Information Technology (Software) X-Slate I
What del command switch allows you to suppress prompt on a wildcard delete?
/q
Which of the following is based on the security concept of "Something you have"? (Choose all that apply) 1. Door lock 2. Hardware Token 3. Biometric Lock 4. Server Lock
1. Door Lock 2. Hardware Token 4. Server Lock
When users log into the network locally they must provide their username and password when users log into the network remotely they must provide their username password and smart card which two statements are true regarding your organization's security (Choose Two) 1. The local network login uses one-factor authentication 2. The remote network login uses two-factor authentication 3. The local network login uses two-factor authentication 4. The remote network login uses three-factor authentication
1. The local network login uses one-factor authentication. 2. The remote network login uses two-factor authentication.
You need to perform a backup on a Windows computer. You only want to back up those files that have changed or have not been previously back up. You also do not want them marked as a backup. Which type of backup would you choose? 1. differential 2. incremental 3. normal 4. copy 5. daily
1. differential
In what release of Windows 10 was support for Homegroups discontinued?
1803
You need to install Windows 7 Professional on a user's x86 computer. Which hardware is NOT a minimum requirement?
2 gigabytes RAM
Which of the following is an open-source mobile operating sytem? 1. Andorid 2. Windows 3. iOS 4. None of the above.
2. Android
How many computers can connect to a Windows 10 file share at one time?
20
All of the following are examples of pirated software, EXCEPT: 1. Installing software fromt he same installation CD on mulitple computers. 2. Installing OEM software from the same installation CD on mulitple compters. 3. Installing software from the same installation CD using multiple licenses. 4. Installing an application using an installation CD with the application name written on it.
3. Installing software from the same installation CD using multiple licenses.
you need to run a command or application requires administrative privileges. What should you do? 1. Enter the command name in the search window, right-click the command when it displays, and select Run as administrator. 2. Right-Click the command prompt, select Run as administrator, and enter the command. 3. Right-Click the application and select properties. Select the Run this program as an administrator option on the Compatibility tab. 4. Any of these.
4. Any of these
A user is having trouble with a new camera installed on his Windows 7 computer after troubleshooting you determine that you need to disable the device upon reboot you determine that the status of EyeSee 2.0 is running and that the application (eyesee.exe) loads at startup. You need to ensure that both components are no longer running on reboot. Drag the appropriate steps from the left to the right in the correct order to accomplish this task. Not all steps may be used. Options: 1. Select the Services tab, and clear EyeSee2.0 2. Select the Startup tab, and clear eyesee.exe. 3. Select the General tab, and select the Diagnostic Startup option. 4. Run regedit.exe 5. Run msinfo32.exe 6. Run msconfig.exe 7. Select the services tab, and clear eyesee.exe. 8. Select the Startup tab, and clear EyeSee2.0
6. Run msconfig.exe. 1. Select the Services tab, and clear EyeSee2.0. 2. Select the Startup tab, and clear eyesee.exe.
You need to reinstall Windows 7 on a client computer. The old hard drive crashed, and you are using the original installation DVD from 2014. You have an Internet connection. What is the best way to make sure you ahve the most current drivers and updates?
Accept the option to download updates and new driver packages.
You have been asked to implement a Homegroup for a user. You need to explain to the user the requirements for this to occur. What is the main requirement that you should mention?
All computers must run Windows 7, Windows 8, or Windows 8.1.
What tasks can users belonging to the Administrators group do? 1. create users 2. remotely reset systems 3. create groups 4. change file permissions
All of the above
You are a new member of a workgroup, and you need to print a document. You do not have a printer attached to your computer, but a co-worker does. Other employees can print to that printer. What is the easiest way to print your document on the coworker's printer?
Ask the co-worker to give you permission to print to the printer.
You are at a customers site the customer reports problem staying connected to the Internet but does not provide any specific information what should you do to gather more information on the problem
Ask the customer to demonstrate the problem
You are attempting to repair a computer in a customer's home in the room in which the computer is located the television is turned on and the volume is turned up you keep losing your train of thought during the troubleshooting process what should you do
Ask the customer to turn down the volume on the television
Logical security refers to controls implemented in software to create an access control system. What functions describe the overall operation of an access control system? (Select all that apply.) 1. Authorization 2. Availability 3. Authentication 4. Accounting
Authenitcation, Authorization, & Accounting
What can door locks be categorized as? (Select all that apply.) 1. Manual 2. Biometric 3. Unconventional 4. Token-based
Biometric & Token-based
When setting up the network for a Small Office Home Office (SOHO) network, you want to ensure that guests can easily find and connect to the network. What do you need to configure? (Select all the apply.) a. Broadcast the SSID. b. Enable QoS. c. Enable DHCP. d. Configure WEP encryption.
Broadcast the SSID. Enable DHCP.
You have installed several 32-bit and 64-bit applications on a Windows 7 Ultimate 64-bit computer. What is the installation folder for the 32-bit applications?
C:\Program Files (x86)
Which mobile device operating system provides the least expansion capacity and is limited to cloud-based and browser-based services?
Chrome OS
You install an application on a user's computer. The application requires a connection to a network server to operate properly. The user report that the application cannot connect to the server. What should you do?
Configure an application exception in Windows Firewall.
What steps are involved in configuring Internet of Things (IoT) devices? (Select all that apply.) a. Connect to the hub. b. Use the hub to discover devices. c. Connect the hub to the Wi-Fi. d. Train the digital assistant.
Connect to the hub. Connect the hub to the Wi-Fi. Train the digital assistant Use the hub to discover devices
You have instructed users not to store passwords for web sites on their computers. You need to examine a user's computer to determine if the policy is being followed. Which Control Panel utility should you use?
Credential Manager
In Linux, if you want to run a batch of commands or a script to perform a backup or other maintenance task what is the scheduling service called?
Cron
You are providing remote support to a user with a Windows-based computer. Which key combination should you tell the user to press to reboot the computer, open the Task Manager, or open the Windows Security window?
Ctrl + Alt + Del
What is it referred to in Performance Monitor where you can create log files?
Data Collector Sets
What component of the Active Directory is the basic administrative building block in Windows client/server networking?
Domain
You need to view the contents of a Windows 10 update. Which command-line tool should you use?
EXPAND
Which of the following refers to capturing and reading data packets as they move over the network?
Eavesdropping
A user that has a Windows 7 laptop is frequently away from the office. During that time, he needs access to several files that are on the network. What should you do?
Enable offline files.
When you start Windows 7, an error message is displayed that indicates that a service failed to load. Which utility can you use to determine why the service failed to load?
Event Viewer
What refers to logical security technologies designed to prevent malicious software from running on a host and can establish a security system that does not entirely depend on the good behavior of individual users?
Execution Control
You are document the system tool within Mac operating systems. Which of the following should you cover?
Force Quit
What are the three levels of "Share Permissions"?
Full Control, Change, and Read
You have a 3-TB drive on which you want to install Windows. How must you format the drive to have the operating system recognize the entire drive?
GPT
You need to refresh the group policy settings. Which command-line utility should you use?
GPUPDATE
When the user wants to finish using Windows, simply disconnecting the power runs a risk of losing data or corrupting system files. There are various choices for closing or suspending a session. Which choice below will save the current session to disk before powering off the computer?
HIbernate
A user contacts you regarding the Windows Update settings on his Windows 7 computer. He wants Windows Updates set back to its default setting. Which setting should you configure?
Install Updates Automatically
You need to upgrade a Windows 7 Home Premium computer to Windows 8 Home Premium. What should you do prior to the upgrade?
Install the latest service pack.
What is the best implentation of the principle of least privilege?
Issuing the Run as command to execute administrative tasks during a regular user session.
On your first day on the job as an A+ technician, you observe your boss executing the command chkdsk. Which statement is true of this utility?
It detects and fixes file system errors on a Windows disk.
You know you saved a file named FILECHK in the D:\MYDOCS directory, but you do not remember the location or the extension. You run the dir D:\MYDOCS\FILECHK.* /IS command. What could this command accomplish?
It locates all the files and directories that have the name FILECHK with any file extension in the MYDOCS directory of drive D, including the subdirectories.
What is the software component that provides the core set of operating system functions, and is the core of Linux?
Kernel
Which NTFS Security setting is NOT part of the File Permissions?
List
You wish to assign a drive letter to a network shared folder so that the user does not have to type in the full path \\FileSrv1\Admin\HumanResources\Forms\Policies\LeaveRequests. How would you do this?
Map the network drive.
Which of the following features of the Microsoft Windows operating system is often better suited for personal needs?
Media Center
A user has a Windows 7 computer with 512 MB of RAM and two hard drives, named drive C and drive D. The paging file is located on drive C.The user complains that his computer does not perform well after running for a couple hours. What should you tell the user to do?
Move the paging file to drive D.
A user has connected a second monitor to his Windows 7 Ultimate computer. The new monitor is detected. However, the dual-monitor configuration is not configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors?
Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution.
Accounts can be managed at the command line using the net user command. What example disables the dmartin account?
Net user dmartin/active:no
What types of operating systems (OSs) are designed to run on servers in a business network?
Network Operating System (NOS)
What active diretory components proivde a way of dividing a domain up into different administrative realsm?
Orgnaizational Units (OUs)
There are several approaches to the problem of data remnants on magnetic disks. If a disk can be recycled or repurposed, destruction is obviously not an option so what do you do instead?
Overwriting/Disk Wiping
What is the practice of monitoring, obtaining, evaluating, testing and deploying fixes and updates?
Patch Management
Which task management tool do you select to view resource usage?
Performance
Which of the following refer to redirecting users from a legitimate website to a malicious one?
Pharming
You are going to install Windows 7. On which type of partition should you install the boot files?
Primary
You are connecting to a wireless network at a coffee shop. How should you classify that connection when prompted?
Public
You find a solution to a problem that directs you to edit a value in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies. What system tool will allow you to accomplish this?
REGEDIT
What windows performance management tool displays a log of "System Stability" events, so you can see at a glance whether a particular application has stopped responding frequently?
Reliability Monitor
You work in a centralized help desk that supports users around the country. You need to adjust a setting on a user's machine, but the user is hundreds of miles away. Which Windows utility can you use to accomplish this?
Remote Desktop Connection
You need to access content on a CD or DVD drive when you do not have an optical drive in your Mac computer. Which feature should you use?
Remote Disk
What is the concept in IT security described as the likelihood and impact (or consequence) of a threat actor exercising a vulnerability?
Risk
You need to ensure that users are able to log into multiple systems using the same login credentials. Which technology should you deploy?
SSO
A users computer is infected with malware you quarantined the infected computer disable system restore and remediate the infected computer by updating the anti malware software and removing the malware what step should you complete next?
Schedule automatic scans and updates for the anti malware software.
What principle Windows log file holds the audit data for the system?
Security Log
To the left of the menu bar is the Apple menu, represented by the Apple icon. What are the items on this menu? (Select all that apply.) a. Service b. Displays c. The Dock d. Storage
Service Displays Storage
Which of the following refer to stealing a password or PIN, or other secure information, by watching the user type it?
Shoulder surfing
Which one of the user accounts in macOS can change their own settings, but not those of other users?
Standard
What displays summary information about the computer, including the processor type and installed Random Access Memory (RAM), plus the Windows edition, product key, and activation status?
System Properties
Your company has the Volume Shadow Copy Service (VSS) enabled on all Windows 7 computers. Which feature is tied closely to this service and is also disabled if VSS is disabled?
System Restore
Which of the following statements regarding Android phones is INCORRECT?
The Android GPS requires the help of cell towers to obtain a location.
Your organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS).You need to copy an EFS-encrypted file. The file will be copied to an NTFS volume that does not implement EFS. What is the state of the file?
The original version of the file remains encrypted. The new version of the file is decrypted
Vivian wants to set permissions on a certain folder to allow users to modify data. What is she really allowing them to do with this type of permission?
The user can read, write, execute, and delete everything, including the folder.
A user with a Windows 7 Ultimate computer that is a member of a domain reports that she is unable to create a Homegroup. What is the reason?
The user cannot create a Homegroup because the computer is a member of a domain.
In a peer to peer network, which of these is NOT true?
There is one central authentication location.
A windows 8 machine displays a "BOOTMGR is missing" error every time it is rebooted. You must automatically repair this failure without overwriting the customers' local user-profiles and without rebuilding the boot configuration data store. You insert a Windows 8 installation DVD into the DVD-ROM, boot to the installation DVD, and select the Repair Your Computer option. Then you select Troubleshoot in the Choose an option menu. Select the appropriate steps on the left, and place them in the correct order on the right. Not all steps may be used. Options: 1. Select Advanced options in the Troubleshoot menu. 2. Select Automatic Repair from Advanced Options. 3. Select Refresh your PC in the Troubleshoot menu. 4. Select Reset your PC in the Troubleshoot menu. 5. Select System Restore From Advanced Options. 6. Select System Image Recovery from Advanced Options. 7. Select Startup Settings from Advanced Options. 8. Run the Bootrec /fixboot command. 9. Select Command Prompt from Advanced Options. 10. Run the Bootrec /fixmbr command.
To automatically repair this failure without overwriting customer's local user profiles and without rebuiliding the boot configuration data store, you should complete the following steps in the following order; 1. Select Advanced options in the Troubleshoot menu. 2. Select Automatic Repair from Advanced Options.
A user contacts you asking if she should run the chkdsk command on her computer. Why would you use this command?
To check the specified drive and repair possible problems
True or false: "Read and Execute" are both options in the NTFS security settings of the Folder and File permissions?
True
Which file system is for optical media with support for multisession writing?
UDF (Universal Disk Format)
What does the acronym UNC stand for?
Universal Naming Convention
Each disk and drive displays status indicators in the Disk Management program. What indicator will show up if the disk is damaged?
Unreadable
You work for a small startup and are setting up the Small Office Home Office (SOHO) network security on the router. Which of the following actions should you take to improve security on the network? (Select all that apply.) a. Turn on Windows firewall b. Use MAC filtering c. Configure content filtering d. Enable UPnP
Use MAC filtering Configure content filtering
You are attending a class on network identification and authentication what is the most common form of identification and authentication?
User identification with reusable password
You are attending class on network identification and authentication. What is the most common form of identification and authentication?
User identification with reusable password
You just received your new work laptop. Included in the box is a device that looks similar to a USB drive and has the word AirCard on it. Which type of connection to the Internet will this provide?
WWAN
The Event Viewer displays each line or item in the source log file as an event and categorizes each event. What type of event may indicate future problems, such as when the system runs low on disk space?
Warning
You are an on-site technician and are at a customer's site to perform service room maintenance you notice that water has entered the server room from a leaking water pipe you call building maintenance to alert them to the problem you then informed the network administrator that water in the server room may void the server's warranty you then wear rubber soled shoes to perform the maintenance work what could be the reason for wearing rubber soled shoes?
Wearing rubber soled shoes does not allow electric current to pass from the ground through your body.
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose?
Wi-Fi Protected Access (WPA)
Which Windows operating systems include apps that use the Windows Store feature?
Windows 8 Windows 10
You need to upgrade a computer running Windows 7 Home Premium with Service Pack 1 to Windows 8. To which editions of Windows 8 can this computer be upgraded?
Windows 8 Pro
You need to download and install critical system updates, security patches or hotfixes, and upgrades for Windows components. Which Windows utility allows you to accomplish this?
Windows Update
A small business owner has five computers in the office that need to be networked. The users need to share files and print services and manage the administration of their shared resources. Which type of network would you recommend to the owner?
Workgroup
What is the folder permission that can create new folders and files, change attributes, view permissions and ownership?
Write
What basic NTFS permssions do you need to move a file?
Write permissions for the destination folder Modify permissions for the source folder
Which wireless communications protocol is an open source technology used primarily for home automation and operates in the same frequency band as many Wi-Fi networks?
ZigBee
A user reports that her mobile device is not working properly. When you research the issue, you discover that she accidentally deleted all teh data on her device. What has most likely occured?
factory reset
Shelly was in the workout room listening to her music via her Bluetooth headphones on her iPhone 6 which was in her pocket later she went into the sauna where she noticed her music stopped playing even though the iPhone was located in a pocket of her robe she was wearing what most likely happened?
iPhone overheated
What command can be used at the command line to manage users?
net user
You need to change a user's password on a Linux computer. Which command should you use?
passwd
You need to view the processes running on a Linux system. Which command should you use?
ps
You have configured System Restore on the computers in your network. Which condition will NOT result in a restore point being created?
saving a new file
Windows is reporting that a system file is corrupt on a Windows computer. You have already run chkdsk/f and rebooted the machine, but the error message shows that the file is corrupt. Which command-line tools would you use next?
sfc - System File Checker (SFC) is the tool that fixes corrupt system files.
Users in your office complain of latency on the network. Which Windows networking tool can you use to investigate this problem?
tracert
You need to connect to the Internet at a client site. The system administrator gives you an SSID of Workplace 1 and a password. Which network type are you going to use to connect to the Internet?
wireless
You are the desktop support technician for your company. You are working on a computer running Windows 7 that has two hard disk drives, named HDD1 and HDD2. You want to copy the entire file and folder structure from HDD1 to HDD2 in the most efficient manner.
xcopy.exe