Pc Pro Part 2 +++++
Healthy or Online
The healthy or online status indicates that the disk is turned on and can be accessed. The volume on this disk is valid and has no errors
Online (errors)
The online (Errors) status indicates that I/O errors have been detected on a dynamic disk. To correct the problem, try reactivating the disk.
Unavailable
The unavailable status indicates that errors have occurred on physical or dynamic disks.
Unreadable
The unreadable status indicates a hardware failure, I/O errors, or other corruption but might also be caused by a delay in reading the Disk Management. Try rescanning the disk to see if the status changes; if not, troubleshoot the hardware or disk problem.
Unreadable
The unreadable status indicates a hardware failure, I/O errors, or other corruption but might also be caused by a delay in reading the disk in Disk Management. Try rescanning the disk to see if the status changes; if not, troubleshoot the hardware or disk problem.
Gene Regulation
Turning on an off genes
How can you reformat a drive from FAT32 to NTFS without losing the existing data?
Use the convert command at a command prompt
You are trying to help a co-worker order a UPS for each PC in her remove office location. What rating is used to specify the size of a UPS?
VA (Volt-Amp) Rating
You are looking at a high-density (three-row) female DB-15 connector on the computer as shown in the figure below. What device uses this connector?
VGA/SVGA monitors
You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network?
VLANs
You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning?
Verify that the computer meets the minimum requirements. Create a system backup of the hard drive prior to running the upgrade.
Virtual Memory Manager
What does VMM stand for?
VMM
What handles paging?
Invitation
What the user sends in order to get help from another user.
Have you ever printed to that printer?
While answering help desk calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the following should be the first question you ask?
No
Yes/No Will user data be modified?
Thin Provisioning
____ ____________ is based on the premise that not all users will use all of space in their allocated storage space.
Each ACL applies only to?
a specific protocol
VPN
a type of data transmission encryption that creates an encrypted tunnel between client and server
When created, an ACL usually contains?
an implicit "deny any" entry at the end of the list
zombie
an infected computer that can be told what to do from a remote location
spam
unwanted email
Sysprep
A tool that is used to generalize Windows 10 and prepare computers for imaging.
You manage a computer that runs Windows 7. You want to create a new user account and allow the user to create and save files, install applications, and change the system time. What group membership should you assign for the new user?
Administrators
You manage a computer that runs Windows 7. You want to create a new user account and allow the user to create and save files, install applications, and change the system. What group membership should you assign for the new user?
Administrators
unmounted
An _________ storage space must be brought back online manually
Unattended installations
An installation that does not require any user input because all necessary configuration information is provided by an answer file.
Social Engineering
Being tricked into giving out personal information
A switch running STP is classified as a backup bridge. What state is it in?
Blocking
An attacker is conducting passive reconnaissance on a targeted company. Which of the following could he be doing? (#2)
Browsing the organization's website.
You need to see the temporary files on a machine running windows 7. Which directory holds the user temporary files, and what environment variable stores the temporary directory path? (select 2)
C:\Users\username\AppData\Local\Temp %tmp%
Which file system path is the default location for system files in Windows 10?
C:\Windows
Which of the following devices can store large amounts of electricity even when unplugged?
CRT monitor
Which of the following services are available regardless of whether the telephone company network is available?
Cable modem
Which type of Internet service uses the DOCSIS specification?
Coaxial cable
You manage a network with a single switch. On each switch port, hub connects multiple devices to the switch. Which condition are you most likely to experience on the network?
Collisions
You have just connected four switches as shown in the exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge?
Configure a priority number of 4096 for switch C.
You have three switches configure as shown in the exhibit. How can you guarantee that switch C becomes the root bridge?
Configure switch C with a lower priority value.
You are providing telephone support for a user who is trying to connect a computer to a projector. You know that the projector only has a VGA port. How would you describe the connector that the user should look for?
D-shaped with 15 pins
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attacks?
DDoS
The three most common installation methods of Windows are?
DVD Boot installation, Distribution share installation , image based installation.
Dashboard All Windows Multiple Desktops
Dashboard All Windows Multiple Desktops
What permissions do member of the Users group have to these two files in the C:\PublicReports folder?
Deny Read to Reports.doc; Allow full control to costs.doc
On Windows 10 system, which Task manager tab would you use to adjust the priority given to a specific program?
Details
You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer ( not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?
Disable Secure Desktop
Which implementation is most secure?
EAP-TLS
Which of the following protocols uses port 443?
HTTPS
MORE RAM
How does one fix paging?
What services does cloud computing provide?
IaaS, PaaS, and SaaS
Which of the following are true concerning the Virtual Desktop Infrastructure (VDI)? (Select two.)
In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. User desktop environments are centrally hosted on servers instead of on individual desktop systems.
You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which Windows feature improves the speed of file searches on your computer?
Indexing service
Which cloud computing model allows the client to run software without purchasing servers, data center space, or network equipment?
Infrastructure as a Service aka IaaS
Quarantine
Keeping a computer away from use
Basic switchs operate at?
Layer 2, therefore are able to perform switching functions with no IP address configured.
Dumpster Diving
Looking through someone else's trash for possible info
Which protocol does VoIP use to interface with the PSTN?
MGCP
The number of hard faults that occur each second.
Memory Pages per Second
What is the least secure place to locate and omnidirectional access point when creating a wireless network?
Near a window
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)
Near backup generators Near cordless phones
You need to protect user data on a Windows 8.1 system. The computer has a singled SSD drive (C:) installed. The SSD drive contains both the Windows operating system and user profile data. You plan to do the following: -Use File History to protect user data. -Configure snapshots to be automatically taken every 30 minutes. -Store the backups in the C:\FileHistory folder. -Include the files in the C:\WidgerProject folder in the backup process. Will this configuration work?
No, backups created with File History must be stored on a drive other than the one containing the information being backed up.
To protect a Windows 8.1 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?
No, you need to enable File History.
What are the main differences between the OSPF and IS-IS routing protocols?
OSPF requires an area 0, while IS-IS does not.
You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?
On the system volume
You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: -Verified that the server is up and running. -Verified that the various routers in between the two location sare up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 -F -I 1500 command on your workstation. The ping command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set" What does this mean?
One of the intermediate routers is an MTU black hole.
Active directory-based activation.
One of the three types of activation allowed from Volume license agreement.
Key Management Services (KMS)
One of the three types of activation allowed from Volume license agreement.
One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?
Open Source
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
PPTP
Match the firewall on the right with the OSI layer at which it operates.
Packet Filtering - OSI Layer 3 Circuit-level proxy - OSI Layer 5 Application-level gateway - OSI Layer 7 Routed Firewall - OSI layer 3 Transparent Firewall - OSI layer 2
NTFS
Partition Size: 256 terabytes Volume Size: 256 terabytes File name length: Unicode (255 Characters, anything but /) File Size: 16 terabytes Amount of files: 4,294,967,295
A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Up to this point, which step have you forgotten in your troubleshooting process?
Perform a backup Explanation You need to perform a backup before making changes. The backup could be used to restore current settings or data in the event of additional issues resulting from the troubleshooting process. You have already established a probable cause and created an action plan. Verifying and documenting the solution occurs after the problem has been resolved.
You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.
Performance
Which tool can you use to display stats that tell you about the operation of your computer?
Performance Monitor
Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system?
Performance Monitor
You manage a Windows 7 system. You want info about all of the programs running on your system and sort each program based on the amt of memory and CPU that the program uses. What tool would you use?
Performance Monitor
What permissions do member of the Users group have to these two files in the C:\PublicReports folder?
Permissions are removed from both files
Your computer has an IP address of 161.13.5.15. your computer is on a:
Public Network
SSH
a method for proxy that uses an ssh connection to the proxy server
Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?
Remote Assistance
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need.
Remote access
Based on the diagram, which type of proxy server is handling the client's request?
Reverse Proxy Server
How do you set file attributes?
Right-click the file, then select Properties. Use the attrib command
Which of the following commands would display the output shown here?
Route print
Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets?
Route summarization
You have a Windows XP system with a single hard disk configured as a basic disk w/ a single partition formatted with FAT32. The disk is running out of free space and you need to add additional space to it. You install a new hard drive and start Disk Management. What are required tasks to add space to the existing volume? (Select Two) a. Run the convert command. b. Create an empty folder on the C:\ drive. c. Initialize the new disk using GPT. d. Extend the C:\ volume. e. Upgrade both disks to dynamic.
Run the convert command. Create an empty folder on the C:\ drive.
Your installing windows 10 via Distribution Share Installation. After booting into windows PE from a removable storage device what do you do next
Run the installation from a distribution share.
You are the PC technician for a company. You are meeting with a user who is experiencing difficulties with his computer. The user explains: "My e-mail doesn't work. I keep getting e-mail sent back to me, I can't find any of my old e-mails, and I don't think that the program has ever worked well." You ask the user to show you how they usually go about their e-mail tasks and determine that there is not a problem with the program, but that the user needs to be trained on how the program works. You know that you have several important work tasks that need to be completed by the end of the day and this is not high on your priority list. What is the best way for you to respond?
Set up a time during which you can sit down with the user and show them how to complete common tasks
Which of the following could easily result in a denial of service attack if the victimized system had too little free storage capacity?
Spam
A virtual LAN can be created using which of the following?
Switch
You need to configure when Windows updates and check for an downloaded from Microsoft's update servers on a Windows 7 system. Which option in Control Panel should you use to do this?
System and Security
What encryption method is used by WPA for wireless networks?
TKIP
Which of the following tools can you use to start the Print Spooler service if it is currently stopped?
Task Manager Services console Net start
Which of the following Denial of Service (DoS) attacks does the victim's system rebuild invalid UDP packets, causing the system to crash or reboot?
Teardrop
What does the /a switch used with the copy command indicate?
That the file is an ASCII text file
Needs Analysis : Stakeholder Interviews
The end users who will use the new systems, check with end user's manager to find out what is expected. Also includes the staff members who will be responsible for the new systems after you have implemented them.
Failed
The failed status shows for a volume that cannot be started, such as when the disk is damages or the file system is corrupt. Make sure the disk is on, then try reactivating the volume. If that doesn't work, then you likely have data loss.
oobeSystem configuration pass
The final configuration pass before installation is complete, applied during the user out-of-box experience (OOBE). This configuration pass is typically used in conjunction with Sysprep and DISM
Formatting
The formatting status is shown for portions of a disk that have not been assigned to a partition or volume.
No Media
The initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to healthy.
Missing offline
The missing or offline statuses show when a dynamic disk has failed, been removed, or turned off. If the disk is turned off, turn it back on, then reactivate the disk. If the disk no longer exists, then delete the disk from Disk Management.
Online (Errors)
The online (errors) status indicates that the I/O errors have been detected on a dynamic disk. To correct the problem, try reactivating the disk.
Remote Desktop Protocol
The protocol used to send desktop information to a remote computer.
While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of oversized Ethernet frames being received on one interface. The interface is connected to a workstation located on the 2nd floor. What could be causing this to happen?
The workstation's network board is jabbering.
Volume license agreement allows for _____ types of activation.
Three
What purposes does a wireless site survey serve? (Choose two.)
To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.
You have just installed anti-malware software on all computers on your company's network. Which additional actions should you take to help protect systems from malicious software?
Train users to scan removable storage devices before copying files. Configure the software to automatically update its definition files.
False
True/False You can restore individual files with system image recovery
You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only minimum rights necessary on the computer. Which group should this user be a member of?
User
Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an software installation.
User Account Control (UAC)
What is the default configuration of most Cisco switches?
VLANs that are tagged.
Which of the following is the most secure security protocol for wireless networks?
WPA2
You need to secure your wireless network. Which security protocol would be the best choice?
WPA2
shadow copies
What are the previous versions of your system are also known as?
paging
What happens when physical ram sends ram to a HD and back?
System Files
What is one of the three things System Restore takes, when it makes a Restore point?
Security Incident
When a incident involving security happens on a computer
Business
Which is one of the versions of Windows 7 that Previous Versions restore available?
The only two operating systems that can be upgraded to windows 10.
Windows 7 (with service pack one) or Windows 8.1
you are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer propterties on your computer to print a ptest page. Instead of a normal test page, you recieve several pages.with garbled charcters on them. What is the most liekly cause of the primblem?
Wrong print driver.
Which of the following benefits apply only to creating VLANs with switches and not to segment the netwrok with regular switches?
You can create multiple broadcast domains
Chkdsk
You can run Check Disk by typing ______ at a command prompt.
What should you do (if possible) before flashing the BIOS? select two
- Connect the computer to a UPS - Backup CMOS settings
you have a small business...
- preshared key - TKIP encryption
Which of the following are safety benefits associated with encasing cables that run across the floor? (select two)
1) Reduced tripping accidents 2) Prevents wear
In a standard ACL, use the following number ranges.
1-99 1300-1999
What do ACL entries do?
1. Describe traffic characteristics 2. Identify permitted and denied traffic 3. Can describe a specific traffic type, or allow or restrict all traffic
IGRP
100
EIGRP Internal Route
90
In a Standard ACL, what can it filter?
Can filter only on source hostname or host IP address
Where is Disk Management located within Windows?
Computer Management
Which of the following describes an IPv6 address? (Select two.)
Eight hexadecimal quartets 128bit address
You want to allow your users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?
FTP
How can you activate Windows 10
From the activation tab in Update and Security.
What is paravirtualization?
Hardware is not virtualized
15%
How much disk usage does system restore go up to?
Which installation type can NOT be used when performing an upgrade to Windows 10?
Imaged-based installation type
You need to place a wireless access point in your two story building. While trying to avoid interference, which of the following is the best location for the access point?
In the top floor
You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. What should you do to complete this installation?
Install Windows in the same way you would a system that uses a standard hard disk drive.
Which of the following is true of the Guest user account on a Windows system?
It is disabled by default.
Which of the following best describes spyware?
It monitors the actions you take on your machine and sends the information back to its originating source.
Secure Shell (SSH)
Just like Telnet, but it provides security by encrypting the data. Uses TCP port 22.
Partition
Logical division of a storage device associated with a hard disk drive. Multiple partitions can be assigned to a single devices in which case a drive letter is assigned to represent each partition
What is the least secure place to locate an access point with an omnidirectional antenna when creating a wireless cell?
Near a window
Which is a firewall function?
Packet filtering
Leave Blank
Page File Usage
You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
RADIUS
You are purchasing a PC system that will be used as a file and print server in a small business. Which hardware selection criteria would be most important for this ssytem?
RAID 1+0 array 64-bit multi-core processor
You recently purchased a USB audio head set and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic.
Recording
A file you have been working on for several days was corrupted when you shut your Windows 7 system down uncleanly. You want to restore a previous version of the file, overwriting the existing file that has been corrupted. Click the option you would use in the properties of the file to do this.
Restore
System Changes
System Restore will bring you back to a point due to what?
Which protocols and port numbers are used by BOOTP/DHCP?
TCP 67 UDP 67
You have an application that you would like to run every Monday at 3 p.m. on your Windows workstation. Which tool would you use to configure the application to run automatically?
Task Scheduler
protein breakdown
adjusts kinds and amounts of proteins; keeps proteins in working order
Which file attribute identifies the file as having been modified since the last backup?
archive
Which of the following is a symptom of a dirty drum or roller in a laser printer?
lines or splots repeated a t regular intervals on the print job
Worm
self replicates across networks
You need to install a 32-bit application on a 32-bit version of Windows. Where is the default directory where the application will be installed?
%systemdrive%/Program Files.
What is the path to the user profiles in windows XP?
%systemdrive%\Documents and Settings\
You need to install a 32-bit application on a 32-bit version of windows Vista. Where is the default directory where the will be installed?
%systemdrive%\Program Files
You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed?
%systemdrive%\Program Files (x86)
You need to install a 32-bit application on a 64-bit version of Windows. Where is the default directory where the application will be installed?
%systemdrive%\Program Files (x86)
You need to install a 32-bit application on a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?
%systemdrive%\Program files
Where are fonts stored in windows 7?
%systemroot%\fonts\
Connected Interface
0
Which of the following devices are most susceptible to problems associated with ESD? (select two)
1) Memory 2) Processor
You created a customize image for your base installation of windows 10. The image is created and placed on a windows distribution share. What are the next two steps of the installation process?
1. Booting your desired computer for installing windows 10 into Windows PE 2.copying customized image onto computer
there are two types of firewalls that you can implement, what are they?
1. Router firewall 2. Transparent firewall
What are the two Access List Types?
1. Standard ACL 2. Extended ACL
Which port number is used by SNMP?
161
You are implementing a wireless access point for a small business. To secure the access point, you decide to implement WPA2 using AES to encrypt the data. The access point's configuration interface asks you to specify the AES key size. What key size is the largest valid key size that AES can be configured to use?
256
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
443
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the Internet; but you are unable to perform secure credit card transactions when making purchases from ecommerce websites. Which ports need to be enabled to allow secure transactions?
443
Which of the following specifications identify security that can be added to wireless networks? (Select two.)
802.11i 802.1x
Which of the following best dedscribes a man-in-the-middle attack?
A false server intercepts communications from a client by impersonating the intended server
What is a cookie?
A file saved on your hard drive that tracks Web site preferences and use.
catalog file
A file used by Windows SIM to read the configurable settings and their current status for a WIM image.
Windows To Go
A portable version of Windows 10 that can be created on a USB drive.
Generalization
A process performed by Sysprep to prepare a computer running Windows 10 for imaging. The computer SID, computer name, and hardware information are removed during generalization
Chain of Custody
A record of people who have each used the computer
Live Analysis
A running examination of a computer that has been attacked
User State Migration Tool (USMT)
A set of scriptable command-line utilities that are used to migrate user settings and files from a source computer to a destination computer. USMT is typically used by large organizations during deployments of desktop operating systems.
Distribution share
A share configured through Windows SIM to gold drivers and packages that can be added to Windows 10 during Installation.
RAID 0 (striping)
A stripe set breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously.
IPsec is implemented through two separate protocols. What are these protocols called? select two
AH ESP
Which mobile device architecture is used by Apple iPad devices running the iOS operating system?
ARM
NTFS features over FAT32
Ability to format larger partition sizes in windows, Smaller cluster sizes for more efficient storage with less wasted space, File and folder permissions to control access to files, Encryption to hide the contents of a file, Compression to reduce the amount of space used by files, Disk quotas to restrict the amount of disk space that files saved by a user can use, Volume mount points that allow you to map a disk space on another partition into an existing volume
You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the option you would use in the Settings app to do this.
Accounts- Your accounts, email, sync, work, family
Your computer seems to be running slow. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What should you do?
Add more memory
When would you configure both static and dynamic routing on the same router?
Add routes not learned via the routing protocol.
While browsing the Internet, You notice that your browser displays pop-ups containing advertisements that are related to recent keywords searches you have performed. What is this an example of?
Adware.
Which of the following cleaning compounds should you include in your cleaning kit?
Alcohol-based monitor wipes
System Audit Mode cleanup action
An option in Sysprep that triggers the computer to enter audit mode and run the auditSystem and auditUser configuration passes on reboot.
System Out-of-Box Experience cleanup action
An option in Sysprep that triggers the computer to run the oobeSystem configuration pass and start Windows Welcome on reboot.
Spanning
Another term for JBOD because the volume spans multiple physical disks.
An XML file that contains settings used during the Windows Installation Process.
Answer file.
Entire processes can be automated using.
Answer file.
Which of the following protects a computer from electrostatic discharge?
Anti-static wrist strap
One day while trying to start your Windows 10 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will most likely fix the problem?
Boot into the recovery environment and run the bootrec /rebuildbcd command.
Which of the following statements describe how VLANs affect broadcast traffic within an internetwork?
Broadcast traffic is transmitted only within a VLAN. Devices on the same VLAN have the same subnet address.
While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting.
Buttons
While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.
Buttons
What statements are true regarding administrative shares? (2) a. By default, Windows automatically creates an administrative share for every volume. b. Default administrative shares are accessed by members of the Administrators or Power Users group. c. If you are a member of the Administrators group, the administrative shares are visible when browsing the network. d. To connect to an administrative share, you must use the UNC path
By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path
Where system root is the C: drive, what is the path to the system files that hold user profiles in Windows 10?
C:\Users\username
You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type o document is this?
Chain of custody
a dot matrix printer is printing faintly after replacing the print head. what should you do?
Check the gap between the printer and the paper
You want to configure your Windows 10 workstation such tha tit can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft.
Choose how updates are delivered
You want to configure your Windows 10 workstation such that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft. Click the option you would use in the Settings app to do this.
Choose how updates are delivered
Damages
Computer that contains damages must be 1st priority
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?
Configure the software to automatically download the definition files updates as soon as they become available.
Which of the following prevents access based on website ratings and classifications?
Content filter
Which Windows component lets you modify system parameters stored in the registry using a GUI interface?
Control Panel
Disk Management/DiskPart
Create, format, and manage partitions and volumes
Which firewall implementation creates a buffer network that can be used to host email or web servers?
DMZ
Which network service would you use to get the IP address from the FQDN hostname?
DNS
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?
DNS
What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?
DRM
Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?
Device Manager
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for workrelated purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security?
Disable the switch ports connected to the network jacks in the reception area.
Which of the following routing protocols is classified as a balanced hybrid routing protocol?
EIGRP
What is your top priority when responding to emergencies and hazardous situations?
Ensure the safety of people in the area
You need to boot a windows 7 system into safe mode. Which key should you press during the system boot to access the advanced boot options menu?
F8
You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want the drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?
FAT64
Which of the following is a valid IPv6 address?
FEC0::AB:9007
Piggy Backing
Following a user logging into a server
What is the function of a routing table?
Gives information a set route to a certain workstation.
Save you time and money in troubleshooting problems.
Good documentation will:
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?
Host-based firewall
MORE RAM
How does one reduce high hard drive access statistics?
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
ICMP
Which of the following is the best countermeasure against man-in-the-middle attacks?
IPSec
unmount
If a storage space runs out of disk space, it will immediately _______, leaving any I/O processes vulnerable to data corruption
Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?
If the battery dies during the update, the operating system could become corrupted
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration.
Implement version 3 of SNMP.
You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. You want to install Windows 10 on this system. You need to use the edition of Windows 10 that will use the full 6 GB of available RAM. What should you do?
Install Windows 10 64-bit Enterprise edition.
What is a Routed firewall?
Is also a Layer 3 router, in fact many hardware routers include firewall functionality. (transmitting data through this type of firewall counts as a router hop. A routed firewall usually supports multiple interfaces, each connected to a differed network segment.)
You have ordered a new laptop from an online retailer. When you come home one day after work, you find the laptop in its shipping container on your front doorstep. It is very cold outside, and you don't know how long it has been there. You unpack the computer and would like to know if it is working properly. What should you do?
Let the computer warm to room temperature before turning it on
Which of the following do switches and wireless access points use to control access through the device?
MAC Filtering
Which of the following features on a wireless network allows or rejects client connections based on the hardware address?
MAC address filtering
Which of the following do switches and wireless access points use to control access through the device?
MAC filtering
Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he cant open a specific file on the computer. Which of the following will most likely correct the problem?
Make Manuel the owner of the file
Susan in accounting has left the company and been replaced my Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will most likely correct the problem?
Make Manuel the owner of the file.
What are the most common means of virus distribution?
Malicious web sites. E-mail.
When multiple routes to a destination exist, what is used to select the best possible route?
Metric
Thin Client
Minimum requirements for running Windows locally Optimized to run very basic applications Gigabit speeds or faster for internet (recommended)
By ports?default, traffic from which VLANs are allowed on trunk
Most managed switches are pre-configured to operate in server mode.
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
Move the router to a secure server room.
Which utility lets you customize which files are processes at startup on Windows 7 systems?
Msconfig
Which tool can you use to view (but not modify) hardware and configuration information for your computer?
Msinfo32
What is the least secure place to locate an omnidirectional access point when creating a wireless network?
Near a window
A user called her organization's Help Desk to request help with connecting to a network server. The Help Desk technician came to her desk to resolve the issue. Once there, the technician used the user's telephone to call his girlfriend. The call lasted the entire time the technician was at the user's desk. Did the technician handle the request correctly?
No, the technician should not have used the user's telephone for a personal call
Which of the following components requires special disposal procedures to comply with environmental guidelines?
Notebook battery
After blocking a number of ports to secure your server, you are unable to send email. To allow email service which of the following needs to be done?
Open port 25 to allow SMTP service.
Which of the following components can be updated by the Windows Update service?
Operating system and critical driver files.
Which of the following Denial of Service (DoS) attacks uses ICMP packets and will only be successful if the victim has less bandwidth than the attacker?
Ping Flood
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
Place access points above where most clients are.
What is the main difference between RIP and RIPv2?
RIP is a classful protocol, while RIPv2 is a classless protocol.
You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use?
Rapid PVST+
You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. What else could you do to increase the security of this system?
Remove the optical drive. Disable all USB ports in the BIOS/UEFI firmware configuration.
Three-way mirror
Requires at least five storage devices. The data is written to three storage devices. This option provides redundancy for the data if two storage devices fail at one time.
Which of the following Internet services provides equal upload and download bandwidth?
SDSL
Which protocol uses traps to send notifications from network devices?
SNMP
Drag each IP port number on the left to its associated service on the right. Be aware that some port numbers may be used more than once.
SNMP 161 TCP and UDP SSH 22 TCP and UDP TFTP 69 UDP SCP 22 TCP and UDP Telnet 23 TCP HTTPS 443 TCP and UDP HTTP 80 TCP FTP 20 TCP SMTP 25 TCP POP3 110 TCP
Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?
Spamming.
Which of the following features dynamically places switch ports in blocking or forwarding states?
Spanning tree
HDDs are best stored in a(n):
Static-shielded bag
Data resiliency
Storage spaces can include data resiliency. Choosing an option that provides resiliency requires you to allocate space for redundant information.
Which of the following best describes the purpose of using subnets?
Subnets divide an IP network address into multiple network addresses.
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network.
Which of the following are true for the IS-IS routing protocol?
Supports IPv6 Divides large networks into areas.
Which of the following are true about routed firewalls?
Supports multiple interfaces Counts as a router hop.
System Restore has been enabled for all volumes on a Windows 7 system. Recently, a new network driver was installed on the system. However, the driver code contained bugs and now your network board no longer functions. You are unable to access the Internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed.
System Restore
Which tool lets you automatically start an application or run a script based on triggers?
Task Schduler
What does the /a switch used the copy command indicate? a. That the file can be decrypted before copying b. That symbolic links should be copied along with the file c. That the file is an ASCII text file d. That the file is a binary file
That the file is an ASCII text file
When you try to boot your computer, it hangs after POST. When you access the CMOS setup pprogram, you see that the date is several years behind and the time is set to 12:01am. What is the most likely problem?
The CMOS battery has failed
To help network administrators deploy Windows 10 Microsoft provides.
The Windows 10 Assessment and Deployment Kit (ADK)
Windows ___ contains a number of tools to prepare for developments and automate the deployment process
The Windows 10 Assessment and Deployment Kit (ADK)
Evidence
The act of preserving as much evidence of the incident as possible
specialize configuration pass
The confirmation pass is performed after hardware has been detected. This is the most common configuration pass to apply settings
Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows operating system? (Select two.)
The current time A volume control
Dead Analysis
The examination of a computer that has been turned off
Failed
The failed status shows for a volume that cannot be started, such as when the disk is damaged or the file system is corrupt. Make sure the disk is on, then try reactivating the volume. If that doesn't work, then you likely have data loss.
Which of the following are true regarding the recovery partition on a Windows system?
The recovery partition can be used to restore the system to its original state when it shipped from the manufacturer.
offlineServicing configuration pass
The second configuration pass that is performed after the Windows image had been copied to the local hard drive. This configuration pass applies packages such as security updates, language packed, and device drivers before Windows 10 is started.
Unallocated
The unallocated status shows for portions of a disk that have not been assigned to a partition or a volume.
Which of the following is a characteristic of extended partitions?
They are subdivided into logical drives.
generalize configuration pass
This configuration pass is performed when Sysprep is run to generalized Windows 10.
True of False? If you perform significant hardware changes to your computer, you may be forced to reactivate Windows.
True
True of False? Unattended installations are faster than Attended installations.
True
True or False? Some personalization features are disabled if an Windows installation is not activated.
True
True or False? During an upgrade to Windows 10, profiles are automatically upgraded and settings within the profile are retained.
True.
True
True/False The system restore process reformats the hard drive?
What is trunking?
Trunking occurs when you configure VLAN that span multiple switches.
Match
UC Server -Manages the entire System -Makes presence information available to users UC Gateway -Connects a digital network to an analog network -Connects a UC network to the PSTN UC Hardware Device -An IP phone for making phone calls -Designed to work specifically with the UC server. US Software Device -A smart phone used to access the UC system.
frep
What command inspects files looking for lines that match whatever term you specify?
enter W then press enter
What two actions to do you have to do to save a file?
Insert Mode
What will I go into if i press i, s, or insert?
User files and applications
What will not be saved with Reset Your PC?
Spoofing
When a company or organization pretends to be real
Social Engineering Training
When a company trains its Co workers to observe social engineering
Pharming
When a website tries to be another website to steal info
Why is trunking important to VLAN configuration?
When frames that are sent over a trunk port is tagged with the VLAN ID number so the receiving switch knows which VLAN the frame belongs to.
BIOS
Where is Disc/partition recovery located?
Ultimate
Which is one of the versions of Windows 7 that have Previous Versions available?
What (2) permissions are not available when sharing a folder on a Windows 7 workstation? a. Write b. Modify c. Read/write d. Read
Write Modify
Identify the problem
You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do first in your troubleshooting strategy?
Determine if anything has changed.
You are responsible for managing client workstations for your company. A user reports that he can't send print jobs to us to specific printer. You go to the user's computer and reproduce the problem. What should you do next?
While using a Windows 8.1 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to point in time before the malware infection occurred. Given this information, which of the following are true?
Your user files were not affected when the system was reverted to the restore point. You must reinstall any applications that were installed after the restore point was taken.
Parity
______ requires that you have at least three storage devices. This option uses parity information to reconstruct data if one of the storage devices fails. Parity uses less space for redundancy than the mirror options, but performance is not as good as the mirror options if a device failure occurs. Parity requires only 50 percent more redundancy space than storage space.
your laser printer prints a vertical black line on every page. You change the toner cartidge but the problem does not go away. What is the most likely problem?
a corona wire is dirty
rootkit
a nasty virus that infects theboot of a system, usually cant be removed by antivirus so the system usually has to be reinstalled
proxy server
a network device that allows skipping a firewall and connects to a different network
what is a recovery partition?
a partition created by the computer manufacturer to restore the system to its original state
grayware
a program that may offer a legitimate service but has undesired features that the user may not know about
ran are
a virus that locks a computer and then asks for money to unlock it
Trojan horse
a virus that slips itself into a system unknowingly to the user, usually looks like legitimate software
Bitlocker
a windows feature that allows encrypting of files and drives
a costumer complains tthat a recently purchases plasma montior no longer displays a pcture. ou verify that the monitor is powered on and that the video cable is securly fastened to the DVI video port. Which of thefollowing actions shoul you direct the customer to take next?
adjust the monitors settings using controls on the monitor
What is a transparent firewall?
also called a virtual firewall, operates at Layer 2 and is not seen as a router hop by connected devices. (both the internal and external interfaces on a transparent firewall connect to the same network segment. Because it is not a router, you can easily introduce a transparent firewall into an existing network)
protein activation
alteration after translation; usually cleavage into smaller parts
adressing
assigning adresses to clinets on a proxy Server
which LCD component is used to illuminate a notebook computers display?
backlight
operon
cluster of genes with relate functions, plus a promoter and operator
one corner of the image on a SVGA monitor always has more purple tint than the rest of the image. what is most likel the roblem?
data cable
what does the command "show cdp neighbors detail"?
displays detailed information about neighboring devices including network address, enabled protocols, hold time and software version.
Yo have acompter running windows 7 home premium and need to accesss the contents ofa flash drive. The falsh drive has been formatted with the exFAT file system. Yo uwant to read the flash drive on your computer as quickly as possible with the least amount of effort. what should you do?
do nothing. Windows 7 can natively access exFAT file systems
After removing the printed paper form you laser printer, the toner smudges and can be wiped off in places. which of the following is the most likely problem?
fuser rolllers
You have a custom database application that your company has been using for several years. The application works fine on all of your windows xp systems. You have just purchased a new windows 7 system for one of your sales team members. you make this user a member of the users group on the local system. you install the custom application successfully. When the sales person logs on an tries to run the application, the program splash screen loads but then seems to hang. what should you do first?
grant the user permissions to the directories and files used by the application
botnet
group of zombies
all members of the Sales team use laptop computers while traveling to connect to the internet. Each laptop head a built in wireless network card that supports 802.11b/g/n. You have trained each user to be able to create new wireless connections in order to connect to wireless networks in airports and at hotels. YOu get a call from one user stating that her wireless connection no longer works. She has checked the wireless cards hardware switch is in the on position
have her verify that the wireless cards hardware switch is in the On positino
Firewalls use (ACL's) access control lists, to manage?
incoming or outgoing traffic.
a user reports that he cant browse to a specific web site on the internet. From his computer, you find that a ping test to the web server succeeds. a trace route test shows 17 hops to the destination web server. What is the most likely cause of the problem?
incorrect DNA server address
You have installed a new computer with a quad core 64 bit processor, 6 GB of memory, and a PCI e video card with 512 MB of memory. After installing the operating syste, , you see less than 4 GB of memory showing as avavailbe in Windows. What should you do?
install a 64 bit version of the operating system
You're troubleshooting an older laser printer that is creating "accordion jams" where the paper is crumpled as it exits the printer moving into the output tray. What can you do to fix this problem?
install a maintenance kit
what command, would you use to configure a switch to get its IP address from a DHCP server?
ip address dhcp
Which commands can you use to create a new directory? (select 2)
md mkdir
Which commands can you use to create a new directory? a. md b. newdir c. cd d. rd e. mkdir
md mkdir
non-NTFS EFS
moving a file to a non ntfs file system removes the encryption
publicly accessible resources (servers) are placed inside the?
screened subnet. (web, FTP or email servers)
you have a laser printer that has worked fine until today, now whenever anything is printed, only black pages come out>Which part are you most likely to replace?
transfer corona
repressor
turns transcription off by blocking attachment of RNA polymerase to promoter; coded for by regulatory gene
Each router interface can have up to?
two ACLs for each protocol 1. one for incoming traffic 2. one for outgoing traffic.
How do you see a list of valid switch for the cd command?
type cd /?
...
unavailable DHCP server
Which of the following paper types should you not be used in inkjet printers?
very glossy paper
Whihc of the following paper types should not be used in inkjet printers?
very glossy paper
Your Windows 7 client system are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?
w32tm /tz
Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone.
w32tm /tz
phishing
when a hacker sends and email asking for sensitive information and pretends to be for a worthy cause
In which of the following situations would restoring from a system image be the best option?
you need to restore a windows system after a hard drive failure
in which of the following situation would reverting to system restore point be the best option?
you recently installed a new application and now the system behaves erratically
A customer calls and reports there is a problem with his computer. After responding to the call and troubleshooting the problem, you discover the switch on the power strip was off. After flipping the switch on, all of the components and their functionality return to normal. Which of the following statements is the best explanation for the customer?
"I found this power strip switch in the off position. Now that it is on, it looks like things are in order. It appears as though that was the problem. Can you confirm that the problem has been resolves?"
You need to install a 32-bit application on a 64-bit version of Windows. Where is the default directory where the application will be installed?
%systemdrive%/Progra, Files (x86)
you need to install a 32-bit application on a 32-bit version of Windows. Where is the default directory where the application will be installed?
%systemdrive%\Program Files
Where are fonts stored on a Windows 7 system?
%systemroot%\Fonts\
You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path?
%tmp% C:\Users\username\AppData\Local\Temp
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting an SSID of Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security? (Select two.)
*Change the SSID to something other than the default. *Disable SSID broadcast.
You've just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select two.)
*Configure the WAP to filter out unauthorized MAC addresses. *Use the WAP's configuration utility to reduce the radio signal strength.
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting an SSID of Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security? (Select two.)
*Disable SSID broadcast. *Change the SSID to something other than the default.
Your organization is frequently visited by sales reps. While onsite, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. What should you do? (Select two.)
*Implement static IP addressing. *Implement MAC address filtering.
A user is trying to log into windows on her notebook computer. She enters the correct password for her user account, but the system wont let her authenticate, claiming the wrong passwork has been entered. Whats causing the problem?
she has turned Num lock on causing numbers to be sent from the keyboard instead of letters
The network board in a workstation is currently configured as follows: -Network speed = Auto -Duplexing = Auto The workstation is experiencing poor network performance and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the configuration of the switch port that the workstation is connected to. Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings?
show running-config interface show interface
After arriving early this morning, you turn on your computer to begin your work. Instanty, you see smoke and smell a strange odor coming form the computer. what should you do?
shut off the sysytem immediantly
What two implementations are available for SaaS?
simple multi-tenancy where clients have their own resources that are segregated from other customers fine grain multi-tenancy where resources are shared but the data is segregated from other customers
Which of the following best describes the use of libraries in windows 7?
special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.
why are gene regulations important in eukaryotic cells
specialization
Which of the following conditions would typically result in replacing the drum on a laser printer?
spots as regular intervals on the page
which of the following conditions would typically rsult in replacing the drum on laser printer?
spots at regular intervals on the page
You are logged in as a user with limited system privileges. You are the Linux system administrator and you have the password to the root user account. When you need to switch to root user to perform administrative tasks, what command would enter at the command prompt? Tip: The command must switch to the home directory and environment variables assigned to the root user. (typed)
su -
What command do you use to configure the default gateway?
switch(config)#ip default-gateway IP_address
You're troublshooting a malfunctioning notebook computer system. The user has indicated that screen is always dark and difficult to reach even while the system is plugged into a wall outlet. You checked the system and determined that the backlight isnt working. Which of the following could be the cause?
the LCD cutoff switch is stuck in the off position
When you try to read a particular DVD r disc that was burned in a different computer, you recieve an error message, other DVD discs work fine in your drive. Which o f the following are the most likely problems?
the disc is dirty or scratched
while troubleshooting a network issue, you successfully ping the 127.0.0.1 IP address, Which of the following is true?
the tcp/ip protocol suite is working correctly on the local computer.
automatic updates
these help getting most recent security updates to protect against viruses
While troubleshooting a problem on a Linux system, you run a utility that generates the following output: Whic of the following utilities were you using?
traceroute
Examine the following output:
tracert
You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 200 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?
tracert
2. Packet filters on the outer firewall allow?
traffic directed to the public resources inside the DMZ. (Packet filters on the inner firewall prevent unauthorized traffic from reaching the private network)
5. Typically, firewalls allow?
traffic originating in the secured internal network into the DMZ and through to the Internet. (traffic that originates in the DMZ or the Internet should not be allowed to access the intranet.)
adware
type of spyware that watches what you are interested in and then displays ads about those things
You administer a etwork with windows and linux servers, and windows 7 clients. A USER CLASS AND INDICATED THAT HE IS UNABLE to access resources on the network. You type ipconfig on the users computer and recive the following output: --- You check your NIC and see the link light on. What might the problem be?
unavailable DHCP server
Which of the following should you do if you cannot turn a laptop off?
unplug the AC power an remove the battery
spam
unwanted emails or messages
You rmotherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4GB modules and boooting your system, you find that windows only recognizes 2.5 GB of RAM. What should you do?
upgrade to a 64 bit version of windows
You have a desktop computer that uses a 20 watt power supply. You recently added a disk RAID 10 array to the system and now it spontanously shuts down. What should you do?
upgrade to a power supply trhat provdes more watts.
Upgrade the disk interface
upgrading your disk interface will greatly improve the throughput of data to and from your hard disk drive.
You're conducting scheduled maintenance on a laser printer. you notice that there is a buildup of excess toner inside the interior of the printer. which of the following is the proper way to remove it?
use an antistatic vaccum
you're conducting scheduled maintenance on a laser printer. You notice that ther is a buildup of excess toner inside the interior of the printer. Which of the following is the proper way to remove it?
use an antistatic vaccum
you have a complier that complies applications used in your business. You want to make sure that the compiler continues to run in the background., even if you open other applications. How can you adjust the amount of attention given to that application?
use task manager to modify the process priority
A user in sales cannot get his laptop to display through a project. He seems the screen output on the built in LCD display.but the video is not being on he projector. What should you do first?
use the FN key to redirect to the external video port
for the past several days the print jobs from the inkjet printer are missing colors and leaving gaps. What should you do to resolve the problem?
use the automatic cleaning feature
How can you keep a windows 7 system form restarting after a critical system error occurs?
use the disable automatic restart on system failure option on the advanced boot menu
lac operon
used by e. coli in the presence of lactose to make the enzyme (proteins) necessary to metabolize lactose
RSA encryption
uses public key and private key authentication instead of a password
Encryption
using a password to effectively jumbled up the data to where its garabage without that password
A USER has called to complain that her computer wont boot. It stops at the bios startup screen right after the memory has been tested and displays a 301 keyboard error. What should you do first?
verify that no keys are being pressed down during POST
You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You pen ports 80, 25, 110 and 143. What applications are most likely to be hosted on the server?
web server, email server
Shoulder Surfing
when someone watches the screen of another user to find personal information
promotor
where RNA polymerase attaches and begins transcription
ACLs describe the traffic type that?
will be controlled
Which operating system does not use C:\Windows as the default location for system files?
windows 2000
Which windows version(s) use libraries to logically group files?
windows 7
you remove a SATA hard disk from a awindows 7 computer and put it in a system running windows 98. You are unable to read the dis; What is the most likely the porblem?
windows 98 does not support NTFS
Which of the following operating systems uses C:\Users\username as the default directory for user files? (select 2)
windows vista windows 7
You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. later, you use the printer properties on your computer to print a test page. instead of a normal test page, you recieve several pages with garbled characters on them. what is the most likely cause of the problem?
wrong print driver
Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)?
xcopy /e
Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)? a. copy /v b. xcopy /e c. copy /n d. xcopy /s
xcopy /e
Which command would you use to copy all files in the directory. including all subdirectories (as well as empty ones)?
xcopy /e
you are trying to access your office network with your winodws workstation form home using your organizations virtual private network. Your DSl moden has connected to your isp, but you cant connect to your office network. You issue the ipconfig command from the command prompt and learn that you system has ben assigned an ip address of 169.254.1.12 whats causing the problem?
you isp's DHCP server isnt working properly
in which of the following sitaions would driver rollback be the best tool to use?
you recently installed a new video driver and now the system behaves erractically
You're trying to access your office network with your Windows workstation from home using your organizations's virtual private network. Your DSL modem has connected to your ISP, but you cant connect to your office network. You issue the ipconfig command prompt and learn that your system has been assigned an ip address of 169.254. 1.12 Whats causing the problem?
your ISP's DHCP server isnt working properly
...
your ISP's DNS server is down
your....
your isp's DNS server is down
You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?
yum install httpd
You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the Internet repositories configured on this system?
yum list available
You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system?
yum list available
You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if httpd package, the Apache HTTP Server package, is installed?
yum list installed httpd
You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?
yum list installed httpd
you have a small wireless network that uses multiple access points. the network uses WPA and borad casts the SSID WPS2....
- TKIP ecryption - Preshared key
Which of the following identify the key difference between a worm and a virus? select two
- a virus relies on a host for replication - worms independently replicate themselves
One day while trying to start you windows xp computer, the system displays the following error: windows could not start because the following file is missing or corrupt: windows\system32ntoskml.exe. Please reinstall a copy of the above file. The problem occurs immediately after the operating system loading message. You are unable to boot into dafe mode. Which of the following will most likely fix the problem? select two
- boot into the recovery console and run bootcfg/rebuild - boot into the recovery console and perform an automatic operating system scan and repair
Which of the following are likely symptoms of malware infection? select two
- changed file permissions - renamed system files
Lately your computer is spontaneously shutting down only after a few minutes of use. What s the most likely cause? slect two
- coo,ing fans clogged with dust or overheated CPU
Which techinque are used in pharming attack toredirect legitimate web traffic to malicious web sites? slect two
- exploiting DHCP servers to deliver the IP address of poisoned DNS servers - changing the hosts files of a users computer
You have a small wireless network with less than 50 client computers. You upgraded the hardware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. Your need the greatest amount of security with e lest amount of effort, and withouth replacing any of the wireless infastrucure. What should you do? select two
- implement WPA2-AEs - configure each client with the same key
You are in the process of configuring a new computer.The motherboard has six memory slots and supports triple channel memory. You install two memory modules. When you boot the computer, thye bios recognizes both modules, but the memory only runs in dual channel mode. What should you do? select two
- install a third, identical memory module - move the modules to the correct motherboard slots
you have just finished install a new SATA hard disk in your computer. Now you SATA DVD drive work. What should you do first? select two
- make sure that the dvd power cable is connected - make sure that the dvd SATA cable is connected
which of the following tools can you use to start the print spooler service if i is currently stopped? select two
- net start - services console
you are troublshooting network connections on a windows workstation and you want to view a list of connections on the compuer. HOw can you do this? select two
- on the start menu, click control panel, then click network and internet - on the star menu, right click network, and select properties
To test a power supply, you want to use a mulitmeter to measure the voltage on a molex hard disk drive connector. To do this, you need to turn the power supply on. Which pins on the 24 pin motherboard connector coming from the power supply can be shunted to turn the power supply on? select two
- pins 15 & 16 - Pins 16- &17
you hae added a new 1 Tb hard disk to a windows computer. the disk is condfigured as a basic disk. Which of the following can be configured on this disk? select tw
- primary partitions - extended partititions with logical drives
while browsing the internet, the internet explorer browser window hangs an stops responding. Which task mananger tab would you use to end internet explorer? select two
- processes and applications
while browsing the internet, a popup browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to scan for and remove the virus. What should you do? select two
- run a full system scan using the antivirus software installed on your system - update the virus definitions for your locally installed anti virus software
You have a windows 7 computer that was recently upgraded from windows xp. An installed application worked fine in Windows xp. but now it does not run in Windows 7. Y ouhave checked the application vendor's web site but there is no update available. That should you try to run the application? select two
- run the application in compatibility mode - run the application in XP mode
you lobby receptionist uses a laptop computer her day to day tasks. you are concerned about the security of her system. What should you do? select two
- secure the laptop to the desk using a cable lock - configure the laptop with a biometric fingerprint scanner
You have connected a two drives to the primary IDE interface in a pc system. How could the drives be configured? select two
- set one driver to master and the other to Slave or Set both drives to cable select
You recently upgraded a clients older workstations from winodws xp to windows 7. The client has called to complain that the new interface is very slow. for exanple, after clicking on the start vbutton, the start menu slowly appears on the screen. How can you fix this problem? select two
- set the visual effects for best performance - upgrade the video board installed in the system
you're troubleshooting a malfunction notebook ccomputer system. the user has indicated that the screen suddenly became dark and difficult to read while h was downloading a large file through his wireless network card while the system was plugged in at his desk. You;ve checked the system and determined that the backlight has stopped working.
- the cold cathode fluorescent lamp has burned out andneeds to be replaced - the inventor in theLCD assembly has malfunctioned
you're troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. When you connect an external monitor to the system, the Windows desktop is displayed properly on the monitor. What could be causing this problem? select two
- the display output has been redirected to the external montiro port using the FN key - the LCD assembly is malfunctioning
when you use the degauss feature on a CRT monitor? select two
- the monitor displays strange colors - the monitor displays distorted images
youre attempting to diagnose a problem with a notebook computer. The user reports that it displayed a message indicating that the battery was low, then it shut down by itself even though it was plugged into a wall output. You've checked the AC adapter and found that the LED light is lit when plugged into a wall outlet. What should you check next? select two
- verify that the AC adapter produces the correct DV voltage for the notebook computer - verify that the power LED on the notebook computer is lit when plugged into the wall outlet.
in which of the following situations would restoring from a backup be the best option? select two
- you accidently deleted several important emails from outlook and need to restore them - you need to restore several word processing files that were accidently deleted from my documents
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall?
-110 -25
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: * They use an 802.11n wireless network * The wireless network is broadcasting an SSID of Linksys * The wireless network uses WPA2 with AES security * Directional access points are positioned around the periphery of the building Based on this information, what should you recommend you client do to increase their wireless network security?
-Disable SSID broadcast -Change the SSID to something other than the default
Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. What should you do? (select two)
-Implement static IP addressing -Implement MAC address filtering
Match the operating system attribute on the left to the correct description on the right. Ability to use multiple processing devices. Ability to run multiple applications simultaneously. Ability to run multiple parts of an application simultaneously.
-Multiprocessing -Multitasking -Multithreading
You're just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network?
-Use the WAP's configuration utility to reduce the radio signal strength -Configure the WAP to filter out unauthorized MAC addresses
You have just finised upgrading the CPU in your desktop system. After running the system for about 15 minutes, the system spontaneously shuts down. What should you do first to troubleshoot the problem? select two
-check the thermal shutdown threshold in the bios - check the CPU fan power
You are troubleshooting a network communication problem to the www.widgets.com server. Which of the folowing will give you the ip address of that server? select two
-nslookup www. widgets.com - ping www.widgets.com
Which of the following file extension types can be run from the command prompt? (select 3)
.bat .exe .com
Which of the following files extension types can be run from the command prompt?
.com .bat .exe
Which of the following file extensions indicate a program file type? (select 2)
.com .exe
Which extension types can be run from the command prompt? (3) a. .com b. .exe c. .sys d. .dll e. .bat
.com .exe .bat
Which file extensions indicate a program file type? (2) a. .jpg b. .mp3 c. .vxd d. .com e. .exe
.com .exe
Which of the following file extensions indicated a Windows system file?
.dll .vxd
Which of the following file extensions indicates a windows system file? (select 2)
.dll .vxd
Which of the following extensions identifies a packaged for use by windows installer?
.msi
Which of the following extensions identifies a program packaged for use by Windows Installer? a. .bat b. .msi c. .exe d. .dll e. .pkg
.msi
Which file extensions indicates a Windows system file? (2) a. .vxd b. .dll c. .rtf d. .com
.vxd .dll
Create a configuration file by using the ___________ option.
/genconfig option.
Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?
/v
Which option used with the copy command makes sure that all copied files are written correctly after thy have been copied? a. /y b. /a c. /n d. /v
/v
You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?
/y
You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use? a. /a b. /v c. /o d. /y
/y
Static Route
1
Match the Windows version on the left with the appropriate system requirements or features on the right. Each Windows version may be used only once.
1 GHz processor (support for PAE, NX, and SSE2 not required) - Windows 7 800 MHz processor - Windows Vista Metro design interface - Windows 8/8.1 2 GB RAM for a 64-bit system - Windows 10
At what percent is packet loss noticeable in voice traffic?
1%
To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (select two)
1) Anti-static mat 2) Metal area on the computer case
Which of the following should be handled with caution due to high operating temperatures? (select two)
1) Components within a laser printer 2) Printing head in a dot matrix printer
Which of the following are common tools used to physically clean the inside of a computer? (select two)
1) Compressed air 2) Natural bristle brush
Besides protecting a computer from under voltages, a typical UPS also performs which other actions? (select two)
1) Conditions the power signal 2) Protects from over voltages
As a PC technician, what are the best actions to take if you are late to an appointment? (select all that apply)
1) Contact the customer 2) Apologize for the inconvenience 3) Give a realistic timeframe for your arrival
You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (select two)
1) Enable the Erase Data option 2) Disable the Simple Passcode Option
Which of the following are safe methods of listing heavy objects? (select two)
1) Lift with your legs 2) Bend your knees with your back straight
Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit? (select two)
1) Non-static generating 2) A vacuum cleaner that blows as well as vacuums
Which of the following will help reduce the threat of static discharge when working on computer hardware? (select two)
1) Remain in physical contact with the server chassis at all times 2) Store unused components in static-shielded bags
Drag the computer function on the left with its associated hardware component on the right. (Each option can be used more than once.) Hard disk Printer Keyboard CPU Speakers RAM DVD-RW Microphone
1) Storage 2) Output 3) Input 4) Processing 5) Output 6) Processing 7) Storage 8) Input
You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 7 PC to the device. How can you connect the device to the PC? (select two)
1) USB cable 2) Wi-Fi wireless connection
Which of the following is most helpful in keeping a computer cool? (select two)
1) Vacuum dust from the system regularly 2) Verify that cooling fans are not circulating air in the wrong directions
What are the following ways you can configure DMZ?
1. Configure two firewall devices; one connected to the public network and one connected to the private network. 2. Configure a single device, with three network cards at; one connected to the public network, one connected to the private network, one connected to the screened subnet. 3. Configure a single device with two network cards; one connected to the public network and another connected to a private subnet containing hosts that are accessible from the private network.(configure proxy ARP so the public interface of the firewall device responds to ARP requests for the public IP address of the device.
Extended ACL's can filter?
1. Source IP protocol (IP/TCP/UDP) 2. Source hostnames or host IP address 3. Source or destination socket number 4. Destination hostname or host IP address 5. Precedence or TOS values
to configure the switch IP address, what are the following commands used to configure the switch IP address?
1. switch#config terminal 2. switch(config)#interface vlan 1 3. switch(config-if)#ip address IP_address subnet_mask 4. switch(config-if)#no shutdown
Which of the following paths opens the Computer Management Tool? (2)
1.) On the start menu, right click on computer and select Manage 2.) In the control panel, open Administrative Tools, then double click on the computer management icon
You need to protect the user data on a Windows 7 system. Which tools could you use to do this? (Select two)
1.)Backup and Restore 2.)Previous Versions
Which of the following is true of online software activation? (Select three)
1.)Before running a newly installed application, the user must activate their license online on the software vendor's website. 2.)With personal software licenses, the limit is usually 1-3 online activation. 3.)Persistent activation may require the license to be continuously re-activated online at a pre-configured interval.
You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select two.)
1.)Configure the application to automatically download and install updates as they are released. 2.)Check the DataComLink Website regularly for patches and updates to the software.
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 7. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. What should you try next to run the application? (Select two)
1.)Create a virtual computer that runs Windows XP. Run the virtual computer each time the application runs. 2.)Run the application in compatibility mode.
You need to protect the user data on a Windows 10 system. Which tools could you use to do this? (Select two)
1.)File History 2.)Backup and Restore
You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select two.)
1.)In the Control Panel, select System and Security, then Security and Maintenance. 2.)In the Control Panel, select User Accounts, then User Accounts.
Which aspects of virtual memory can you configure on a Windows workstation? (Select two.)
1.)Maximum size of the paging file 2.)Location of the paging file
You manage a Windows 7 system. You want to view info about your computer including the CPU utilization percentage and information about disk read operations. Which tools could you use to do this? (2)
1.)Performance Monitor 2.)Task Manager
You manage a Windows system, You want to view information about your computer including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select two.)
1.)Performance Monitor 2.)Task Manager
While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)
1.)Processes 2.)Details
What is the purpose of the Microsoft Management Console? (2)
1.)Provide a shell for running snap-ins 2.)Provide a common user interface for performing administration tasks
A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select two.)
1.)Remote Desktop Users 2.)Administrators
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 10. You have checked the application vendor's website, but there is no update available. What should you try next to run the application? (Select two.)
1.)Run the application in compatibility mode. 2.) Create a virtual machine that runs an older version of Windows. Run the application within the virtual machine.
You have configured your windows system to automatically backup user data every night at midnight. You also take a system image backup once a month. What else should you do to ensure that you are protected against data loss? (Select two)
1.)Store a copy of all backups off-site. 2.)Regularly test restoration procedures.
Which of the following tools can you use to start the Print Spooler service if it is currently stopped? (Select three.)
1.)Task Manager 2.)Services console 3.)Net start
Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select two)
1.)They are moving away from DRM because of several key shortcomings in the technology. 2.)They are adopting alternatives to DRM such as encouraged customers to not illegally share digital files.
Your computer seems to be running slow. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two)
1.)Use Resource Monitor to monitor memory utilization. 2.)Use Task Manager to monitor memory utilization.
In which of the following situations would restoring from backup be the best option? (Select two.)
1.)You accidentally deleted several important e-mails and need to restore them. 2.)You need to restore several word processing files that were accidentally deleted from your Documents folder.
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a "paper license" and a single key for updating 10 users. Since this is an enterprise paper license there is no mechanism that enforces a limit to the number of times the key can be used so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select two)
1.)You risk losing your job. 2.) You expose your company to litigation by violating the software license agreement.
Your Windows 7 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this? (Select two.)
1.)w32tm /query /source. 2.) w32tm /query /status.
In Extended ACL use the following number ranges
100-199 2000-2699
OSPF
110
RIP
120
you have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. THe default gateway address is 192.168.1.254. and the router is proiding DHCP on the network. The 2 computer has been assigned the ip address of 192.168.1.55. which o f the foloowing is considered the loopback address for the 2 computer?
127.0.0.1
you have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The 2 computer has been assigned the ip address of 192.168.1.55 which of the following is considered the loopback address for the 2 computer?
127.0.0.1
You want to close all ports associated with NetBIOS on your network firewalls to prevent attacks directed against NetBIOS. Which ports should you close?
135, 137139
Which of the following are valid IPv6 addresses? Select all that apply.
141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552
Which of the following IP addresses is a valid IP address for a host on a public network?
142.15.6.1
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
169.254.0.0 - 169.254.255.255
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
169.254.0.1 - 169.254.255.254
Given that your windows workstation has automatic private ip addressing implemented using default settings, which of the following TCP/ IP addresses could be automatically assigned to the sstem should your DHCP server go down or become inaccessible?
169.254.1.26
given that your winodws workstation has autmoative private ip addressing implemented using default setting, which of the following TCP/ IP adreesses could be automatically assigned to the system should your DHCP server go down or become inaccessible?
169.254.1.26
EIGRP External Route
170
You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.)
172.17.128.0 172.17.0.0
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer?
172.18.188.67 10.0.12.15 192.168.12.253
You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?
2
Which of the following ports does FTP use to establish sessions and manage traffic?
20, 21
To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select two.)
21 20
To access your company's internet network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible? Which port needs to remain open so you can still work from home?
22
To access your company's internal network from home, you have used Telnet. Security policy now prohibits the use of unsecure protocols such as Telnet. The administrator has recently implemented a firewall at the network perimeter and disabled many ports. Which port needs to be closed to prevent Telnet access from home?
23
Which port does Telnet use?
23
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select two.)
25 110
You are implementing a wireless access point for a small business. To secure the access point, you decide to implement WPA2 using AES to encrypt the data. The access point's configuration interface asks you to specify the AES key size. The business owner needs the access point to be as secure as possible. Which key size is the largest valid key size that AES can be configured to use?
256
Which of the following cellular network types does NOT provide Internet connectivity?
2G
Drag the cellular network specification on the left to its corresponding mobile technology generation on the right
2G - GSM CDMA 3G - LTE HSPA+ 4G - WiMAX
Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.)
32 numbers, grouped using colons Hexadecimal numbers
Which port must be opened in a firewall of a Windows system in order Remote Desktop connections to be established with it?
3389
Which port must be opened in the firewall of a Windows system in order Remote Desktop connections to be established with it?
3389
You have been asked to implement a RAID 10 solution for a video editor's desktop workstation. What is the minimum number of hard disks than can be used to configure RAID 10?
4
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
443
You are configuring PuTTY to be used to access the CLI of a Cisco switch. Which of the following configuration values would prevent PuTTY form connecting?
4600 baud Flow control = RTS/CTS
EIGRP Summary Route
5
You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
53
Home or Small Office Server
64-bit multi-core CPU minimum Fast network adapter. Gigabit speeds or faster (recommended) Storage that provides both speed and redundancy. RAID 5, RAID 1+0, or RAID 0+1 Recommended amount of RAM in triple- or quad-channel mode
Gaming System
64-bit multi-core CPU minimum High-end cooling solution to dissipate heat High-end video adapter with GPU High-end audio adapter with surround-sound speaker system
You have been tasked with designing a workstation that will run VMware Workstation virtualization software. It will be used by a software engineer to run virtual machines for application development and testing. Which criteria should be included in your design for this system?
64-bit processor with 8 cores RAM configured to run in a quad-channel mode
...
802.11n
You have been contacted by OsCorp to recommend a wireless internet solution. The wireless stragegy must support a transmission range of 150 feet, use a frequency range of 2.4 Ghz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?
802.11n
which wireless standard has the highest data transfer rates
802.11n
you are designing a wireless network or a client. your client needs the network to support a data rate of at least 54 mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 Ghz. Which 802.11 standards will work best in this situation? select two
802.11n 802.11a
Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?
::1
RAID 10 (stripe of mirrors)
A RAID 10 volume stripes data across mirrored pairs and across multiple disks with parity for data redundancy
RAID 5 (striping with distributed parity)
A RAID 5 volume combines disk striping across multiple disks with parity for data redundancy
What protocol does a Cisco switch use to automatically detect trunk ports?
A Trunking protocol
Bad Sector
A ___ ______ is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any used bad sectors are redirected to another sector.
cross-linked file
A _____ _______ ____ occurs when two files claim the same cluster. Check disk will identify cross-linked files and correct their cluster associations.
Select the statement that best describes a broadcast storm.
A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.
image
A collection of files captured using DISM and stored in an image file
Application Compatibility Toolkit (ACT)
A collection of tools to identify and resolve app compatibility issues and help organizations to run legacy software. it is included in the Windows 10 ADK.
Windows 10 assessment and Deployment Kit (ADK)
A collection of utilities and documentation for automating the deployment of Windows 10
Deployment Image Servicing and Management (DISM)
A command-line tool that can be used to service Windows 10 images offline or online and perform imaging operations.
Directory
A container in a volume that holds files or other directories. It is used to logically sort and organize data to keep related files grouped together. Most operating systems use a hierarchical filing structure
image file
A file that store one or more images (typically operating system installations) The size of an image file is minimized through the use of single-instance storage when a file exists in multiple images.
Windows Imaging Format (WIM)
A file-based image format developed by Microsoft to store multiple images in a single file.
Foreign
A foreign disk is a dynamic disk that was created in one system and moved to another system. When you first add the disk to a different system, the partition information for the disk must be updated to reflect all dynamic disks in the current system. Import the disk to make it available in the new system.
Phishing
A hoax website to gain personal information
Windows PE
A limited version of Windows that can be used to perform recovery tasks and install Windows 10.
Hardware Abstraction Layer (HAL)
A low-level system driver in Windows 10 that controls communication between Windows 10 and the computer hardware
RAID 1 (mirroring)
A mirrored volume stores data to two duplicate disks simultaneously.
Universal Naming Convention (UNC)
A naming system used by windows computers to locate network file shares and network printers. The format is \\servername\sharename.
provisioning
A new configuration process for Windows 10 that modifies the configuration of an already installed Windows 10 operating system to match corporate standards. Windows ICD creates provisioning packages that perform that configuration.
File
A one-dimensional stream of bits treated as a logical unit. They are the most basic component that a file system uses to organize raw bits on the storage device itself. The file name is made up of the directory path plus the file name. An extension can also be added to the filename to identify the file type and program used to create, view and modify the file.
Product activation
A process put in place by Microsoft to reduce piracy. Unique information about your computer is sent to Microsoft to ensure that the package of windows 10 purchased is installed on only a single computer.
Volume
A single accessible storage area within a file system. A volume can encompass a single partition or span across multiple partitions depending on how it is configured and what operating system you are using. Identified by drive letters
Which of the following are true of Libraries?
A single folder can be added to multiple Libraries. Each Library can contain multiple folders from different files system locations.
Which of the following are true of libraries in windows 7? (select 2)
A single folder can be added to multiple libraries. Each library can contain multiple folders from different file system locations.
What are the differences between a virtual machine and a virtual hard disk?
A software implementation of a computer that executes programs like a physical machine, and a virtual hard disk is a file created within the host operating system that simulates a hard disk for the virtual machine
What is the function of the hypervisor?
A thin layer of software that resides between the virtual operating system(s) and the hardware, it allows virtual machines to interact with the hardware without going through the hosting operating system
Volume Activation Management Tool (VAMT)
A tool that can be installed to provide volume activation with KMS activation keys used with volume licensing. It is equivalent to the Volume Activation Service in Windows Server 2012 R2 and Windows Server 2016.
Educate the user as to how the problem was resolved and verify that they are satisfied with the results.
A user sends a print job to a network printer and it prints page after page of random characters. He calls the help desk and a technician discovers that somehow the wrong printer driver had been loaded on the users workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. What else should she do?
Windows System Image Manager (SIM)
A utility that is used to create answer files for Windows 10 unattended installations. Windows SIM can also create distribution shares and configuration sets.
Windows Imaging Configuration Designer (ICD)
A utility that is used to create provisioning packages for Windows 10. Windows ICD can also create bootable media that includes a Windows 10 installation image and a provisioning package.
Consider the external ports for a typical PC system (pictured below). Drag the port type on the left to the letter on the right that best identifies it. (Each type can be used once.) A-J
A) HDMI b) Thunderbolt c) IEE 1394 d) USB e)VGA f) DVI g) RJ45 h) RJ11 i_Figer S/PDIF j) Audio Jack
You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the swap file? A. On the system partition B. Split the file between two hard disks C. On a USB flash device D. On a drive other than where the operating system files are stored
A. On the system partition Explanation: You must place the swap file on the system partition if you want the system to be able to create a memory dump file when it.
A SYN attack or a SYN flood exploits or alters which element of the TCP three-way handshake?
ACK
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?
ACL
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)
AES encryption 802.1x
IPSec is implemented through two separate protocols. What are these protocols called?
AH and ESP
Which of the following attacks tried to associate an incorrect MAC address with a known IP address?
ARP Poisoning
A router is configured with the login, no password condition for console access. Which of the following statements is true about access via a Telnet or SSH session?
Access is denied.
You recently installed a Windows 10 System. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to being using an online Microsoft account to authenticate to the system instead. Click the option you would use in the Settings app t do this
Accounts
You recently installed a Windows 10 system. During the installation process, you elected to sign in to the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead.
Accounts
Which option in Control Panel is used to review your Windows 7 computer's status and resolve issues?
Action Center
Which partition type identifies the partition as one that holds the book loader program used to start the operating system?
Active
If you want to boot from a hard drive, what must it have?
Active partition
Your Cisco router has three network interfaces configured: -S0/1/0 is a WAN interface that is connected to an ISP. -F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. -F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.2.0/24. You have configured an access control list on this router using the following rules: -deny IP 192.168.1.0 0.0.0.255 any -deny IP 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?
Add a permit statement to the bottom of the access list.
you want to uprade your Windows 7 Professional computer wot Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10. What should you do?
Add more memory
Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?
Add paging files to the E: and F: volumes
Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 BG of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?
Add paging files to the E: and F: volumes.
What information is contained in a routing table?
Address of known network, timeout value, next hop router, and cost value.
What does the following command do? attrib +s +r -a myfile.dll
Adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll
What does the following command do? attrib +s +r -a myfile.dll
Adds the system file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll.
What does attrib +s +r -a myfile.dll do? a. Adds the system file attribute, adds the write-only attribute, and removes the archive attribute to the file b. Removes the System file attribute, removes the read-only attribute, and adds the archive attribute to the file c. Adds the system file attribute, removes the read-only attribute, and removes the archive attribute to the file d. Adds the system file attribute, adds the read-only attribute, and removes the archive attribute to the file
Adds the system file attribute, adds the read-only attribute, and removes the archive attribute to the file
You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?
Administators
You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?
Administrators
A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of enable this configuration?
Administrators Remote Desktop Users
You need to configure File History to automatically delete any stored snapshots that are older than 1 month. click the option you would use in Control Panel to do this.
Advanced Settings
Which tool would you use to configure the paging file location and size on a Windows system?
Advanced System Settings in Control Panel.
Which tool would you use to configure the paging file location and size on a Windows system?
Advanced System settings in Control Panel
You need to configure File History to automatically delete any stored snapshots that are older than 1 month. Click the option you would use in Control Panel to do this.
Advanced settings
What is the name of the set of features that improves the visual appearance of Windows? These features include, but are not limited to, the following: • Glass effects • Window animations • Flip 3D • Snap • Shake
Aero
Graphics design or CAD/CAM WS
Affordable and powerful CPU 64-bit multi-core CPU minimum High-end video adapter with extensive amounts of RAM. Maximum amount of RAM supported by the motherboard.
Audio/Video Editing WS
Affordable and powerful CPU High-end video adapter with extensive amounts of RAM. High-end audio adapter with speakers Very large and vary fast hard disk drive
Needs Analysis : Documentation
After talking with the stakeholders involved, write down everything that you learned. Finalize analysis with stakeholders, this ensures that all parties know what the scope of the project is.
Which security practice is an example of the Principle of Least Privilege?
All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.
What permissions do member of the Users group have to these two files in the C:\PublicReports folder?
Allow Full Control to both
You computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports -Copy Costs.doc from C:\Confidential to C:\PublicReports What permissions do members of the Users group have to these two files in the C:\PublicReports folder?
Allow Full Control to both
You manage two folders in your computer as follows: -C:\Confidential -C:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permissions to the User groups: -Reports.doc -Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports foler?
Allow Full Control to both
You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the the properties for the following two files and assign the Deny Read permission to the user group: Reports.doc Costs.doc The D:\ drive allows the Full Control permission to the User group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports What permissions do members of the Users group have to these two files in the D:\PublicReports folder?
Allow full control on both.
What permissions do member of the Users group have to these two files in the C:\PublicReports folder?
Allow full control to both
Remote Assistance
Allows a person needing help with their computer to request help from another user.
Remote Desktop
Allows you to access the your computer from a remote location over a network connection. Uses TCP port 3389.
Remote Host
Also known as a Server, this device is left running in a state ready to accept a connection.
Which of the following best describes the ping of death?
An ICMP packet that is larger than 65,536 bytes
answer file
An XML file used during an unattended setup to provide configuration to Setup.exe Windows 10 answer files are created by using Windows(SIM).
Which of the following describes how access lists can be used to improve network security?
An access list of filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
unattended.xml
An answer file that is automatically searched for during the generalize, auditSystem, auditUser, and oobeSystem configuration passes.
autounattend.xml
An answer file that is automatically searched for during the windowsPE, offlineServicing, and specialized configuration passes.
Image-based installation
An image-based installation uses DISM to apply an image of an operating system onto a computer. The image can include applications as well as the operating system.
DVD boot installation
An installation of Windows 10 that is started by booting from DVD to run Setup.exe
distribution share installation
An installation of Windows 10 that is started by running Setup.exe over the network from a distribution share.
Unattended Installation
An installation that does not require any user input because all necessary configuration information is provided by an answer file.
clean installation
An installation that is performed on a new computer, or does not retain the user settings or applications of an existing computer.
upgrade installation
An installation that migrates all of the settings from a preexisting Windows operating system to Windows 10.
attended installion
An installation when a network administer must be present to answer configuration questions presented during Windows 10 installation.
Offline updates
An offline update is applied to Windows 10 during installation before Windows 10 is started. The packages used for offline updates are supplied by Microsoft.
offline update
An offline update is applied to Windows 10 during installation before windows 10 is started. The packages used for offline updates are supplied by Microsoft.
A company executive has just ought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select two)
App reviews and rating will help you choose an effective anti-virus app Anti-virus apps are available for purchase from Android app stores
Helps organizations quickly identify which applications are compatible with Windows 10.
Application Compatibility Tool Kit.
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
Application-level
Match the applicationaware network device on the right with the appropriate description on the left. Each description may be used once, more than once, or not at all.
Applicationaware proxy Improves application performance Applicationaware firewall Enforces security rules based on the application that is generating network traffic, instead of the traditional port and protocol Applicationaware IDS Analyzes network packets to detect malicious payloads targeted at applicationlayer services
What file attribute identifies the file as having been modified since the last backup? a. Encrypted b. Read only c. Hidden d. Archive
Archive
This Windows 10 Installation type minimizes user involvement during installation.
Attended Installation (Type)
This Windows 10 installation type you need to manually start and perform
Attended Installation (Type)
With this Windows 10 Installation Type the user only has to enter information at the very begging and the very end of installation.
Attended Installation (Type)
You start this Windows 10 installation type by running Setup.exe
Attended Installation (Type)
What are the most common network traffic packets captured and used in a replay attack?
Authentication
Which of the following features is supplied by WPA2 on a wireless network? (Select two.)
Authentication Encryption
Which of the following features is supplied by WPA2 on a wireless network?
Authentication Encryption
Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.)
Authentication for agents and managers Encryption of SNMP messages
You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, which switch will become the root bridge?
B
Which parameters of virtual memory can you control on a Windows workstation? (Select two.) A. Maximum time between memory swap operations B. Location of the paging file C. Minimum size of the paging file D. Minimum time between memory swap operations E. Maximum size of the paging file
B. Location of the paging file & E. Maximum size of the paging file Explanation: While the default behavior of Windows is to allow the operating system to manage virtual memory settings, the system administrator can control both the maximum size of the virtual memory paging file and the disk partition upon which the paging file is stored.
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?
BGP
You have a computer where a removable disk drive has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more OS's. The drive is currently configured using drive letter D:. What should you do?
Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.
You have a computer where a removable disk drive has been formatted with NTFS. You want to drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:. What should you do?
Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.
Which of the following is an important aspect of evidence gathering?
Backing up all log files and audit trails
You need to protect the user data on a Windows 10 system. Which tools could you use to do this?
Backup and Restore File History
Which disk types does Windows support? (Select 2)
Basic Dynamic
Eavesdropping
Being noisy & listening to other people
Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the weekly Reports.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group. What correctly describes Bob's ability to access the WeeklyReport.xls file? a. Bob can find the file in a search, but cannot open the file. b. Bob has full access to the file, and can open, read, write changes, delete, and change permissions on the file. c. Bob cannot search for or open the file. d. Bob can open and read the file, but cannot write changes to the file. e. Bob can open, read, and write changes to the file
Bob can open, read, and write changes to the file
Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed recently on the computer. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver.
Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager.
While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.
Buttons
Match the Mac key labels on the left with the corresponding Mac key descriptions on the right. -The primary modifier key on Apple systems, used like the Ctrl key on a Windows system -Primarily used for text document navigation -Used for application and navigation shortcuts -Typically only found on Apple notebooks and is used to access the F1-F12 keys on the keyboard
C D A B
Which tool would you use to adjust the operation of virtual memory in Windows Vista or Windows 7? A. Clock, Language, and Region in Control Panel B. Hardware and Sound in Control Panel C. Advanced System Settings in Control Panel D. Administrative Tools in Control panel
C. Advanced System Settings in Control Panel Explanation: You manage virtual memory using Advanced System Settings in Control Panel. You can control the size and the location of the paging file. You use Hardware and Sound in Control Panel to manage hardware devices, such as printers. You use Administrative Tools to load MMC consoles such as Services or Computer Management.
What is the recommended size of the paging file under normal circumstances on a Windows 7 system with 4 GB or RAM installed? A. As large as possible. B. 1.5 times the amount of physical RAM. C. Equal to the amount of physical RAM. D. No more than 3 times the amount of physical RAM.
C. Equal to the amount of physical RAM. Explanation: Unless you are running applications that require large amounts of swap file space, the optimal setting for virtual memory swap file size is about the same size as the amount of physical RAM in the computer on Windows 7 systems with more than 1 GB of RAM installed. With less than 1 GB of RAM installed, then the recommendation is to set the size of the paging file to 1.5 times the amount of RAM installed in the system. If the paging file is too small, the system will spend excess time swapping memory data in to and out of the swap file. This condition is known as thrashing, where system performance (particularly usability) becomes very poor, but hard drive activity is almost constant.
A customer complains of a slowly-operating Windows system. In researching the problem, you notice that the computer's hard disk drive light stays illuminated for long periods of time as more applications are loaded. To speed up the computer, which of the following components should you consider upgrading? A. System board B. Hard disk drive C. Memory D. CPU
C. Memory Explanation: When a Windows-based computer does not have sufficient memory, data is often written to the hard disk drive instead. This is called virtual memory. To speed up the computer, you should add more memory so the computer does not need to rely on virtual memory. Memory is often the first component you should consider upgrading to improve performance. Upgrading the CPU could result in faster performance, but the fact that the hard disk light is on constantly indicates heavy use of virtual memory.
The paging file on a hard drive is sometimes called: A. Extended memory B. Upper memory C. Virtual memory D. Random access memory
C. Virtual memory Explanation: A paging (swap) file on a hard drive is sometimes called virtual memory, because it mimics real memory (though at a much slower speed). The process of moving data from RAM to disk (and back) is known as swapping or paging. Random Access Memory (RAM) is used as a temporary data storage location and is called physical memory. The terms extended and upper memory refer to memory above the first megabyte of address space in an IBM PC With an 80286 or later processor.
You are a PC technician for a national computer retailer. A business customer asks you to build a three custom computers to be used by employees at a branch office: -CAD / CAM Design Workstation -Home Theater PC -Virtualization Workstation
CAD / CAM Design Workstation -6 GB GDDR5 PCIe video adapter -32 GB PC4-21300 DDR4 ECC RAM -1 TB SATA HD Home Theater PC -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter Virtualization Workstation -32 GB PC4-21300 DDR4 RAM -4 TB SATA HD -Integrated Video adapter
You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from accessing the access point (AP) configuration utility?
Change the administrative password on the AP.
You have a Windows system with two SATA hard drives, one used for the operating system and the other used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. When you started the computer, the system showed the startup information screen, but then returned an error that an operating system could not be found. What should you do?
Change the boot order in the UEFI configuration. Verify the operating system SATA drive is configured as teh boot drive in the UEFI configuration.
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.)
Change the default administrative user name and password. Use an SSH client to access the router configuration.
You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?
Changing the administrative password
Check Disk
Check Disk is a utility that verifies the file system integrity of a hard disk. Errors that can be checked and fixed by Check Disk include: Lost clusters are a series of used clusters on the hard disk drive that are not associated with a specific file.
You want to make sure that you always have the latest patches installed on you workstation for an order entry application created by DataComLink corporation. What should you do?
Check the DataComLink Website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.
You have just installed a new USB card reader in your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?
Check the manufacturer's website for information about the error. Explanation For information about a specific error, check the manufacturer's website. Taking any other action might fix the problem, but would most likely just waste time. In most cases, device-specific problems can be corrected with a new driver or other software update.
Hard drive is wiped out and reformatted with this Windows 10 installation type.
Clean Installation.
Network admins in corporate environments often prefer which type of Windows 10 installation type?
Clean Installation.
This Windows 10 installation type can be performed by ANY installation method
Clean Installation.
A new computer always has this type of Windows 10 installation type.
Clean installation
Most windows 10 installations are what type?
Clean installations
Which tool can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?
Clock, Language, and Region
You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which option in Control Panel would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?
Clock, Language, and Region
You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which option in Control Panel would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboard?
Clock, Language, and Region
You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which option in Control Panel would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboard?
Clock, Language, and Region
When designing a firewall, what is the recommended approach for opening and closing ports?
Close all ports; open only ports required by applications inside the DMZ
When designing a firewall, what is the recommended approach for opening and closing ports?
Close all ports; open only ports required by applications inside the DMZ.
Which of the following is not true regarding cloud computing?
Cloud computing requires enduser knowledge of the physical location and configuration of the system that delivers the services.
Which of the following is not a reason to use subnets on a network?
Combine different media type on to the same subnet.
You're working on a Mac computer that has an issue with a non-responsive application. You need to stop the application using the Force Quit feature. Which of the following keyboard shortcuts can be used to access the Force Quit feature?
Command+Option+Esc
The amount of memory that has been assigned to running process.
Commit Charge
What is the difference between a hybrid cloud and a community cloud?
Community cloud is designed to be shared by several organizations, and a hybrid cloud is a combination of pubic, private, and community cloud resources from different service providers
Which Windows tools would you use to browse the file system on a drive? (Select three.)
Computer File Explorer Windows Explorer
System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System Protection for the C: volume.
Configure
System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System protection for the C: volume. Click the option you would select to do this.
Configure
Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company's network and the third-party's network to be connected via a dedicated WAN connection. As you prepare for the connection, you encounter a problem. The two networks need to be able to exchange routing information, but they use different routing protocols. The third-party organization uses RIP, and your network uses OSPF. What should you do to allow routing information to be exchanged?
Configure a border router to use route redistribution
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)
Configure all wireless access points with client certificates. Configure the RADIUS server with a server certificate.
You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:/ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?
Configure indexing to include the D: /drive.
You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D: drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?
Configure indexing to include the D: drive.
You have a Windows 7 computer shared by 3 users. Files that are used by all users are stored on the D:/ drive in various folders. The users that have created hundreds of files on this drive are having a hard time finding the files they need. What feature can you configure to improve access for users?
Configure indexing to include the D:/ drive
You have a Windows system shared by three shift workers. Files that are used by all users are strored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?
Configure indexing to include the D:\ drive
You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. To do this, you need to configure a RADIUS Server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is part of the complete solution)
Configure the RADIUS server with a server certificate and Configure all wireless access points with client certificates.
A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two
Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection
A salesperson in your organization spends most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration?
Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using WiFi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public WiFi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)
Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec.
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stole, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
You have just installed a new keyboard that includes special programmable buttons. You installed the custom driver that came with the keyboard. Now you want to configure what the special keyboard buttons do. Which Windows utility would most likely let you manage these settings?
Control Panel
You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?
Convergence
You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer. Assuming the default directories were used during installation for both systems, which action is correct?
Copy the fonts from C:\Winnt\Fonts to C:\Windows\Fonts.
Which of the following phone attacks adds unauthorized charges to a telephone bill?
Cramming
Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new hard disk to the computer. What should you do to add space to the C:\ drive? a. Strip the C:\ volume to the second disk b. Span the C:\ volume to the second disk c. Create a mount point using space on the second disk d. Extend the C:\ volume to the second disk
Create a mount point using space on the second disk.
What is the primary function of the IKE protocol used with IPSec?
Create a security association between communicating partners
You manage Windows desktops for your organization. You recently updated all you workstations to Windows 10. You organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 10. You have checked the application vendor's website, but there is no update available. What should you try next to run the application?
Create a virtual machine that runs an older version of Windows. Run the application within the virtual machine. Run the application in compatibility mode.
A user reports that she she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next?
Create an action plan. Explanation At this point, you should create an action plan and account for side effects of the proposed plan. Identifying the effects ahead of time helps you put measures into place to eliminate or reduce any potential negative consequences. Escalation is not necessary because you are already in charge of managing and maintaining the desktop computers. Fix the problem only after creating the action plan and identifying possible effects. Document the problem and the solution after the problem has been fixed and the solution has been verified.
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
DSL
Out of the three most common installation methods of windows 10 which one Includes only the drivers and components included on the windows 10 Installation?
DVD Boot Installation
Out of the three most common installation methods of windows 10 which one can add drivers using a USB drive or other removable storage unit?
DVD Boot Installation
Out of the three most common installation methods of windows 10 which one is most Suitable for small organizations that only occasionally install windows 10?
DVD Boot Installation
Out of the three most common installation methods of windows 10 which one is the Least suitable method for a large volume of computers?
DVD Boot Installation
your desktop workstation system uses a scsi bus to connect storage devices. the SCSI host adapter is assigned an ID of 7, the SCSI hard disk is assigned an ID % the SCSI tape drive is assigned an ID of 3, and the SCSI DVD drive is assigned an ID of 0. which device has the lowest priority on the SCSI bus.
DVD drive
You are helping a customer over the phone who needs to connect a monitor that uses a digital interface. Which port should you instruct her to look for on the back of her PC?
DVI
Mission Control is a desktop and windows management utility that is used to access several Mac OS features. Which of the following are Mac features accessed through Mission Control? (Select three.)
Dashboard All Windows Multiple Desktops
Persistent Data
Data stored on the HDD
You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are have a problem. Which of the configuration values would you most likely need to change?
Default gateway
The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: -Allow Full Control to the D:\Reports folder -Deny Full Control to the D:\Sales folder -Deny Full Control to the D:\Reports\2010reports.doc file -Allow Full Control to the D:\Sales\2010sales.doc file What effective permissions does Mary have to both files?
Deny Full Control to both
Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to C:\Public Reports. -Copy Costs.doc from C:\Confidential to C:\PublicReports. What permissions doe members of the Users group have to these two files in the C:\PublicReports folder?
Deny Read to the Reports.doc file; moving the file to the new folder on the same drive preserves the NTFS permissions assigned to the file.
What permissions do member of the Users group have to these two files in the C:\PublicReports folder?
Deny full control to both
Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue. What should you do next?
Deploy the hotfix on a test computer.
Used to perform offline servicing of windows imaging format (WIM) Images.
Deployment Image Servicing and Management (DISM)
You have just installed a packet-filtering firewall on your network. Which options will you be able to set on your firewall?
Destination address of a packet. Source address of a packet. Port number.
On a Windows 10 system, which Task Manager tab would you use to adjust the priority given to a specific program?
Details
On a Windows 10 system, which Task Manager tab would you use to adjust the priority given to a specific program?
Details.
A user reports that he can't send print jobs to a specific printer. You go to the user's computer and reproduce the problem. What should you do next?
Determine if anything has changed. Explanation After identifying the problem, determine if anything has changed. For example, question the user and identify user changes to computer. From there, you establish a theory of probably cause, and continue through the troubleshooting process. Before you can establish a probable cause, do additional work to see what might have changed. After selecting a probable cause, determine if escalation is required, then create an action plan and implement the solution.
A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. What should you do next?
Determine if escalation is needed. Explanation After you identify the most probable cause, escalate the problem if it s beyond your ability to fix or your scope of management. For example, the problem might be in the network server configuration that you are not authorized to correct. When forwarding the problem onto someone else, be sure to describe the nature of the problem, the actions you have already taken, and the symptoms that lead you to believe the problem is outside of your area of responsibility. If you have decided that escalation is not necessary, create an action plan that includes the fix and identifying possible effects of implementing the fix. After the solution has been implemented, verify that it works and that there were no unforeseen consequences. Finally, document the problem and the solution.
Which system utility would you use to trouble shoot hardware devices, examine and control the resources used by specific devices and install updated device drivers/
Device manager
Which of the following best describes the concept of a VLAN?
Devices on the same network logically grouped as if they were on separate networks.
Which of the following protocols can TLS use for key exchange? (Select two.)
DiffieHellman and RSA
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
Disable SSID broadcast
Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?
Disable SSID broadcast
You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?
Disable Secure Desktop
One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allows management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been disabled on the system. What should you do to increase the security of this system?
Disable the Guest account.
Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: -Server systems are kept in a locked server room. -User accounts on desktop systems have strong passwords assigned. -A locked door is used to control access to the work area. Users must use ID badges to enter the area. -Users connect their personal mobile devices to their computers using USB cables. -Users work in three 8-hour shifts per day. Each computer is shared by three users. Each has a limited account on the computer they use. Based on this information, what should you recommend your client do to increase security?
Disable the USB ports on user's workstations.
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within secure areas have been trained to lock workstations if they leave them for a period of time. What recommendations would you make to this organization to increase their security?
Disable the switch ports connected to the network jacks in the reception area.
Disk Defragmenter
Disk Defragmenter optimizes the performance of your hard drive by joining fragments of files that are in different locations on your hard drive into a single location.
Which tool would you use to create and delete partitions on hard drives?
Disk Management
You have physicallt installed a new hard disk drive in your computer and configured the disk in the bios using the CMOS setup program. You try to access the hard disk drive in Windows explorer, but the drive is not displayed. Which utility will you most likely use to solve the problem?
Disk Management
The number of read and write requests that are waiting to be processed.
Disk Queue Length
The amount of time that the disk subsystem is busy reading from and writing to disk.
Disk Time
Disk Cleanup
Disk cleanup helps manage disks by locating and disposing of files that can be safely removed from the disk by: Emptying the recycling bin, Deleting temporary files such as those used by a web browser or for application installation. Deleting installation log files, Deleting offline files, Compressing old files
Which installation method is best for large numbers of computers that share the same hardware configuration?
Disk image Network installation
You purchased a new LED monitor for your computer. On the back of the monitor you see the following port (pictured below). Which type of cable should you use to connect the monitor to your computer?
Display Port Cable
Out of the three most common installation methods of windows 10 which has medium customization features where you can include additional files as part of the installation?
Distribution Share Installation
Out of the three most common installation methods of windows 10. Which installation method of windows 10 requires that files must be transferred across a network?
Distribution Share Installation
Out of the three most common installation methods of windows 10 which two Requires computers to be booted into Windows PE?
Distribution Share Installation, imaged based installation.
You have a computer running Windows 7 Home Premium and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?
Do nothing. Windows 7 can natively access exFAT file systems.
Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and also to access specific folders.
Dock (not Spotlight, Terminal, Mission Control)
A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. What should you do next in your troubleshooting strategy?
Document the solution. Explanation You have completed and tested the task, and verified full system functionality. You now document the solution, so if the same display issue returns, you or your replacement will know what to do.
When conducting a forensic investigation, and assuming that the attack has been stopped, which of the following actions should you perform first?
Document what's on the screen
Both
Does Windows 10 Reset This PC, Refresh this PC, or Both with a single action?
Simple
Does not provide redundancy. This option simply adds space from the storage pool to the storage space. When you select the Simple option, all of the data in the storage space is lost if one of the drive fails.
You have just installed a new deice in you windows computer. After installation, you cant use the device. you check in Device manager and find an icon for the device with a yellow exclamation mark over it. What should you do?
Download the latest driver form the maunfacturer's web site/
You have just started a new job as a technical team leader at a PC repair shop. You are responsible for overseeing the work of other PC technicians, as well as doing your own share of the repair work. To improve the safety of your location, you decide to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop. How should you get them?
Download them from the chemical manufacturer's Web sites
Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2008 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing?
Downloading a file
Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2012 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing?
Downloading a file
A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause?
Duplex mismatch
You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The installation starts but does not detect the RAID array. What should you do?
During the install, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows.
You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of Network Address Translation (NAT) should you implement?
Dynamic
Which remote access authentication protocol allows for the use of smart cards for authentication?
EAP
Which remote access authentication protocol allows for the use of smart cards for authentication?
EAP
Which EAP implementation is most secure?
EAPTLS
You are troubleshooting a client connectivity problem on an Ethernet network. The client has intermittent connectivity to the network. You discover that the unshielded twisted-pair patch cable runs 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system. Which of the following may be causing the connectivity problem?
EMI interference
Each ACL can be applied to more than one interface. However?
Each interface can only have one incoming and on outgoing list.
You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?
Edit settings in the Local Security Policy
You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?
Edit settings in the Local Security Policy.
You want to configure User account Control so when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?
Edit settings in the Local Security Policy.
The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?
Edit the properties for the file; assign Mary the Deny Full Control permission
The D:\ drive in your computer has been formatted with NTFS. The Sales group on you computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?
Edit the properties for the file; assign Mary the Deny Full Control permission.
The D:\ drive in your computer has been formatted with NTFS. The sales group on your computer has been given allow full control to the D:\Sales folder. The Mary User account is a member of the sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?
Edit the properties for the file; assign Mary the Deny Full Control permission.
You want to set the encryption attribute for the C:\payroll.xls file. What should you do?
Edit the properties of the file in Windows Explore
You want to set the encryption attribute for the C:\payroll.xls file. What should you do?
Edit the properties of the file in Windows Explorer
You want to set the encryption attribute for the C:\payroll.xls file. What should you do? a. At a command prompt, type: attrib c:\payroll.xls +e b. At a command prompt, type: encrypt c:\payroll.xls c. Edit the properties of the file in Windows Explorer d. At a command prompt, type: attrib +e c:\payroll.xls
Edit the properties of the file in Windows Explorer
A user sends a print job to a network printer and its prints page after page of random characters. He calls the Help Desk and a technician discovers that somehow the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. What else should she do?
Educate the user as to how the problem was resolved and verify that they are satisfied with the results. Explanation After resolving any incident, you should spend a few minutes with the user, client, or customer and explain how the problem was resolved and verify that they satisfied with the results.
You have configured a remote access server to accept dial-up connections for remote access clients. Remote clients are able to connect successfully and access resources on the remote access server. However, the remote clients are not able to connect to other devices located on the same subnet where the remote access server is located. Which action would likely correct the problem?
Enable proxy arp on the LAN connection for the remote access server.
You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm?
Enable spanning tree on the switches.
Which of the following actions directly improves system security on Windows systems?
Enable the Windows firewall. Install anti-malware software.
EFS
Encrypting file system, a protocol that windows uses for encryption
Which of the following features are supplied by WPA2 on a wireless network?
Encryption
You are investigating the use of Web site and URL content filtering to prevent users from visiting certain Web sites. Which benefits are the result of implementing this technology in your organization? (Choose two.)
Enforcement of the organization's Internet usage policy An increase in bandwidth availability
What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8 GB of RAM installed?
Equal to the amount of physical RAM.
You provide desktop support for a small company. The company has two locations int he same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?
Establish a Remote Assistance connection and watch what the user is doing
You provide desktop support for small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?
Establish a Remote Assistance connection and watch what the user is doing.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.
Establish a Remote Desktop connection and update the driver
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?
Establish a Remote Desktop connection and update the driver.
A user asks you to perform a task that you do not know how to do and is not in your job description. What is the best way to respond?
Explain to the user that this is not a task you can perform, but you will do your best to contact the correct people to take care of the job and arrange for them to perform the task
You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks? (Select 2)
Extended partitions with logical drives Primary partitions
Virtualization WS
Extensive RAM and CPU processign power maximum amount of RAM supported by motherboard. 64-bit quad-core CPU minimum Consider an eight-core CPU or a server sys. with mult. physical CPU sockets.
Consider the cable connectors used by various peripheral devices (pictured below). Drag the letter on the left to the peripheral device on the right that would most likely use the connector type. A-H
External Storage Device G Analog Monitor D Video Camera C HDTV A Dial-up Modem H Digital Monitor (without audio) E Network Adapter Headphones F Headphones B
Which of the following is a privately controlled portion of a network that is accessible to some specific external entities?
Extranet
You need to boot a Windows 7 system into Safe Mode. Which key should you press during the system boot to access the Advanced Boot Options menu?
F8
You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want to drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?
FAT64
Which of the following is a secure alternative to FTP that uses SSL for encryption?
FTPS
You have two switches connected as shown in the exhibit. You would like to configure rapid spanning tree on Switch A. On which ports would you use the portfast command?
Fa0/1 and Fa0/2
Screen Sharing
Feature that allows you to share the screen of your Mac OS system.
You need to protect the user data on a Windows 8.1 system. Which tools could you use to do this?
File History
You need to protect the user data on a Windows 8.1 system. Which tools could you use to do this?
File History
Physical
Files can be accessed after the storage space is brought back online manually, but you must add more ________ disk space to the pool and add it to the storage space in order to use the storage space
You work at the IT Help Desk in your company. An employee calls to report a problem with her workstation and a service ticket is assigned to you. You respond to the service ticket immediately and arrive at the employee's workstation within minutes; however, when you begin speaking to her, you can't understand what she is saying because she is speaking Spanish, and you do not understand Spanish. What should you do?
Find an interpreter
Which is the best device to deploy to protect your private network from a public untrusted network?
Firewall
SATA3
For optimal performance, consider upgrading to _____. This will upgrade your speed to 600 Mbps
You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?
Format
You have physically installed a new hard disk drive in your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the hard disk drive in Widows Explorer, but get an error message. Which utility will you most likely use to solve the problem?
Format
If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set and security permissions on the folder?
Full Control
If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set any security permissions on the folder?
Full Control
Which type of virtualization allows applications to run within the virtual machine without being modified in any way?
Full Virtualization
What is the different between full and partial virtualization?
Full- virtual machines completely simulates a real physical host Partial- Only some of the components of the virtual machines are virtualized
Which of the following can route layer 3 protocols across an IP network?
GRE
Which Windows component can be used to display information such as weather forecasts, time, and news headlines on the desktop?
Gadgets (not Notification Area)
You are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office: -Gaming PC -Home Office Server -Thick Client Workstation
Gaming PC -1000 W Power Supply -1 TB SATA HD -Dual SLI 6 GB PCIe video adapters -5.1 channel surround sound adapter -Liquid CPU cooler Home Office Server -2 TB RAID 5 disk array -600 W power supply -No audio adapter -Integrated video adapter Thick Client Workstation -400 W power supply -500 GB SATA HD -512 MB PCIe video adapter -Basic desktop applications isntalled
You can use these finger motbns to perform specific functions on a Mac OS system: • Right-click: Tap with two fingers to right-click • Smart zoom: Double-tap with two fingers to zoom in on a web page, image, or document (double-tap again to zoom out) • Scroll: Slide up or down using two fingers to scroll up or down • Zoom: Spread two fingers apart to zoom in. Bring fingers back together to zoom out • Page navigation: Slide two fingers left or right to navigate between pages in a document • Mission Control: Slide four fingers straight up to open Mission Control • All apps: Slide four fingers straight down to display all windows of the active app What is the name of the Mac feature that makes these finger motbns available?
Gestures
You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this?
Get 64-bit drivers for all hardware Perform a clean installation
You are purchasing several PC system that will be used as thin clients in a large organization. Which hardware selection criteria would be most important for this system?
Gigabit Ethernet adapter
After installing new software a few days ago, your DVD drive tray randomly began to open and close. Today, you were called into your boss's office to discuss why you are calling 900 numbers while at work. Which type of malware would create these symptoms?
Grayware.
On a Windows system, which of the following is true about groups?
Group members have access rights assigned to the group.
On a Windows system, which of the following is true of groups?
Group members have the access rights assigned to the group
On a Windows system, which of the following is true of groups?
Group members have the access rights assigned to the group.
Which component within a tablet device measures acceleration horizontally and vertically at the same time?
Gyroscope
Which of the following protocols provide gateway redundancy? (select all that apply)
HSRP GLBP VRRP
Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?
HTTPS
Which protocol is used for securely browsing a Web site?
HTTPS
Use ________ to simplify data migration on the same computer
Hard Links
You need to configure settings for a USB printer that you have just connected to your Windows 7 system. Which option in Control panel should you use to do this?
Hardware and sound
Standard Thick Client
Hardware meets requirements for running the selected OS Enough processing power, disk space, and RAM to support the desktop applications Optimized to run desktop productivity applications
While answering Help Desk calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the following should be the first question you ask?
Have you ever printed to that printer? Explanation When a customer reports a problem, it is important to ascertain the extent of the problem. The fact that the user cannot print to a particular printer should first be approached from the standpoint of determining if they ever could and, if so, what has changed since then. Checking cables and restarting the printer are all actions that could be taken to resolve the issue. However, you should first identify the extent of the problem before attempting solutions.
A user calls to report a problem. She is trying to install an application on a Windows 10 system, but cannot. In the past, she installed applications on her Windows XP system without any issues. Her user account has always been a member of the Power Users group. What do you suspect is causing the installation issue?
Her group membership denies program installation on the operating system.
A user calls t report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?
Her group membership does not allow her to install new software
A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the User Group on the system. What do you suspect is causing the installation issue?
Her group membership does not allow her to install new software.
A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?
Her group membership does not allow her to install new software.
Home Theater System
High-end audio adapter with surround-sound speaker system Video adapter with TV turner and HDMI port HTPC form factor
Match the Active Directory component on the left with the appropriate description on the right. Each component may be used once, more than once, or not at all.
Holds a copy of the Active Directory database Domain Controller Manages access for a workstation Computer Object Manages access for an employee User Object Can be created to logically organize network resources Organizational Unit Cannot be moved, renamed, or deleted Generic Container Defines a collection of network resources that share a common directory database Domain
You are a PC technician for a national computer retailer. You are asked to build each of the systems listed on the right. You need to use the most appropriate hardware components to ensure that each of these systems will fulfill its intended role.
Home Office Server -2 TB RAID 5 disk array -600W power supply -No audio adapter -Integrated video adapter Gaming PC -1000W power supply -1 TB SATA HD -Dual SLI 6GB PCIe -Video adapters -5.1 channel surround sound adapter -liquid CPU cooler Home Theater PC -HDMI output -Compact form factor -5.1 channel surround sound adapter -TV tuner adapter Virtualization Workstation -AMD 12-core, 4 GHz CPU -4 TB SATA HD -32 GB DDR4 RAM -Hardware-assisted virtualization Thin Client Workstation -Intel Celeron dual-core, 2.7 Ghz CPU -500 GB SATA HD -2GB DDR3 RAM -Few or no applications installed Audio/Video Editing Workstation -Intel Core i7 six-core, 3.4 GHz CPU -2 TB SSD SATA HD -16 GB DDR4 RAM -High-end audio adapter with speaker system -High-end video adapter with dual displays
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?
Hotfix
You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?
IGP
your monitor is displaying images using odd colors. Which of the following is a solution to this problem?
INCREASE THE COLOR DEPTH
The switch itself has only one active what?
IP address, the IP address identifies the switch as a host on the network.
A switch does not need to have what?
IP address, unless you want to manage it with an in-band management utility. (such as SSH or a web-based interface.)
Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?
IPSec
Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?
IPsec
Which of the following protocols provides authentication and encryption services for VPN traffic?
IPsec.
Which of the following protocols are classified as link state routing protocols?
IS-IS OSPF
Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?
ISDN BRI
Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)
ISDN BRI ADSL
What is the difference between IaaS and PaaS?
IaaS or Infrastructure as a Server delivers infrastructure to a client, such as processing, storage, networks, or virtualized environments where the client deploys and runs software without having to purchase servers, data center space, or network equipment PaaS or Playform as a Server gives everything a developer needs to build an application, without the cost and complexity of buying and managing the underlying hardware and software layers
Needs Analysis
Identifies who will use the computer system and for what purpose.
You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do first in your troubleshooting strategy?
Identify the problem. Explanation Currently you have no idea what problem the user is having. The first step would be to identify the problem. You would ask questions to identify what the problem and its symptoms are. You would find out what has changed only after you know a bit more about the problem. Before taking any actions, back up the system to protect user data. Establishing a theory and a plan of action occurs only after you know what the problem is.
Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?
If the network is connected to the Internet using multiple ISPs.
Which of the following is a myth regarding electrostatic discharge (ESD)?
If you can't feel ESD, the surge is not sufficient to harm computer components
You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. What would happen to your iPad if you disconnect it before the operating system update is complete?
If you disconnect during the update, the operating system could become corrupted.
under which circumstances would using the Last known good option be most likely to correct the problem?
If you made a system change and then the start up fails before the logon screen
You are a PC technician for a company. An employee has stepped out of his office while you fix a computer problem he has been having. He accidentally left a report open next to his computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. What should you do?
Ignore the paper and tell no one of its contents
Out of the three most common installation methods of windows 10. Which installation method image is created and placed on a distribution share by using Windows SIM
Image based installation
Out of the three most common installation methods of windows 10 which one requires the creation of a customized image that you can apply to a computer?
Image based installation.
Out of the three most common installation methods of windows 10 which installation method has the highest level of customization?
Image-base installation
Out of the three most common installation methods of windows 10 which installation method is the fastest?
Image-base installation
While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID and you see that the call is not work-related. What is the most professional way to handle the situation?
Immediately forward the call to voicemail
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for guests. The owner has asked that you implement security controls such that only paying guests are allowed to use the wireless network. She wants guests to be presesnted with a loging page when they initially connect to the WLAN. After entering a code provided at check in, guests should then be allowed full access to the Internet. If a user does not provide the correct code, they should not be allowed access to the internet. What should you do?
Implement a captive portal
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for guests. The owner has asked that you implement security controls such that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, guests should then be allowed full access to the Internet. If a user does not provide the correct code, they should not be allowed to access the Internet. What should you do?
Implement a captive portal.
A local dentist has contracted you to implement a network in her new office. *No one from the Internet should be able to access her internal network. *Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. *Employees should be blocked from accessing non-work related web sites, especially sites that contain inappropriate content. *A system should be put in place to detect and prevent external attacks on her network.
Implement an all-in-one security appliance.
Your organization uses a Web server to host an ecommerce site. Because this Web server handles financial transactions, you are concerned that it could become a prime target for exploits. You want to implement a network security control that will analyze the contents of each packet going to or from the Web server. The security control must be able to identify malicious payloads and block them. What should you do?
Implement an applicationaware IPS in front of the Web server.
A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: * They use an 802.11a wireless network * The wireless network SSID is set to BWLAN * The wireless network is not broadcasting the network SSID * The wireless network uses WPA2 with AES security * Omni-directional access points are positioned around the periphery of the building Based on this information, what should you recommend your client do to increase their wireless network security?
Implement directional access points
A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: • They use an 802.11a wireless network. • The wireless network SSID is set to BWLAN. • The wireless network is not broadcasting the network SSID. • The wireless network uses WPA2 with AES security. • Omnidirectional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security?
Implement directional access points.
ESD is most likely to occur:
In a cool, dry atmosphere
You have implemented a regular backup schedule for your Windows server, backing up all data every weekend with incremental backups every other night. You company has decided against storing backup tapes at an offsite location. Where would be the next best place to keep your backup tapes?
In a fireproof, locked safe.
You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?
In a locked fireproof safe
You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. for security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?
In a locked fireproof safe.
You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop?
In the Control Panel, select User Accounts, then User Accounts In the Control Panel, select System and Security, then Security and Maintenance
You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select two. Each choice is a possible answer.)
In the Control Panel, select User Accounts, then User Accounts. In the Control Panel, select System and Security and Maintenance.
Which statements accurately describe the port states of both bridges and switches?
In the learning state, the MAC address table can be populated, but frames are not forwarded. Ports in a blocked state still receive BPDUs.
You need to place a wireless access point in your twostory building. While trying avoid interference, which of the following is the best location for the access point?
In the top floor
Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.
In-Band Management -Competes with normal network traffic for bandwidth. -Must be encrypted to protect communications from sniffing. -Affected by network outages. Out-of-band management -Uses a dedicated communication channel. -Does not compete with normal network traffic for bandwidth. -
You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. What should you do?
Include the D:\Reports folder in the Library.
You have a windows 7 computer. You have created a custom library using D:\Stats as the path to the library. You want the files in the D:\Reports folder to be available in the library you created. The files should also still be accessible using the D:\Reports folder. What should you do?
Include the D:\Reports folder in the library.
You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem. Which of the following is the most likely cause of the problem?
Incorrect VLAN assignment
Which of the following are reasons to configure VLANS on a switch as opposed to using switches without VLANs?
Increased security Increased number of broadcast domains
You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?
Install a privacy filter on the monitor. Secure the system to the desk with a cable lock.
You are a desktop technician for a small company and recently installed Windows & on an older workstation. Once complete, you notice that the Flip 3D feature is not available. You need to enable Flip 3D. What should you do?
Install a video card that supports Aero
Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's Accounting department. She received a single Windows 10 installation disc with the licenses.
Install one system and image it to the other systems. Use a network installation.
Which of the following actions taken on a Windows workstation will directly improve system security?
Install the latest updates
Which of the following actions taken on a Windows workstation will directly improve system security?
Install the latest updates.
you are the network administrator for a small company. You purchase eight copies of Windows at a local retail outlet. You install Windows successfully on eight computers in the office. A month later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. What should you do?
Instruct the employees to activate their Windows installation.
You are the network administrator for a small company. You purchase eight copies of Windows at a local retail outlet. You install Windows successfully on eight computers in the office. A mount later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. What should you do?
Instruct the employees to activate their Windows installations
Don is an accountant in the Finance department. For the last several months he has been testing an online accounting program. After speaking with his manager, Don received permission to download a streamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the operating system will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. Which of the following is the most likely reason Don could not install the application?
Insufficient permissions
Don is an accountant in the Finance department. For the last several months he has been testing an online accounting program. After speaking with his manager, don received permission to download a streamlined version of the software which requires a local installation. after downloading, Don tried to install the application, but the operating system will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. Which of the following is the most likely reason Don could not install the application?
Insufficient permissions
Don is an accountant in the Finance department, and for the last several months has been testing an online account program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. After downloading, Don tries to install the application on his Windows 10 workstation, but the operating system does not allow it. Out of frustration, he calls the Help Desk. The Help Desk personnel comes to Don's machine and installs the application without issue. Which of the following is the most likely reason Don could not install the application?
Insufficient permissions.
What is the purpose of an MSDS?
It documents how to safely handle hazardous materials
A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch.
It does not record address or segment information. It does not forward the message.
Which of the following is true of the Guest user account on Windows system?
It is disabled by default.
A switch running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?
It uses the source MAC address and network segment information to build its bridge database, but does not forward the message.
Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system?
Jitter
Which of the following are steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?
Keep the operating system up to date. Lock the screen with some form of authentication. Explanation Keeping the operating systems up to date with the latest updates and patches will help because they often contain fixes for known security issues. Configure the screen lock to require some sot of authentication to physically access your device. A remote backup is an essential disaster recovery solution but will not prevent hacker exploitation or virus infection. Having your device always in your possession, it can still be hacked and infected by a virus if not protected. Anti-virus apps for Android devices will protect your device but you should do some research to make sure you get the most effective one. Turning off locations services does not improve your device's security and it will make it harder to find your device if you lose it.
Which of the following is the name of the core of the operating system that is loaded into memory when the system boots up? This part of the operating system is responsible for • Controlling security • Managing the file system • Providing a platform for applications to run on
Kernel
Which of the following are considered input devices? (Select three.)
Keyboard Microphone Scanner
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two
L2TP PPTP
Which of the following cellular types use MIMO to increase 3G data throughput? (Select two.)
LTE HSPA+
A SYN packet is received by a server. The SYN packet has the exact same address for both the sender and receiver addresses, which is the address of the server. This is an example of what type of attack?
Land Attack
Which device type should typically not be plugged into a protected outlet on a UPS unit?
Laser printer
You are a PC technician for a company. An employee needs her computer reinstalled and you have arranged to use her computer and office over their lunch break to complete the installation. You enter her office and find it to be quite disorderly with sticky notes around the monitor and stacks of papers and folders on the desk. This makes you feel uncomfortable while you work. What is the best thing to do?
Leave the office exactly as it is. Even if it makes you uncomfortable, you should never alter someone else's workspace
Which of the following area advantages of using the Spanning Tree Protocol (STP) in network segmented bridges?
Lets you provide redundancy by using more than one connection between devices, making you network more reliable. Identifies the optimal path between network devices. Prevents switching loops from forming.
Switches running STP are in the process of exchanging BPDUs and redefining their roles. In what port state are the switches?
Listening
You are designing a wireless network implementation for a small business. the business deals with sensitive customer information, so data emanation must be reduces as much as possible. The floor plan of the office is shown below. Match each type of access point antenna with the appropriate location on the floorplan.
Location = type A= Directional B= Directional C=Omnidirectional D= Directional E= Directional F= Directional G= Directional
Which aspects of virtual memory can you configure on a Windows workstation?
Location of the paging file. Maximum size of the paging file.
Which of the following will improve the security of sensitive information on your device if it is lost or stolen?
Locator applications. Remote wipe. A screen lock. Explanation Being able to do a remote wipe of your device will keep sensitive information from falling into the wrong hands if your mobile device is lost or stolen. Having a screen lock will help keep casual users from getting access to your device, but determined hackers can find ways around a screen lock. Locator applications might help you find your device, before a determined hacker does, if you misplace it. Keeping the operating systems up to date with the latest updates and patches will not protect your device if it falls into a determined hacker''s possession. A remote backup is an essential disaster recovery solution but will not prevent hacker exploitation or virus infection. Being up to date and having anti-malware apps, for Android devices, will note protect your device in a determined hacker's possession.
Of the following choices, which action could be MOST harmful to you?
Looking into the end of a fiber optic cable
Which of the following is an advantage of the exFAT file system over NTFS?
Lower memory and processor resource use
You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. What should you do next?
Make sure that all installed applications run correctly
You want to update your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase and upgrade version of Windows and perform an in-place upgrade. What should you do next?
Make sure that all installed applications run correctly.
Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.
Managed Switch -Provide port security features. -Support VLANs. -Can be configured over a network connection. -Can be configured over a dedicated communication channel. Unmanaged switch -Commonly sold at retail stores. -Provide very few configuration options.
While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy-backing to gain access to your building. The individual in questions did not have a security badge. Which security measure could you implement to keep this from happening in the future?
Mantraps.
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?
Manually reconfigure the default route to point to the new next hop router.
You manage a network with multiple subnets connected to the Internet. A user reports that she can;t access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. Which of the following is likely the cause of the problem?
Missing default route on a router.
You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?
Missing route on the default gateway router
You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use?
Mobile device management software that performs remote wipes. Mobile device management software that does full device encryption. Explanation If a mobile device with sensitive information gets lost, the best protection you can have is that the device is fully encrypted and the ability to remotely wipe, or delete all the data from, the device's data storage.
You have a folder on your Windows 7 computer that you would like to share with members of your development team. users should be able to view and edit any file in the shared folder. You share the dofing and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do? a. Create new user accounts for each user and assign the necessary folder permissions. b. Install Samba on your workstation, then configure permissions using Samba. c. Modify the NTFS permissions on the folder d. Create a group and make all user accounts members of the group. Grant full control share permissions to the group.
Modify the NTFS permissions on the folder
Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?
Modify the permissions on the document
Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?
Modify the permissions on the document.
RAID 1
Most expensive fault tolerant system.
Which tool can you use to view, but not modify, hardware and configuration information for your computer?
Msinfo32
Which feature allows a tablet to recognize multiple finger touches at the same time?
Multi-touch
Members of the Sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed. Which solution should you use?
NAC
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used?
NAS with clustering
Which of the following network devices or services prevents the use of IPsec in most cases?
NAT
Which of the following networking devices or services prevents the use of IPSec in most cases?
NAT
Which of the following networking devices or services prevents the establishment of VPN connections in most situations?
NAT.
What is required to control access to the file system using file and folder permissions on a Windows-based computer?
NTFS-formatted partition
What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?
Near a window
You need to back up user data on a Windows 8.1 system. The computer has an SSD drive (C:) and a hard disk drive (D:) installed. The SSD drive contains both the Windows operating system and user profile data. You plan to do the following: -User Backup and Restore to backup user data. -Run the backup automatically every night at 1 A.M. -Store the backups in the C:\Backups folder. -Include a system image in each backup. Will this configuration work?
No, Windows 8.1 does not include the Backup and Restore utility. File History must be used instead.
You need to backup user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: -User Backup and Restore to backup user data. -Run the backup automatically every night at 11 P.M. -Store the backups in the C:\Backups folder. -Include a system image in each backup. Will this configuration work?
No, backups created with Backup and Restore can't be stored on the same drive containing the information being backed up.
A user called the Help Desk to request help with his Windows workstation. He's having trouble downloading new messages from your company's e-mail server. The Help Desk technician told him to open a Command Prompt and try to PING the e-mail server. She also told him to check his SMTP and POP3 server IP addresses. Did the Help Desk technician handle this request correctly?
No, the technician used jargon that the user probably didn't understand
When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?
No, this is the system's recovery partition.
When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?
No, this is the system's recovery partition.
To protect user data on a Windows 7 system, you've configured System Restore to automatically create restore points for the C:\ volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data?
No, you need to create a backup of your user data as well.
To protect user data on a Windows 7 system, you've configured System Restore to automatically create restore points for the C:\volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your user's data?
No, you need to create a backup of your user data as well.
To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect you user's data files. Will the configuration adequately protect your system in the event of a hard disk failure?
No, you need to create an image of your Windows system as well.
To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect your user's data files. Will this configuration adequately protect your system in the even of a hard disk failure?
No, you need to create an image of your Windows system as well.
To protect your Windows 7 system, you've used System Restore to automatically protect your system using restore points. You've also used Backup and Restore in Control Panel to configure a nightly backup of your user's data files.
No, you need to create an image of your Windows system as well.
You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the hard drives. Have you properly prepared theses systems for disposal?
No, you should use disk wiping software to fully erase the drives.
You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?
Ntblog.txt
Christian has booted his windows 7 workstation in safe mode and enabled boot logging. Which file would he examine to see a list of drivers loaded during the startup process?
Ntbtlog.txt
Christian has enabled Boot Logging from the Advanced Startup Options menu of his Windows 10 workstation. Which file would he examine to see a list of drivers loaded during the startup process?
Ntbtlog.txt
You have booted your Windows workstation into Safe Mode and enabled Boot logging. To which log file is the boot logging information now being written?
Ntbtlog.txt
Which type of active scan turns off all flags in a TCP header?
Null
You have a computer with a single hard disk configured as a basic disk with a single partition formatted with NTFS. The computer runs windows 7 enterprize. the disk has run out of space. You need to add space to the disk . You install a new hard drive and start Disk mmanagement. Which fo tghe following is required task to add space to the existing volume?
ON THE NEW HARD DISK. CREATE A NEW PARTITION WITOHUT A DRIVE LEtter
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
OSPF
Which of the following routing protocols uses relative link cost as the metric?
OSPF
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
On a RADIUS Server
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
On a RADIUS server
You have a computer with a single hard disk configured as a basic disk with a single partition formatted with FAT32. The computer runs Windows XP professional. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. What is a required task to add space to the existing volume? a. Extend the C:\ volume. b. Upgrade both disks to dynamic. c. Create an empty folder on the new hard disk. d. On the new hard disk, create a new partition without a drive letter.
On the new hard disk, create a new partition without a drive letter.
Multiple Activation Key (MAK)
One of the three types of activation allowed from Volume license agreement.
Which of the following are typical components of a NAS device?
One or more NICs A minimal network OS
You want to be able to access you home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. What should you do?
Open the firewall port for the remote desktop protocol.
Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?
Operating system
Which of the following associates a port number with a host on a private network?
PAT
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
PPTP.
Which of the following protocols can you portable computer use to connect to your company's network via a virtual tunnel through the Internet?
PPTP. L2TP.
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.
You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two.)
Parabolic Highgain
You are connecting an older, dot matrix printer to a computer. The printer's cable is a D-shaped connector with 25 pins. Which port type does the printer connect to?
Parallel port (25 pins)
FAT32
Partition Size: 2 terabytes Volume Size: 2 terabytes File name length: Long File Names (255 characters, spaces) File Size: 4 gigabytes Amount of Files: 268,435,437
You manage two folders in your computer as follows: -C:\Confidential -C:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports foler?
Permissions are removed from both files
You manage two folders in your computer as follows: C:\Confidential D:\PublicReports The C:\ drive is formatted with the NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the the properties for the following two files and assign the Deny Read permission to the user group: Reports.doc Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports What happens to the permissions for both files as they are created in the D:\PublicReports folder?
Permissions are removed from both files
You need to enable a screen saver password on the Windows workstation in you organization. Which Control Panel option should you use to do this?
Personalization.
You have purchased new computers and will be disposing of your old computers. These computers were previously used for stroring highly-sensitive customer order information, including credit card numbers. What should you do prior to getting rid of the computers?
Physically destroy the hard drives with a hammer.
which of the following commands verifies that TCP/IP is working correctly on the local computer?
Ping 127.0.0.1
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specified users. All other users must not be able to view r modify the files in the folder. What should you do? (2) a. Configure share permissions. b. Configure NTFS permissions. c. Place the files on a FAT32 partition. d. Place the files on an NTFS partition. e. Configure both share and NTFS permissions
Place the files on an NTFS partition. Configure both share and NTFS permissions
You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch you music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers. Click the tab you would use in the Sound Properties window to do this.
Playback
You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch you music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers. Click the tab you would use in the Sound Properties window to do this.
Playback
You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch your music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers.
Playback
Which of the following features is used with digital IP phones to supply power through a switch port?
PoE
While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed.
Pointer Options
While using a new windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. click the tab you would use in the Mouse Properties window to do this.
Pointer Options
While using a new windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this.
Pointer Options
Match the Etherchannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all.
Port Aggregation Protocol (PAgP) -Desirable mode places the port in a negotiating state. -Auto mode places the port into a passive negotiating state. Link Aggregation Control Protocol (LACP) -Based on the 802.3ad standard. -Passive mode places the port into a passage negotiating state. -Active mode places the port in a negotiating state.
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?
Port forwarding
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. Which unified communication feature is this?
Presence information
Masquerading
Pretending to be a rep for a company to gain personal info
Drag the Web threat protection method on the left to the correct definition on the right.
Prevents visiting malicious Web sites Web threat filtering Prevents outsided attempts to access confidential information Antiphishing software Identifies and disposes of infected content Virus blockers Prevents unwanted email from reaching your network Gateway email spam blockers Prevents visiting restricted Web sites URL content filtering
You need to protect the user data on a Windows 7 system. Which tools could you use to do this?
Previous Versions Backup and restore
Which of the following are considered computer hardware? (Select two.)
Printer Motherboard
You have a small network at home that is connected to the Internet. On our home network you have a server with the IP address of 192.168.55.199/16. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server?
Private addresses are not accessible through the Internet.
While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer?
Process. Details.
Volatile Data
Processed data that is kept inside the RAM
On a Windows system, which Task manager tab would you use to adjust priority given to a specific program?
Processes
Which computer function takes data through a series of procedures as defined by a set of instructions?
Processing
You turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while, but it doesn't appear that anything else is happening. The hard drive activity light doesn't show activity, and you never hear the sound that plays when Windows loads. Which of the following are the most likely cause of the problem?
Processor Video card Memory
The amount of time the processor spends performing non-idle tasks.
Processor utilization
A process put in place by Microsoft to reduce piracy.
Product Activation.
Telnet
Protocol that opens a plain-text unsecured remote console connection. Uses TCP port 23.
Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all.
Provides a high-level overview of the organization's security program. -- Organizational Security Policy Defines an employee's rights to use company property. -- Acceptable Use Policy Identifies the requirements for credentials used to authenticate to company-owned systems. -- Password Policy Identifies a set of rules or standards that define personal behaviors. -- Code of Ethics Sets expectations for user privacy when using company resources. -- Acceptable Use Policy Specifies that user accounts should be locked after certain number of failed logins attempts. -- Password Policy
Striping
Provides an increase in performance; Does not increase performance; Requires two disks; Has no overhead because all disk space is available for storing data.
RAID 5
Provides fault tolerance for a single disk failure; Provides an increase in performance for read operations.
RAID 10
Provides fault tolerance for a single disk failure; Provides redundancy and performance; Requires a minimum of four disks.
You manage a server that runs your company website. The web server has reached its capacity, and the number of clients requests is greater than the server can handle. You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content. Which solution should you implement?
Proxy Server
Match each description on the left with the appropriate cloud technology on the right.
Public cloud Provides cloud services to just about anyone. Private cloud Provides cloud services to a single organization. Community cloud Allows cloud services to be shared by several organizations. Hybrid cloud Integrates one cloud service with other cloud services.
You have a workstation running a 64-bit versions of Widows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the least amount of effort and cost.
Purchase a 64-bit upgrade version of Windows 10; perform an in-place upgrade.
You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. What should you do?
Purchase a full version of Windows 10; perform a custom installation.
You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers?
Put the database server on the private network Put the Web server inside the DMZ
While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. What action should you take?
Quarantine the files.
You have a file which you would like other users to see, but not modify. Which file attribute should you use?
R
You have a file which you would like other users to see, but not modify. which file attribute should you use?
R
You have a file which you would like others users to see, but not modify. which file attribute should you use? a. R b. A c. H d. S
R
Which of the following drive configurations uses striping with parity for fault tolerance?
RAID 5
You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement?
RAS
Which of the following protocols has a limit of 15 hops between any two networks?
RIP
The immediate preservation of evidence is paramount when conducting a forensic analysis. Which of the following actions is most likely to destroy critical evidence?
Rebooting the system
You recently purchased a USB audio headset and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic. click the tab you would use in the Sound Properties window to do this.
Recording
You recently purchased a USB audio headset and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic. Click the tab you would use in the Sound Properties window to do this.
Recording
Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a unstable state. During the recovery process, you want to preserve as much data as possible including apps purchased from the Microsoft Store as well as your user's data files. Which option should you use?
Refresh Your PC
Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a usable state. During the recovery process, you want to preserve as much data as possible including apps purchased from Microsoft Store as well as your user's data files. Which option should you use?
Refresh Your PC
Which tool lets you view and directly edit the registry?
Regedit
What tool can you use in the Control Panel to control how many times, dates, numbers, and currency are formatted and displayed for your computer?
Region and Language
You use your computer to type documents in Portuugese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. What tool would you use to configure your computer for the new keyboard so you can switch between the Portuguese and the English keyboards?
Region and Language in the Control Panel
Even if you perform regular backups, what must be done to ensure that you are protected
Regularly test restoration procedures.
Even if you perform regular backups, what must be done to ensure that you are protected against data loss?
Regularly test restoration procedures.
You ave configured your Windows systems to automatically back up user data every night at midnight. You also take a system image back up once a month. What else should you do to ensure that you are protected against data loss?
Regularly test restoration procedures. Store a copy of all backups off-site.
Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks.
Remote Assistance
The fan in a 450-Watt power supply is malfunctioning. What action should you take?
Remove and replace the power supply
Marcus was attempting to tweak his workstations operating system when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. After pressing f8 , which option should be choose?
Repair your computer
Two-way mirror
Requires at least two storage devices. The data is written to two devices. Two-way mirror requires twice as much device space as the amount of storage allocated to the storage space. This option protects you from a single storage devices failure.
Which of the following does not accurately describe an iSCSI SAN?
Requires special hardware and knowledge to implement.
A file you have been working on for several days was corrupted when you shut your Windows 7 system down uncleanly. You want to restore a previous version of the file, overwriting the existing file that has been corrupted.
Restore
The chain of custody is used for what purposes?
Retaining evidence integrity by identifying people coming into contact with evidence
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in Vlan 1 needs to communicate with a device on the same switch which is in VLAN2. What should you configure so that the two devices can communicate?
Routing
You have a computer that currently has Windows Vista installed. You want to upgrade the system to Windows 10. You want to retain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?
Run Scanstate in Windows Vista. Perform a clean ( custom) installation of Windows 10 on the existing hard drive. Boot into Windows 10 and reinstall all applications. Run Loadstate.
You have a computer that currently has Windows Vista installed. You want to upgrade the system to Windows 10. You want to retain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?
Run Scanstate in Windows Vista. Perform a clean (custom) installation of Windows 10 on the existing hard drive. Boot into Windows 10 and re-install all applications. Run Loadstate.
You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer running Windows Vista to the new computer. How can you do this with the least amount of effort?
Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications.
You have just purchased a new computer that runs Windows 7. You would like to transfer all of the applications and user data from your old computer running Windows XP to the new computer. How can you do this with the least amount of effort?
Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications.
You have installed anti-malware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next to make sure that there aren't any existing files on your system that are infected?
Run a full scan. Download the latest definition files.
You have a custom database application that your company has been using for several years. The application worked correctly when your organization used Windows XP systems. Recently, you purchased new Windows 10 systems for you sales team members. Each user is a member of the Users group on the local systems. you install the custom application successfully. When the sales employees log on and try to run the application, the program splash screen loads, but then seems to hang. What should you do first?
Run the application as Administrator.
You have a Windows 10 system that was recently upgraded from Windows 7. One of the installed applications worked fine under Windows 7, but now does not run in Windows 10. you have check the application vendor's website but there is no update available. What should you try next to run the application?
Run the application in compatibility mode.
You manage Windows desktops for you organization. You recently updated all you workstations to Windows 7. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. What should you try next to run the application?
Run the application in compatibility mode. Create a virtual computer that runs Windows XP. Run the virtual computer each time the application runs.
You have a Windows 7 computer that was recently upgraded from Windows XP. An installed application worked fine in Windows XP, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. Which options should you try to run the application?
Run the application in compatibility mode. Run the application in XP mode.
You have recently been called to troubleshoot network connectivity problems at a user's workstation. You have found that the network cable runs across high-traffic areas on the floor, causing the cable to wear through and break. You have replaced cable with a plenum rated, shielded, twisted pair. You would like to minimize the problem and prevent it from happening again. What should you do?
Run the cable through the ceiling area instead of across the floor
As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.)
SFTP SCP
Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call?
SIP
Which of the following protocols are used with VoIP
SIP Sessions Initiation Protocol RTP Real-Time Transport Protocol
SFTP uses which mechanism to provide security for authentication and data transfer?
SSH
Which of the following can be used to create a secure connection to a remote server?
SSH
Which of the following network services or protocols uses TCP/IP port 22?
SSH
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH
Which of the following tools allow for remote management of servers? (Select two.)
SSH Telnet
You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP?
SSID
Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?
SSID broadcast
FTPS uses which mechanism to provide security for authentication and data transfer?
SSL
Which protocol does HTTPS use to offer greater security in Web transactions?
SSL
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet?
SSL
You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)
SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?
SaaS
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satellite
Which of the following is the most susceptible to interference related to atmospheric conditions?
Satellite
Good documentation will:
Save you time and money in troubleshooting problems. Explanation By keeping adequate documentation, you can reduce the time and money spent troubleshooting. While documentation can help reduce troubleshooting, it can never completely eliminate it. Documentation helps you know when regular maintenance of hardware is required, but does not eliminate maintenance.
Youre troublshooting a computer running windows 7. The operating system has halted and a blue screen has been displayed on the monitor with an error message. What is the first step you should take in troublshooting the issue?
Search for the error in Microsoft's knowledgebase or in a search engine on the internet
You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. What is the first step you should take in troubleshooting the issue?
Search for the error in Microsoft's knowledgebase.
Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment. What should he do next?
Select Troubleshoot > Advanced Options > Startup Repair
Remote Desktop Service
Service only supported by Windows Professional, Business, Enterprise, and Ultimate.
Which of the following tools can you use to start the print spooler service if it is currently stopped? select two
Services console and net start
Which of the following protocols is used during the call control process of multimedia communications?
Session Initiation Protocol
One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (you account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?
Set a screensaver password. Disable autorun on the system.
You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?
Shredding.
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?
Smurf
Remote Desktop Client
Software available on all editions of Windows.
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427. What is the source on this network traffic?
Someone is using Voice over IP (VoIP) to make a telephone call.
You have just installed a packet-filtering firewall on your network. What options will you be able to set on you firewall?
Source address of a packet Destination address of a packet Port number
Which of the following solutions would you implement to eliminate switching loops?
Spanning tree
You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?
Spanning tree
Which of the following solutions would you implement to eliminate switching loops?
Spanning-tree
You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?
Spanning-tree
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?
Spanning-tree
You are looking at a female TRS connector on the computer. Which device uses this connector?
Speaker
Which of the following best describes the use of Libraries in Windows?
Special folders that group files and folders, possibly stored in both local and network locations, into a single logical folder.
One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?
Split horizon.
A router on the border of your network detects a packet with a source address that is from an internal client but the packet was received in the Internet-facing interface. This is an example of what form of attack? (#1)
Spoofing
You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible?
Standardization
Match each Windows version on the left with its associated features on the right. Each Windows version can be used once, more than once, or not at all.
Start Screen similar to the Windows Phone - Windows 8/8.1 Enhanced Aero features including Snap, Shake, and Peek - Windows 7 Windows Sidebar - Windows Vista Metro design interface - Windows 8/8.1 Free upgrade available - Windows 10 Introduced the Libraries feature - Windows 7 Microsoft Edge web browser - Windows 10
You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To increase performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.
Startup
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?
Static
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?
Static
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?
Static NAT
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow Internet hosts to contact the server to browse a personal Web site. What should you use to allow access?
Static NAT
What is the difference between static and dynamic routing?
Static needs to have the routing table manually configured while dynamic is configured by sharing routing data.
Arrange the Fiber Channel SAN implementation tasks in the order they should be performed.
Step 1 - Install a Fiber Channel adapter in each server that will access the shared storage on the SAN. Step 2 - Deploy a Fiber Channel switch. Step 3 - Connect each server to the Fiber Channel switch using the appropriate fiber optic cabling for the equipment your are using. Step 4 - Deploy a shared storage device.
Ease of adding space
Storage spaces eliminates the need for such tasks as repartitioning drives, resizing volumes, and backing up data in order to repartition. When you need more disk space for your storage space, follow these steps. Install a new storage device to the system/Add the free space on that device to a storage pool./ Allocate space to an existing storage space.
Which of the following devices helps protect against temporary, above-normal voltages?
Surge protector
You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?
Switch
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
Switch port
What problems does the Spanning Tree Protocol prevent?
Switching loops from developing when redundant paths are implemented between switches.
You need to configure when Windows checks for and downloads updates from Microsoft's update servers on a Windows 7 system. Which option in control Panel should you use to do this?
System and Security
You need to enable Remote Desktop on a user's Windows 10 system s that you can manage it over the network from your office. Click the option you would use in Control Panel to do this.
System and Security
You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. click the option you would use in Control Panel to do this.
System and Security
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)
TKIP encryption Preshared key
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
TLS and SSL
As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. How should you best address the situation?
Tactfully explain the problem without accusing or judging the customer
One of the programs that launch automatically at startup is causing your Windows 10 workstation to lock up. You have examined the Startup folder, and the problem application is not present. Which Windows utility should you use to prevent the program from starting automatically?
Task Manager
Your computer has a quad-core processor that supports multi- threading installed. Given that the system is running Windows, how can you verify whether multi-threading has been enabled?
Task Manager can display CPU utilization graphs for eight processors.
Your computer has a single core processor that supports hyper-threading. in Windows how can you verify whether hyper-threading is enabled? (task manager)
Task Manager will show CPU utilization graphs for two processors.
Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?
Task Scheduler
Which tool lets you automatically start an application or run a script based on triggers?
Task Scheduler
You have an application that you would like to run every Monday a 3 p.m. on your Windows workstation. Which tool would you use to configure the application to run automatically?
Task Scheduler
You have an application that you would like to run every Monday at 3 .m. on your Windows workstation. Which tool would you use to configure the application to run automatically?
Task Scheduler
You are the PC technician for a company. An employee comes to you extremely worried that his printer has broken and it is imperative that his documents are printed in time for a very important presentation he is giving in just 10 minutes. How should you respond?
Tell the employee that most printer problems are easy to fix and you will do your best to get his project printed as soon as possible
An employee demands that she needs more RAM for her computer in order to complete her work tasks, but you know that her department isn't budgeted for new equipment. Your supervisor is the only one that has the authority to allocate department funds. How should you respond?
Tell the employee that she isn't currently budgeted for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be required
A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next?
Test the solution Explanation After implementing the solution, verify full system functionality. Make sure that the solution has fully fixed the problem and has not caused any other problems. Document the problem and solution after it has been fixed and verified. Determine if escalation is needed and create an action plan before implementing the solution.
A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. What should you do next in your troubleshooting strategy?
Test the solution Explanation After you implement a solution, you should always verify full system functionality. Sometimes more than one problem exists, or your solution may not have solved the problem. For example, in this case an incorrect driver for the video card could potentially continue to cause display issues. By verifying system functionality, you can ensure the problem is completely resolved. Explaining what you did, implementing preventative measures, and documenting the solution would occur after you have tested the solution to make sure the problem is completely fixed.
What does the /a switch used with the copy command indicate?
That the files is an ASCII text file
You administer a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: • IP address: 192.168.23.8 • HTTP Port: 1030 • SSL Port: 443 Users complain that they can't connect to the Web site when they type www.westsim.com. What is the most likely source of the problem?
The HTTP port should be changed to 80.
You administer a web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the website as follows: -IP address: 192.168.23.8 -HTTP Port: 1030 -SSL Port: 443 Users complain that they can't connect to the website when they type www.westsim.com. What is the most likely source of the problem?
The HTTP port should be changed to 80.
What is the relationship between the host and the guest operating systems?
The Host system provides the hardware resources. The Guest operating system provides the software environment via virtual hardware
No Media
The No Media status shows for an optical or removable media drive that does not contain a valid disc. This disk status only applies to CD-ROM, DVD-ROM, or removable disks.
A user needs to copy a file from an NTFS partition o a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and encryption. When the folder is copied, is true? a. The R attribute is retained on the file. b. Only the NTFS permissions are retained on the file. c. The R and encryption attribute are retained on the file. d. None of the NTFS permissions or attributes are retained on the file. e. The attributes and NTFS permissions are retained on the file.
The R attribute is retained on the file.
A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?
The R attribute is retained on the file.
A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?
The R attributes is retained on the file
A user needs to copy a file from NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?
The R attributes is retained on the file.
A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified treat management (UTM) device that provides multiple security features in a single network appliance: -Firewall -VPN -Anti-spam -Antivirus You join the UTM device to the company's Active Directory domain. The company's traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public WiFi networks. What weaknesses exist in this implementation?
The UTM represents a single point of failure.
Whcih of the following is true about a primary partitions?
The active partition must be a primary partition
What does a beeping from the UPS mean?
The computer is running on the UPS battery power
Which of the following describe the EDGE cellular technology? (select two.)
The first Internet compatible technology Offers speeds of 400-1,000 Kbps
windowsPE configuration pass
The first configuration pass performed during Setup, which can be used to perform task such as disk partitioning and entering the product key.
Formatting
The formatting status is shown for volumes during the formatting process. After formatting, the status for the volume changes to healthy
Healthy or Online
The healthy or online status indicates that the disk is turned on and can be accessed. The volume on the disk is valid and has no errors.
Your iPad is configured to do remote backups everyday to iCloud. What conditions are required for the iCloud backup to take place. (Select three)
The iPad has to be plugged into a power source The iPad has to have an Internet connection The iPad screen has to be locked
Initializing
The initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to healthy
Missing Offline
The missing or offline statuses show when a dynamic disk has failed, been removed, or turned off. If the disk is turned off, turn it back on, then reactivate the disk. If the disk no longer exists, then delete the disk from Disk Management.
Not Initialized Unknown
The not initialized or unknown status indicates a disk without a valid master boot record or partition table (either missing or corrupt). To correct the problem, initialize the disk. If the partition table is invalid, use third party tools to try to recover the partition table.
Which of the following are true regarding using multiple VLANs on a single switch?
The number of collision domains remains the same. The number of broadcast domains increases.
Configuration Set
The subset of files from a distribution share that are required for a particular answer file. A configuration set is more compact than a distribution share.
You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the neccessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?
The system is vulnerable because LEAP is susceptible to dictionary attacks.
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the necessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?
The system is vulnerable because LEAP is susceptible to dictionary attacks.
You suspect that an Xmas tree attack is occurring on a system. Which of the following could result if you do not stop the attack?(Select two)
The system will be unavailable to respond to legitimate requests AND the threat agent will obtain information about open ports on the system
Unallocated
The unallocated status shows for portions of a disk that have not been assigned to a partition or volume.
Your organization uses an 802.11g wireless network. Recently, other tenants installed the following equipment in your building: * A wireless television distribution system running at 2.4 GHz * A wireless phone system running at 5.8 GHz * A wireless phone system running at 900 MHz * An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range * An 802.11n wireless network running in the 5.8 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
The wireless TV system
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a Windows server on the following ports: -137 -138 -139 What is the source of this network traffic?
The workstation is using NetBIOS to access shared resources on the server.
Thin provisioning
Thin provisioning or overbooking allows you to allocate larger storage spaces than the disk space available in the pool.
auditUser configuration pass
This configuration pass is performed after user sign-in when Sysprep triggers Windows 10 into audit mode.
auditSystem configuration pass
This configuration pass is performed before user sign-in when Sysprep triggers Windows 10 into audit mode.
Remote Client
This device establishes the connection and logs on to the remote host.
Firewall
This must be configured in order to allow remote desktop connections. Open port 3389.
Which of the following technologies does GSM use to allow multiple connections on the same frequency?
Time division multiple access
When would you create a static routing table entry?
To define a default route for routing.
What purpose does a wireless site survey serve? (Choose two)
To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.
What is the primary purpose of gateway redundancy?
To overcome a single point of failure on the next hop router
Why should backup media be stored offsite?
To prevent the same disaster from affecting both the network and the backup media.
Why should backup media be stored offsite?
To prevent the same disaster from affecting both the system as well as its associated backup media.
Which TCP/IP utility gives you the following output? 2 14 ms <10 ms 14 ms loopback0.GW1.SLT1.ALTER.Net (137.39.2.123)
Tracert
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security?
Train the receptionist to keep her iPad in a locked drawer when not in use.
False
True/False User data will be modified when using a system restore point?
Which are examples of a strong password?
TuxP3nguinsRn0V3l. il0ve2EatIceCr3am.
How can you see a list of valid switched for the cd command? a. Type cd | more b. Type cd help c. Type cd /? d. Type cd list
Type cd /?
Which connector on the back of a computer is used to attach a mouse to a modern PC system?
USB A
You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 10. You need to transfer use profile information and data files from ComputerA to ComputerB. Which tools could you use to do this?
USMT Windows Easy Transfer
You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 10. You need to transfer user profile information and data files from ComputerA to ComputerB. Which tools could you use to do this?
USMT Windows Easy Transfer
You have been asked to install Windows 7 on 10 different computers for a new branch office you company is setting up. The computers have been purchased from different companies and have different hardware. Which methods should you use to reduce the installation time and the effort you need to spend?
Unattended
This Windows 10 Installation type does NOT require admin Intervention.
Unattended Installation.
Which of the following are characteristics of VDSL? (Select Two)
Unequal download and upload speeds Supports both data and voice at the same time
You've been asked by upper management if there is a way to integrate phone calls, email and instant messaging into a single platform. Which of the following systems should you recommend to them?
Unified communication
What is the best way to protect a computer from power spikes during an electrical storm?
Unplug the computer from the AC outlet
Also referred to as an "In-place upgrade"
Upgrade Installation
Microsoft now recommends this installation type.
Upgrade installation "In-place upgrade"
Migrates the users settings, files, and applications that existed in the previous operating system.
Upgrade installation.
You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without loosing any data. What should you do?
Upgrade the disk to a dynamic disk
You are preparing for an installation of 64-bit Windows 10 on a computer that is currently running a 64-bit version of Windows 7. You perform a hardware inventory on the computer and not the following: -Processor = 2.0 GHz -Free Hard Drive Space = 200 GB -RAM = 1 GB -DVD drive = 18x -100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 7. What should you do?
Upgrade to at least 2 GB of RAM.
Upgrade the hard disk
Upgrade to the fastest hard disk possible. Hard disk drives come in a variety of different rotation speeds such as: 5400, 7200, and 10,000 rpm
Basic
Use Primary and extended partitions, Supported by all operating systems,
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a locked server closet. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router's console port. You've configured the device with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
Use SCP to back up the router configuration to a remote location.
You have an application that processes videos used in your online business, which requires a significant amount of processor time. You want to make sure that the application receives adequate access to the CPU, even if you open other applications. How can you adjust the amount of attention given to that application?
Use Task Manager to modify the process priority.
You have an application that renders videos in your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application?
Use Task Manager to modify the process priority.
You have an application that processes videos used in your online business, which requires a significant amount of processor time. You want to make sure that the application receives adequate access to the CPU, even if you open other applications. How can you adjust the amount of attention given to that application?
Use Task Manager to modify the process' priority
You have been recently hired to manage a network for a small company. Prior to your arrival, the entire network was migrated from IPV4 to IPv6. Each of the two functional groups within the organization has its own network segment that is separated from the other with a router. All network segments with the organization use a /64 prefix, including the point-to-point backbone segment that connects the two routers. You are concerned that Neighbor Discovery (ND) issues could occur between the two routers on the backbone segment. Which strategy could you employ to help prevent these issues from occuring?
Use a /127 prefix on the backbone segment
You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do?
Use a router to configure a subnet for the accounting computers
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address you concerns?
Use cable locks to chain the laptops to the desks.
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?
Use data wiping software to clear the hard drives.
You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. What should you do?
Use dynamic disks and a spanned volume
You have a company network that is connected to the Internet. You want all users to have Internet access, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.
How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?
Use the Disable automatic restart after failure option on the Advanced Startup Options menu.
You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. You want to gather the necessary information as quickly as possible. What should you do?
Use the Microsoft Assessment and Planning Toolkit (MAP).
You recently purchased a copy of Windows 10 from a retail store. However, the system you want to install Windows on doesn't have an optical drive. What is the best option to install Windows in this scenario?
Use the Windows 7 USB/DVD Download Tool to copy the installation files to a USB flash drive.
How do you set file attributes? (Select Two) a. Use the attrib command. b. Use the set command. c. Right-click the file, then select Attributes. d. Right-click the file, then select properties. e. Use the assign command.
Use the attrib command. Right-click the file, then select properties.
how can you reformat a drive from FAT32 to NTFS without losing the existing data?
Use the convert command at a command prompt
You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the design folder that apply when files are accessed both locally and remotely. What should you do?
Use the convert command from FAT32 to NTFS permissions.
You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?
Use the convert command to convert from FAT32 to NTFS, then configure NFTS permissions
You have a hard disk that is formatted with the FAT32 files system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?
Use the convert command to convert from FAT32 to NTFS, then configure NTFS permissions.
Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation?
User Account Control (UAC)
Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations?
User Account Control (UAC)
Which component of Windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?
User Account Control (UAC)
which windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation
User Account Control (UAC)
Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations?
User Account control (UAC)
Windows 10 stores user settings in ________________
User Profiles Stored as a folder in the C:\users\directory
You manage over 100 desktop computers, all currently running Windows Vista. You recently purchased replacement computers that have Windows 10 pre-installed. You want to move user data and setting from the old computers to the new computers . Which tool should you use?
User State Migration Tool
You manage over 100 desktop computers, all currently running Windows Vista. You recently purchased replacement computers that have Windows 10 pre-installed. You want to move user data and settings from the old computers to the new computers. Which tool should you use?
User State Migration Tool
Migrates encrypting file system (EFS) certificates with the /copyraw option.
User State Migration Tool.
Moves desktop settings and applications. Features include: capture user configuration state, apply user configuration state, migrate encrypting file system (EFS) certificates with the /copyraw option.
User State Migration Tool.
On a Windows system, whcih of the following is true of using groups?
User accounts are made members of a group. Group members have the access rights assigned of the group.
On Windows system, which of the following is true of using groups?
User accounts are made members of a group. Group members have the access rights assigned to the group.
On a Windows system, which of the following is true of using groups?
User accounts are made members of a group. Group members have the access rights assigned to the group.
A tool Part of the Windows 10 assessment and development kit (ADK) that is used to migrate user settings and files
User state migration tool (command-line utility)
Uses scripts to migrate settings and files.
User state migration tool (command-line utility)
You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only th emunumum rights necessary on the computer. Which group should this user be a member of?
Users
You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of
Users
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
Users with the correct WEP key
Which of the following statements about SSL VPN are true? select two
Uses port 443 Encrypts the entire communication session
Which of the following statements about an SSL VPN are true?
Uses port 443. Encrypts the entire communication session.
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
VLAN
Which switch features are typically used with VoIP?
VLAN PoE
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?
VLANs
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
VPN concentrator
Your organization employs a group of traveling salespeople who need to access the corporate home network through the Internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which solution should you implement?
VPN concentrator.
Match the Cisco device password type on the left with its functions on the right.
VTY -Controls the ability to log on though a LAN or WAN interface configured on the device. EXEC -Controls the ability to switch configuration modes Console -Controls the ability to connect to the device using a direct connection
You want to purchase a home theater computer system. Which hardware selection criteria would be most improtant for this system?
Video card with HDMI output HTPC form factor
What is the purpose of the Services Snap-in?
View and manage software processes running in the background
What is the purpose of the dxdiag tool?
View information related to DirectX operation
What is the purpose of the dxdiag tool?
View information related to DirectX operation.
Recently, a Windows 10 update was automatically download and installed on your Windows 10 system. However, after installing the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.
View your update history
Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. However, after installing the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again.
View your update history
Match the firewall type on the left with its associated characteristics on the right. Each firewall type may be used once, more than once, or not at all.
Virtual Firewall -Operates at Layer 2 -Does not count as a hop in the path between hosts. -Each interface connects to the same network segment. Routed firewall -Operates at Layer 3 -Counts as a hop in the path between hosts -Each interface connects to a different network.
Which of the following is another name for the paging file?
Virtual Memory.
Logical Segmentation
Virtual addressing assigns data to?
Which of the following is another name for paging file?
Virtual memory
You own a custom PC retail store. A small business client asks you to build three workstations for her organization: -Virtualization Workstation -Video Editing Workstation -Thin Client PC
Virtualization Work Station -AMD 12-core, 4 GHZ CPU -4 TB SATA HD -32 GB DDR4 RAM -HAV Video Editing Workstation -Intel Core i7 six-core, 3.4 GHZ CPU -2 TB SSD SATA HD -16 GB DDR4 RAM -Video capture card Thin Client PC -Intel Celeron dual-core, 2.7 GHz CPU -500 GB SATA HD -2 GB DDR3 RAM -Few or no applications installed
Is used to provide activation services for Windows Operating Systems and Microsoft Office.
Volume Activation Management Tool (VAMT)
Dynamic
Volumes on dynamic disks are like partitions and logical drives on basic disks. Supports up to 128 volumes, Support volumes that use discontiguous disk space, Simple volumes contain disk space from a single hard disk, Spanned volumes contain disk space from multiple hard disks, grouped together into a single volume.
Which of the following offers the weakest form of encryption for an 802.11 wireless network?
WEP
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
Is a file-based image format that stores multiple images in a single file.
WIM
You have a windows xp professional wokstation that does not currently have the recovery console installed. Which command should you use to install the recovery console?
WINNNT32/ CMDCONS
Which of the following provides security for wireless networks?
WPA
You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?
WPA2 and AES
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?
Wait for convergence to take place.
The presence of unapproved modems on desktop systems gives rise to the LAN being vulnerable to which of the following?
War dialing
Applications for mobile devices fall into two categories; some have been reviewed, approved, and signed with a certificate by the app service while some have not.
What category do apps fall into if they have been signed with a certificate? Trusted What category do apps fall into if they have not been reviewed, approved, and signed with a certificate? Untrusted Explanation Apps that have been reviewed, approved, and signed with a certificate by the app service are referred to as trusted apps. Apps that have not been reviewed, approved, or signed with a certificate by the app service are referred to as untrusted apps. Untrusted apps might be safe but it is risky to install them and most devices won't allow them to be installed by default.
NTFS
What file architecture is needed on you hard drive that only works system restore?
Virtual Memory Manager
What handles paging?
Incident Response
What happens in response to a security incident
Reinstalls windows
What happens when you refresh Your PC
paging out
What is it called when a page file is written to the HD?
Paging in
What is it called when the page file is sent to the HD?
Disable services
What is one of the actions you can do in the command prompt Recovery environment?
Enable services
What is one of the actions you can do in the command prompt Recovery environment?
Overwrite corrupted files
What is one of the actions you can do in the command prompt Recovery environment?
Partition drives
What is one of the actions you can do in the command prompt Recovery environment?
Read boot logs
What is one of the actions you can do in the command prompt Recovery environment?
Read the hard disk
What is one of the actions you can do in the command prompt Recovery environment?
Repair corrupt MBR
What is one of the actions you can do in the command prompt Recovery environment?
Write to hard disk
What is one of the actions you can do in the command prompt Recovery environment?
format drives
What is one of the actions you can do in the command prompt Recovery environment?
Backup and Restore
What is one of the methods to recover lost data files?
File History
What is one of the methods to recover lost data files?
Previous Version
What is one of the methods to recover lost data files?
Command Prompt
What is one of the methods to recover your System?
Recover disc/partition
What is one of the methods to recover your System?
Refresh This PC
What is one of the methods to recover your System?
Reset This PC
What is one of the methods to recover your System?
Startup Repair
What is one of the methods to recover your System?
System Image Recovery
What is one of the methods to recover your System?
System Restore
What is one of the methods to recover your System?
Program files
What is one of the three things System Restore takes, when it makes a Restore point?
Registry Files
What is one of the three things System Restore takes, when it makes a Restore point?
1.5
What is the minimum multiplier for moderate amount of physical ram?
Command line mode
What is the mode when I try to leave Insert Mode?
File History
What is the new name of Previous Versions?
4.0 MB
What is the size of a page file?
4096 KB
What is the size of a page file?
Esc
What key needs to be pressed to leave insert mode?
Replace Mode
What mode preforms a full adjustment of text by placing the selected text with new texted?
What is convergence?
When all routers have the same routing info.
Page fault
When an application has been paged out it cause a what?
Under what conditions should you choose exFAT over FAT32 or NTFS? (Select 2)
When creating a volume over 32 GB in size When formatting removable flash devices.
Windows 8
When did Refresh or Reset this PC show-up?
Under what condition should you choose exFAT over FAT32 or NTFS?
When storing files larger than 4GB in size. When formatting removable flash devices.
Enterprise
Which is one of the versions of Windows 7 that have Previous Versions available?
What does the rd command do when used with the /q switch?
Will not prompt you to confirm deletions
What does the /q switch the rd command do? a. Runs a query. b. Will not prompt you to confirm deletions. c. Reverses a drive deletion d. Removes sub directories in addition to files in the current directory.
Will not prompt you to confirm deletions.
What does the /q switch with the rd command do?
Will not prompt you to confirm deletions.
Which operating system(s) include the following features? • Cortana • Cloud storage • Continuum • Microsoft Store • Microsoft Edge
Windows 10
Aero is a feature of which Windows versions and editions?
Windows 7 Home, Professional, ultimate and Enterprise
You remove a hard disk from a Windows 7 system and put it in another system that is running Windows 98. You are unable to read the disk. What is most likely the problem?
Windows 98 doesn't support NTFS.
Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (3) a. Device Manager b. Windows Explorer c. Network Neighborhood d. Computer e. Computer Management f. Network
Windows Explorer Computer Network
A new tool that helps create provisioning packages and create image media.
Windows Imaging and Configuration Designer (ICD)
A limited and non-GUI version of Windows 10
Windows PE
Can be used for installing, troubleshooting, and repairing Windows 10.
Windows PE
Controls the installation process When you boot from the Windows 10 Installation DVD.
Windows PE
Is a graphical tool for configuring unattended installs creating distribution shares.
Windows SIM Stands for Windows system image manager.
Windows 10 ADK Includes
Windows performance ToolKit Windows Assessment Toolkit
Which of the following forms of networking is highly susceptible to eavesdropping and must be secured accordingly?
Wireless
Boot Sector
With Startup Repair you can Verify windows boot files, Compare check sum and inspect and repair what?
You currently use the Thunderbird e-mail client on your desktop PC. You use it to connect to an e-mail server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad and want to configure its Mail app to connect to your e-mail server. Can you do this?
Yes, you can configure the Mail app on an iPad to connect to an e-mail server using the IMAP and SMTP protocols
In which of the following situations would restoring from a backup be the best option?
You accidentally deleted several important e-mails and need to restore them. You need to restore several word processing files that were accidentally deleted from your Documents folder.
Test the solution.
You are responsible for managing client workstations for your company. A user calls and explains that her monitor does not work. While troubleshooting the issue, you discover a bad video card in the system. You replace the card you connect the monitor cable to the card. What should you do next in your troubleshooting strategy?
Verify full system functionality.
You are responsible for managing client workstations for your company. A user is unable to access data an external hard drive. You investigate the problem in determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next?
Determine if escalation is needed.
You are responsible for managing client workstations for your company. A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. What should you do next?
Perform a backup.
You are responsible for managing client workstations for your company. A user reports that her system is running slow when saving files. You identify what has changed in determine that you would need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Up to this point, which step have you forgotten in your publishing process?
Create an action plan.
You are responsible for managing client workstations for your company. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next?
Document the solution.
You are responsible for managing the clients workstations at your company. A user in the conference room called concerning the digital projector and display issues when the projector is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. What should you do next in your troubleshooting strategy?
Check the manufacture's Web site for information about the error.
You had just installed a new USB card reader in your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?
You're formatting a newly-installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used. Which of the following scenarios would require selecting the FAT32 file system?
You need the disk to be backwards-compatible with older versions of Windows
You're formatting a newly-installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used. Which of the following scenarios would require selecting the FAT32 file system?
You need the disk to be backwards-compatible with older versions of Windows.
In which of the following situations would restoring from a system image be the best option?
You need to restore a Windows system after a catastrophic hard drive failure.
In which of the following situations would restoring from a system image be the best option?
You need to restore a Windows system after catastrophic hard drive failure.
Given that you are using a Windows 10 system, in which of the following situations would reverting to a System Restore point be the best option?
You recently installed a new application and now the system behaves erratically.
I which of the followinf situations would driver rollback be the best tool to use?
You recently installed aa new video driver and now the system behaves erractically/
Which of the following statements about cleaning monitors and display devices is true?
You should clean the monitor while it is powered off and with the power plug removed to avoid getting a shock
You have a computer currently running Windows 7. Which of the following reasons would justify performing a clean installation of Windows 10 on the system instead of an upgrade?
You want to dual boot both operating systems.
In which of the following situations would you most likely implement a demilitarized zone (DMZ)?
You want to protect a public Web server from attack.
In which of the following situations should you install a firewall?
You want to restrict Internet users from accessing private date on you network.
You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?
Your copy is the same as the copy posted on the website
You want to use the Universal Naming Convention (UNC) format to access a shared folder called pictures on a computer named HOME1. whcih format would you use? a. Home1:Pictures b. .Home1:Pictures c. Home1:\\Pictures d. \\Home1\Pictures
\\Home1\Pictures
Orphaned
________ files are files that exist on the hard drive but which are not associated with a directory in the index. Normally Check disk can re-associate the file with the correct directory.
operator
a "switch" that determines if RNA polymerase can attach and begin transcription
What is DMZ?
a demilitarized zone or screened subnet. Is a buffer network (subnet) that sits between the private network and untrusted network (such as the internet)
zero day
a hack used before a patch is released
Scareware
a program that tricks the user into believing it actually has a virus
Virus
a program that tries to damage a computer and also replicate itself onto others
HTTP proxy
a type of proxy that only supports web traffic
SOCKS 5
a type of proxy that support most types of traffic
spyware
a type of virus that watches everything you do and report back to a server
a customer complains that a recently purcchased monitor no longer displays a picture. you verify that the monitor is powered on and that the video cable is securley fastened to the video port. Which fo the following actions should you direct the customer to take nesxt/
adjust the monitors settings using controls on the monitor
AES
advanced encryption standard, very efficient and only crack able by brute force
you are the administrator for your company and you have been asked to get the company accounting program installed on some new windows 7 laptops. When you install this software one the new PCs you discover that it will not run because User Account Control keeps causing it to fall. Because the accounting program was designed by the company and it will not be upgraded anytime soon, you must get it to work as is with UAC. What can you do to get the application to work with UAC. Choose the best solution
alter the program settings to Run this program as an administrator
You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?
apt-get install httpd
Standard ACL's should be placed?
as close to the destination as possbile.
Extended ACL should be placed?
as close to the source as possible.
man in the middle attack
attacker gets in between the client and server and steals information
http hijacking
attacker hijacks users cookies and uses them to steal the http session
pharming
attacker makes a website that appears to be a real legitmate website
replay attack
attacker sniffs authentication info and uses it at a later time
You are working at a command line and want to add the read-only attribute to a file and remove the hidden attribute. Which command would you use?
attrib +r -h
You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. which command would you use? a. attrib +ro -h b. attrib add r remove h c. attrib +r -h d. attrib /add r /remove /h
attrib +r -h
When you create an ACL on a Cisco device, a "deny any" statement is?
automatically added at the end of the list (this statement does not appear in the list itself)
What would you enter at the command prompt to start a new Bourne-again shell (bash) session? (typed)
bash
What type of authentication would require a user fingerprint or face recognition to get past the screen lock on a mobile device and get access to the device?
biometric Explanation A biometric authentication system attempts to identify a person based on metrics, or a mathematical representation, of the subject's biological attributes such as a fingerprint or a face recognition.
Which of the following represent the correct boot sequence in windows xp after the bios has passed control over to NTLDR?
boot - NT Detect - NTO
Which windows 7 operating system startup
boot configuration data
one day while trying to start your windows xp computer, the system displays the following error: invalid parition table. Which of the following will most likely fix the problem?
boot into the recovery console and run the fixmbr command on the boot volume
one day while trying to start your windows 7 compute.r The system displays the following error: windowss could not start because of a computer deisk hardware configuration problem. Could notread from the selected boot disk. Check boot path and disk hardware. Whichc of the following will most likely fix the problem?
boot into the recovery environment and run the bootrec/ rebuilding command
Greg. a graphic artist, installs a new art application on his windows 7 computer. The application prompts Greg to install an updated video driver, which is unsigned. Greg accepts the unsigned drive and completes the installation. Greg uses the system for several days, and then reports that his display doesnt seem to refresh properly under some conditions. You want to configure gregs computer to use the previous driver until the manufacturer provides a signed drived, but he still needs to able to use the appliation he installed. What should you do?
boot the system into safe mode. Open Device manager, and select the video driver. Open the drivers properties and select roll back driver.
You are troubleshooting a Windows 7 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating that the BOOTMGR is missing. You determine that this is a symptom of a corrupt or missing boot sector. To fix the issue, you do the following: 1. Boot the system from the Windows 7 installation DVD. 2. Access the Recovery Environment. 3. Open a Command window. Enter the command you can run at the command prompt to address this issue.
bootrec /fixboot
You are troubleshooting a Windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you do the following: 1. Boot the system from the Windows 10 installation DVD. 2. Access the Recovery Environment. 3. Open a Command window. Enter the command you can run at the command prompt to address this issue.
bootrec /fixmbr
mRNA breakdown
by enzymes in the cytoplasm
6 months ago, you purchased a new laptop. Since then, you have noticed that the battery life has been steadily going down. When it was new, a full charge lasted about 3 hours. Now you are lucky to geet 2 hours before the battery charge level drops below 5%. What should be your first step to correct this problem?
calibrate the battery
You replaced the print catridge on an inkjet printer. What should you do next?
calibrate the printer
A user reports that they are unable to access thier firewire drive after moving the pc form beneath the desk to the top of the desk. What is the most likely cause of this problem?
card is not properly seated
Which command would you use to change the current directory to the immediate parent directory?
cd ..
Which command would you use to change the current directory to the immediate parent directory? a. cd b. dir c. pdir d. cd ..
cd ..
you have a windows 7 system with two SATA hard drives, one used for the operating system and the other used for data. You have traced recent problems to a fault in the system motherboard. You replace the motherboard and reconnect all hardware. When you start the computer, the system shows the BIOS information screen, but then returns an error thatan operating system could not be found.What should you do?
change the boot order in the bios
you have purchases an LED monitor and connected it to the DVI port on your computer using a DVI cable.You configure the screeen resolution to 1440x900 with 24 bit color. The screen display seems to be fuzzy. What should yo do to correct the problem?
change the screen resolution to the native resolution of the monitor.
a dot matrix printer is printing faintly after replacing the print head, What should you do?
check the gap between the printer head and the paper
Mary reports that an applications shortcut icon no longer launches the application. You check your documentation and find that you have installed a new disk drive in her computer. What should you do first so Mary can run the application?
check the shortcut properties to make sure it is pointing to the correct file location
When running a program on a Windows System, you get an error message indicating that a specific file (not the .exe file) cannot be located. What should you try to fix the problem?
check the working Start in directory identified by the shortcut
a dot matrix printer is printing faintly after replacing the print head. what should you do?
checkthe gap between the printer head and the paper
Which of the following utilites would you use to correct cross linked clusters within the file system on a windows workstation?
chkdsk
Which of the following utilities checks the disk for bad clusters?
chkdsk
4. When designing the outer firewall packet filters, a common practice is to?
close all ports and open only those ports necessary for accessing the public resources inside the DMZ.
To enable management from a remote server, what do you do?
configure the default gateway.
You have ust replaced the motherboard in your computer. Your computer starts, but the hard disk light does not comeon on while the system is booitng. What should you do?
connect the hard disk, LED to the motherboard
block initiation of translation
controlled by inhibitory proteins
You recently purchased a new computer running windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old windows 2000 computer and placed on his new computer. Assuming the default directories are used during installation for both systems, which action is correct?
copy the fonts from C:\Winnt\Fonts to C:\Windows\Fonts.
JBOD
creates a single volume using space from two or more disks.
which term refers to a situation where tow files try to claim the same cluster on the hard disk?
cross linked clusters
You have just connected a new computer to your network. The network uses static ip addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?
default gateway
youvbe just installed a new video card in a users windows workstation. However, when you power the system on, the screen is displayedin 16 colors at 640x480 resolution . Which of the followingwill resolve this problem?
download and install the latest driver from the video card manufacturers web site
You have just installled a new device in your windows 7 computer using the devices installation disc and the included drivers. After installation, the system crashed when you tr to use the device. what should you do?
download the latst driver from the manufacturers web site
The video driver on your Windows 7 computer is preventing the system form strating up successfully. You have already downloaded an updated driver and copied it to the computers hard drive. Which mode should you select from the windows advanced boot options menu that would most likely allow you to start the computer to continue fixing the problem?
enable VGA mode
A user complains that his USb no longer works. You check Device Manager and see the iconwith a black down arrow on it> what should you do?
enable the device
a user complains that his usb scanner no longer works. You check Device mangaer and see the icon with a black down arrow on it. What should you do?
enable the device
Encryption vs compression
encryption only locks the file while compression makes it smaller
data transmission encryption
encrypts data when sent over a network
Which utility canbe used to vew when a service was stopped as well as any error messages generated by the service?
event viewer
you're troubleshooting a malfunctioning LCD display on a notebook computer system. After confirming that the notebook is recieving AC power, you plug in an external monitor. Ther external monitor does not display the output form the notebook after pressing the Fn key to toggle the display. Which of the following could be the cause?
failed video adapter
Lately you hear a clicking noise when reading or writing data from the hard disk. what is the most likely cause of the clicking?
failing hard drive
You have an existig computer that youve been using for years. you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor that is supported by the motherboard. when you star the computer, it beeps regurlaruly but nothing is shown on the screen and it doesnt start. What should you do?
flash the BIos Reinstall the old proocessor in the motherboard
after removing the printed paper from your laser printer, the toner smudges and can b wiped off in places. Which of the following is the most likely problem?
fuser rollers
You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?
iSCSI Initiator
When an ACL is applied to an interface, it?
identifies the list restricts incoming or outgoing traffic.
What would you enter at the command prompt on a Linux system to display the IP addresses and the subnet masks assigned to each network interface on a Linux system? (typed)
ifconfig
you manage a network that has multiple internal subnets. You connect workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig/ all and see the following: ... What is the most likely cause of the problem?
incorrect default gateway
You manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0 subnet which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. you run ipconfig/ all and see the following: ... What is most likely the cause of the problem?
incorrect subnet mask
epigenetic inheritance
inheritance of traits by factors not involving DNA sequence
In a SAN implementation, the servers that connect to shared storage devices are called _____________.
initiators
you're troublshooting an older laser printer that is creating accordion jams, where the paper is cumpled as it exists the printer moving into the output treay. What can you do to fix this problem?
install a maintenance kit
Your computer currently runs windows 7 eterprize edition. You ant to create a Raid 10 aray using four newly installed SATA disks. Whe you go to Disk Management, the option to create the Raid 10 array is not avaible. What should you do?
install an Add-on Raid controller
you are trying to print complex images on an older that uses a parallel connection to your workstation. The pages produced cut off the bottom third of each image you print. Which of the following resolutions will fix the problem?
install more memory in the laser printer
yuu have an existing computer urnning windows 7 entriprize. you want to configure a raid5 array in the computer. You install three new SATA drives, then use the Raid controller integrated into the motherboard to define a raid 5 array using them, when ou booot the computer, window does not show the logical raid drive you just created. what should you do?
install the drives for the raid controller
which of the following is a symptom of a dirty drum or roller in a laser printer?
lines or splotches repeated at regular intervals on the print jobs
What would you enter at the command prompt on a Linux system to display a list of files and subdirectories that exist within the present working directory? (typed)
ls
You have just finished upgrading the 250 W power supply in your desktop computer to a 450 W power supply. Now the bios doesnt recognize one of the hard disk drives in the system during POST. What should you do?
make sure that the hard disk is connected to the power supply
compression
making a files smaller to conserve space
You want to know more about the usage, command syntax, and the options available with the Linux ifconfig command. What would you enter at the command prompt to display this information about ifconfig? (typed)
man ifconfig
a computer has two hard disk drives installed on the primary IDE channel. You decide to move the second har drive to the second IDE channel. The secondary IDe interface ill have no other devies. How should you configure the second hard drive on the channel?
master or single
ACLs can be used to log traffic that?
matches the list statements.
you turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while but it doesnt appear that anything else is happening. THe hard drive activity light doesnt show activity, and you never hear the sound that plays when windows loads up. Which of the following are the most likely cause of the problem? select three
memory processor video card
the crt monitor dipslays a thick black border around the main screen image. What shoudl you ise to fix this problem?
monitor hardware controsl
One of the programs that launches automatically at startup is causing your windows workstation to lock up. You have to prevent the program from starting automatically?
msconfig.exe
How can you see a list of valid command parameters for the net command? a. net help b. net /? c. help net d. net -h
net /?
A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions? a. net use b. nslookup c. tracert d. ipconfig
net use
When you load a partition management utility on a workstation running an OEM version of Windows 7, you notice that there is a hidden partition on the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?
no, this is the system recovery partition
inducible
normally off; ca be turned on in the presence of an inducer
repressible
normally on; can be turned off in the presence of a repressor
You are testing the power supplly in a pc system by measuring the voltage available on the 4 pin molex connector. The voltage on the red wire is +5.1 volts. What should you do?
nothing the power supply is working normally
you have booted your windows 7 workstation into safe mode and enabled boot logging. To which log file is the boot logging information bow being written.
ntbtlog.txt
youre configuring devices on a SCSi bus. Youve installed a SCSI adapter in an expasion slot. Youve connected a SCSI hard disk drive to one of the middle connectors on the internal SCSI ribbon Cable. The end connector on the internal SCSI ribbon cable is connected to a SCSI DVD drive. Where should termination be enabled on this Bus?
one the SCSI adapter an on the DVD drive
3. If the firewall managing traffc into the DMZ fails?
only the servers in the DMZ are subject to compromise. (the LAN is protected by default)
Lately your computer is spontaneously rebooting and freezing. What is the most likely cause?
overheated CPu
Many hardware router, such those from Cisco, also provide a?
packet filtering firewall. (these devices are frequently used to fill both network roles (router and firewalls) at the same time.
which of the following problems is common for dot matrix printers?
paper scraps are caught in the feed machanism
Which of the following problmes is common ofor dot matrix printers?
paper scraps are caught in the feed mechanism
For a list to allow any traffic, it must have at least one?
permit statement that either permits a specific traffic type or permits all traffic not specifically restricted.
Several employees have forwared you an email indicating that your companys health insurance provider has just launched a new benefits management web site that all employees to provide their social security number. However, you have discovered that your company;s insurance provider did not send this email. WHa kind of attack just occured?
phising
You are troublshooting connectivity between you computer and the www.widgets.comserver whose Ip address is 192.168.1.1. Which of the following commands tests connectivity to the device as well as name resolution?
ping www.widgets.com
you're troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. What is the first thing you should do?
plug in an external monitor
differentiation
process in which cells become specialized in structure and function
On a windows system, which task manager tab would you use to adjust the priority given to a specific program?
processes
Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?
ps -e
Due to a blackout, power is no longer coming from the wall putlet and your compter is now offf. You do not have a UPS and you need to remove a disc out of the Dvd Drive. hwat is the easiest method for retrieving the disc?
push a unbent paperlcip into the hole on the front of the drive
What would you enter at the command prompt on a Linux system to display the present working directory? (typed)
pwd
Which command lets you delete subdirectories in addition to files in the current directory?
rd /s
Which command lets you delete subdirectories in addition to files in the current directory? a. rd /q b. rd /f c. rd /a d. rd /s
rd /s
Which command lets you delete subdirectories in addition to files in the current directory?
rd/s
Rodney, a user in the research department, reports that he is getting STOP errors while using his Windows 7 Computer. You ask rodney if anything has changed recently on the computer. Rodney explains that he ran the installation program for his PDA and everything worked fine until he tried to hot sync. Now any time he hot syncs, he has to reboot the computer. You need to fix Rodneys computer and prevent rodney from using the PDA until you can install an updated river. What should you do?
reboot the sysem and select safe mode. Disable the PDAs driver in Device manager
Rodney...
reboot the system and select safe mode. Disable the PDAs driver in device manager
While working on your windows 7 system, the system encounters a critical error. For a brief second you see the blue screen indicating the error. Before you can read the error, however, the system reboots. After rebooting and logging back on, the same thing happens again. What should you do so that you can read the error message next time it happens without the system rebooting?
reboot the system. Press f8 and disable the automatic restart feature
a user in the research department, reports that heis gettin STOP erros on his winows system during startup . You ask him if anything has changed recently on the computer. He explains that he ran the installation program for his PDA just before revieing the first STOp error. He immediantly rebooted and has not been able to use Windows 7 since then due to STOP erroes during the boot process. You need to fix his computer. What should you do?
reboot the system. Selct last known good configuration form the advanced startup options
you're troubleshooting a notebook system that uses a digitzer paf and stylus ffor user input. The user has complained that the digitezer pad registers stylus taps about 1 inch to the right of where the tap actually occured. How can you fix this problem?
recalibrate the digitizer pad
Yo u have just installed several devices at once to a computer. but now the computer fails to boot properly. What shoud you do?
remove all of the newly added devices and install them once at a time
Your laptop carrying case is designed for a 15 inch laptop, yet you think you can squeeze your 16 inch laptop into it. Before slipping the laptop into the case, What should you do?
remove any ExpressCards from their slots
your manager has been using the same laptop computer without error for four years. Suddenly, the computer will not start and run correctly, What should you do to isolate the problem?
remove the batteries and attempt to run the computer form a wall outlet
you are testing the power supply in a PC system by measuring the voltage available on the 4 pin molex connector. the voltage on the yellow wire s +10.1 volts. hwat should you do?
replace the power supply
You have just installed a maintenance kit in you laser printer. What should you do next?
reset the page coutn
How do you set file attributes? (select 2)
right-click the file, then select properties. use the attrib command.
Which of the following utilities would you use to view the routing table?
route
when you print from your laser printer, the paper contains faint images from previous print outs. Which components should you check? select two
rubber scraper and discharge lamp
When you print from you laser printer, the paper contais faint images from previous print outs. which components shoud you check? select two
rubber scrapper and discharge lamp
You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. now you cant get the device to work. what should you do first?
run any diagnostic software tha came with the device
You have a Windows Vista Computer that was recently upgraded from Windows XP. One application worked fine in windows xp but now does not run in Windows vista. You have checked the application vendors web site but there is no update available. What should you try next to run the application?
run the application in compatibility mode
the video driver on your windows 7 computer is preventing the system form starting up successfully. You have already downloaded an updated driver and copied it to the computes hard drive. Which mode should you select form the windows advanced boot options menu to ensure that the system can complete the boot process?
safe mode
A malfunctioning video driver is preventing your windwos system from starting successfully. Which startup option oshould you choose so you can copy an updated driver from the help desk support server?
safe mode with networking
how genes
series of genes that controls the differentiation of cells and tissues in an embryo
To configure the switch IP address, what do you do?
set the address on the VLAN interface (a logical interface defined on the switch to allow management functions). By default, the VLAN is VLAN 1.
You are installing the first SATA drive into a desktop computer system, but you do not have the drivers for the motherboards integrated SATA controller. Which of the following tasks will be required in the configuration process?
set the drive type in the BIOS to IDE
you recently upgraded a clients older workstations from windows xp to windows 7. The client has called to complain that the interface is very slow . For example, after clicking on the start button, the start menuslowly appears on the screen. How can you fix this problem without upgrading the hardware itself?
set the visual effects for best performance
You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use?
sfc /verifyonly
You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use?
sfc /verifyonly
You want to scan your system for changed system files and autmatically revert to previous version for any file that has been altered. You want the scan to run once the next time the system boots. Which command should you use?
sfc/ scanonce