OS Operating Systems Concepts
Which of the following is a wireless Internet connectivity method that utilizes cellular technology?
3G
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?
Backward compatibility for legacy operating systems and applications
Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?
Connect to a Bluetooth speaker
The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred?
DDoS
Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)
DSL modem. Cable modem
On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?
Details
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Digital certificate
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
End-of-life
Zach believes someone is trying to log in to a computer system in order to gain access to the company's network. He wants to use Windows to determine if that is the case. Where can Zach go to check the security logs?
Event Viewer
What Windows process is responsible for authenticating users?
Incorrect. Winlogon.exe is responsible for the logon process
A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remote Assistance to view a very detailed and cryptic error message on the user's desktop. Each attempt the technician makes to connect to the remote computer results in a message stating the connection was refused. Which of the following protocol and port number combinations should be opened on the remote computer's firewall to allow this connection?
RDP, port 3389
The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update?
Remove malware.
You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue?
Reset the network settings in the mobile device Settings app.
What is a snapshot of the system settings and configuration called?
Restore point
Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled. What kind of malware could be causing the issues on Frank's computer?
Rootkit
Allison's computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a folder in the Documents library of her user account. Allison tried to take ownership of the folder but was still denied access. She tried running an antivirus scan on the folder, and again access to the folder was denied. What can Allison do to fix this security issue?
Run a Windows Defender Offline scan
Which of the following symptoms can be attributed to malware infection on a mobile device? (Select TWO.)
Slow data speeds. Battery drains faster than normal.
Why does a normal hard boot take longer than a normal soft boot?
The initial steps must be performed by the BIOS/UEFI
If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used?
Thin provisioning
Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software. What can Sharon's company do to make sure a customer who purchases the program does not give it to someone else?
Use DRM
What command can be used to check for file system errors?
chkdsk /r
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to create a custom console containing only the tools she regularly launches and then distribute this custom console to each computer. Which of the following Windows tools will allow the technician to configure a custom console?
mmc.exe
Which of the following best meets the requirements of a strong password?
t*M&2.zY7
What option, when passed to the shutdown command, will restart the local computer?
/r
Which of the following security settings can best help minimize brute force attacks on local user account passwords?
Account lockout threshold
If you receive this error when trying to go to a website, where can you go in Windows to verify the certificate settings for the website?
Certificate Manager
Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend?
Home
What type of storage drive contains spinning platters?
Magnetic hard disk drives
A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen. What display setting will the user adjust?
Resolution
A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?
VPN tunnel
What command can be used to scan for Windows installations not stored in the BCD?
bootrec /scanOS
What command should you use to rearrange parts of files on the drive so they are contiguous?
defrag
What command can be used to totally wipe a hard drive clean, including the partitioning system?
diskpart
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?
AES
What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?
Accelerometer
A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?
Address reservation
Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?
Airplane mode
A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?
Back up all user data
Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers. What type of security do you recommend?
Biometric locks
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?
BitLocker
A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?
Cable
James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels?
Cable lock
A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue?
Check for OS updates.
Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before. What is the issue with the client's computer?
Computer virus
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?
Configure logon time restrictions
Which of the following must be performed prior to creating a spanned, striped, or mirrored volume on unallocated space in Windows?
Convert basic disks to dynamic disks
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?
DNS
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?
Demilitarized zone
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?
Disable AutoRun
A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?
Disable the auto-brightness option
You can use what utility to convert two or more basic disks to dynamic disks?
Disk Management
Oscar has a client who has been receiving unsolicited emails from several companies. Oscar recommended that the client unsubscribe from the email lists, but that just increased the number of unsolicited emails she received. What can Oscar do to stop the unsolicited emails on the email server?
Enable a spam filter.
Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software. What will you recommend to your supervisor?
Enable the spam filter
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?
Enable the supervisor password in the BIOS/UEFI setup
Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?
Enter the pin code.
Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?
Enter the same user name and password used on the corporate network.
Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?
Fourth-generation cellular
Lana has just taken a job as an IT professional in Europe and would like to get a head start on what to expect. What regulated data would you recommend that she research?
GDPR
Jerry was recently contacted by a coworker who received an email that seemed suspicious. Jerry investigated her email account and noticed that she had been sending hundreds of emails every day for a week. He also noticed that this problem started after the coworker sent a reply email agreeing to participate in a contest to win a free car wash. What happened to the coworker's email account?
Her email was hijacked
Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?
IMAP
Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?
Inherited permissions
Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
Install apps only from trusted sources
Lin received 200 new laptops to be issued to company employees. Lin was asked to set them up and distribute them to everyone on a list provided by his supervisor. Lin has completed installing all the software on each computer and is ready to distribute them, but he needs to keep track of who received each laptop. How can Lin keep track of all the laptops?
Inventory management documentation
John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?
Lightning
A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?
Linux
Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?
MAC filtering
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?
NFC
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?
Network printer
If you are working on a client's computer and you believe that you have found a violation of the AUP, what is your next step?
Report the incident through the proper channels
You have received an escalated trouble ticket for a Windows workstation that displays an error message each time the user signs in to Windows. The previous technician logged the error in the ticketing system and made a note that she was not familiar with the error message the system was displaying. What is the first step you should take in resolving this issue?
Research the error message on the web
A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger. Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize. What should Derek perform next on the client's computer?
Run a virus scan
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?
Security tab
James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?
Settings app
A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request?
Some apps will work on different OS platforms, but many will not.
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows 7 startup process?
Spacebar
What is responsible for getting a system up and going and finding an OS to load?
Startup BIOS/UEFI
Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?
Synchronization to the cloud
What Windows utility can be used to find out what processes are launched at startup?
System Configuration
A technician mistakenly uninstalled an application that is crucial for the productivity of the user. Which of the following utilities will allow the technician to correct this issue?
System Restore
A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available. Which of the following is the most likely reason for this issue?
System Restore is turned off
Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. What will you recommend as an upgrade to RADIUS?
TACACS+
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?
Take ownership of the folder and then change permissions
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?
The Lock Screen timeout setting needs to be made in the AD OU GPO.
Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to research a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process. What has happened to the customer computer?
The client received a fake security alert.
One of Kyle's clients called to complain that his computer was running really slow. Kyle went to the client's work area and started troubleshooting the problem. Kyle ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger and noticed that the SVC host was running several processes. While Kyle was looking at Task Manager, the computer crashed. Kyle restarted the computer and noticed a long load time for Windows. He checked Task Manager and saw several processes that he did not recognize. What might be the issue with Kyle's client's computer?
The computer might have a virus
A technician removed several instances of malware from a customer's Windows PC. Now when the user double-clicks .doc files to open them, an error message appears asking what program to use to open the files. Which of the following is the most likely cause for this error?
The malware removal process changed the file association for the .doc file type
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?
The method for retrieval is dependent on the specific app or device's operating system
A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?
The screen protector is interfering with touch response
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files
The user had previously encrypted her data files and folders using EFS
A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt. Which of the following best describes the reason for this issue?
The user must open the command-line interface using Run as administrator.
A user is attempting to launch a Windows utility from a command prompt but is receiving a message stating the user must be an administrator in order to use the utility. Which of the following best explains the reason the user is receiving the message
The user must run the command using an elevated command prompt
A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an as-needed basis. Which of the following Storage Spaces features describes this functionality without the need to also reconfigure the available space to users?
Thin provisioning
Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program?
Try to install in Safe Mode.
A user contacted you to report that an unwanted Windows application is launched each time her computer is booted. How can you permanently resolve this issue?
Uninstall the application.
Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer. What should she do before she runs the anti-malware program?
Update malware signatures
A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have been tested and verified to be working properly. What step should be considered next to resolve this problem?
Update network settings
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?
Use Safe Mode to boot.
Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?
User guide for the device
Joe works for a company that has a traveling sales force. The company has asked Joe to research a way for the sales force to have real-time information on the availability of its salable products. The company has an intranet application that allows it to see up-to-the minute information. The company does not want to make this information public. What should Joe recommend?
VPN
Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?
VPN
What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?
WAN, MAN, LAN, PAN
You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?
WPA2-PSK, AES
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?
Windows Home editions do not support EFS
Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues. What tool can Henry use to create a bootable flash drive in Windows 10?
Windows Media Creation tool
A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?
Windows domain user name and password
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet. Where can Eric go to look up the device driver's filename to determine what device uses the device driver?
Windows\System32\drivers folder
Peggy found a freely distributed software package for her small business that will allow its sales to be tracked into a database for inventory purposes. Can Peggy install this software on all the computers in her store?
Yes, this is open source software.
Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior?
Your device is sending spam messages to your contacts
Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?
iCloud
A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool?
mdsched.exe
Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft command-line command should Henry use to check whether he can connect to the server?
ping
Which of the following Windows commands will delete the files and directories at the destination location that no longer exist at the source location?
robocopy /purge
If you suspect corrupted system files are causing issues, what commanad can be run to verify and restore the corrupted files?
sfc /scannow
Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?
smss.exe
What command can be issued within Windows RE to enable networking?
wpeinit