Testout chapter 8-10

¡Supera tus tareas y exámenes ahora con Quizwiz!

(9.1.10) You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?

%systemdrive%\Program Files (x86)

(9.1.10) You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

(10.1.3) Which of the following peripheral devices are designed specifically for playing games on a computer? (Select two.)

-Joystick -Gamepad

(8.1.13) Drag each Group Policy setting on the left to the appropriate description of how the setting is enforced on the right.

-Causes the policy to be enforced = Enabled -Does not change the current setting for the policy = Not configured -Prevents the policy from being enforced = Disabled

(9.3.9) Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.)

-L2TP -PPTP -IPsec

(9.1.10) Which file attribute identifies the file as having been modified since the last backup?

Archive

(10.1.3) Which of the following devices would you add to a computer if you needed to take inventory at a retail store by scanning the UPC symbols on products?

Bar code reader

(9.1.10) You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11?

C:\Users\username

(8.8.13) Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is the MOST likely source of the problem?

Corrupt MBR or partition table

(8.1.13) Which of the following is a valid distinguished name for the MarketSpace common domain name?

MarketSpace.org

(8.8.13) You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written?

Ntbtlog.txt

(10.1.3) What type of peripheral device is typically found on a laptop computer and allows the user to control the cursor with a finger?

Touch pad

(9.1.10) While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

(8.8.13) Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.)

-The CPU and chipset are verified and fully initialized. -System memory is initialized, verified, and allocated.

(8.8.13) Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue?

Verify that the BIOS/UEFI is configured to use the correct video adapter.

(8.8.13) You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: 1.) Boot the system from the Windows 11 installation DVD. 2.) Access the Recovery Environment. 3.) Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr

(9.1.10) Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

(8.1.13) You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

(9.3.9) Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys?

Trusted Platform Module (TPM)

(9.1.10) You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again?

robocopy

(8.1.13) You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business?

A workgroup

(8.8.13) Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot, and now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent him from using the TV until you can install an updated driver. What should you do?

Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

(8.1.13) A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled?

GPOs linked to organizational units that contain this user's object.

(8.1.13) You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements?

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

(9.1.10) You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer?

The wrong file extension was used when saving the file.

(9.3.9) You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip?

You can boot the hard drive without providing the startup key.

(8.8.13) You experience startup errors after you install a new device. What should you do FIRST to resolve the issue?

Boot in Safe Mode and roll back the driver.

(8.8.13) You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows?

Disable and then enable devices and services one by one.

(9.3.9) After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file?

EFS encrypts the FEK by creating a key pair (private and public).

(8.1.13) Administrative Templates are Registry-based settings that you can configure within a GPO to control a computer system and its overall user experience. Which of the following can you do with an Administrative Template? (Select two.)

-Control notifications -Restrict access to Control Panel features.

(10.1.3) Jamie has been tasked with designing a solution for the paralegals in his office. They need to review old documents that are on paper files and create word processor documents from them that can be searched and cross-referenced. Which of the following devices should Jamie use to create the solution? (Select two.)

-Digitizer -Scanner

(8.1.13) Match each Active Directory definition on the left with its corresponding component on the right.

-Domain = A collection of network resources that share a common directory database. -Organizational unit (OU) = A folder-like container that organizes network resources. -Built-in containers = Default containers used to organize Active Directory objects that cannot be deleted. -Object = A resource within Active Directory. -Domain controller = A Windows server that holds a copy of the Active Directory database.

(10.1.3) Match the peripheral devices on the left with the descriptions or examples on the right. Each peripheral device may be used once, more than once, or not at all.

-Used to scan hardware that contains an embedded microchip for authentication = Smart card reader -Used to capture some type of analog signal and convert it into digital data = Digitizer -Can be a stand-alone device or integrated with other peripherals, such as a keyboard = Smart card reader -Used to scan users' unique physical features and use them to verify their identity = Biometric scanner -Graphics tablets mostly used by graphic artists to capture hand-drawn images = Digitizer -Fingerprint scanner = Biometric scanner -Most commonly used in retail environments at checkout stands = Barcode reader

(10.1.3) Which of the following devices authenticates users based on their physical features?

Biometric scanner

(9.3.9) You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption?

BitLocker To Go

(9.3.9) Which of the following is true of the Windows BitLocker program?

BitLocker is designed to protect files against offline access only.

(9.3.9) When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive?

BitLocker with TPM

(9.3.9) A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file?

EFS

(9.3.9) Which of the following security solutions would prevent you from reading a file that you did not create?

EFS

(9.1.10) While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command?

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

(10.1.3) You have three computers in your office. You would like to reduce the time it takes to switch from one computer to the next, and you would like to use only one keyboard, one monitor, and one mouse for all three computers. Which of the following devices BEST allows this type of setup?

KVM

(10.1.3) You are an IT professional that works with home users. One of your customers works from home and uses multiple Windows computers as well as an Apple Mac computer. Your customer wants to be able to switch between his computers without changing the keyboard and monitor currently in use. Which of the following devices would BEST facilitate sharing his monitor and other input devices with all of his computers?

KVM switch

(9.1.10) A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied?

Only the R attribute is retained on the file.

(8.8.13) Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS?

POST

(10.1.3) Which peripheral device is best for capturing a customer's signature when they check out at a convenience store or supermarket?

Signature pad

(8.1.13) A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change?

System Properties > Computer Name

(8.8.13) Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue?

System Restore

(8.1.13) The Hide Programs setting is configured for a specific user as follows: After logging in, the user is able to see the Programs and Features option. Why did this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

(9.3.9) You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive?

The file will no longer be encrypted.

(10.1.3) Which of the following is considered a computer input device?

Touchscreen


Conjuntos de estudio relacionados

Chapters One and Two Banking Systems

View Set

psych 1010 final exam practuce UVU

View Set

Civil Rights and Society: McLaurin v. Oklahoma (1950)

View Set

Ch. 4 path Hemodynamic disorders

View Set

Vocabulary log - Year 4 (BiC) - Part 3

View Set

Chapter 2: Descriptive Statistics

View Set