Chapter 4: Supporting Windows
A security administrator is concerned about the introduction of new software to the environment. What security considerations should be made when allowing new software in the environment? (Select all that apply.) -Memory consumption -Trusted sources -Digital signature -Network bandwidth consumption
-Trusted sources -Digital signature
A user experiences a slow desktop load, so they want to try to rebuild their local user profile. Which of the following is an invalid file when considering user profiles? -NTUSER.MSI -NTUSER.DAT -NTUSER.DAT.LOG -NTUSER.INI
-NTUSER.MSI
A user calls in about an invalid boot disk error. What is the most common cause of this issue? -Floppy disk left in the drive on a restart -OS loader not found -USB set as the primary boot method -Driver corruption
-USB set as the primary boot method
A curious IT professional investigates the hidden System Reserved partition. What will the professional find contained to the partition? -RMM -MSDS -NLA -BCD
BOOTMGR and the boot configuration data (BCD)
A graphics artist is starting to get into 3D animation and wants to ensure their computer can adequately handle the work. What should the graphics artist use? -Hardware token -LPL -Integrated graphics -Dedicated graphics
Dedicated Graphics
A project manager implements a new ticketing system that allows the helpdesk to record knowledge, streamline efficiencies, and automate solutions. Which of the following is the least of concerns for application support? -Licensing -Distribution method -Support -Training
Distribution method
A server administrator wants to create several virtual machines with a consistent set of software and configuration options. What should the administrator use for installation? -DirectAccess -BitLocker -Images -POSIX
-Image
A user boots a Windows device into the basic input/output system (BIOS) but recognizes no bootable disks. What is most likely the problem? -It is using MBR partitioning. -It is using GPT partitioning. -It is using APFS. -It is using ext3.
-It is using GPT partitioning.
A user finds that their home computer fails to boot. The user believes part of the operating system (OS) is corrupted. They want to recover it but do not want to lose any personal documents. What should the user do? -Use a factory recovery partition. -Use the full reset option. -Format the drive. -Use refresh.
-Use refresh.
A server administrator tests an application migration from a 32-bit server to a 64-bit server, but the application is still 32-bit. Where will Windows run the application? -PXE (Preboot eXecution Environment) -SED (self-encrypting drive) -WOW (Windows on Windows) -OEM (original equipment manufacturer)
-WOW (Windows on Windows)
A student considers upgrading but has many custom drivers and hardware in their Windows-driven rig. Where can the student look for a catalog of tested devices and drivers for this platform? -LPL -PXE -NIST -SED
LPL
An intern just started an internship for a company. They are working with a Windows server team that is pushing out applications. What should the intern expect to use? -MSI -DMG -DEB -RPM
MSI
A client administrator at a local university runs a computer lab and decides they want to image the machines nightly due to the high risk of having everything available and open to use. The administrator orders new computers which are compatible with the ability to use Preboot eXecution Environment (PXE). What type of boot would this be? -Network -Hard drive -Optical -USB
Network
A support operator helps a user who is complaining about latency and sluggish performance. Which of the following will be the least helpful in troubleshooting? -Perform a system file check (SFC) -Use Task Manager. -Reboot. -Run fewer programs.
Perform a system file check (SFC)
A user brings in a laptop that does not boot. Based on the user's description, the assistant suggests running chkdsk. How can the user do this? -System Restore -WinRE -UEFI -BCD
Windows Recovery Environment (WinRE)