OS Final Exam (3,5,7,9,10)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Match the scripting term to the description.

$X Variable 9 Integer Loop Executes the same commands until a condition is met "sample text" String "Press any key" String %TEMP% Windows environment variable 1424 Integer #Start PowerShell comment

Match the protocol or encryption name with the feature.

-AES Current encryption algorithm used today., -TKIP Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure., -WEP No longer considered secure because the key used for encryption doesn't change., -WPA Typically uses TKIP for encryption., -WPA2 Typically uses AES for encryption.

In Linux, where are the commands required for system administration stored?

/sbin

What is the value of X when execution ends in the following pseudocode?

100

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

802.11ac 802.11n

Which of the following best describes a variable when implemented in a script?

A container for storing data values that can be assigned, referenced, and manipulated.

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Accelerometer

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

Account lockout threshold

Which of the following user accounts are created automatically and disabled by default when Windows in installed (Select Two)

Administrator Guest

Which of the following user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.)

Administrator Guest

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?

Airplane mode.

Which of the following operating systems can be modified and the source code redistributed?

Android

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement?

Authenticator apps

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?

Back up all user data.

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?

Backward compatibility for legacy operating systems and applications.

You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?

BitLocker

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on.Which of the following will meet these requirements?

Cable

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue?

Check for OS updates.

A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install. Which of the following steps should the user take next?

Check for sufficient available storage space.

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the Advanced button to open Advanced Security Settings for the file.

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?

Close or disable all unused running apps.

While you work on the customer's printer, he continues chatting about his network and problems he's been experiencing. One complaint is that his Internet service slows down considerably in the evening. You suspect you know the cause of this problem: His neighbors arrive home in the evening and bog down the ISP's local infrastructure. To be sure, you take a quick look at the back of his modem. What type of cable connected to the WAN port would confirm your suspicions and why?

Coaxial cable connected to the modem's WAN port would confirm that the customer is using cable Internet, which shares the TV cable infrastructure with other customers in the area. This can result in service becoming degraded if many people in the neighborhood are using cable Internet at the same time

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script.

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?

Configure logon time restrictions.

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?

Connect to a Bluetooth speaker.

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.What network setting should you check to see the address of the server being used to resolve this address?

DNS

Which of the following will use an RJ-11 connector for connectivity

DSL

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

Data transmission over limit

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?

Details

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device. Which of the following is the first step a technician should take in resolving this issue?

Determine if any other devices are experiencing the same issue.

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable Autorun

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting Lower radio power levels Enable MAC Filtering

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?

Disable the auto-brightness option.

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do?

Disregard the message and check for a compromised app.

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. ​ What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Enable a hotspot on his smartphone.

You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?

Enable the supervisor password in the BIOS/UEFI setup.

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

End-of-life

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?

Enter the pin code.

A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?

First Aid

Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?

Gestures

Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend?

Home

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?

IMAP

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

Describe two different methods of opening the Network and Sharing Center in Windows 10.

Include any two of the following: Open Control Panel and click Network and Sharing Center. Right-click the Network icon in the desktop taskbar, click Open Network & Internet settings, and then click Network and Sharing Center. Right-click Start, click Network Connections, and then click Network and Sharing Center. In File Explorer, click Network in the left pane and then click Network and Sharing Center on the Network ribbon. In Command Prompt, PowerShell, or the Run dialog box, enter control.exe /name Microsoft.NetworkAndSharingCenter.

Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Inherited permissions

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?

Install apps only from trusted sources.

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

Lengthen the time period between forced password changes.

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?

Lightning

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment?

Line 3

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?

Linux

A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?

Live USB or CD

A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?

Locator applications

Which of the following are closed source, proprietary operating systems? (Select TWO.)

Mac OS X High Sierra Windows 10 Home

mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls?

Malware is interfering with the calls.

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account. Which of the following describes the security method being used?

Multifactor authentication

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?

Mutual authentication

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?

NFC

A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?

NetBoot

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?

Network Printer

A Windows user is attempting to exit a locked up desktop application that is not responding to mouse or keyboard input. Which of the following steps can be taken to end the application process without exiting other open applications?

Open Task Manager and end the process associated with the application.

The touch screen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue?

Perform a factory reset on the device.

What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time?

Performance Monitor

Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time?

Performance Monitor

You're troubleshooting a network connection for a client at her home office. After pinging the network's default gateway, you discovered that the cable connecting the desktop to the router had been damaged by foot traffic and was no longer providing a reliable signal. You replaced the cable, this time running the cable along the wall so it won't be stepped on. What do you do next?

Ping the router again to confirm the network connection is working.

You're setting up a Minecraft gaming server so that you and several of your friends can share a realm during your gameplay. To do this, your friends will need to access your server over the Internet, which means you must configure your router to send this traffic to your game server. Which router feature will you use and which port must you open?

Port forwarding will send Minecraft traffic to the gaming server without exposing the rest of the network to that traffic from the Internet. Minecraft uses port 25565.

In Windows 10, what Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes?

Processes

What Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes?

Processes

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?

RFID tags

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

Require user account passwords. Require strong passwords. Set failed logon restrictions.

You have received an escalated trouble ticket for a Windows workstation that displays an error message each time the user signs in to Windows. The previous technician logged the error in the ticketing system and made a note that she was not familiar with the error message the system was displaying. What is the first step you should take in resolving this issue?

Research the error message on the web.

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes.

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue?

Reset the network settings in the mobile device Settings app.

A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen. What display setting will the user adjust?

Resolution

Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?

SSH is a secure, encrypted alternative to Telnet.

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights?

Security

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?

Security tab

A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use?

Services Console

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?

Settings app

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files.

Spencer would like to purchase a wearable device that allows him to make phone calls and send text messages. Which type of wearable device should Spencer purchase?

Smart Watch

A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request?

Some apps will work on different OS platforms, but many will not.

Which of the following are natively supported by the Windows, Mac, and Linux operating systems?

Support for reading and writing to FAT32 partitions

Your mobile device appears to be contacting a remote server to upload your personal data. Which of the following should be performed first to protect your personal data?

Switch to airplane mode.

Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?

Synchronization to the cloud

What Windows utility can be used to find out what processes are launched at startup?

System Configuration

A technician mistakenly uninstalled an application that is crucial for the productivity of the user. Which of the following utilities will allow the technician to correct this issue?

System Restore

A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available. Which of the following is the most likely reason for this issue?

System Restore is turned off.

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?

Take ownership of the folder and then change permissions.

Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility. What kind of device would you recommend for this type of 3D tour?

Tethered VR headset

A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

The Lock Screen timeout setting needs to be made in the AD OU GPO.

aSam cannot figure out why he can't get sound from his tablet's internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted. What might prevent Sam from getting sound from his tablet?

The audio output is being directed to a Bluetooth speaker.

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?

The battery is going bad.

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?

The command needs to be preceded by sudo.

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual. Which of the following should you consider as a cause for these issues?

The device is infected with malware.

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32.

The file will lose all permissions.

A technician removed several instances of malware from a customer's Windows PC. Now when the user double-clicks .doc files to open them, an error message appears asking what program to use to open the files. Which of the following is the most likely cause for this error?

The malware removal process changed the file association for the .doc file type.

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?

The method for retrieval is dependent on the specific app or device's operating system.

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data. Which of the following is the most likely cause for this behavior?

The mobile device has malware on it.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?

The mobile device is on a different Wi-Fi network than the TV.

A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally. Which of the following is the most likely reason for this issue?

The operating system or driver is causing the issue.

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share. Which of the following best describes this situation?

The principle of least privilege was not followed.

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?

The screen protector is interfering with touch response.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat?

The smartphone is located too close to the car's heat vent.

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy.

A technician is troubleshooting a Windows computer experiencing slow startup. Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup?

The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?

The user had previously encrypted her data files and folders using EFS.

A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt. Which of the following best describes the reason for this issue?

The user must open the command-line interface using Run as administrator.

A user is attempting to launch a Windows utility from a command prompt but is receiving a message stating the user must be an administrator in order to use the utility. Which of the following best explains the reason the user is receiving the message?

The user must run the command using an elevated command prompt.

A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device's cellular service is active and functioning. What is the first thing the user should check?

The user should verify location services is enabled on the smartphone.

A user contacted you to report that an unwanted Windows application is launched each time her computer is booted. How can you permanently resolve this issue?

Uninstall the application.

A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have been tested and verified to be working properly. What step should be considered next to resolve this problem?

Update network settings.

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?

Updates are found in the App Store.

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?

Use a third-party remote access app that uses a browser.

A Windows computer stopped printing to a directly connected printer, and the technician suspects a service may be at fault. Which of the following steps can the technician take to verify her suspicion?

Use the Services Console to stop and start the Spooler service.

A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt. Which of the following steps should the technician take next?

Use the tasklist utility to locate the PID for the explorer.exe process.

Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?

User guide for the device

Which of the following Task Manager tabs on a Windows system is used to display the processes owned by each signed-in user?

Users

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?

VPN

Which of the following steps can be taken to resolve limited or no network connectivity issues on a Windows computer? (Select TWO.)

Verify the network cable between the computer and router is connected and not damaged. Verify the SOHO router is powered on and the port LEDs indicate connectivity. Answers:a. Run msconfig and configure startup for Safe Mode.

A group of wireless devices are using each other as relays to share a network connection across a large area.Which of the following network categories is being used?

WMN

You are tasked with configuring a wireless SOHO router for a customer.Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device.

Wait a few minutes for the phone to automatically unlock

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device. Which of the following steps should the user take first?

Wait a few minutes for the phone to automatically unlock.

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?

Windows Home editions do not support EFS.

What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop

X = 1, the Do...Loop is endless.

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior?

Your device is sending spam messages to your contacts.

Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device to be at least 50 meters away from the base station. What type of device should the company purchase?

Z-Wave

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?

chown

Frank is traveling for work

create a hotspot tether his laptop

Check My Work While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router is now communicating with the Internet, which you can confirm by observing the blinking light on the router's WAN indicator. However, now your laptop is not communicating with the router. Order the commands below to fix the problem and confirm connectivity.a. pingb. ipconfig /renewc. nslookup microsoft.comd. ipconfig /release

d. ipconfig /release, b. ipconfig /renew, a. ping, c. nslookup microsoft.com

Which of the following is the current Linux file system used to hold the operating system?

ext4

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?

gmail

A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?

grep

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?

iCloud

In this chapter, you learned how to set a static IP address in Windows. Most Linux OSs allow these settings to be changed from the command line. Search online to see how to do this. What Linux command is used to set the interface to a static IP address?

iface. Also acceptable is iface eth0 inet static.

Your boss has asked you to configure a DHCP reservation on the network for a Windows computer that is used to configure other devices on a network. To do this, you need the computer's MAC address. What command can you enter at the command line to access this information?

ipconfig /all. Also acceptable is arp -a.

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

macOS Recovery

A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool?

mdsched.exe

A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to create a custom console containing only the tools she regularly launches and then distribute this custom console to each computer. Which of the following Windows tools will allow the technician to configure a custom console?

mmc.exe

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network.Which Microsoft command-line command should Henry use to check whether he can connect to the server?

ping

A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?

ps

A user is complaining about sluggish performance on her linux system, and the technician suspects a running process is consuming excessive processor resources.

ps

Which of the following best meets the requirements of a strong password?

t*M&2.zY7

A windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C:\ drive is formatted with NFTS, and the D:\ drive is formatted with FAT32

the file will lose all permissions

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection

windows domain user name and password


Conjuntos de estudio relacionados

Nursing 202 Health Assessment: Ch 21

View Set

Child Development PrepU Questions

View Set

Medical-Surgical Drugs Level 1 & 2

View Set

Winter Storms, Ice Storms, Blizzards

View Set

Unit 12, Climate Change Wikipedia Homework

View Set