannot be set as active and, therefore, cannot be used to boot the computer. Use a primary partition to set the partition as active, boot the computer, or to create multiple partitions per disk.

Question 6: You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 10 PC to the device. How can you connect the device to the PC? (Select TWO. Each option is a complete solution.) : Ethernet wired connection : USB cable : Wi-Fi wireless connection : Serial cable : Firewire cable

Explanation An iPad can be connected to a Windows 10 PC in three different ways: · USB cable · Wi-Fi wireless connection · Bluetooth wireless connection The iPad does not support wired Ethernet connections, serial connections, or Firewire connections.

Question 8: A company executive has just bought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select TWO.) : Android mobile devices, like iOS devices, are not susceptible to malware threats. : App reviews and ratings will help you choose an effective anti-virus app. : Any Android anti-virus app will be about as effective as any other. : Anti-virus apps are available for purchase from Android app stores. : Anti-virus apps for Android have not been developed yet. : Android operating system updates are sufficient to protect against malware threats.

Explanation Anti-virus apps are available for purchase from Android app stores, but many are not able to protect your Android device from more than 65% of the known malware threats. As you shop for an anti-virus app, be sure to refer to app reviews and ratings to help you choose an effective anti-virus app. Android devices can be infected by malware, so it is important to take steps to protect them.

Question 219: You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do? : Escalate the call to another technician or your supervisor. : Establish a Remote Desktop connection and update the driver. : Drive to the other location as soon as possible and update the driver. : Tell the user to wait until you are scheduled to be in that location.

Explanation As long as it is set up correctly, you can use Remote Desktop to connect to the user's system remotely. You can then perform tasks as if you were at the computer.

Question 236: You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password? :su -In:

Explanation At the command prompt, enter su -, and the system will switch you to the root user and require you to enter the root password. You will then be able to perform tasks that require root user administrative privileges. After completing these tasks, you should log out as root and return to the standard user account.

Question 33: You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks? (Select TWO). : Striped volumes : Spanned volumes : Simple volumes : Primary partitions : Extended partitions with logical drives

Explanation Basic disks use primary and extended partitions. Each physical disk can have up to four primary partitions or three primary partitions and one extended partition. Logical drives are defined within an extended partition. The extended partition can be divided into multiple logical drives. Dynamic disks support volumes that use discontiguous disk space. Simple volumes contain disk space from a single hard disk (both contiguous and discontiguous space). Spanned volumes contain disk space from multiple hard disks grouped into a single logical volume. Striped volumes use equal partition sizes on two disks to create a volume. Data is divided and saved to each disk.

Question 25: Match each disk type on the left with its corresponding description/features on the right. Each disk type may be used once, more than once, or not at all. Support up to 128 volumes. Dynamic disks Use primary and extended partitions. Basic disks Are supported by all operating systems. Basic disks Support volumes that use discontiguous disk space. Dynamic disks Store partitioning information in a hidden database on all such disks in the system. Dynamic disks Only support volumes made up of contiguous disk space. Basic disks

Explanation Basic disks: · Use primary and extended partitions. · Are supported by all operating systems. · Only support volumes made up of contiguous disk space. Dynamic disks: · Support up to 128 volumes. · Support volumes that use discontiguous disk space. · Store partitioning information in a hidden database on all such disks in the system.

Question 14: You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 10 on this system? : Load the drivers for the SSD device during the initial phase of the Windows installation. : Install Windows the same way you would a system that uses a standard hard disk drive. : Set the SATA configuration in the UEFI firmware to RAID. : Add a standard hard disk to the system and install Windows on the disk instead of the SSD device.

Explanation Because the SSD drive uses a SATA interface, you can install Windows on it the same way that you would on a standard hard disk drive. It's unlikely that you would need to load special drivers to access the SSD device. Setting the SATA configuration to RAID in the UEFI firmware would require at least one more identical SSD device to be added to the system and a RAID array be configured before you could install Windows.

Question 210: Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs? : Hidden share : VPN connection : Remote Desktop connection : Administrative share : Network share

Explanation By creating a network share to Jane's folder that contains her documents, you can grant the managers the ability to see and read these documents. All other employees will not have access if the rights are granted appropriately. If a manager forgets the path, they will still be able to easily find the folder by looking for shared folders on her computer. Administrative shares are created by the operating system. Specific share permissions and file security cannot be set. A hidden share is a form of a network share, but cannot be viewed by others when they are searching for the shared location. These shares are created by adding a dollar sign ($) to the end of the share when it is created. Although this could be used to share Jane's files, it would require that Jane give the path to each manager. Since Jane wanted to make this process as simple as possible, using a network share would be easier. A VPN, or Virtual Private Network, allows you to create a safe secure tunnel between your company network and a remote location over an existing connection, usually the internet. This is not required to share folders with fellow employees in the same local network. A remote desktop connection gives someone the ability to log on to another computer from their computer. This would not be a suitable solution, as it would be difficult to limit rights.

Question 209: You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform? : Replace the speakers. : Replace your sound card. : Manually change the IRQ settings for the card. : Check the vendor's website for an updated driver.

Explanation Check the vendor website for an updated driver before further troubleshooting. Because the speakers worked before, you probably won't need to replace the speakers. PCI cards are plug and play, meaning that you should not need to manually configure resources such as IRQs. You should troubleshoot the problem completely before you resort to replacing the sound card.

Question 17: You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected? : In the UEFI configuration, set the SATA mode to be AHCI. : In the UEFI configuration, set the SATA mode to IDE. : In the UEFI configuration, configure the boot order to boot from the hard drive instead of the optical drive. : During the installation, browse to and select the appropriate driver for your RAID controller when prompted.

Explanation During the installation, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows. Windows requires the drivers for the RAID controller to be able to access the RAID array. When using a RAID array, the SATA mode in the UEFI configuration should be set to RAID. This mode must be selected for you to access the motherboard RAID configuration utility and create the array. Using IDE or AHCI for the SATA mode would disable the RAID controller on the motherboard, and each storage device would be seen as a separate disk. Booting to the hard drive would not work because the installation files are stored on the optical disc, not the hard drive.

Question 44: You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices. When formatting your USB drive, which of the following file system types would meet MOST, if not all, of your needs? : FAT32 : NTFS : NFS : CDFS

Explanation FAT32 is your best choice. Many of the older operating systems (and non-PC systems like printers, projectors, and TV sets) were initially installed or designed to use FAT32. Formatting your USB drive with any of the other file systems would make it incompatible with many of the devices you need to maintain.

Question 45: What is required to control access to the file system using file and folder permissions on a Windows-based computer? : NTFS-formatted partition : Ext4-formatted partition : FAT32-formatted partition : EFS

Explanation File permissions are only available under Windows for files on a partition formatted with NTFS, not FAT32. The Encrypting File Service (EFS) with Windows encrypts individual files. The Ext4 file system is used on Linux systems.

Question 199: From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future? : When I close the lid: Sleep/Suspend : When I close the lid: Hibernate : When I close the lid: Standby : When I close the lid: Shut down

Explanation Hibernate saves the state of your computer to the hard disk and completely powers off your computer. When the devices resumes, the saved state is restored to RAM, and you can pick up where you left off. Sleep, suspend, and standby are all different terms that have been used for various versions of Windows. Regardless of which option is available for your version of Windows, when selected, these do not turn off your computer. Instead, they put the computer and all peripherals on a low power consumption mode. Since your battery is not very good and can only power your computer for a short time, these options run the risk of the computer losing power, resulting in the closure of your programs and files. Shut down will close all files and programs, and all power is terminated.

Question 200: You want to use Hibernation on your Windows notebook. What does it need to have? : A minimum of 1 GB of RAM : Enough free hard drive space : UPS : A Pentium IV or better processor

Explanation Hibernation saves everything in RAM to the hard drive. Therefore, you need at least as much free disk space as you have RAM. Hibernation does not depend on the processor capabilities or the amount of RAM. A UPS is used to supply power to a device if the regular AC power is interrupted.

Question 27: You have four volumes on a basic hard disk. You convert the disk to dynamic. After the conversion, which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? : Healthy (Dynamic) : Healthy (Logical Drive) : Healthy (Basic) : Healthy (Primary Partition) : Healthy

Explanation If a basic disk gets converted to dynamic, the status of all partitions on that disk would be changed to show a status of Healthy. There are no Primary or Logical partitions on a dynamic disk. A basic hard disk can have only have four primary partitions. To get around this limitation on basic disks, the fourth partition is automatically configured as an extended partition that can hold logical drives, so the fourth partition would show a status of Healthy (Logical Drive).

Question 217: If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing? : If the printer has a USB port, plug in a USB wireless adapter. : If the printer is Ethernet capable, it can be connected to the network through a wireless router. : If the printer is Bonjour-enabled, it can be discovered by workstations using the Bonjour service. : Share the printer from a computer that has a wireless network connection.

Explanation If the printer is not Wi-Fi capable but has an Ethernet port, it can be connected to the network through a wireless router. Just use an Ethernet cable to connect the printer to a port on the wireless router. Users on the same network as the wireless router will be able to send jobs to the printer as if the printer has a wired connection. (All users will have to install the driver for that printer on their workstations.) The wireless router option is more reliable than connecting the printer to a workstation that has a wireless connection to the network and then sharing the printer from that workstation. The workstation performs the same role as the wireless router, but the workstation will be shut down a lot more often than the wireless router would be. A USB wireless adapter will not provide a wireless connection for a printer because the adapter needs to be connected to a device with an operating system and the capacity to install drivers. Bonjour can only be used for wireless printing if the printer is already using a Wi-Fi connection to the network.

Question 29: You have just added a brand new hard disk to your Windows-based computer. When you power on the computer, the disk is not shown in File Explorer. To troubleshoot this issue, you open the Windows Disk Management console and see that the disk is present, but is shown as Unknown. Which of the following disk management steps is MOST likely required first? : The disk needs to be partitioned. : The disk needs to be wiped. : The disk needs to be initialized. : The disk needs to be formatted.

Explanation If you add a brand new disk to your PC and it doesn't show up in File Explorer, especially if it is in the Disk Management console, it's shown as Unknown. It is most likely that the drive needs to be initialized. Initializing a disk erases everything on it and prepares it for use by Windows. After a disk has been initialized, it can then be partitioned and formatted. Wiping a disk is the process of overwriting any data that was previously recorded on the hard drive. This process ensures that if the drive falls into enemy hands, no old data can be recovered. Since this drive is brand new, a disk wipe is not required

Question 40: Which of the following conditions would prevent you from using a GUID Partition Table (GPT) when setting up a disk drive? : You need to be able to create up to 128 partitions on the drive. : You're setting up the drive to boot 64-bit Windows 7 on a UEFI-based computer. : You're setting up the drive to boot Windows 10 on a computer that uses traditional BIOS. : You need to set up the drive as a dynamic disk.

Explanation If you need the drive to boot Windows and the computer uses traditional BIOS (not UEFI), you need to set up the drive with MBR. A GPT drive can: · Be basic or dynamic. · Set up to boot 64-bit Windows 7 on a UEFI-based computer. · Be used to create up to 128 partitions.

Question 237: You've just opened a text file in the vi editor, and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode? (Select THREE). : Press the S key and then press Insert : Press Esc and then press : + R : Press Esc and then press the R key : Press Insert and then press Insert again : Press the 'i' key and then press Insert : Press Insert and then press the R key : Press Insert and then press : + R

Explanation In Command Mode, you need to press either the I key, the S key, or the Insert key to enter Insert Mode; then, just as with GUI word processors, if you press the Insert key again, the cursor will change to Replace Mode. Pressing Esc while in Command Mode will switch vi to Command Line Mode.

Question 46: You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. Which of the following BEST describe the next step you need to perform? : Share the folder and then use share permissions to control access. : Use Explorer to edit the permissions on the folder. : At a command prompt, use the attrib command to configure permissions. : Use the convert command to convert from FAT32 to NTFS and then configure NTFS permissions.

Explanation In order to implement file and folder permissions, you must convert from FAT32 to NTFS by using the convert command. You can then configure file permissions. Using share permissions secures the folder contents when the file is accessed through the network, but does not control access when files are accessed locally.

5. You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely rectify this issue? : Update the memory controller driver in Device Manager. : Flash the BIOS. : Disable the AGP aperture in the BIOS. : Install a 64-bit version of the operating system.

Explanation In this scenario, the most likely cause is the operating system being a 32-bit operating system. You must use a 64-bit operating system to use memory above 4 GB. The AGP aperture is a method for sharing system memory with an AGP video card instead of PCIe. With shared memory, some of the memory is used by the video card and is not available for the system. You do not update memory controller drivers.

Question 9: You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete? : If you disconnect during the update, the operating system could become corrupted. : The update would continue wirelessly (if a wireless network is available). : Your iPad would revert to the previous version of the operating system, so you'd have to start the update again from the beginning to get the update. : iTunes would pause the update process until you reconnect your iPad to your computer.

Explanation It is very important that you not disconnect your iPad while the update is in progress. If you disconnect your iPad while the update is in progress, the operating system could become corrupted. The update will not pause if you disconnect; it will crash. It will not continue through a wireless connection. The iPad will not just revert to the previous version of the operating system.

Question 227: As the IT technician for your company, you have discovered that the anti-malware software being used is not detecting and removing a virus. Which of the following would MOST likely correct this issue? : Searching for and deleting the file you believe to be infected. : Scanning the computer using another virus detection program. : Updating your malware definitions. : Setting the read-only attribute of the file you believe to be infected.

Explanation Malware detection software can search only for malware listed in its malware definitions file. An outdated file can prevent the anti-malware software from recognizing a new virus.

Question 204: A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the SIMPLEST way to power down the laptop? : Hold down the power button for several seconds. : Disconnect the power adapter. : Press Ctl + Alt + Del and open the task manager. : Remove the battery.

Explanation Many laptops power off when the power button is held down for several seconds. Pressing Ctl + Alt + Del on a Windows computer opens the task manager. The task manager can be used to close frozen applications. However, in this scenario, the laptop does not respond to keystrokes. Disconnecting the power adapter and removing the battery interrupts the power to the laptop, forcing it to shut down. Both must be done to interrupt the power. Holding down the power button for five seconds is an easier option.

Question 211: Don is an accountant in the Finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the most likely reason Don could not install the application? : Insufficient disk space : Failed device driver : Insufficient permissions : Incorrect service pack level : Insufficient system RAM

Explanation Most likely, Don cannot install the application because his user account has insufficient permissions. The help desk technician's user account has permissions to install applications, but Don does not. Insufficient space would keep an application from installing if it required more space than is available. But in this case, the help desk personnel was able to install it without issue. Device drivers are only needed for devices connecting to the computer. Service packs generally contain security-related hotfixes and do not affect ability to install legitimate applications.

Question 11: You are currently managing a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device? : Intel64 : ARM : x86 : x86-64

Explanation Most tablet devices, such as the iPad, use the ARM architecture. ARM is more power-efficient and less expensive to manufacture than x86. Android also runs primarily on ARM. The x86 architecture is used on some tablet PCs. It is compatible with standard x86 PC hardware and software, which allows the device to run operating systems such as Windows. Some newer versions of Android can also run on the x86 architecture. x86-64 and Intel64 are architectures used in desktop and notebook PCs.

Question 240: You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies? : yum install httpd : ps -ef : yum install httpd -dep : apt-get install httpd -dep : apt-get install httpd : dpkg install httpd : ps -e

Explanation On a Linux distribution that uses Debian Package Manager (dpkg) for package management, entering apt-get install httpd at the command line will install the Apache HTTP Server package and all its dependencies. The apt-get command can automatically locate and download Debian packages for you by searching one or more repositories on the internet. It installs the package and all of its dependencies at the same time.

Question 238: You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies? : yum install httpd -dep : apt-get update httpd : yum update httpd : apt-get install httpd : yum install httpd

Explanation On a Linux distribution that uses RPM for package management, entering yum install httpd at the command line will install the Apache HTTP Server package and all its dependencies. yum automatically locates and downloads RPM packages for you by searching one or more repositories on the internet. It can install a software package and all of its dependencies at the same time.

Question 241: You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system? : ps -e : yum list available : apt-get list : yum show available : apt-get list available : yum list all : yum show all : ps -ef

Explanation On a Linux distribution that uses RPM for package management, entering yum list available at the command line will display a list of all packages available for installation within the internet repositories yum is configured to use on this system.

Question 239: You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed? : yum info httpd : yum search httpd : yum list installed : yum list installed httpd

Explanation On a Linux distribution that uses RPM for package management, entering yum list installed httpd at the command line will check to see if the Apache HTTP Server package is installed.

Question 220: A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select TWO.) : Power Users : Remote Desktop Users : Guests : Administrators : Users

Explanation Only users who are members of the Administrators or Remote Desktop Users groups are allowed to establish Remote Desktop sessions with a Windows system. Either group may be used; however, in this scenario, the best option would probably be to make her a member of the Remote Desktop Users group instead of Administrators to avoid granting her too many permissions and rights. Members of the Power Users, Users, and Guests groups are not allowed to establish Remote Desktop connections with a Windows system.

Question 19: You are an IT administrator for your company. You have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances? : Solid state/flash drives : PXE : USB : DVD

Explanation Performing the install from the network by means of PXE (pre-boot execution) will allow you to quickly install the required 300 computers from one location. Depending on the PXE environment used, you can often remotely reboot specific computers, and they will automatically know that an install is required and will perform the desired steps with minimal intervention from an IT administrator. External solid state/flash drives, USB, and DVD boot methods all require the IT administrator to visit each computer and perform some of the setup steps manually. Therefore, these methods can be slower and more time consuming.

Question 208: Which of the following virtual printing options allows you to convert a Word document into a .jpg file? : Print to File : Print to PDF : Print to XPS : Print to Image

Explanation Print to Image allows you to print any document into an image file that is independent of the application you use to view them. For example, you can convert a Word document into a .jpg file. The resulting images are print-ready and optimized for websites, smartphones, and tablets. You can also print them on a physical printer for excellent printouts. Print to the XPS allows you to create .xps files using any program that you can print from in Windows. Use the Print to XPS Document Writer when you want to view, save, share, digitally sign, and protect your document's content. The Print to PDF feature allows you to print your document to PDF format. Print to File saves the formatting and layout information of your file so a printer can create the document without the program or computer that created it.

Question 48: You have a computer with a removable disk drive that has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following actions MUST you complete to make the desired changes? : Back up the data on the D: drive. Run format /fs:NTFS. : Upgrade the disk to a dynamic disk. : Back up the data on the D: drive. Run convert.exe. : Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

Explanation The only way to go from NTFS to FAT32 is to reformat the drive. Because reformatting destroys all data, you should back up the drive before formatting and then restore the data after formatting the drive.

Question 18: You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops? : Recovery partition : Clean install : Image deployment : Upgrade

Explanation Since only two types of computers are being offered, using an image preloaded with the correct drivers, applications, and files is the quickest and easiest way to deploy Windows and any supplemental software (such as Microsoft Office). A recovery partition is used to restore a corrupt computer back to the state it was in at purchase. This option would not provide all the customizations needed for the company software. An upgrade is only used to migrate from an existing operating system to a newer operating system. Since these are new computers, an upgrade in not necessary or possible. A clean install is the process of installing Windows over the top of an existing operating system and, in the process, cleaning or erasing all of the existing data. This would require more time and would not install any of the supplemental software required.

Question 225: Nate, an employee in your organization, has started to work from home two days a week. Nate uses the same company laptop while working in the office and working at home. Nate's laptop automatically connects to the wireless network in the office, but does not automatically connect to his home wireless network. Nate would like the laptop to connect automatically at home and at work. Which of the following would BEST allows this to happen? : Configure a static IP address for the general TCP/IP configuration that is compatible with the office network and another static IP address for the alternate TCP/IPv4 configuration that is compatible with the home network. : Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network. : Configure automatic private IPv4 addressing. : Configure a static IP address that works for both the office and the home wireless networks. in both locations.

Explanation Since the employee is able to connect in the office, you only need to configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address. If the home wireless network used DHCP, an alternate static configuration would not be necessary. But since the employee does not obtain an automatic connection, DHCP must not be available on the home wireless router. There is no need to change the configuration that the laptop uses in the office. An automatic private IPv4 address (APIPA) will not enable the employee to connect to the internet either in the office or at home. There is no static IP configuration that could work

Question 197: Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? : System : Troubleshooting : Device Manager : Programs

Explanation Starting at the Control Panel's System Settings, you can select Advanced System Settings and then navigate to Virtual Memory Performance Options. From there, you can change the way your computer handles virtual memory (page files). If needed, an initial and maximum size can be set. Since no additional RAM can be added to the computer, increasing these sizes should reduce or eliminate the low virtual memory error messages. Program lets you view the programs installed and, if needed, uninstall, change, or repair an application. These options will not increase the amount of virtual memory used. Although the Troubleshooting option can be used to locate and fix many issues, such as fixing problems with Windows Update, running maintenance tasks, and more, it will not let you increase the virtual memory settings. Device Manager allows users to view and control the hardware attached to the computer. It does not let you increase the virtual memory settings.

Question 226: A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? : Alternate IP configuration : Static IP addressing : Dynamic IP addressing : APIPA IP addressing : Link-local addressing

Explanation Static IP addressing allows you to manually assign all configuration values. Static addressing is prone to error and should only be used under the following conditions: · The network has a small number of hosts. · The network will not change or grow. · You have some hosts that must always use the same IP address.

Question 196: You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update? : Performance : View hidden files : Program and Features : System protection

Explanation System protection provides full control over your System Restore operations. In Windows 10, System Protection is disabled by default. Before you perform the Windows update, you should enable this feature. Once enabled, Windows will automatically create restore points when system changes are made. However, it may be best to create the first restore point manually. If, for some reason, your Windows system is not functioning properly after the update, you can use this feature to restore your system back to the restore point created prior to the upgrade. Program and Features lets you view the programs installed on your computer and, if needed, uninstall, change, or repair an application. It cannot be used to create or use restore points. Performance lets you adjust settings to use for the appearance and performance of Windows. It also lets you configure some advanced settings, such as configuring virtual memory. It cannot be used to create or use restore points. View hidden files will let you see and work with files that are normally hidden. It cannot be used to create or use restore points.

Question 244: On a Linux system, what is the name of the directory where you will find a text file called devices that contains information about the devices that are configured on the system? : /proc : /root : /dev : /hwinfo : /sys

Explanation The /proc directory is actually dynamically created whenever you access it. /proc contains the devices file that lists all the hardware devices that are configured in the system. /proc also contains the cpuinfo file with information about the processor installed in the system and the dma file, which contains a list of DMA channel assignments.

Question 214: A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer? : Have the user share the folder as a local share and copy the file to the share. : Establish remote assistance and transfer the file within the session. : Attach the file to an email and have the user copy the file to the correct folder. : Use the C$ administrative share to copy the file.

Explanation The C$ administrative share (\\computername\C$) is available to technicians with administrator privileges. This share is the FASTEST way to transfer a file. It takes extras steps to have the user create local shares, and the user may not have permissions to the folder where the file should be copied.There are several steps to creating an email and attaching a file. In addition, depending on the file type, the file may be blocked by email filtering.The C$ administrative share is available to the technician. Setting up a remote assist session would add extra steps.

Question 28: Match the disk status on the left with the corresponding description on the right. Each status may be used once, more than once, or not at all. Shows while a disk is being converted from a basic disk to a dynamic disk. Initializing Indicates that the disk is turned on and can be accessed and the volume on the disk is valid and has no errors. Healthy Indicates that errors have occurred on physical or dynamic disks. Unavailable Shows when a dynamic disk has been removed or turned off. Offline

Explanation The Healthy or Online status indicates that the disk is turned on and can be accessed. The volume on the disk is valid and has no errors. The Initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to Healthy. The Unavailable status indicates that errors have occurred on physical or dynamic disks. The Missing status shows when a dynamic disk has been removed or turned off.

Question 230: When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use? : A remote desktop connection needs to be closed. : The operating system needs to be rebooted. : A runaway application does not respond to user input. : A user accidently sends a large job to a printer.

Explanation The Mac OS Force Quit functions and the Linux kill command can be used to stop a runaway application does not respond to user input. Force Quit and kill are not used to cancel a print job. Force Quit and kill are not used when the operating system needs to be rebooted. Force Quit and kill are not used to close a remote desktop connection.

Question 203: Which ACPI power state allows a system to start where it left off, but all other components are turned off? : Mechanical Off : Working : Soft Off : Sleeping

Explanation The Sleeping power state has a sleep state (S4) that allows the operating system context to be saved to a hibernation file. All other components are turned off. When the computer is restarted, the loader reads the hibernate file and jumps to the system's previous, pre-hibernation location. The Working state means the computer is running and is usable. Soft Off has similar traits to some of the sleeping states, but the computer’s contents are not saved and a full reboot is required. Mechanical Off means the system is completely turned off and is not consuming any power. No information from RAM is saved.

Question 228: An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following? : Scheduled disk maintenance : Patch management : Scheduled backups : Driver/firmware updates

Explanation The Time Machine application on Mac OS computers and the tar command in Linux are used for backups. While Time Machine and tar can be used to restore disk files, scheduled disk maintenance is usually performed to maintain disk and filesystem integrity. Patch management involves updating operating systems and applications, not performing backups. Driver/firmware updates involves updating the middleware that interfaces with internal and external devices, not performing backups.

Question 34: If you want to boot from a hard drive, what must it have? : Active partition : Passive partition : Dynamic partition : Extended partition

Explanation The active partition contains the boot sector, which is required to load an operating system. An extended partition is a partition type on a basic disk. An extended partition can exist, but is not required to boot.

Question 35: Which partition type identifies the partition as one that holds the boot loader program used to start the operating system? : Extended : System : Primary : Active

Explanation The active partition identifies which partition holds the boot loader code. When the system starts, it looks in the volume boot record (VBR) of the active partition to identify the location of the boot loader code. The system partition is the partition that holds the operating system files. This might be the same as the active partition, but can be different. A primary partition is a partition type on a basic disk. An active partition must be a primary partition, but there can be additional non-active primary partitions on a disk. An extended partition is a partition type that is subdivided into logical drives. The extended partition cannot be the active partition.

Question 16: Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's accounting department. She received a single Windows 10 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select TWO). : Use the installation disk to install Window on each system individually. : Use a network installation. : Burn 50 copies of the installation disc and install 50 systems at a time. : Copy the installation media to 10 flash drives and install 10 systems at a time. : Install one system and image it to the other systems.

Explanation The best installation options in this scenario is to either perform a network installation or use imaging. In a network installation, you would copy the installation media to a Windows Deployment Services (WDS) server, configure each new workstation to use PXE boot, boot them from the WDS server over the network, and then run the install. Alternatively, you could install Windows on one of the systems and then use imaging software to take an image of that system and copy it to the remaining 99 systems over a network connection. Installing one system at a time from the installation disc would take a considerable amount of time. Burning multiple copies of the installation disc or creating multiple flash drives and then installing 100 systems from them would be time-consuming.

Question 15: You recently purchased a copy of Windows 10 from a retail store. The system you want to install Windows on doesn't have an optical drive. What is the BEST option for installing Windows in this scenario? : Install the system over the network from a Windows Deployment Services (WDS) server. : Install Windows on a system that has an optical drive and then create a disk image and copy it to the system you originally wanted to install Windows on. : Perform a Reset installation. : Use the Windows USB/DVD Download Tool to copy the installation files to a USB flash drive.

Explanation The best option in this scenario is to run the Windows USB/DVD Download Tool on a different computer to copy the Windows 10 installation media to a USB flash drive. Then you can boot the system where you want to install Windows from the flash drive and complete the install. While a network install using a WDS server is possible in this scenario, it would require considerably more time, expertise, and hardware. The same is true of using an imaging solution. You can only perform a Reset installation on an existing Windows 10 system.

Question 232: A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use? : grep : ls : ps : chmod

Explanation The chmod command modifies the permissions on a files and defines who can access a file and the mode that can be used to access a file. The grep command is used to search text. The technician could save the output of the ps command in a text file and then search the files, or the technician could pipe the output from the ps command into the grep command.The ls command list the contents of a directory.The ps command lists information on the running processes on a Linux computer.

Question 201: You have just purchased a used laptop, and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. Which of the following will BEST resolve this issue? : Free up disk space. : Configure the laptop to use the Max Battery power scheme. : Charge the battery before pressing the power button. : Enable ACPI support in the BIOS.

Explanation The computer must have sufficient disk space to enter hibernation. The contents of RAM are saved to the hard disk. ACPI support is already enabled; otherwise, you would not have been able to configure hibernation in the first place. Changing the power scheme or charging the battery has no effect on a device's ability to enter hibernation.

Question 223: Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established? : 123 : 23 : 3389 : 22

Explanation The firewall on a Windows system must be configured to allow Remote Desktop traffic through. This is done by opening TCP port 3389 (by default). This port is opened automatically on the Remote Desktop host when remote connections are enabled. Port 22 is used by the SSH protocol. Port 23 is used by the Telnet protocol. Port 123 is used by the Network Time Protocol.

Question 7: Match the mobile operating systems on the left with the descriptions on the right. Each mobile operating system may be used once, more than once, or not at all. Closed source and second most popular mobile device operating system. iOS Device manufacturers are countless. Android Open source and most popular mobile device operating system. Android Device manufacturers include Microsoft, Samsung, and HTC. Windows Devices solely designed and developed by Apple. iOS Closed source and third most popular mobile device operating system. Windows

Explanation The following mobile device operating systems are commonly available with the following feature highlights: Android · Android is open source and the leader in mobile device operating systems. · Google Play Store has the most mobile apps. · Android manufacturers are countless and include Samsung, Sony, HTC, LG, and Motorola. iOS · iOS is closed source and the second most popular mobile device operating system. · iOS is a close competitor with Google in theAppStore mobile app count. · iOS devices or iPhones are solely designed and developed by Apple. Windows · Windows is closed source and far behind Android and iOS in mobile device operating system popularity. · Windows Store has the fewest mobile apps. · Microsoft Mobiles (formerly Nokia) are the leading Windows Phone providers, though Samsung and HTC have launched Windows phone devices in the past. Google is not a mobile device operating system; Google uses the Android operating system.

Question 231: A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? : cd : grep : sudo : ls

Explanation The grep command is used to search text. The technician could save the output of the ps command in a text file and then search the files, or the technician could pipe the output from the ps command into the grep command. The ls command list the contents of a directory. The cd command is used to change the current directory, or the directory in which the user is currently working. The sudo command is short for "superuser do" or "substitute user do." It allows a user with proper permissions to execute a command as another user, such as a superuser.

Question 10: Your iPad is configured to do remote backups everyday to iCloud. Which conditions are required for the iCloud backup to take place? (Select THREE.) : The iPad has to have an internet connection. : The iPad has to be plugged into a power source. : The iPad has to be connected to your computer and logged into iTunes. : The iPad screen has to be unlocked with a password. : The iCloud Backup app has to be running. : The iPad screen has to be locked.

Explanation The iCloud backup will happen everyday, as long as your iPad is plugged in and connected to the internet and its screen is locked.

Question 3: You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor? : Hard disk : RAM : Operating system : BIOS

Explanation The motherboard and the operating system must be able to support the processor in use. Many 64-bit CPUs can run a 32-bit version of the operating system. However, the operating system will run only in 32-bit mode and will not take full advantage of the 64-bit processor. Even if you stick with the 32-bit operating system, chances are you will need to upgrade the hardware abstraction layer (HAL) to one that is compatible with the 64-bit processor. The BIOS must support the 64-bit processor. However, when you upgrade the motherboard, you will get a new BIOS chip, so upgrading the BIOS will not be an issue.

Question 242: Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management? : yum process info : apt-get -e : yum info : apt-get -ef : yum -ef : yum -e : ps -ef : ps -e

Explanation The ps utility is used to display running processes on a Linux system. Entering ps -e will display a simple list (without extended information) of all processes running on the system. ps -ef will display a list with extended information about all the processes running on the system. yum and apt-get are package management tools. They are not used for process management.

Question 235: You are logged in as a user with limited system privileges. You are the Linux system administrator, and you have the password to the root user account. When you need to switch to root user to perform administrative tasks, what command should you enter at the command prompt? :su -In:

Explanation The su - command switches ownership of the current session to the root user. Entering a space and a dash after su ensures that you will have access to the home directory and environment variables assigned to the root user. You must enter the root user password to proceed after entering the su - command.

Question 215: Which of the following methods can be used to connect a printer to a network? (Select TWO.) : Plug a network cable into your printer's USB port. : Plug an Ethernet cable into the network port in the printer. : Connect your printer to an external print server device that is connected to the network. : Plug a USB-to-Ethernet adapter in your printer's USB port. : Plug a network cable into your printer's serial port.

Explanation There are two common ways to make a printer a network printer. Most printers come with an integrated network card or have a slot for adding a network card. Otherwise, it is possible to connect it to the network using an external printer server. The external print server functions as a gateway between the printer's parallel interface and the network topology. While a USB-to-Ethernet adapter can be used to connect a workstation to a wired network, it won't work with a printer, as software drivers must be loaded on the host for the adapter to work.

Question 41: You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO). : Configure both share and NTFS permissions. : Configure share permissions. : Configure NTFS permissions. : Place the files on an NTFS partition. : Place the files on a FAT32 partition.

Explanation To control both local and network access, you will need to use both NTFS and share permissions. The folder must be located on an NTFS partition to be able to configure NTFS permissions. Configuring only NTFS permissions will not allow network access. Configuring only shared permissions with the files on a FAT32 partition will not control local access.

Question 202: You want to configure Power Plans on your Windows 10 laptop computer. Which of the following can do this? (Select TWO.) : Click Start and then open the Control Panel. Double-click the System icon. On the Advanced tab, click the Settings button for performance. : In the Notification Area, double-click the battery icon. Click Power Options. : Go to Settings > System > Power & sleep. : Click Start and then right-click Computer and select Properties. Click Advanced System Settings. : Right-click the Desktop and select Properties. On the Screen Saver tab, click the Power... button.

Explanation To edit Power Plans in the Windows 10 operating system, go to Settings > System > Power & sleep. Alternatively, you can also click the battery icon in the Notification Area for Power Options.

You have been asked to install Windows 10 on 30 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend? : Imaging : Optical disc : Network : Unattended

Explanation To simplify and speed up installation, perform an unattended installation. The unattended answer file contains responses to common setup questions. You simply start the installation and direct it to reference the answer file, and the installation completes without your intervention. You cannot use an image-based solution because this requires that all hardware be similar. A network or optical disc-based install will not simplify the installation. You must still move from system to system to answer all of the installation prompts during the installation process.

Question 32: You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. Which of the following is the BEST step to perform? : Use basic disks and a primary partition. : Use dynamic disks and a spanned volume. : Use basic disks and an extended partition. : Use dynamic disks and a simple volume.

Explanation To use multiple disks in a single logical storage unit, upgrade all disks to dynamic disks. Create a spanned volume. A simple volume contains storage space from a single disk. Use basic disks to create primary and extended partitions. Partitions cannot include storage space from multiple disks.

Question 4: You want to build a new system that supports 6 GB of memory. Which of the following will be the MOST important consideration when building the computer? : ECC memory : DDR3 memory : 64-bit processor : Triple channel memory support

Explanation To use over 4 GB of memory, you will need a 64-bit processor and a 64-bit operating system. 32-bit processors support up to (or slightly below) 4 GB of memory. While 6 GB of memory will likely use DDR2, DDR3, or DDR4, this is not a requirement. Triple channel memory uses three memory controllers to improve memory performance. ECC memory includes error correction on the memory.

Question 221: You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do? : Establish a Remote Desktop connection and perform the task on the user's system. : Establish a Remote Assistance connection and watch what the user is doing. : Drive to the other location as soon as possible and then watch as the user performs the task. : Schedule the user to get more training on using the application.

Explanation Use Remote Assistance to watch what another user is doing. In the remote session, you can also take control and show the user how to complete the task. With Remote Desktop, you could try to do the task on the user's computer, but the other user would not be able to see what you were doing.

Question 47: Your computer's hard drive is currently formatted as FAT32, but you want to take advantage of the features offered to NFTS drives. Which of the following steps would MOST likely allow you to do this without losing the existing data? : Use the convert command at a command prompt. : Use the format command with the /p switch. : Reformat the drive using Disk Management. : In Disk Management, delete the existing partition or volume. Recreate the partition or volume with the same settings and choose NTFS instead of FAT32.

Explanation Use the convert command at a command prompt to reformat a drive from FAT32 to NTFS without losing the existing data. Reformatting or deleting a drive deletes all existing data.

Question 243: You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO). : grep /var/log/auth.log : page /var/log/auth.log : less /var/log/auth.log : ls /var/log/auth.log : vi /var/log/auth.log : more /var/log/auth.log

Explanation Using the more command, the contents of the file is output to the screen one page at a time to give you a chance to read the contents of the file; press the space bar to go through the file one page at a time. Using the less command does the same thing as the more command, except that is allows you to use the Pg Up and Pg Dn keys to scroll up and down through the file.

Question 30: You have a disk in your system that is displayed in the Disk Management utility, as shown in the image below. The disk icon includes a red arrow that is pointing down. Which of the following would you expect to see, in the space where the red outline is, as the status of this disk? : Foreign : Unreadable : Initializing : Not initialized

Explanation When Disk Management shows a disk icon that includes a red arrow that is pointing down, it indicates that the disk is not initialized. The disk status would say Initializing if the disk is being converted from a basic disk to a dynamic disk. A Foreign disk is a dynamic disk that was created in one system and moved to another system. The Unreadable status indicates a hardware failure, I/O errors, or other corruption, but might also be caused by a delay in reading the disk in Disk Management.

Question 20: You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this? (Select TWO). : Get 64-bit drivers for all hardware. : Perform an in-place upgrade. : Get 64-bit versions of all applications. : Upgrade to a CPU with at least four cores. : Perform a clean installation.

Explanation When moving from a 32-bit operating system to a 64-bit operating system, you must perform a clean installation. An in-place upgrade is not possible. The 64-bit version of Windows requires 64-bit versions of all hardware drivers. You can, however, run 32-bit applications on a 64-bit processor with a 64-bit operating system. While the system will run better with a quad-core processor, it isn't required to complete the installation.

Question 24: You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. Which of the following is the BEST step to perform? : Run the convert command. : Run the fixboot command to convert the partition type to GPT. : Delete the partitions and re-create them as simple volumes. : Upgrade the disk to a dynamic disk.

Explanation When you upgrade a basic disk to a dynamic disk, existing partitions are converted to simple volumes. You can convert the disk without deleting partitions or losing any data. Use the Convert command to change the file system from FAT32 to NTFS. The partition table type (either MBR or GPT) does not affect the partition or volume type.

Question 26: Which disk types does Windows support? (Select TWO.) : Static : Extended : Basic : Dynamic : Primary

Explanation Windows supports basic and dynamic disks. When you install Windows, your hard disks are automatically initialized as basic. You can convert them to dynamic disks after Windows is installed. You can use both basic and dynamic disks on the same computer system, but a volume consisting of multiple disks, such as a mirrored volume, must use only one type of disk. "Primary" and "extended" are terms that describe partition types on basic disks.

Question 224: You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home? : Dynamic IP addressing : APIPA IP addressing : Alternate IP configuration : Static IP addressing : Link-local addressing

Explanation With an alternate IP addressing configuration, the system's IPv4 Properties are configured on the General tab to use DHCP to automatically obtain TCP/IP configuration information. If a DHCP server cannot be contacted, the static IP configuration information on the IPv4 Properties' Alternate Configuration tab is used.

Question 213: You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority. Which of the following is the BEST course of action in this situation? : Install a WorkGroup to allow each device to control what is shared and with whom. : Install a HomeGroup to provide a single login and simplify security and sharing. : Install a WorkGroup to provide a single login and simplify security and sharing. : Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Explanation With only five PCs in this company, a Windows WorkGroup will let you organize your computers in a peer-to-peer network. This WorkGroup network lets you share files, internet access, and printers between the five employees. Unlike Windows HomeGroup, a WorkGroup has no centralized authority. Therefore, each workstation controls the database of users and privileges. Each device that is part of the WorkGroup can allow access on a user-by-user or group-by-group basis. The HomeGroup is the least secure approach to networking and sharing. A HomeGroup allows anyone with access to the Homegroup access to everything shared on any computer in the group. A single password is used for access to the group, providing equal access to all joined devices.

Question 222: Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks? : Telnet : Remote Desktop : SSH : Remote Assistance

Explanation Within a Remote Assistance session, you can see what a user is doing, or you can take control of the desktop and perform configuration actions while the user watches. Remote Desktop lets you connect to a remote system and perform configuration tasks. However, you cannot watch what others do at the desktop, and they will not be able to see what you are doing. Telnet and SSH only provide remote access to the console prompt, not the entire graphical desktop.

Question 216: If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer? : The printer can only be shared by disconnecting it from the workstation and connecting it to the network. : Configure the printer to be a print server. : Configure the workstation as a print driver. : Configure the printer to be a shared printer.

Explanation You can configure a printer attached to a Windows workstation as a network printer by configuring it to be a shared printer. This is done by accessing the Devices and Printers panel on the workstation and then opening the printer's Properties window and configuring the settings on the Sharing tab.

Question 38: You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot? : Shrink the primary partition. : Convert the disk from basic to dynamic. : Reformat the disk with the partitions needed for a dual boot system. : Convert the disk from physical partitions to logical partitions.

Explanation You can decrease the space used by primary partitions and logical drives by shrinking them into adjacent, contiguous space on the same disk. For example, if you discover that you need an additional partition but do not have additional disks, you can shrink the existing partition from the end of the volume to create new unallocated space that can then be used for a new partition.

Question 21: You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the lowest cost and least effort. Which of the following would be the BEST way to install Windows 10? : Purchase a 64-bit upgrade version of Windows 10 and perform an in-place upgrade. : Purchase a 32-bit full version of Windows 10 and perform an in-place upgrade. : Purchase a 64-bit upgrade version of Windows 10 and perform a custom installation. : Purchase a 64-bit full version of Windows 10 and perform a custom installation.

Explanation You can purchase a 64-bit upgrade version of Windows 10 when moving from Windows 7. In this scenario, you can perform an in-place upgrade because you are moving to the same or higher edition. If you were moving to a lower edition (such as a Home edition), you would need to perform a new installation. You can't upgrade from a 64-bit version of Windows to a 32-bit version of Windows.

Question 229: Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC? : Telnet : Remote Desktop Protocal : Screen Sharing : SSH

Explanation You can use screen sharing to access your Mac while you're away, solve a problem on someone else's Mac, or collaborate with others on a project such as a website or presentation. Remote Desktop Protocol is a Windows solution. SSH is used to establish a secure terminal connection over a network. Telnet is used to establish an unsecure connection over a network.

Question 23: You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. Which of the following will BEST resolve this issue? : Instruct the employees to disable their anti-virus software. : Instruct the employees to boot into Safe Mode and revert to a prior restore point. : Instruct the employees to perform a startup repair from the Advanced Startup Options menu. : Instruct the employees to activate their Windows installation.

Explanation You have a 30-day grace period in which to activate your Windows product installation. If the grace period expires and you have not completed activation, all features of Windows except the product activation feature will stop working. All customers who purchase retail packaged products or a new computer from an original equipment manufacturer (OEM) have to activate the product.

Question 198: Which tool would you use to configure the paging file location and size on a Windows system? : Clock, Language, and Region in Control Panel : Administrative Tools in Control Panel : Advanced System Settings in Control Panel : Hardware and Sound in Control Panel

Explanation You manage virtual memory on a Windows system using Advanced System Settings in Control Panel. You can control the size and the location of the paging file. Use Hardware and Sound in Control Panel to manage hardware devices, such as printers. Use Administrative Tools to load MMC consoles such as Services or Computer Management. Cconfigure regional and language preferences using Clock, Language, and Region in Control Panel.

Question 52: You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created. What should you do? : In the BIOS, change the SATA disk mode to RAID. : Reconfigure the drives into a RAID 0 or RAID 1 array. : Install the drivers for the motherboard RAID controller. : In the BIOS, change the SATA disk mode to AHCI.

Explanation You must install the RAID driver so that Windows recognizes arrays created by the motherboard RAID utility. Without the driver, Windows will not be able to see the logical drive defined by the array. When you define the array, you configure the BIOS to use RAID as the SATA type. If you had not completed this step, you would not be able to run the RAID configuration utility. Use AHCI to configure SATA drives to support hot swapping.

Question 51: You've just installed a new video card in a user's Windows workstation. When the system is powered on, the screen is displayed in 16 colors at 640x480 resolution. Which of the following will BEST resolve this problem? : Upgrade the monitor to one that supports a higher sync rate. : Reboot the system into Safe Mode. : Download and install the latest driver from the video card manufacturer's website. : Verify that the system UEFI firmware is compatible with the video card.

Explanation You should download the latest video driver from the manufacturer's Website. Because Windows didn't have the right driver, it used a generic VGA or SVGA driver instead.

Question 42: You are in the process of preparing a storage device and must determine which file system to use. Which of the following BEST describes the advantage of using the exFAT file system rather than NTFS? : Lower memory and processor resource use : Access control lists and permissions : Support for files over 4 GB : Support for volumes over 32 GB

Explanation exFAT does not have the additional memory and processing overhead and problems that can occur on removable storage when using NTFS. Both exFAT and NTFS support volumes over 32 GB and files over 4 GB. While exFAT supports some limited file permissions, NTFS provides better control through granular permissions and access control lists.

Question 43: You have a computer running Windows 10 Home. You need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do? : Install the latest Windows 10 service pack. : Install an exFAT reader application on your computer. : Do nothing. Windows 10 can natively access exFAT file systems. : Upgrade the computer to Windows 10 Professional. : Run convert.exe on the flash drive to convert it to FAT32 instead of exFAT.

Explanation exFAT is supported in Windows Vista SP1 and later. While you can use convert.exe to change the file system from FAT32 to NTFS, you cannot change it from exFAT to FAT32.

Question 50: You are in the process of preparing a storage device and must determine which file system to use. Under which of the following conditions are you MOST likely to you choose exFAT over FAT32 or NTFS? (Select TWO). : When formatting removable hard drives. : When the device needs to be readable by other operating systems, such as MacOS or Linux. : When storing files larger than 4 GB in size. : When formatting removable flash devices. : When creating a volume less than 10 MB in size.

Explanation exFAT was designed to optimize storage for removable flash devices. Windows does not currently support using exFAT for hard drives. exFAT supports file sizes over 4 GB (FAT32 has a 4 GB file size limitation). Use FAT32 when creating a volume smaller than 10 MB.

Question 234: Which of the following utilities can you use from the command line on a Linux system to see a list of the installed network interfaces along with their current statuses and configurations? : ipconfig : netstat : iflookup : netconfig : netinfo : ifconfig

Explanation ifconfig is used on Linux (and Mac OS) systems to display the installed network interfaces, their current status, and the current configuration settings for each interface, including the MAC address, IP address, broadcast address, and subnet address. ipconfig is used on Windows systems to view the installed network interfaces and their IP address, subnet mask, and default gateway configuration. netstat is used on a Windows system to display IP-related statistics. netconfig, iflookup and netinfo are not real networking utilities.


Conjuntos de estudio relacionados

Website Design - Quiz 1 (Chapter 1)

View Set

Unit 23 - Closing the Real Estate Transaction

View Set

biotech test #3 dna things, protein synthesis, recombinant dna, tissue culture

View Set

D058 Health Literacy for the Client and Family

View Set

Calcium, phosphate and parathyroid hormone

View Set