IT Support EXAM Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Your manager asks you to set up an environment for user training on the payroll system. What is included in this environment? (Choose all that apply.)

a. A sandbox c. Dummy data

Which is the best first step to protect important data on your hard drive?

a. Back up the data to another device.

Which of the following methods can you use to install Windows 10 in a VM? (Choose all that apply.)

a. Clean install from an ISO image b. Clean install from a USB flash drive c. Upgrade from Windows 8.1 using an ISO image d. Clean install from a setup DVD

You have set up a user group named Accounting and have put all employees in the accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the accounting department allowed to access this folder. What is the best way to configure the new share?

a. Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder.

You need to install a customized console on 10 computers. What is the best way to do that?

a. Create the console on one computer, and copy the .msc file to the other nine.

What type of storage media can be used to create a Windows system image? (Choose all that apply.)

a. DVDs b. Internal hard drive c. External hard drive d. Network drive

Without changing the default folder, what is the command to list all files in the C:\Linda\test2 folder that have file extensions of only two characters?

a. Dir C:\Linda\test2\*.??

Your organization has several Mac and Windows laptops that all access data on a file server on the local network. Which file system on the Linux file server is best suited to this situation, and how do you best set it up?

a. FAT32; on a different partition than the one that holds the Linux installation

You are having difficulty uninstalling freeware a user accidentally installed while surfing the web. You look online and see the software is designed to work in an x86-based version of Windows. In which folder should you expect to find the program files for the software?

a. It depends on the version of Windows installed.

What is one difference between a video surveillance camera and a webcam? Select all that apply.

a. One camera is a part of the IoT, and the other is not. c. One camera has an IP address, and the other does not.

Which of the following are true about Android Safe Mode? (Choose all that apply.)

a. Only apps native to the Android installation can run in Android Safe Mode. b. A Safe Mode flag displays somewhere on the screen. c. Safe Mode helps you eliminate third-party apps as the source of a problem. d. To exit Safe Mode, restart the device normally.

Your manager asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?

a. Risk analysis documents

What are reasons to uninstall software you no longer use? (Choose all that apply.)

a. To prevent Windows errors c. To free up hard drive space

You suspect malware might have infected restore points saved on the computer, and you want to delete them all. What is your next step?

a. Turn off System Protection.

While working in a call center, you receive a call from Latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. You ask your manager, and she tells you that the server team changed the application's URL during an upgrade over the weekend. She asks you to make sure all the other technicians are aware of this change. What is the best way to share this information?

a. Update the knowledge base article that contains the application's URL in the ticketing system application.

Which Chromebook security feature ensures that malware can't change the OS's system files?

a. Verified boot

When is it appropriate to use iTunes to restore an iPad from backup?

a. When the backup has been created on a Windows computer

Which Windows utilities are used to create previous versions of files that can be recovered from the file properties dialog box? (Choose all that apply.)

a. Windows File History b. Windows Backup and Restore

Which installation of Windows 10 requires you to enter a product key during the install process?

a. You are replacing a failed motherboard on a system with Windows 10 installed and a Microsoft account was not used to sign in to Windows.

You sign in to your personal computer with your Microsoft account, and you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called _________________.

a. multifactor authentication

Android apps are contained in an Android package kit, which has what file extension?

b. .apk

Which two of the following hosts on a corporate intranet are on the same subnet?

b. 172.54.98.3/16 d. 172.54.72.89/16

Which definition describes a virus?

b. A program that can replicate by attaching itself to another program

You have exhausted your knowledge of a problem, and it still is not solved. Before you escalate it, what else can you do?

b. Ask a knowledgeable coworker for help.

While verifying Windows settings, you discover defragmenting is turned off for the hard drive. What do you do next?

b. Check the type of hard drive installed.

As the new network administrator managing Active Directory in your organization, you decide to set up a backup system for all folders in the domain authorized for users to store their data. Which tasks should you do first before you configure the backup routine? (Choose all that apply.)

b. Evaluate backup software and storage requirements. d. Apply folder redirection to the Home folder for each user.

Which of the following tools can be used to improve Windows performance?

b. Indexing Options

A user tells you that Microsoft Word gives errors when saving a file. What should you do first?

b. Install Windows updates that also include patches for Microsoft Word.

You are setting up a Windows 10 desktop computer that requires 3 TB of storage. Which option is the best practice? (Choose all that apply.)

b. Install two 1.5 TB hard drives with the GPT partitioning systems and 64-bit Windows 10.

Which statements are false about the GPT partitioning system? (Choose all that apply.)

b. It contains the legacy MBR system for backward compatibility. c. It can only be installed on drives that are larger than 2 TB.

You are troubleshooting an application problem and want to eliminate faulty memory as a source of the problem. Which command do you use?

b. Mdsched.exe

Which security features are available on Windows 10 Home? (Choose all that apply.)

b. NTFS permissions d. Share permissions

Which of the following is true about NTFS permissions and share permissions?

b. NTFS permissions work only on an NTFS volume.

The PXE programming code is used to boot a computer when it is searching for an OS on the network. Where is this code stored?

b. On the motherboard

Where is the biometric data for an Android facial recognition lock or fingerprint lock kept?

b. Only on the Android device

After a Windows installation, what is the easiest way to determine that you have Internet access?

b. Open a browser and navigate to a website.

You suspect a boot sector virus has infected your computer. How can you remove the virus?

b. Perform a Microsoft Defender Offline scan.

You are helping your friend troubleshoot a problem with their Linux server. You enter a common Linux command and discover it doesn't work exactly as you expected. What might be the problem, and what do you do next?

b. The Linux shell is not the one you expected; use the echo $0 command.

You work at an IT help desk and have been asked to set up 25 new user accounts in Active Directory. Your manager tells you to save time by using a PowerShell script that's available on a network share. You look at several script files named CreateNewUsers that are stored on the drive. Which one is likely to be the one you want?

b. The file with a .ps1 file extension

You have used Disk Management to verify that a laptop has a recovery partition, but when you do a Windows reset, you don't see the option to restore preinstalled apps. What is the most likely problem?

b. The laptop factory state uses an OS other than Windows 10.

You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which device assigned this IP address to the interface?

b. The local computer

Which OS is most appropriate to support a web server on the Internet?

b. Ubuntu Server

An application is frozen, and you cannot close its application window. What is the first thing you should do to end the process?

b. Use Task Manager.

You suspect that Windows has become corrupted. What is the least invasive solution to fix the problem?

b. Use the System File Checker.

You open a folder Properties dialog box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

b. You are not using an edition of Windows that supports encryption.

Your company has recently been hired to install a smart security system for a large office building. The system will include security cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation?

b. Zigbee, because it is always encrypted

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user nolan?

b. grep "nolan" /var/log/vsftpd.log

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors?

c. /var/log

vWhen a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in Explorer, and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem?

c. Check the C:\Users\Belinda Lim\Documents folder.

You suspect the hard drive is corrupted. Which window do you open to repair the drive?

c. Elevated command prompt window to use chkdsk

The documentation for your router says that it can provide content filtering to filter out keywords except for pages that use the HTTPS protocol. Why is that?

c. HTTPS pages are encrypted, and the router cannot decrypt them to read the content.

Which of the following statements is false?

c. In Ubuntu Desktop, a USB flash drive must have a drive letter assigned before you can access it.

What is one effective way to implement a VPN connection on your Android device?

c. Install a firewall app that includes a VPN connection in its services.

What is a potential security risk when enabling Developer mode in Android?

c. Malicious software might reach your device when it is connected to a computer via a USB cable.

You need a VPN to connect to a private, remote network in order to access some files. You click the network icon in your taskbar to establish the connection, and you realize there is no VPN option available on the menu. What tool do you need to use to fix this problem?

c. Network and Sharing Center

You see multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first?

c. Perform a startup repair.

What device can be installed on a laptop to prevent shoulder surfing?c. Privacy filter

c. Privacy filter

Stop errors happen when which types of processes encounter an error?

c. Processes created by Windows components running in kernel mode

When cleaning up the startup process, which of these should you do first?

c. Run System Configuration to see what processes are started.

If you suspect a computer is infected with a virus and you are ready to upgrade from Windows 8.1 to Windows 10, what is your best practice?

c. Scan the system for malware before you perform the Windows 10 upgrade.

Which of the following is the best reason to replace a mobile device with a new one in a corporate environment?

c. The latest version of Android the device can support has reached its EOL limitation.

If you are having a problem with a driver, which of the following should you try first?

c. Update Windows.

You're troubleshooting a network connection for a client at their home office. After pinging the network's default gateway, you discover that the cable connecting the desktop to the router had been damaged by foot traffic and is no longer providing a reliable signal. You replace the cable, this time running the cable along the wall, so it won't be stepped on. What do you do next?

c. Use the ping command.

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

c. When Windows attempts to launch critical device drivers

You have 32-bit Windows 8.1 installed on your computer, and you purchase a license for Windows 10 Pro. You want to install Windows 10 using the 64-bit architecture. In which way can you install Windows 10?

c. You can perform a clean install but not an upgrade.

Backups of files can help restore files when something goes missing. Which of the following commands can be used to copy a file named ImportantInfo.txt from the desktop to a directory named Backups in the root directory?

c. cp Desktop/Importantfile.txt ./Backups/ImportantInfo.txt

A new user is exploring the Linux terminal and wants to read an explanation of the dig command and see several examples. Which command would help them understand this command?

c. man dig

Which command would you use to find out how much RAM is installed in a computer?

c. msinfo32.exe

In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command line in order to install a program?

c. sudo

What tool is best to use when destroying data on an SSD?

d. ATA Secure Erase

Which Event Viewer log do you search to find errors and warnings?

d. Administrative Events log

Before allowing apps from untrusted sources to be installed on your Android device, what should you do? (Choose all that apply.)

d. All of the answers are correct.

Remote Desktop and Remote Assistance require a technician to change port settings and firewall settings, but third-party apps such as GoToMyPC do not. Why is this?

d. GoToMyPC and other third-party apps use ports already left open for web browsing and don't require additional incoming connections.

Which Windows program must be running before a user can sign in to Windows?

d. Lsass.exe

Which Windows tool is used to reset the password for a user's Windows account?

d. Network Places Wizard (netplwiz.exe)

After installing the device drivers for a video adapter, you still are not able to use the special features of the adapter. What is your next step?

d. Open Device Manager and check for errors.

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

d. Policies generally apply to either computers or users.

Which type of server can function as a firewall?

d. Proxy server

What is the first thing you should do when you discover a computer is infected with malware?

d. Quarantine the computer.

Mia works from home occasionally and needs to set up her Windows 10 computer at work so she can remote in from her home office. Which tools should she use?

d. Remote Desktop

You want to restart your Windows computer at the end of a PowerShell script you have built to update the operating system. Which of the following commands could be used to perform the restart in your script?

d. Restart-Computer

An employee uses a key fob to access corporate resources from their home office. What type of authentication are they using?

d. Soft token

After setting up a dual-boot installation with Windows 8.1 and Windows 10, how do you boot the system into Windows 8.1?

d. Start the system and select the OS in the boot loader menu.

Which tool is the least invasive solution to repair Windows?

d. Startup repair

Your friend is setting up a computer and plans to use Windows RAID striping. They ask you how many hard drives they should install in the system. What do you tell them?

d. Suggest to your friend that they use hardware RAID, which is more stable.

What is the best way to determine if an email message warning about a virus is a hoax?

b. Check websites that track virus hoaxes.

When a driver is giving problems in Windows 10, which tool offers the least intrusive solution?

b. Device Manager

What is the most effective thing you can do to prevent a mobile device battery from draining too quickly?

b. Enable airplane mode.

Your Windows system boots to a blue screen stop error and no Start screen or desktop. What do you do first?

b. Use the web to research the stop error messages and numbers.

Among the following, which is the best protection against ransomware?

a. Carbonite

Daunte frequently calls your help desk asking for instructions on how to use Windows 10. What is the best way to help Daunte?

d. Use Remote Assistance to show Daunte how to use Windows 10, and point him to the log file created.

How can you configure an iPhone so it can download and install any app from any website on the Internet?

d. Use an app to jailbreak the iPhone.

As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occur?

d. When BIOS/UEFI is searching for an OS using devices listed in the boot priority order

When NTFS and share permissions are used on the local file server, can a user signed in on a Windows 10 Home computer access these shares? Why or why not?

d. Yes, because the user is authenticated on the file server to access its shares.


Kaugnay na mga set ng pag-aaral

Immunology- Major Histocompatibility Complex (MHC)

View Set

Target Marketing and Market Segmentation

View Set

Italian (Checkpoint B) - Vocabulary

View Set

Psyc 304 Unit 4: Ethical Issues in Psychological Research

View Set

NCLEX -- fundamentals, med surg, leadership/mgmt

View Set

Combo with "CFA Set 1" and 5 others

View Set