ITC 191 Exam #1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

System Restore

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue? Answer Use BOOTMGR Go Back to the Previous Build System Restore Reset this PC

Open source

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model? Answer Open source Enterprise Proprietary Persistent Personal

Kernel

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform for applications to run on. What is the name of this core component? Answer Interface Driver Central Processing Unit Kernel Desktop

The installation will fail.

Tyler has a computer with a Windows 32-bit operating system. He wants to install an application that requires a 64-bit operating system. Which of the following is likely to happen if he tries to install it anyway? Answer Windows will isolate the 64-bit binaries by redirecting Registry calls to allow the program to run. The installation will fail. Windows will use WOW64 to run the application, but the program will run slowly. The program will install a 64-bit driver and will run normally.

Assign you a user and an administrator token.

What does Windows 11 do when you log in with an administrator account with elevated privileges? Answer Assign you a user and an administrator token. Notify you that you have administrative privileges. Use your credentials to assign you administrative privileges. Assign you a unique administrator token.

GUI (Graphical user interface)

What is normally disabled by default on most Linux servers? Answer GUI TUI IaaS Embedded Linux

.sh

What is the most commonly used file extension for a shell script? Answer .sh .bash .zsh .ksh

Saves information about system devices.

What is the role of the CMOS in a modern computer? Answer Saves information about system devices. Coordinates the use of system hardware with the operating system. Tests hardware during system startup. Loads the operating system into memory.

Backup and Restore

What tool can you use to create a full system image of your Windows drive? Answer Recovery drive System Repair Windows Installation Media Backup and Restore

GCC compiler system Update utility Bash shell

When Linus Torvalds first released Linux version 0.02 in 1991, which utilities were included in the release? (Select three.) Answer Print server Bash shell Database server GCC compiler system Web server File server Update utility

A runaway application does not respond to user input.

When assisting users, a technician often uses the macOS Force Quit function and the Linux kill command. Which of the following situations would require their use? Answer A runaway application does not respond to user input. A remote desktop connection needs to be closed. The operating system needs to be rebooted. A user accidently sends a large job to a printer.

In Settings under Privacy (Windows 10) or Privacy and security (Windows 11).

Where in Windows can you allow an application to use the computer's location? Answer In Settings under Update and Security (Windows 10) or Apps and features (Windows 11). In Settings under Privacy (Windows 10) or Privacy and security (Windows 11). In Control Panel under Programs and Features (Windows 10 and 11). In Control Panel under Security and Maintenance (Windows 10 and 11).

SSO

Which Active Directory service simplifies how users log in to all the systems and applications that they need? Answer Domain Workgroup PIN SSO

ps -e

Which command would you use to display a simple list of all processes running on a Linux distribution that use either RPM or dpkg for package management? Answer yum process info ps -ef yum -ef ps -e yum -e apt-get -e yum info apt-get -ef

An interpreted programming language used to write scripts.

Which of the following BEST describes a scripting language? Answer An interpreted programming language used to write scripts. The process of organizing commands and structures into a script. A text file with commands and structures. A popular method of scripting based on the Bourne shell.

A Windows stop error.

Which of the following BEST describes the Blue Screen of Death (BSoD)? Answer A Not enough USB controller resources warning. A Windows stop error. A time drift error. A No operating system found error.

They gather information about a problem and perform basic troubleshooting.

Which of the following BEST describes the primary role of Tier 1 support operators? Answer They solve issues behind the scenes and handle the most complex situations. They gather information about a problem and perform basic troubleshooting. They use their specialized training and experience with the organization to help resolve an issue. They track the progress of and open and close tickets.

LibreOffice

Which of the following Linux software applications provides word processing, spreadsheets, and presentations? Answer Distro LibreOffice GIMP LightWorks

Dock

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and access specific folders? Answer Spotlight Dock Terminal Mission Control

GRE

Which of the following VPN protocols was developed by Cisco and can be used to route any Layer 3 protocol across an IP network? Answer SSL GRE L2TP IPSec

Sign in with a Microsoft account instead

Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account? Answer Family & other users Manage my accounts Sign in with a Microsoft account instead Users and Groups

General Availability Channel

Which of the following Windows Update options releases updates as soon as they are available to the public? Answer Windows Server Update Services Long-Term Servicing Channel General Availability Channel Windows Insider Program

Virtual desktop

Which of the following Windows desktop components lets you create multiple desktop to organize availability for different sets of applications? Answer Widgets Virtual desktop Settings Taskbar

Install the latest updates.

Which of the following actions directly improves system security on a Windows workstation? Answer Disable automatic reboot on an error. Create regular restore points. Create a password reset disk. Install the latest updates.

System memory is initialized, verified, and allocated. The CPU and chipset are verified and fully initialized.

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.) Answer Power is supplied to the CPU. System memory is initialized, verified, and allocated. The CPU and chipset are verified and fully initialized. Device drivers are loaded into memory. The EFI boot manager initializes.

Use strong passwords. Use waiting room features.

Which of the following actions should you take to BEST secure your video conferencing software? (Select two.) Answer Use recording. Disable the software when not in use. Apply spam filters. Use strong passwords. Use waiting room features. Use two-factor authentication.

Popular with the scientific community. Focuses on code readability.

Which of the following are characteristics specific to the Python programming language? (Select two.) Answer Most popular method of scripting in the Linux world. Popular with the scientific community. Used for website and web page design. Executes multiple Windows commands in sequence. Focuses on code readability.

Automated backups Network drive remapping System updates

Which of the following are common uses for scripting? (Select three.) Answer File management Email mass mailings Automated backups Network drive remapping Bookmark list management System updates Script creation

Can be moved to the left or left-centered on the screen. Can be hidden.

Which of the following are features of the Windows taskbar component? (Select two.) Answer Includes a search field for quick location of applications. Displays breadcrumb navigation when accessing components. Can be moved to the left or left-centered on the screen. Can be hidden. Provides options to personalize your news feed and interests.

System changes made since the restore point was taken are undone.

Which of the following is true about System Restore? Answer If the restore freezes, you can cancel the restore process. Device drivers installed since the restore point will not be affected. System changes made since the restore point was taken are undone. User data will be affected.

The user initiates the session.

Which of the following is true of Remote Assistance? Answer The user initiates the session. It is designed to improve user productivity. Only one user is logged in at a time. The remote user initiates the session.

Group members have the access rights that are assigned to the group.

Which of the following is true of groups on a Windows system? Answer Users can log on as the group and have all the assigned access rights. Group members have the access rights that are assigned to the group. A group allows multiple users to share a single logon. Users and local resources, such as printers and shared folders, can be made members of a group.

Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations.

Which of the following is true of online software activation? (Select three.) Answer The software vendor does not track how many times each license code is activated, but uses persistent activation to annually audit the number of licenses being used. Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations. With enterprise licenses, the software vendor tracks how many times each license code is activated and automatically charges the enterprise for activations above the license limit. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations.

They are moving away from DRM because of several key shortcomings in the technology. They are adopting alternatives to DRM, such as encouraging customers not to illegally share digital files.

Which of the following is true of the way many large digital media vendors use Digital Rights Management technology today? (Select two.) Answer They are offering free backup copies of protected digital files. They are moving away from DRM because of several key shortcomings in the technology. They are moving to strengthen the encryption used to protect their digital files. They are cooperating with other vendors to make their digital files more portable in relation to those vendors' hardware and software. They are adopting alternatives to DRM, such as encouraging customers not to illegally share digital files.

Globe key

Which of the following keys let you switch between keyboard languages? Answer Globe key Control key Option key Command key

PIN

Which of the following must be set up before you can register a facial or fingerprint scan for your account? Answer Picture password Security key PIN Password

Linux operating system

Which of the following must specifically be modified to embed Linux within intelligent devices (such as smart TVs and tablets)? Answer Linux distribution Linux utilities Linux operating system Linux user interface

L2TP PPTP

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.) Answer PPPoE VNC L2TP RDP PPTP

Batch

Which of the following scripting languages includes multiple Windows commands that are run in sequence? Answer Batch Python Shells JavaScript

PowerShell

Which of the following scripting languages is gradually replacing Windows batch files? Answer Python JavaScript Visual Basic PowerShell

Choose the language you speak with your device Show additional calendars in the taskbar Country or region

Which of the following settings can you modify in the Time & Language category in the Windows 10 Settings app? (Select three.) Answer Manage sound devices Choose your input device Choose the language you speak with your device Show additional calendars in the taskbar Country or region Let websites provide locally relevant content by accessing my language list Show notifications on the lock screen

Encrypts the entire communication session. Uses port 443.

Which of the following statements about an SSL VPN are true? (Select two.) Answer Uses UDP port 500. Provides message integrity using HMAC. Encrypts the entire communication session. Encapsulates packets by adding a GRE header. Uses pre-shared keys for authentication. Uses port 443.

Hotfix

Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis? Answer Hotfix Windows as a Service Targeted software patch Service pack

Microsoft Endpoint Configuration Manager

Which of the following tools can manage bandwidth usage and deployment times for updates? Answer Windows Server Update Services Microsoft Endpoint Configuration Manager Windows Update Windows Update for Business

System File Checker

Which of the following troubleshooting utilities scans the operating system files and replaces corrupt files? Answer System Image Recovery Services System File Checker System Restore

PPTP

Which of the following was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP? Answer SSL L2TP IPSec PPTP

macOS

Which operating system uses the Time Machine backup program? Answer Windows Linux Android macOS

POST

Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS? Answer Boot Loader Winload.exe WININIT POST

Remote Desktop

Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer? Answer Telnet Remote Assistance Remote Desktop Screen Sharing

JavaScript

Which scripting language is widely used for website and web page design and is also the most popular programming language in the world? Answer Python Batch Visual Basic JavaScript

Performance Monitor

Which tool can you use to gather data and display statistics (in counters) that help you monitor the operation of a Windows system? Answer Performance Monitor Event Viewer MSinfo Computer Management

The average user

Which user type is the Windows Beta channel recommended for? Answer Administrators Commercial users The average user Highly technical users

Msconfig (System Configuration)

Which utility allows you to choose Selective Startup in Windows? Answer Msconfig (System Configuration) Event Viewer Msinfo32 Regedit Performance Monitor

VPN

While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using? Answer DLP Firewall VPN Access control list

Spotlight

A macOS user has forgotten the location of an important spreadsheet document. Which macOS feature could they use to find the spreadsheet? Answer Key Chain Remote Disk Spotlight Mission Control

Scheduled backups

An administrator configures the Time Machine application on macOS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following? Answer Scheduled backups Driver and firmware updates Patch management Scheduled disk maintenance

System Properties > Computer Name

A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change? Answer System Properties > Remote System Properties > Advanced System Properties > Computer Name System Properties > System Protection

Verify that no keys are being pressed down during POST.

A user has called to complain that her computer won't boot. It stops on the system startup screen right after the memory has been tested and displays a 301 keyboard error. Which of the following troubleshooting steps is the BEST to try first? Answer Install a new keyboard on the computer. Verify that the latest UEFI firmware updates have been applied. Verify that no keys are being pressed down during POST. Download and install the latest keyboard driver from the manufacturer's website.

GPOs linked to organizational units that contain this user's object.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled? Answer The Default Domain Policy GPO. GPOs linked to the domain that contains this user's object. The Local Group Policy. GPOs linked to organizational units that contain this user's object.

Administrators Remote Desktop Users

A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups should you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) Answer Power Users Administrators Guests Users Remote Desktop Users

Control notifications. Restrict access to Control Panel features.

Administrative Templates are Registry-based settings that you can configure within a GPO to control a computer system and its overall user experience. Which of the following can you do with an Administrative Template? (Select two.) Answer Control notifications. Allow users to run only the files you specify. Determine who can add trusted publishers. Restrict access to Control Panel features. Identify allowed or blocked software.

yum info orleans

During a routine audit of a web server running on an RPM-based Linux system, you notice a package that is not installed from the standard server template. This is an error. Before you do anything, however, you need to find the package's dependencies. The package's name is orleans. Which of the following commands lists dependencies? Answer apt search orleans yum list orleans yum info orleans apt info orleans

Operations

During which asset management phase would you perform maintenance tasks, such as installing updates and patches or upgrading a hard drive? Answer Decommissioning Deployment Procurement Operations

taskkill

Frank is running a program called FrameMaker on his Windows computer. While trying to import graphics into this program, he sees a spinning wheel for a long time. When Frank clicks on the application, a message is displayed that indicates that the application is not responding. Which of the following Microsoft command line tools can BEST shut down the application? Answer exit shutdown del taskkill

Navigate between pages in a document correct answer: Slide two fingers left or right Zoom in correct answer: Spread two fingers apart Scroll correct answer: Slide up or down using two fingers Right-click correct answer: Tap with two fingers Display all windows for the active app correct answer: Slide four fingers straight down

Gestures are specific finger motions that are used to perform specific functions on a macOS system. Apple systems use the multi-touch trackpad, the Magic Mouse, or the touchscreen to perform these motions. Drag each macOS hand gesture on the left to its associated function on the right. Drag Tap with two fingers Slide two fingers left or right Slide four fingers straight down Spread two fingers apart Slide up or down using two fingers Drop Navigate between pages in a document Zoom in Scroll Right-click Display all windows for the active app

Personalization

If you want to change your taskbar from appearing on the bottom of the screen to the right side, under which of the following Windows 10 Settings app categories would you find the setting to change this? Answer Ease of Access Systems Devices Personalization

The whole system will run slowly.

Jesse, a professional graphic designer, has just installed a new application on his system, which needs a lot of memory for timely processing and high-quality images. Jesse's computer has an integrated graphics card. Which of the following is MOST likely to happen when Jesse runs the application on his computer? Answer The graphics card will generate a lot of heat. The graphics card will produce high-quality images without delay. The battery life will diminish quickly when running the app. The whole system will run slowly.

D. Control

Primarily used for text document navigation.

The administrator is not included in her Specific Users Only list.

Rachel wants to use Screen Sharing to allow a system administrator to remotely access her Apple iMac. However, when she initiates the Screen Sharing session, the administrator is not able to access her iMac desktop from his iMac computer. What is the MOST likely reason that the administrator cannot access the Screen Sharing session? Answer Screen Sharing is not enabled on Rachel's iMac. The VNC Viewer setting is not enabled. The Observe mode is not enabled. The administrator is not included in her Specific Users Only list.

C. Command

The primary modifier key on Apple systems, used like the Ctrl key on a Windows system.

B. fn

Typically only found on Apple notebooks and used to access the F1 - F12 keys on the keyboard.

Apps

Under which Windows 10 Settings app category can you choose battery options when you want to watch movies and videos on battery power? Answer Gaming Personalization Apps System

A. alt option

Used for application and navigation shortcuts.

Security notes Certificates

What else does the macOS Keychain utility store besides passwords? (Select two.) Answer Security notes Certificates Password preferences Public keys Security configurations

Support secure communications over an untrusted network.

What is a VPN's primary purpose? Answer Support secure communications over an untrusted network. Support the distribution of public web documents. Allow the use of network-attached printers. Allow remote systems to save on long-distance charges.

Enterprise E5

Which of the following Windows 11 Enterprise edition versions is specifically intended for organizations that want to use cloud-delivered endpoint security? Answer Enterprise Enterprise E3 in Microsoft 365 E3 Enterprise E5 Enterprise E3

Ubuntu SUSE Debian

Which of the following are popular Linux OS distributions? (Select three.) Answer Library SaaS Ubuntu NaaS Terminal SUSE Debian

IPsec

Which of the following protocols provides authentication and encryption services for VPN traffic? Answer IPsec TCP SSL L2TP

EULA

Which type of contract are you typically required to accept when obtaining a proprietary software license? Answer EULA DMCA PRD GPL

Startup Repair

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering on your computer, Windows 11 will not start. Which of the following tools should you use FIRST to try and resolve the issue? Answer Startup Repair Backup and Restore Recovery Drive Restore Files

Library

You are creating a Linux program that needs to write data to a hard disk. In order to save time, you decide to have your program call a pre-written code element that tells the operating system to perform the task. What is this focused pre-written code element called? Answer Embedded Distribution Library Kernel

In-place upgrade

You are currently running the latest version of Windows 10 on your laptop. You want to install Windows 11 to take advantage of several new features. However, you have critical data on the OS hard drive that you want to preserve while installing Windows 11. Which of the following installation methods should you use? Answer In-place upgrade SetupDiag Clean install SCCM

Network & Internet

You are setting up a network for your company and need to know the MAC address and IP address for a Windows computer. Under which of the following categories in the Windows 10 Settings app can you find both the MAC address and the IP address? Answer Accounts Network & Internet System Devices

A workgroup

You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business? Answer A domain A tree A forest A workgroup

Load the necessary drivers from a USB drive.

You begin the installation process and discover that you need to load additional drivers to support your storage controller so that Windows can write to that disc. What should you do? Answer Allow Windows to find the necessary drivers. Load the necessary drivers from a USB drive. Insert or connect to the installation media and boot from that media. Remove all drivers and restart.

Devices

You have a new employee that is left-handed and needs the mouse for her computer to have the right button be the primary button for ease of use. Under which of the following Windows 10 Settings app categories can you change the mouse settings to make the right button the primary button? Answer Systems Ease of Access Personalization Devices

Event Viewer

You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly? Answer File Explorer Advanced Options Menu Event Viewer System File Checker

Startup

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

apt-get install httpd

You use a Linux distribution that employs Debian Package Manager (dpkg) for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? Answer yum install httpd -dep ps -e dpkg install httpd apt-get install httpd -dep apt-get install httpd yum install httpd ps -ef

Updates and Security

You want to perform an upgrade from Windows 10 to Windows 11 on your laptop computer without going directly to a website or external source to retrieve or access the upgrade package. Which of the following should you use? Answer ISO Installation Media SCCM Updates and Security Installation Assistant

Purchase an enterprise license for the software program and reuse the activation code for each workstation.

Your organization has 75 workstations that each need a software program installed. Which of the following is the BEST choice to accomplish this? Answer Purchase a personal license for the software program and reuse the activation code for each workstation. Purchase an enterprise license for the software program and reuse the activation code for each workstation. Purchase one personal license for the software program and then search online for additional activation codes provided by third parties or activation code generators. Purchase 75 personal licenses for the software program and use each unique activation code for each workstation.

Configure the VPN connection to use IPsec Configure the browser to send HTTPS requests through the VPN connection.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.) Answer Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. Configure the VPN connection to use IPsec. Configure the VPN connection to use PPTP. Configure the VPN connection to use MS-CHAPv2. Configure the browser to send HTTPS requests through the VPN connection.

Persistent license activation

A software vendor has had recurring problems with customers misusing their proprietary software. Which of the following technologies can give them the MOST control in regulating who, how, and when their software is being used? Answer One-time license activation Digital fingerprinting Digital watermarking Persistent license activation

Boot Camp

A technician is tasked with installing the Windows OS on a macOS computer so that the computer can boot to either macOS or the Windows OS. Which macOS feature should the technician use to complete this task? Answer Boot Camp Finder Disk Utility Keychain

Her group membership does not allow her to install new software.

A user calls to report a problem. She is trying to install an application on her new Windows 11 system, but the installation will not proceed. Her user account is a member of the Users group. What is MOST likely causing the installation issue? Answer She is not using an app from the Microsoft Store. Her group membership does not allow her to install new software. The application is incompatible with Windows 11. She is not a member of the Power Users group.

Upgrade the CPU to one with multiple cores.

Adding more RAM does not necessarily improve system performance. Which of the following must you also do to make sure that system performance does improve? Answer Uninstall the most current update. Upgrade the CPU to one with multiple cores. Reboot the system. Rebuild the Windows profile.

Enable Hyper-V to run the program on the previous version.

After upgrading to the newest version of Windows, an important application is no longer running. Which of the following is the BEST option for troubleshooting the problem? Answer In Control Panel, uncheck the box next to Block all incoming connections, including those in the list of allowed apps. Enable Hyper-V to run the program on the previous version. Stop Windows Defender from checking apps. Install an antivirus program to prevent malware interference.

The remote session from the Level 1 operator has not been disconnected.

As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been escalated from a Level 1 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop? Answer The remote session from the Level 1 operator has not been disconnected. The employee's computer is turned off. You have the wrong IP address for the employee's computer. Your firewall is not set up to allow the connection through port 3389.

Use a script to run a query of all machines.

As a network administrator for several hundred machines, you have been given the task of listing all workstations and servers in your company network that have less than 16 GB of RAM. What is the BEST method for accurately collecting this data? Answer Remotely connect to each machine. Send out an email requesting the information. Check each machine's IT record. Use a script to run a query of all machines.

Workgroup

As the IT administrator for a small consulting firm, you want all the computers in the company office to be able to share files, printers, and local network resources. There are currently 15 computers in the office. Which of the following Windows features could you implement that would MOST closely match your network requirements? Answer Bitlocker Remote Desktop Protocol (RDP) Domain access Workgroup

File History

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: Only customer data files created by the financial consultants need to be backed up. Data backed up to a flash drive. Backed up files must be uncompressed. Include contact lists and desktop preferences. Which of the following backup solutions BEST meets your requirements? Answer Differential File Backup System Image File History

Unintentional introduction of malware Accidentally changed system settings

As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. Which of the following are common problems that can be introduced into a system or network with a script? (Select two.) Answer Strange characters on a printed page Black (or Blue) Screen of Death Beeps upon startup Unintentional introduction of malware Accidentally changed system settings

RAM capacity

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility? Answer VRAM capacity CPU capacity RAM capacity SSD storage capacity

Insufficient permissions

Don is an accountant in the finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the MOST likely reason Don could not install the application? Answer Incorrect service pack level Insufficient permissions Insufficient disk space Failed device driver Insufficient system RAM

Causes the policy to be enforced correct answer: Enabled Does not change the current setting for the policy correct answer: Not configured Prevents the policy from being enforced correct answer: Disabled

Drag each Group Policy setting on the left to the appropriate description of how the setting is enforced on the right. Drag Not configured Enabled Disabled Drop Causes the policy to be enforced Does not change the current setting for the policy Prevents the policy from being enforced

Disk queue length correct answer: The number of read and write requests that are waiting to be processed. Processor utilization correct answer: The amount of time the processor spends performing non-idle tasks. Commit charge correct answer: The amount of memory that has been assigned to running processes. Disk time correct answer: The amount of time that the disk subsystem is busy reading from and writing to disk. Memory pages per second correct answer: The number of hard faults that occur each second.

Drag each definition on the left to its corresponding Task Manager performance counter on the right. (Each definition may be used once, more than once, or not at all.) Drag The amount of time the processor spends performing non-idle tasks. The amount of time that the disk subsystem is busy reading from and writing to disk. The number of read and write requests that are waiting to be processed. The amount of memory that has been assigned to running processes. The number of hard faults that occur each second. Drop Disk queue length Processor utilization Commit charge Disk time Memory pages per second

Update & Security

In which of the following Windows 10 Settings app categories can you find reports on your device's health? Answer Update & Security Network & Internet Devices System

Right-click > End task

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what's going on and how to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to immediately stop the application from running? Answer Right-click > Disconnect Right-click > Disable Right-click > Switch to Right-click > Stop Right-click > End task

Mobile devices

Linux has been a mainstay operating system in server rooms for many years, and it has grown even more pervasive in recent times. Which of the following types of devices has Linux taken over a large percentage of the market for? Answer Printers Desktop workstations Mobile devices Wi-Fi routers

Screen Sharing

Listen to exam instructions Which remote access solution is built into macOS? AnswerScreen Sharing Remote Desktop Quick Assist Remote Assistance

Domain correct answer: A collection of network resources that share a common directory database. Organizational unit (OU) correct answer: A folder-like container that organizes network resources. Built-in containers correct answer: Default containers used to organize Active Directory objects that cannot be deleted. Object correct answer: A resource within Active Directory. Domain controller correct answer: A Windows server that holds a copy of the Active Directory database.

Match each Active Directory definition on the left with its corresponding component on the right. Drag A collection of network resources that share a common directory database. A folder-like container that organizes network resources. Default containers used to organize Active Directory objects that cannot be deleted. A resource within Active Directory. A Windows server that holds a copy of the Active Directory database. Drop Domain Organizational unit (OU) Built-in containers Object Domain controller

Only offers Windows' 11 most basic features. correct answer: Home Intended for most business professionals. correct answer: Pro Intended for those whose work requires high-end hardware for intense computing. correct answer: Pro for Workstations Intended for large organizations that have IT professionals managing the systems. correct answer: Enterprise

Match each Windows 11 edition on the left with the correct description on the right. Drag Home Pro Pro for Workstations Enterprise Drop Only offers Windows' 11 most basic features. Intended for most business professionals. Intended for those whose work requires high-end hardware for intense computing. Intended for large organizations that have IT professionals managing the systems.

Backs up all files (even those that have not changed). correct answer: Full Backs up every file that has changed since the last full or incremental backup. correct answer: Incremental Backs up every file that has changed since the last full backup. correct answer: Differential Compares the data found in the last full backup with the current content and uploads only the changes. correct answer: Synthetic

Match each backup method on the left with the correct description on the right. Drag Full Incremental Differential Synthetic Drop Backs up all files (even those that have not changed). Backs up every file that has changed since the last full or incremental backup. Backs up every file that has changed since the last full backup. Compares the data found in the last full backup with the current content and uploads only the changes.

Ability to use multiple processing devices. correct answer: Multiprocessing Ability to run multiple applications simultaneously. correct answer: Multitasking Ability to run multiple parts of an application simultaneously. correct answer: Multithreading

Match each operating system attribute on the left with the correct description on the right. Drag Multiprocessing Multitasking Multithreading Drop Ability to use multiple processing devices. Ability to run multiple applications simultaneously. Ability to run multiple parts of an application simultaneously.

Restore her system using the recovery partition.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 10 to Windows 11 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 10 operating system? Answer Download and reinstall Windows 10 from the internet. Connect her computer to your external flash drive and install Windows 10 from the data it contains. Restore her system using the recovery partition. Using the Windows 10 DVD, perform an upgrade.

Multiple Desktops All windows Dashboard

Mission Control is a desktop and window management utility that is used to access several macOS features. Which of the following are macOS features that you can access through Mission Control? (Select three.) Answer System Preferences Spotlight Multiple Desktops Secure Notes All windows Boot Camp Dashboard

yum search firefox

On a Linux system using RPM for package management, which of the following commands would you use to search online repositories for an available Firefox package? Answer yum search firefox apt search firefox rpm -s firefox apt-get search firefox

apt search firefox

On a Linux system using the Debian Package Manager, which of the following commands would you use to search online repositories for an installable Firefox package? Answer apt search firefox rpm -s firefox yum search firefox apt-get search firefox

Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot, and now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent him from using the TV until you can install an updated driver. What should you do? Answer Boot the system from a Windows installation disc and select the Startup Repair option. Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager. Reboot the system and select Safe Mode. Edit the properties of the TV tuner driver in Device Manager and select Roll Back Driver. Re-install Windows from the installation disc. Use the Reset This PC option in the Settings app.

Provides access to software and data through the cloud. correct answer: SaaS Provides access to storage devices through the cloud. correct answer: STaaS Provides network connectivity through the cloud. correct answer: NaaS Provides access to virtual machines through a network connection. correct answer: IaaS

There are several cloud computing options available for Linux. Drag the cloud computing option on the left to its appropriate description on the right. Drag IaaS SaaS NaaS STaaS Drop Provides access to software and data through the cloud. Provides access to storage devices through the cloud. Provides network connectivity through the cloud. Provides access to virtual machines through a network connection.

The Linux source code remains freely available to anybody who wants it.

Which of the following best describes the GNU General Public License (GPL) that is associated with the Linux kernel source code? Answer You can freely utilize, but not change, the Linux source code. The Linux source code remains freely available to anybody who wants it. You need to pay a yearly fee to access and change the Linux source code. The Linux source code remains free to those who use it for non-commercial applications.

apt-get dist-upgrade apt dist-upgrade

Which of the following commands can you use to install updated packages (found in configured repositories) that are currently installed on a Debian Package Manager-based system? (Select two.) Answer apt-get dist-upgrade yum upgrade apt dist-upgrade apt update yum update

A full backup that is stored offsite.

Which of the following describes the grandfather backup in a grandfather-father-son (GFS) rotation scheme? Answer A full backup that is stored offsite. An incremental backup that is stored offsite. An incremental backup that is stored onsite. A full backup that is stored onsite.

Sell a license to use the program

Which of the following does the GPL prevent you from doing with an open-source software program? Answer Sell a contract for technical support Sell a license to use the program Access its source code Modify its source code

Bourne shell

Which of the following forms of shell scripting is most commonly used? Answer Bourne shell Bourne Again shell Korn shell Z shell

Implement additional security protocols.

Which of the following is a best practice when using Remote Desktop Protocol (RDP) to access another computer? Answer Enable Bitlocker on the remote computer. Implement additional security protocols. Make sure both computers are in the same workgroup. Make sure both computers have the same amount of RAM.

Enterprise license

Which of the following is a software license that allows 100 or more activations? Answer Public domain license General Public License Personal license Enterprise license

Check for application driver updates.

Which of the following is a troubleshooting step to try when troubleshooting application conflicts? Answer Check for application driver updates. Rename files in Registry Editor. Run System File Checker. Restart services.

MarketSpace.org

Which of the following is a valid distinguished name for the MarketSpace common domain name? Answer Market.Space.org MarketSpace_com MarketSpace.org MarketSpace/com

Bash

Which of the following is designed to provide a Linux command line interface? Answer Bash GCC GPL GIMP

Training contracts

Which of the following is one way that developers and organizations who produce open-source software can generate revenue from the software? Answer Persistent activation licenses Enterprise licenses Training contracts One-time activation licenses

Incorrect boot order

Which of the following is the No operating system found error likely caused by? Answer Incorrect boot order Outdated applications Outdated drivers Time drift

Plugging into a 3.0 USB port.

Which of the following is the Not enough USB controller resources warning most often a result of? Answer Plugging into a 2.0 USB port. Plugging into a USB hub. Plugging into a 3.0 USB port. An overheated hard drive.

ps aux

While working on a Linux system that has been underperforming, you notice that there is one process that is utilizing a significant amount of CPU time. The name of the process is "hidden.sh". Which of the following ps commands would you use to ensure that you can see who owns that process? Answer ps aux ps -ef ps ax ps -el

To prevent the same disaster from affecting both the system and its associated backup media.

Why should you store backup media offsite? Answer To prevent the same disaster from affecting both the system and its associated backup media. It is required by government regulations in the USA. To reduce the possibility of theft. To improve the efficiency of the restoration process.

RMM

You are a network administrator for a large financial institution. There are several account advisors who are constantly on the road with their Windows laptop devices. You want to be able to occasionally check on the health of these laptops, including the ability to receive automated alerts for any unusual activity that may indicate some kind of security breach. Which of the following remote management technologies would BEST help you monitor these laptops? Answer RMM MSRA Desktop management software File transfer software

Resource Monitor

You are a network engineer for a large financial institution. While monitoring a server on your WAN network, you notice that it is experiencing a bottleneck, slow cursor movements, and lagging application function. You want to determine if a particular process is causing the problem. Which of the following tools would BEST help you troubleshoot an issue with a process by providing information such as process ID, status, and threads, as well as how much CPU is being used in real time and the 60-second average of how much CPU utilization is being consumed by each process? Answer Performance Monitor Reliability Monitor Task Manager Resource Monitor

Restore Fred's computer back to a previous restore point.

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware? Answer Perform an image deployment from a backup image to restore Fred's computer to a known good point. Format Fred's disks and perform a clean installation of the operating system. Purchase a new disk and deploy a backup image of Windows. Restore Fred's computer back to a previous restore point.

Processes Performance

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful in determining any issues with how the computer is running? (Select two.) Answer Details Processes Services Users App history Performance

Update History WSUS

You are the system administrator for several Windows servers in your company. Instead of scheduling the same updates for all the Windows servers, your systems engineer would like to begin approving the updates based on specific groups of servers. In addition, the systems engineer would like you to begin checking the update logs on the servers on a regular basis to determine if and how the updates were applied. Which of the following tools would BEST help you meet the new requirements requested by the systems engineer? (Select two.) Answer Update History Advanced Options WSUS Windows Insider Program Windows Update for Business

Search for the error in Microsoft's knowledge base or by using an internet search engine.

You are troubleshooting a computer that runs Windows 11. The operating system has halted, and a black screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue? Answer Uninstall the last application or system update that was installed. Check the voltage levels on the DC side of the power supply. Remove all memory modules and replace them one at a time until the error reappears. Search for the error in Microsoft's knowledge base or by using an internet search engine. Update the BIOS.

SFC

You are working on your Windows 10 computer during a fierce thunder storm. Lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue? Answer SFC chkdsk bootrec defrag

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements? Answer Organize the OUs at the top level by employee and resource; then assign specific rights to each user. Organize the OUs at the top level by department; then use group accounts to help control resource rights. Organize the OUs at the top level by resource and office (country); then assign specific rights to each user. Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

Boot in Safe Mode and roll back the driver.

You experience startup errors after you install a new device. What should you do FIRST to resolve the issue? Answer Boot in Safe Mode and disable all unnecessary devices. Boot in Safe Mode and roll back the driver. Disable automatic restart. Recover the system image.

Privacy

You have a Skype meeting scheduled, but when you open it to start the meeting, you find that Skype is not allowed to use the camera on your device. Under which Windows 10 Settings app category can you allow Skype to access your camera? Answer Apps Privacy Devices System

Use a paired device that employees always keep on their person to lock and unlock their computer through the Dynamic lock option that works through proximity.

You have a business where employees are often called away from their desks for 30 minutes or more at a time. Many do not shut down or lock their computers before walking away because they don't want to take time to log on again when they return. Which of the following options from the Windows 10 Settings app is the BEST choice for keeping these computers secure considering the employees' behavior and situation? Answer Have each person shut down their computer when leaving and use Windows Hello Fingerprint when signing on again. Use a paired device that employees always keep on their person to lock and unlock their computer through the Dynamic lock option that works through proximity. Have each person use the Windows key plus the L key to lock the screen when they leave and use a PIN when they return to log on again. Have each person sleep their computer when leaving and use a password to sign on again when they return.

Task Scheduler

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? Answer msconfig Task Scheduler msinfo32 Services Task Manager

Copy the .app file to the Applications directory.

You have been given a .app file for your Macintosh computer. The file is a graphics editor that you plan to install. What would you normally do to install the graphics editor? Answer Drag the .app file from Mission Control to the Dock. Launch the .app file and follow the installation instructions. Copy the .app file to the Applications directory. Launch the .app file from the Terminal application.

Disable and then enable devices and services one by one.

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows? Answer Launch and use the utilities provided in the Recovery Environment. Disable automatic restart on system failure. Disable and then enable devices and services one by one. Disable Driver Signature Enforcement.

Ntbtlog.txt

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written? Answer Ntbtlog.txt Myboot.txt Bootlog.txt Boot.log

Use a recovery disc to restore the operating system.

You have created a system image of Windows 11 on your laptop before updating several applications on your hard drive. The system image is stored on an external hard drive. After updating one of the applications, you are required to restart your laptop. However, during the restart, you receive an error message that the system is unable to reboot. You try to restore the system image from the external hard drive, but you are unsuccessful. Which of the following do you need to do BEFORE successfully restoring your Windows 11 system using the system image? Answer Set the BIOS/UEFI settings to boot from the external hard drive first. Copy the system image to a network computer and access the image from there. Use a recovery disc to restore the operating system. Copy the system image to the Windows hard drive and then start the recovery process.

Financial application documentation

You have decided to use the Apple Remote Disc feature to share CDs and DVDs among employees on your company headquarters office network. Which of the following DVDs can you share with the employees using Remote Disc? Answer Financial application documentation Audio files from the latest company conference Human Resource Blu-ray training videos Graphics editor installer

Right-click Start and select Apps & Features. Right-click the Start menu's application tile.

You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access and manage your newly-installed application? (Select two.) AnswerRight-click Start, select the application, and select Settings. Right-click Start and select Apps & Features. Right-click the Start menu's application tile. Right-click the Start menu, select All apps, and then right-click the application. Right-click the Start menu, select the application, and then select Settings.

Uninstall the Windows Update

You have just finished installing a new Windows Update when your computer locks up. What should you do first? Answer Reset your PC Run a System Repair Complete a System Restore Uninstall the Windows Update

Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

You have just installed Windows 11 on your laptop, purchased an infrared camera, and set up Windows Hello facial recognition as your login option. As part of the setup process, you enter a PIN as a backup login method. After a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your PIN. Because it has been several weeks, you have forgotten the exact number. You attempt to enter your PIN at least 24 times, but are never locked out. What is the MOST likely reason that you have not been locked out after several failed PIN login attempts? Answer You have failed to set up both your TPM chip and BitLocker for lockout. Your laptop has a TPM chip, but you have failed to set up BitLocker for lockout. Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout. You have set up BitLocker for lockout, but you have also failed to set up your TPM chip.

The laptop will be reset to the factory defaults. You are given the choice to keep your edited images.

You have recently purchased a Windows 11 laptop and have just installed several applications, including a graphics editor. Using the application, you have edited several images that you need to send to a company executive for a presentation. However, you are experiencing problems using the application and are deciding whether or not to use the Reset this PC option to remove the application and try re-installing it. What can you expect to happen if you use this option? (Select two.) AnswerAll your edited images will be removed. The laptop will be reset to the factory defaults. You are given the choice to keep your edited images. You can choose to remove only the graphics editor. The laptop will be reset to the last restore point.

You deleted a group that was created by the third-party application.

You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it. What is the MOST likely cause of the issue? Answer You deleted a group that was created by the third-party application. You assigned the wrong permissions to your user account. You switched from a domain account login to a local login. You assigned the application user account to the Users group.

Run the application in Compatibility Mode. Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run on Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select two.) Answer Run the application in its own memory space. Run the application in Compatibility Mode. Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. Purchase a new application that runs on Windows 10. Make all users who need to run the application members of the local Administrators group.

Local Group Policy Editor

You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer? Answer Windows Firewall Control Panel Local Group Policy Editor Programs Settings

No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

You need to back up user data on a Windows 11 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to back up user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work? Answer Yes, all of the requirements for using Backup and Restore have been met. No, system image backups can't be scheduled with Backup and Restore. You must run them manually. No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up. No, Windows 11 does not include the Backup and Restore utility. You must use File History instead.

System

You need to download a large file on your computer, but you are concerned about having enough space for the file. In which of the following Windows 10 Settings app categories can you find out exactly how much storage space is currently being used on your local disk? Answer System Network & Internet Devices Apps

Performance

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

Establish a Remote Desktop connection and update the driver.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue? Answer Drive to the other location as soon as possible and update the driver. Establish a Remote Desktop connection and update the driver. Tell the user to wait until you are scheduled to be in that location. Escalate the call to another technician or your supervisor.

Establish a Remote Assistance connection and watch what the employee is doing. Establish a Quick Assist session with the employee and watch what he is doing.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from an employee who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what might be causing the problem. Which of the following is the BEST way to provide the assistance the employee needs? (Select two.) Answer Establish a Remote Desktop connection and perform the task on the employee's system. Drive to the other location as soon as possible and then watch as the employee performs the task. Schedule the employee to receive more training on using the application. Establish a Remote Assistance connection and watch what the employee is doing. Establish a Quick Assist session with the employee and watch what he is doing.

Accounts

You recently installed a Windows 11 system. During the installation process, you elected to sign in to the system with a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

yum list available

You use a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on the system? Answer yum show all apt-get list available ps -ef yum list available apt-get list ps -e yum list all yum show available

yum install httpd

You use a Linux distribution that uses RPM for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? Answer yum install httpd -dep yum install httpd yum update httpd apt-get update httpd apt-get install httpd

yum list installed httpd

You use a Linux distribution that utilizes RPM for package management. Which command would you use to verify that the httpd package (the Apache HTTP Server package) is installed? Answer yum search httpd yum list installed yum list installed httpd yum info httpd

Check the DataComLink website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by the DataComLink corporation. What should you do to ensure this? (Select two.) AnswerCheck the DataComLink website regularly for patches and updates to the software. Configure Windows Update to download and install updates automatically. Configure Windows Update to download updates for other Microsoft products when Windows is updated. Configure the application to automatically download and install updates as they are released. Download any patches from the company as you are notified of them.

PPTP

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? Answer PPTP SLIP PPP NetBEUI

Back up her files using File History.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 11. She is concerned that she may accidently delete a personal file or that her primary hard disk may fail at some future time, causing her to lose her personal files. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files? Answer Purchase a third-party backup software program. Back up her files using File History. Create a network share to which Lily can copy her files. Configure scheduled disk maintenance.

Windows updates

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches, you are concerned that your Windows 11 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? Answer Scheduled backups Antivirus updates Windows updates Scheduled disk maintenance

Pause Updates

You would like to set Windows Update to delay updates for a week. Which of the following Windows Update settings would you use to configure the delay? Answer Windows Insider Program Update History Advanced Options Pause Updates

Verify that the BIOS/UEFI is configured to use the correct video adapter.

Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue? Answer Use System Restore from Safe Mode to select a working restore point. Boot the system from the installation disc and repair the system. Verify that the BIOS/UEFI is configured to use the correct video adapter. Check the motherboard documentation for information on beeps.

Uninstall the update

Your Windows OS starts to act strangely. You find out that there was a Windows automatic update three days ago. Which of the following would be BEST to try first to resolve the issue? Answer Uninstall the update Startup Repair System Image Recovery System Restore

Use Task Manager to display CPU utilization graphs for eight processors.

Your computer has a quad-core processor installed that supports multithreading. Given that the system is running Windows, how can you BEST use Task Manager to verify whether multithreading has been enabled? Answer Use Task Manager to show a single process running on multiple processors simultaneously. Use Task Manager to display CPU utilization graphs for eight processors. Use Task Manager to show each application running with two processes. Use Task Manager to report CPU utilization values up to 800%.

Remove the installed Windows update.

Your computer is not performing properly; an update was recently installed. Which of the following actions from the Windows 10 Settings app is the BEST troubleshooting choice to try first for this situation? Answer Remove the installed Windows update. Go back to a previous version of Windows. Use the Startup Repair function. Reset your PC.

Use Task Manager to monitor memory utilization. Use Resource Monitor to monitor memory utilization.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.) Answer Use Task Manager to monitor disk activity. Use Reliability Monitor to monitor memory utilization. Use Task Manager to monitor memory utilization. Use Reliability Monitor to monitor system reliability. Use Resource Monitor to monitor memory utilization. Use Resource Monitor to monitor disk activity.

Privacy & security > For developers > Develop Mode: On

Your financial investment company has recently completed development of a custom application for maintaining customer portfolios. You want to install this application on each Windows laptop that was assigned to each investment advisor. Which of the following Windows 11 settings do you need to configure to sideload this custom app? Answer Right-click the application's tile > Sideload app > Yes Update & Security > For developers > Sideload apps > Yes Privacy & security > For developers > Develop Mode: On Right-click Start > Apps & Features > Developer Mode: On

System

Your job functions have recently changed. As a result, you find that you need to work with more programs running on your Windows computer at the same time. As a result, you're now starting to receive error messages warning you of low virtual memory, but there's no additional RAM that can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? Answer Programs Device Manager Troubleshooting System

VPN concentrator

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement? Answer Host-to-host VPN Screened subnet VPN concentrator Site-to-site VPN

You risk losing your job. You expose your company to litigation by violating the software license agreement.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select two.) Answer You risk losing your job. You expose your company to litigation by violating the software license agreement. The software will eventually stop working properly for the 10 extra updates you installed. The software company will never detect the violation, so negative consequences are unlikely. Because you should be allowed one to three activations per user, this decision does not put you at risk for negative consequences.

Corrupt MBR or partition table

Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is the MOST likely source of the problem? Answer Corrupt boot sector Inaccessible boot disk Missing or corrupt file Corrupt MBR or partition table

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: Boot the system from the Windows 11 installation DVD. Access the Recovery Environment. Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr

Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the BEST way to respond to this situation? Answer Tell the user that they will need to find someone else to take care of their problem. Tell the user it isn't in your job description and move on with your current task. Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task. Try to perform the task by yourself.

View and manage software programs running in the background.

Which of the following is the purpose of the Services snap-in? Answer Display statistics that tell you about the operation of your computer. View and manage software programs running in the background. View historical data that describe the operating system's stability. Manage end user applications running on your computer. View logs about programs, system events, and security.

Backout plan

Which part of the change management process specifies how you will return affected systems to their original state if your implementation fails? Answer Backout plan Purpose Risk analysis Scope

Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public.

Aaron is a system administrator for a school district and have been assigned to maintain and decommission computer equipment throughout the district schools. He has been assigned to review all the workstations currently being used by the administrative staff at the district and school levels to determine if they need to be replaced or upgraded to meet current administrative requirements. He decides to replace the workstations with new equipment, decommission the existing computers, and sell them to the public as surplus. After selling several of the decommissioned computers, a local paper publishes an article about financial corruption in the school district with documentation to prove the accusations. Which of the following steps in the Decommissioning process did Aaron fail to do that might have BEST prevented this situation? Answer Determine whether the workstations should have been destroyed or disposed of properly in the trash. Ensure that any sensitive or proprietary information was permanently removed from the workstations before selling them to the public. Remove the workstations from the production network. Remove the workstations from the asset management database.

Ensure that your software is compatible with Windows 11.

After upgrading from Windows 10 to Windows 11 on your laptop, everything seems to be going well until you start running a graphics editing program that you have used for years. The program keeps locking up after a few minutes. Which of the following pre-installation steps would have helped to resolve this issue? Answer Verify that your system (drive space, memory, and so on) is compatible with Windows 11. Create a system image. Ensure that your software is compatible with Windows 11. Gather third-party installation media and drivers.

Tell the employee that her department doesn't currently have a budget for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired.

An employee calls you to demand more RAM for her computer to complete her work tasks. However, you know that her department doesn't have a budget for new equipment. Your supervisor is the only one that has authority to allocate department funds. Which of the following is the BEST way to respond? Answer Tell the employee that her department doesn't currently have a budget for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired. Tell the employee that you will get new RAM for their computer as soon as possible. Tell the employee that the best option is for her to purchase new RAM for the computer and bring it to work. Tell the employee that she should make do with what she has.

The CMOS battery has failed.

An employee complains that every time they turn their computer off, the computer's time is set to 12:00 p.m., and the date is set back to January 1, 1990. Which of the following is the MOST likely cause of this anomaly? Answer The CMOS battery has failed. The CMOS settings are not being saved before the computer powers off. The CMOS chip on the motherboard is loose. The CMOS chip is failing.

no

Anna is an account rep for a financial firm and has submitted a ticket in the company ticketing system to resolve an issue with a high-profile customer's account. The account is frequently losing important financial transactions. She has filled out the following information on the ticket: Customer's name and contact information Relevant problem information After waiting three days, the ticket is assigned to a tier-two support operator and set to an in-progress status. In addition, the operator sends the ticket back to Anna with a request for information about her work computer. She is frustrated because a resolution to the issue is not being addressed. SOLUTION: Anna adds additional information in the ticket description about the importance of resolving the issue immediately. She also includes the make and model of her work computer and then sends the ticket back to the support operator. Drag Yes No Drop Does this action provide what the support operator needs to help resolve the ticketing system issue?

yes

Anna is an account rep for a financial firm and has submitted a ticket in the company ticketing system to resolve an issue with a high-profile customer's account. The account is frequently losing important financial transactions. She has filled out the following information on the ticket: Customer's name and contact information Relevant problem information After waiting three days, the ticket is assigned to a tier-two support operator and set to an in-progress status. In addition, the operator sends the ticket back to Anna with a request for information about her work computer. She is frustrated because a resolution to the issue is not being addressed. SOLUTION: Anna decides to set a severity level to indicate the high priority of the issue and then sends information back to the operator about her computer, which includes the application experiencing the problem, the device's network ID, and the operating system. Drag Yes No Drop Does this action help resolve the ticketing system issue?

Generally, a change order form requires you to explain your change request in the following order: Purpose of the change Scope of the change Risk analysis Backout plan

Arrange the standard change order form information on the left in its standard presentation order on the right. (Not every answer will be used.) Proposal to the customer Scope of the change Change board membership Proposal to the CEO Explanation of changes already made Risk analysis Purpose of the change Backout plan

Contact the customer and apologize. Give a realistic timeframe for your arrival.

As a PC technician you know you will be late to an appointment with a customer. Which of the following actions should you take? (Select two.) Answer Contact the customer and apologize. Blame your tardiness on heavy traffic. Explain why you are late. Tell a joke to ease the situation. Give a realistic timeframe for your arrival.

How does this change fit with company's current strategic focus?

As a systems engineer for a large retail corporation, you have filled out a change order form to replace the laptop computers that sales reps use on the road with business tablets that are much more durable, provide both touch and keyboard options, and are more portable and easier to use when working with clients. The request has been forwarded to the change board, which is reviewing the change order form with you. One of the board members asks if this change will impact plans to move more of the business online to reach customers directly. Which of the following questions does the board member really want answered? Answer What are the desired deliverables? What is the scope of the requested change? How does this change fit with company's current strategic focus? What are the desired outcomes?

Deal with confidential materials appropriately.

As you arrive on-site at a customer's place of business, you go to the front desk and ask for the manager of the IT department. The manager greets you and tells you to use their first name, which is Robin. Robin then escorts you to the printer, which is jammed. After you fix the printer, the existing print job completes. As the paper comes out, you notice that one of them is marked confidential and has to do with an upcoming merger. You find Robin and say, "Robin, your printer is fixed and working perfectly." Robin then escorts you off the premises. When you get home that evening, you tell your spouse about the merger document you saw. The next day, you call Robin to verify that the printer is still functioning properly. Which of the following professionalism principles did you fail to to follow? Answer Use appropriate professional titles. Deal with confidential materials appropriately. Avoid being judgmental. Follow up with the customer to verify satisfaction.

Avoid dismissing customer problems.

As you arrive on-site to fix an issue, you are met by a frantic employee who immediately details how critical the issue is and how important it is to fix it as quickly as possible. Having seen this same issue many times, you say to the customer, "Stop worrying. I know what I'm doing." Which of the following professionalism principles are you failing to follow? Answer Avoid dismissing customer problems. Avoid an argument with the customer. Avoid being judgmental. Maintain a positive attitude.

Floor plan

Your organization has expanded into an adjacent office. You have been tasked with laying cables to connect the new space with the existing space. Which document should you look at to ensure that there will be no interference or damage to the cables from existing infrastructure? Answer Network topology diagram Knowledge base Floor plan Physical security diagram

Determine goods and services required

Candace is a purchasing manager for a large metropolitan hospital and is responsible for making purchasing decisions for millions of dollars worth of equipment each year. The hospital board has recently decided that many of the older hospital devices need to be upgraded to IoMT (Internet of Medical Things) equipment to become more efficient and effective in their procedures. Candace has decided to start by ordering new IoMT heart-monitoring devices that track a patient's heart information remotely. She immediately talked to her equipment sales representative and ordered several new IoMT heart-monitoring devices. However, after deploying them, she finds that they do not provide all the data that nurses and doctors were expecting. Which of the following steps did Candance fail to complete during the asset management Procurement phase that led to this issue? Answer Negotiate with the supplier Determine goods and services required Obtain a list of suppliers Finalize the purchase order

The CMOS battery has failed.

When you boot your computer, it hangs after asking you for the current time and date. What is the MOST likely problem? Answer The computer needs more RAM. The BIOS is outdated. The CMOS battery has failed. Daylight savings time has started or ended.

User Education and Awareness Policy

Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? Answer Bring Your Own Device (BYOD) Policy Security Policy User Education and Awareness Policy Acceptable Use Policy (AUP)

Procurement

During which asset management phase would you consider whether an asset would replace an existing one and whether it will have any impact on the existing network and users? Answer Deployment Operations Procurement Decommissioning

There is no operating system installed on the computer. You want to preserve the existing operating system.

In which of the following situations would you use a custom/clean installation? (Select two.) Answer You want to upgrade while preserving data and settings. You want to repair Registry entries and working files. There is no operating system installed on the computer. You want to preserve the existing operating system. You want to verify system compatibility. You want to install a new build over the current installation.

Budget Project plan Risk assessment

Which documents are generally finished and approved before a project begins? (Select three.) Answer Budget Analysis spreadsheet Project plan Risk Assessment Slide presentation Change order form Customer acceptance checklist

The OS will become increasing vulnerable to cyberattacks.

Jack has a small retail business. He had a custom application developed for his inventory tracking. All of Jack's company computers have an operating system on them that will soon reach end of life because a newer version was released two years ago. Jack is afraid that his custom inventory application won't be compatible with the new version of the operating system. Which of the following is a risk that Jack is taking if he continues to use the operating system after its end of life? Answer The OS will become increasing vulnerable to cyberattacks. The custom application may no longer be compatible. He may lose sales during the migration process. He may lose some of the OS's features that he relies on.

The accounts should have been disabled instead of deleted.

Jared, an employee in Human Resources, left the company two months ago as part of a company downsizing initiative. A new Human Resources VP is now running the department and has re-hired Jared to work as a manager in Human Resources. As a new IT system administrator for the company, you have been assigned to re-establish all of Jared's accounts, including network accounts, email, software, and VPN access. However, you discover that no accounts exist for Jared. What should have been done during Jared's offboarding process to make sure his accounts were still available for a period of time? Answer The accounts should have been left in place for a required period of time. The accounts should have been disabled instead of deleted. The account passwords should have been changed. The accounts should have been deleted, but not removed from the trash.

Severity level

Jason is a sales rep with an computer company that sells customized laptops to the public. He is opening a ticket to help resolve a customer issue with a malfunctioning laptop, which was purchased by an important customer who is relying on the laptop to complete a critical project. Which of the following items in the ticket can Jason use to help the support team immediately determine the time sensitivity of resolving this issue? Answer Tier assignment Detailed issue description Severity level Department assignment

Deployment

Jason is a system administrator for a hospital. As part of his role, he helps to maintain all devices in the hospital that connect to the internet (IoT devices). Recently, the hospital has purchase some new heart-rate monitoring devices that are IoT-enabled. Jason needs to add the devices to the inventory management database. Which of the following is the asset management phase that Jason is currently involved with? Answer Deployment Procurement Priority Operations

Shows while a disk is being converted from a basic disk to a dynamic disk. correct answer: Initializing Indicates that the disk is turned on, can be accessed, and that the volume on the disk is valid and has no errors. correct answer: Healthy Indicates that errors have occurred on physical or dynamic disks. correct answer: Unavailable Shows when a dynamic disk has been removed or turned off. correct answer: Missing

Match each disk status on the left with the corresponding description on the right. Each status may be used once, more than once, or not at all. Drag Formatting Healthy Unallocated Initializing Missing Unavailable Drop Shows while a disk is being converted from a basic disk to a dynamic disk. Indicates that the disk is turned on, can be accessed, and that the volume on the disk is valid and has no errors. Indicates that errors have occurred on physical or dynamic disks. Shows when a dynamic disk has been removed or turned off.

Support up to 128 volumes. correct answer: Dynamic disks Use primary and extended partitions. correct answer: Basic disks Are supported by all operating systems. correct answer: Basic disks Support volumes that use discontiguous disk space. correct answer: Dynamic disks Store partitioning information in a hidden database on all such disks in the system. correct answer: Dynamic disks Only support volumes made up of contiguous disk space. correct answer: Basic disks

Match each disk type on the left with its corresponding description/features on the right. Each disk type may be used once, more than once, or not at all. Drag Basic disks Dynamic disks Active disks Drop Support up to 128 volumes. Use primary and extended partitions. Are supported by all operating systems. Support volumes that use discontiguous disk space. Store partitioning information in a hidden database on all such disks in the system. Only support volumes made up of contiguous disk space.

A logical division of a storage device associated with a hard drive. correct answer: Partition A single accessible storage area within a file system. correct answer: Volume A container in a file system used to logically sort and organize data. correct answer: Directory A one-dimensional stream of bits treated as a logical unit. correct answer: File

Match each file system component on the left with the correct description on the right. Drag Partition Volume Directory File Drop A logical division of a storage device associated with a hard drive. A single accessible storage area within a file system. A container in a file system used to logically sort and organize data. A one-dimensional stream of bits treated as a logical unit.

A user-friendly interface that uses icons and visual components to interact with the system.

Most operating systems have a GUI as part of their system. Which of the following BEST describes an operating system's GUI? Answer The microprocessor's program that starts the system up after the computer is powered on. A user-friendly interface that uses icons and visual components to interact with the system. The primary component of a computer that retrieves, processes, and executes instructions. An important component of a computer that is used to store data and machine code while in use.

Linux

Ruth has a startup business and limited resources. She wants to save money by using an operating system on her business computers that has no associated fees for installation. Which of the following operating systems could Ruth install for free? Answer Windows Chrome OS macOS Linux

A document or collection of documents that provide information about an organization's network security.

Which of the following BEST describes a Security Policy? Answer A document that defines how often backups should run and where they should be saved. A document or collection of documents that provide information about an organization's network security. A document that outlines how long a password should be and which characters can be used in the password. A document that outlines who has access to company resources.

Properly identify the motherboard Download the flash utility or tool from the manufacturer's website.

To fix a problem you are having with your PC, you have determined that you must flash the computer's BIOS. Which of the following would MOST likely need to be completed prior to flashing the BIOS? (Select two.) Answer Properly identify the motherboard. Locate the flash utility or tool that was shipped with your computer. Test the memory to ensure that it is functioning properly. Download the flash utility or tool from the manufacturer's website. Create a backup of the hard disk in the event of a failure.

The relationship between remote locations and the WAN links that connect them. The location and IP addresses of hubs, switches, routers, and firewalls.

Which of the following are included in a network topology diagram? (Select two.) Answer A layout of server racks, cooling, and air circulation systems. A layout of all electrical wiring and components. The relationship between remote locations and the WAN links that connect them. A layout of all plumbing and HVAC components. The location and IP addresses of hubs, switches, routers, and firewalls.

Whenever a BIOS update provides functionality that is not currently supported, but is required by the operating system or hardware.

When do you need to upgrade the system BIOS? Answer Whenever you install a new hard disk drive. Whenever you add a new peripheral device, such as a keyboard, mouse, or printer. Whenever the BIOS settings need to be modified. Whenever a BIOS update provides functionality that is not currently supported, but is required by the operating system or hardware.

Asset management

Which of the following is the process of tracking and managing an organization's assets? Answer Decommissioning Asset management Procurement Deployment

Collect physical access items from the employee. Disable electronic access for the employee.

Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.) Answer Collect physical access items from the employee. Disable electronic access for the employee. Make sure the employee has access to the company's knowledge base. Review the Acceptable Use Policy (AUP) with the employee. Have the employee sign a Non-Disclosure Agreement.

Acceptable Use Policy (AUP) Bring Your Own Device (BYOD) Policy

Which of the following documents might a new employee need to sign during the onboarding process? (Select two.) Answer Backup Policy Regulatory and Compliance Policy Acceptable Use Policy (AUP) User Education and Awareness Policy Bring Your Own Device (BYOD) Policy

Creates a hash based on installed system components.

Which of the following functions are performed by the Trusted Platform Module (TPM)? Answer Generates authentication credentials. Performs bulk encryption. Encrypts data on the hard disk drive. Creates a hash based on installed system components.

Chrome OS

Which of the following is a web-browser based operating system? Answer macOS Chrome OS Linux Windows

Linux

Which of the following is an open-source operating system? Answer Chrome OS Windows Linux macOS

Windows

Which of the following is currently the most in-use operating system in the world? Answer Windows Chrome OS macOS Ubuntu

Operating system

Which of the following is software that allows a user to access a computer's memory, file system, processes, and hardware? Answer CPU RAM Operating system Application software

Chrome OS

Which of the following operating systems was derived from Linux? Answer macOS Unix Chrome OS Windows

Intel

Which of the following processors allowed macOS users to run Windows on their computers? Answer IBM AMD M1 Intel

Add or remove apps and folders from the Start menu. Configure accessibility options

Which of the following tasks are part of configuring the user environment after you successfully install a Windows system? (Select two.) Answer Configure Windows Update. Add or remove apps and folders from the Start menu. Configure accessibility options. Activate your Windows system. Install and configure your firewall.

Microsoft Windows

Which of the following vendors offers the largest variety of editions for its operating system? Answer Google Chrome Microsoft Windows Apple macOS Ubuntu

Purpose of the change

Which part of the change management process asks how the project will align with the organization's current mission and strategy? Answer Purpose of the change Scope of the change Plan for the change Change implementation

Scope of change

Which section of a change order form would include the desired outcomes of a project? Answer Risk analysis Purpose of change Scope of change Backout plan

Resource Monitor

Which tool can you use to display hardware utilization statistics that tell you about your computer's operation? Answer Advanced System Settings Computer Management Event Viewer Resource Monitor

Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation? Answer Answer the phone and say, "I'm busy right now. I'll call you right back." Ignore the phone and let it continue ringing until the caller reaches your voicemail. Immediately answer the phone and try to finish the call as fast as you can. Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

The person who should be the primary contact person for the project.

Who does the term responsible staff member refer to? Answer The person who is responsible for performing most of the project work. The person who should be the primary contact person for the project. The person responsible for submitting the request. The person responsible for approving the request.

Change board customer The change board may include the CEO, managers, or other personnel, but approval from persons outside the change board (such as a marketing director, sales rep, or regional rep) is not generally required.

Who needs to approve a change before it is initiated? (Select two.) Answer Marketing director Change board Regional rep Customer Sales rep

Create a system backup of the hard drive. Verify that the computer meets the minimum requirements.

You are about to begin an upgrade of a Windows 10 workstation to Windows 11. What should you do before beginning? (Select two.) Answer Remove all peripherals and expansion boards. Repartition and reformat the hard drive. Install all the applications that will be used on the new system. Create a system backup of the hard drive. Verify that the computer meets the minimum requirements.

Image deployment

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications that your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the following installation types would be the BEST use of your time in this scenario? Answer Upgrade Image deployment Recovery partition Clean installation

PXE (Pre-boot execution)

You are an IT administrator for your company. You have been tasked with installing 300 copies of Windows 11. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances? Answer USB Solid-state/flash drives PXE DVD

Avoid being judgmental Actively listening

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but you restrain from making any comments. At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer. A quick test determines that the device is now working. Which of the following professionalism principles is the technician failing to follow? (Select two.) Answer Avoiding being judgmental Allow the client to speak and avoid interrupting Actively listening Argue with customers and/or be defensive Talking to coworkers while interacting with customers

Performance Processes

You are an IT technician for your company. Jodie, a receptionist, thinks that her Windows 11 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs are MOST helpful for getting an overall view of how Jodie's computer is running? (Select two.) Answer Performance App history Processes Details Services Users

no

You are an information security specialist in charge of developing and implementing security measures for your company. You are currently working with the company's IT system administrator to make sure that all policies and procedures meet city, state, and industry regulations. You have noted that employees often allow coworkers into restricted areas who may not have authorized access. In addition, employees often work from home using company laptops that are often unsecure and frequently contain sensitive company data on the local hard drive. SOLUTION: You update the Acceptable Use Policy (AUP) to clearly state that only authorized employees can access restricted areas with a proper key fob (no tailgating), along with any penalties for non-compliance. To address the laptop security issue, you work with the IT system administrator to update the network diagram and inform employees of the changes to help secure their laptops. Drag Yes No Drop Does this solution provide a reasonable approach for addressing the security area and work-from-home issues?

Backout plan A backout plan is the portion of a change order form that details how you will return affected hardware and software to its original state if the proposed change fails.

You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called? Answer Rollback plan System image plan Risk analysis Backout plan

Back up existing data.

You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation. Which of the following pre-installation steps should you perform next? Answer Plug your laptop into an uninterruptible power source. Run Disk Cleanup on the hard drive. Back up existing data. Upgrade your laptop's RAM.

Create a system image

You are in the process of preparing to install Windows 11 on your Windows 10 computer. Which of the following pre-installation steps is critical to complete (not optional) if you are performing a clean installation? Answer Back up existing data Create a system image Verify software compatibility Obtain hardware drivers

msconfig

You are one of the IT administrators for your company. Your coworker, Rachel, says that when she boots her computer, it displays a message saying that one of her programs had an error while loading and is not working. To fix this issue, you would like to see if Windows can provide a log file that may give you a hint about what is failing at boot time. Which of the following Microsoft tools or consoles would MOST likely give you the ability to create such a log file? Answer System Information Device Manager Task Manager msconfig

The process for reporting suspicious behavior The Security Policy The help desk's contact information

You are responsible for updating your company's onboard training for all new employees. Which of the following items are important to include in that training? (Select three.) Answer The procedure for closing user accounts The Data Backup Policy The network diagram The process for reporting suspicious behavior The Security Policy The User Education and Awareness Policy The help desk's contact information

Ignore the paper and tell no one of its contents.

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer. It states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take? Answer Tell your friend about the report you saw and whose desk it was on. Give your friend a heads up about what you found, but don't tell them how you got the information. Ignore the paper and tell no one of its contents. Tell your fellow PC technicians about what you saw and let them decide what to do with the information.

Set an appointment to train the employee on how to complete common email tasks.

You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well. When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day. What is the BEST way for you to respond? Answer Inform the employee that there isn't anything wrong with the program and that he simply does not know how to use it correctly. Set an appointment to train the employee on how to complete common email tasks. Tell the employee to ask their co-workers how to use the program if he come across further problems. Direct the employee to the email program's help utility.

The utility can only manage MBR partitions and is displaying the drive's protected MBR.

You are using an older utility to manage a GPT-partitioned drive on a Windows 10 system. You only see a single partition. However, you know you have multiple partitions across the hard drive. What is the MOST likely reason that you only see one partition? Answer The utility is displaying the drive's unprotected MBR. The utility can only display dynamic partitions. The utility is only designed to work with Windows 7 or 8. The utility can only manage MBR partitions and is displaying the drive's protected MBR.

Clean installation

You have a computer with a 64-bit dual-core processor that runs the 64-bit version of Windows 10 Professional edition. You would like to upgrade to the 64-bit version of Windows 11 Home. You want to perform the upgrade with the least amount of effort possible. Which of the following installation methods do you need to perform? Answer Clean installation Repair installation In-place upgrade Windows 10 Installation Assistant installation

Custom/clean installation

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs? Answer Repair installation Custom/clean installation Upgrade installation In-place installation

Upgrade

You have a workstation running a 64-bit version of Windows 10 Professional that you would like to upgrade to Windows 11 Professional. You want to preserve the existing data, settings, and applications. Which of the following would be the BEST installation methods to use to install Windows 11? Answer Custom/clean Upgrade In-place Repair

Use Task Manager to modify the process priority.

You have an application that renders videos for your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application? Answer Use Task Manager to modify the processor affinity. Use Task Manager to modify the process priority. Use the Services console to change the startup type to Automatic. Use Task Manager to switch to the running application.

Upgrade the disk to a dynamic disk.

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. Which of the following is the BEST step to perform to accomplish this? Answer Upgrade the disk to a dynamic disk. Delete the partitions and re-create them as simple volumes. Run the fixboot command to convert the partition type to GPT. Run the convert command.

Healthy (Logical Drive)

You have four volumes on a basic hard disk. Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? Answer Healthy (Primary Partition) Healthy Healthy (Basic) Healthy (Logical Drive) Healthy (Dynamic)

Healthy

You have four volumes on a basic hard disk. You convert the disk to dynamic. After the conversion, which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? Answer Healthy (Logical Drive) Healthy Healthy (Primary Partition) Healthy (Basic) Healthy (Dynamic)

Unallocated

You have just finished installing Windows on a system that contains four physical hard disks. The installation process has created a system volume and a C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2), but did not create any volumes on these disks. Which of the following would you expect to see as the status of Disk 1 and Disk 2? Answer Unavailable Formatting Initializing Unallocated Healthy Unreadable

Computer Management

You have just installed a new video card in your friend Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following is the BEST Control Panel administrative tool to fix Mark's computer? Answer Resource Monitor Computer Management Component Services System Configuration

FAT32

You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices. Which of the following file system types would meet MOST, if not all, of your needs when formatting your USB drive? Answer NFS CDFS FAT32 NTFS

Install the adapter driver from the manufacturer instead of using the Windows driver.

You have just purchased a new Windows 11 computer for creating and editing animations. You install a new high-end video adapter to handle the animation creation requirements. However, when compiling and running the animations, the computer seems sluggish, and the compilation takes longer than expected. Which of the following would be the BEST first step to resolve this issue? Answer Add more RAM to your computer to improve performance. Install the adapter driver from the manufacturer instead of using the Windows driver. Update the animation software to the latest version. Purchase and install a video adapter with more onboard memory.

The update file has been tampered with.

You have just purchased a new computer. This system uses UEFI firmware and comes with Windows 11 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install it, an error message is displayed that indicates the digital signature on the update file is invalid. Which of the following MOST likely caused this to happen? Answer The system has a rootkit malware infection. SecureBoot has been enabled in the UEFI firmware configuration. Interim UEFI updates that have been released since the system was manufactured need to be installed before you can install the latest update. The update file has been tampered with.

Reactivate your copy of Windows.

You have just upgraded your motherboard. Several weeks later, you suddenly start having issues with accessing Windows features on your computer. Which of the following will BEST resolve this issue? Answer Boot into Safe Mode and revert to a prior restore point. Disable your antivirus software. Reactivate your copy of Windows. Perform a Startup Repair from the Advanced Startup Options menu.

Disable SecureBoot in the UEFI configuration.

You have purchased a new notebook. This notebook system uses UEFI firmware and comes with Windows 11 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all Windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. Which of the following would allow your computer to boot to Linux? Answer Enable the TPM chip on the motherboard. Enable SecureBoot in the UEFI configuration. Reinstall Windows 11 on the system. Disable SecureBoot in the UEFI configuration. Set the boot order to boot from the hard disk first in the UEFI configuration.

"I found this power strip switch in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confirm that the problem has been resolved?"

You have responded to a call from a customer who is having problems with his computer. After troubleshooting the problem, you discover the switch on the power strip was off. After switching it on, all of the components and their functionality return to normal. Which of the following is the BEST way to explain the solution to the customer? Answer "Next time you need to call, check this power strip switch. It was turned off. That's why nothing worked. If I were you, I would have checked this first and saved both of us time." "All I did was flip the power strip switch on. You probably bumped it by accident. And that accident just cost you about $80. But don't feel bad, accidents happen to everyone. Although, this one could have been easily avoided." "That was probably the easiest problem I've ever fixed. I am surprised you had to call in. Thanks for making my day! All I had to do was flip this little switch. You're good to go." "I found this power strip switch in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confirm that the problem has been resolved?"

Disk Defragmenter

You have used your computer for several years, resulting in a lot of data stored on your hard disk. Lately, your computer's functions have slowed. Which of the following tools is LIKELY to help speed up your computer? Answer Disk Defragmenter Copy chkdsk DiskPart

Install Windows the same way you would install a system that uses a standard hard disk drive.

You need to install Windows 11 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 11 on this system? Answer Add a standard hard disk to the system and install Windows on the disk instead of the SSD device. Set the SATA configuration in the UEFI firmware to RAID. Load the drivers for the SSD device during the initial phase of the Windows installation. Install Windows the same way you would install a system that uses a standard hard disk drive.

Connect unauthorized devices. Respond to social engineering attacks. Click on links in a phishing email.

You plan on including Employee Education and Awareness Policy training for all new employees. As part of that training, which of the following should you instruct your employees NOT to do as part of company procedures? (Select three.) Answer Become familiar with the company Security Policy. Connect unauthorized devices. Access restricted areas in the company building. Bring your own devices to work. Respond to social engineering attacks. Click on links in a phishing email. Install software on their company laptops.

Download an ISO copy of the installation files to a USB flash drive.

You recently purchased a copy of Windows 11 from a retail store. The system that you want to install Windows on does not have an optical drive. What is the BEST option for installing Windows in this scenario? Answer Install Windows on a system that has an optical drive and then create a disk image and copy it to the system that you originally wanted to install Windows on. Download an ISO copy of the installation files to a USB flash drive. Perform a reset installation. Install the system over the network from a Windows Deployment Services (WDS) server.

Configure a user password in the BIOS/UEFI.

You want to configure your computer so that a password is required before the operating system will load. What should you do? Answer Configure an administrator password in the BIOS/UEFI. Configure chassis instruction detection. Configure a user password in the BIOS/UEFI. Require complex passwords in the Local Security Policy.

During the installation, browse to and select the appropriate drivers for your RAID controller when prompted.

You want to install Windows from optical media on a mirrored RAID disk array. You run the motherboard disk configuration utility and create the RAID 1 array. Then you configure the system to boot from the Windows installation optical media. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected? Answer In the UEFI configuration, set the SATA mode to IDE. In the UEFI configuration, set the SATA mode to AHCI. During the installation, browse to and select the appropriate drivers for your RAID controller when prompted. In the UEFI configuration, configure the boot order to boot from the hard drive instead of the optical drive.

Clean installation

You want to keep an existing operating system installed on a system and deploy Windows as a separate instance on the same device, creating a multiple-boot configuration. Which installation type should you use? Answer In-place installation Clean installation Repair installation Upgrade installation

Shrink the primary partition.

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot in this scenario? Answer Shrink the primary partition. Reformat the disk with the partitions needed for a dual boot system. Convert the disk from physical to logical partitions. Convert the disk from basic to dynamic.

Add more memory.

You want to upgrade your Windows 10 Professional computer to Windows 11 Professional. You begin by checking the hardware and discover that it has 2 GB of RAM, a 2.0 GHz dual-core processor, a 256 GB solid-state drive, and a video adapter with 128 MB of RAM and DirectX 12 support. You want to install the 64-bit version of Windows 11. What should you do? Answer Upgrade to a processor with at least four cores. Upgrade to a faster processor. Upgrade the video adapter. Add more memory. Install a larger solid-state drive or hard drive.

Purpose of Change incorrect answer. Correct Answer:To provide every client using the software the functionality to automate 401k management. Scope of Change incorrect answer. Correct Answer:Add 401k management to the payroll software. Plan for Change incorrect answer. Correct Answer:Request to hire contractors to implement 401k management. Risk Analysis incorrect answer. Correct Answer:Using contractors could result in going over budget if there are problems with the project. Backout Plan incorrect answer. Correct Answer:Back up the program and data before adding the new feature.

You work for a company that provides payroll automation software to its clients. You are creating a program that will automate payroll tasks for small businesses with few employees. You are on track to meet your deadline for the project, and you anticipate having a lot of money leftover in the project budget. Mid-project, you receive a call from the human resources manager at MakeStuff, a company that will use the small-business payroll software. The manager informs you that MakeStuff has decided to offer its employees a 401k investment option and asks whether the small-business payroll program can automatically manage 401k investments. Currently, the project plan does not include that function, but you believe making the addition would be valuable to your business. You are worried about requesting permission to add this functionality for two reasons. First, the deadline for this project is very close, and it cannot be moved. Second, you have created software that automates flexible savings account management, but you haven't automated 401k investments before, and you know they are more complicated. You must fill out a change order form to request this change. Select the best option for each portion of the form. Purpose of Change Scope of Change Plan for Change Risk Analysis Backout Plan

MMC

You work in the IT department. To perform your daily tasks, you often use many of the available Windows consoles, such as Device Manager, Hyper-V Manager, and Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities BEST provides this capability? Answer MSTSC SERVICES.MSC MMC MSINFO32

Install one system and image it to the other systems. Use a network installation.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 11 licenses for your organization's accounting department. She received a single Windows 11 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select two.) Answer Install one system and image it to the other systems. Use a network installation. Use the installation disk to install Window on each system individually. Burn 50 copies of the installation disc and install 50 systems at a time. Copy the installation media to 10 flash drives and install 10 systems at a time.


Kaugnay na mga set ng pag-aaral

Chapter 9 The housing decision: Factors and Finances

View Set

Ch. 3: Introduction to the Fourth Amendment

View Set

Perfect Competition Market Structure

View Set

MGT 321 - Organizational Behavior

View Set