ro Part 3++++++++++++++

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You need to install a 32-bit application on a 64 bit version of Windows 7. Where is the default directory where the application will be installed?

%systemdrive%\Program Files (x86)

You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed?

%systemdrive%\Program Files (x86)

You need to install a 32bit application on a 64bit version of Windows 7. Where is the default directory where the application will be installed?

%systemdrive%\Program Files (x86)

Where are fonts stored in windows 7?

%systemroot%\fonts\

When you print from you laser printer, the paper contais faint images from previous print outs. which components shoud you check? select two

rubber scrapper and discharge lamp

for the past several days the print jobs from the inkjet printer are missing colors and leaving gaps. What should you do to resolve the problem?

use the automatic cleaning feature

How can you keep a windows 7 system form restarting after a critical system error occurs?

use the disable automatic restart on system failure option on the advanced boot menu

What is the path to the user profiles in windows XP?

%systemdrive%\Documents and Settings\

Which techinque are used in pharming attack toredirect legitimate web traffic to malicious web sites? slect two

- exploiting DHCP servers to deliver the IP address of poisoned DNS servers - changing the hosts files of a users computer

you have just finished install a new SATA hard disk in your computer. Now you SATA DVD drive work. What should you do first? select two

- make sure that the dvd power cable is connected - make sure that the dvd SATA cable is connected

you have a small business...

- preshared key - TKIP encryption

when you use the degauss feature on a CRT monitor? select two

- the monitor displays strange colors - the monitor displays distorted images

Under what conditions should you choose exFAT over FAT32 or NTFS? (Select two.)

*When formatting removable flash devices *When storing files larger than 4 GB in size

Which of the following file extensions indicates a windows system file? (select 2)

.dll .vxd

Which option used with the copy command makes sure that all copied files are written correctly after thy have been copied? a. /y b. /a c. /n d. /v

/v

Which of the following paths opens the Computer Management Tool? (2)

1.) On the start menu, right click on computer and select Manage 2.) In the control panel, open Administrative Tools, then double click on the computer management icon

You need to protect the user data on a Windows 7 system. Which tools could you use to do this? (Select two)

1.)Backup and Restore 2.)Previous Versions

You need to protect the user data on a Windows 10 system. Which tools could you use to do this? (Select two)

1.)File History 2.)Backup and Restore

Which of the following ports does FTP use to establish sessions and manage traffic?

20, 21

which wireless standard has the highest data transfer rates

802.11n

Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?

::1

What is a control panel option that is only available in Windows XP?

Add or Remove programs( which will allow us to directly add or remove programs as well as remove window components)

Dashboard All Windows Multiple Desktops

Dashboard All Windows Multiple Desktops

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32

Which tool can you use to view, but not modify, hardware and configuration information for your computer?

Msinfo32

A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. What should you do next?

Determine if escalation is needed

While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed.

Pointer Options

What DirectX Information does Dxdiag display?

OS version | Processor and Memory | DirectX Version | settings and drivers used by display devices | Audio Drivers | Input Devices

How can you reformat a drive from FAT32 to NTFS without losing the existing data?

Use the convert command at a command prompt.

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task Scheduler

which term refers to a situation where tow files try to claim the same cluster on the hard disk?

cross linked clusters

A user reports that they are unable to access thier firewire drive after moving the pc form beneath the desk to the top of the desk. What is the most likely cause of this problem?

card is not properly seated

Which command would you use to change the current directory to the immediate parent directory? a. cd b. dir c. pdir d. cd ..

cd ..

which of the following problems is common for dot matrix printers?

paper scraps are caught in the feed machanism

When running a program on a Windows System, you get an error message indicating that a specific file (not the .exe file) cannot be located. What should you try to fix the problem?

check the working Start in directory identified by the shortcut

A user complains that his USb no longer works. You check Device Manager and see the iconwith a black down arrow on it> what should you do?

enable the device

Which utility canbe used to vew when a service was stopped as well as any error messages generated by the service?

event viewer

You need to install a 32-bit application on a 64-bit version of Windows. Where is the default directory where the application will be installed?

%systemdrive%/Progra, Files (x86)

You need to install a 32-bit application on a 32-bit version of Windows. Where is the default directory where the application will be installed?

%systemdrive%/Program Files.

You need to install a 32-bit application on a 32 bit version of Windows 10. in which default directory will the application be installed?

%systemdrive%\Program Files

You need to install a 32-bit application on a 32-bit version of windows Vista. Where is the default directory where the will be installed?

%systemdrive%\Program Files

You need to install a 32bit application on a 32bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

Where are fonts stored on a Windows 7 system?

%systemroot%\Fonts\

You own a custom PC retail store. A small business client asks you to build three workstations for her organization: • Virtualization Workstation • Video Editing Workstation • Thin Client PC Drag and drop each workstation type onto the most appropriate PC hardware on the left. Each workstation type can be used more than once.

(AMD 12core, 4 GHZ CPU *VIRTUALIZATION WORKSTATION), (Intel Core i7 sixcore, 3.4 GHz CPU *VIDEO EDITING WORKSTATION), (2 TB SSD SATA HD *VIDEO EDITING WORKSTATION) (Intel Celeron dualcore, 2.7GHz CPU *THIN CLIENT PC), (4 TB SATA HD *VIRTUALIZATION WORKSTATION), (500 GB SATA HD *THIN CLIENT PC), (2 GB DDR3 RAM *THIN CLIENT PC), (16 GB DDR4 RAM *VIDEO EDITING WORKSTATION), (32 GB DDR4 RAM *VITUALIZATION WORKSTATION), (HAV *VIRTUALIZATIN WORKSTATION), (Video capture card *VIDEO EDITING WORKSTATION), (Few or no application s installed *THIN CLIENT PC)

You just created a snapshot of a virtual machine while it was running. What information is saved in the snapshot? (Select two.)

*The current contents of the virtual machine's CPU registers. *The current contents of the virtual machine's RAM.

Which of the following statements are true regarding administrative shares? (Select two.)

*To connect to an administrative share, you must use the UNC path. *By default, Windows automatically creates an administrative share for every volume.

You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 10. You need to transfer user profile information and data files from ComputerA to ComputerB. Which tools could you use to do this? (Select two. Each answer is a complete solution.)

*USMT *Windows Easy Transfer

Which of the following permissions are not available when sharing a folder on a Windows 7 workstation? (Select two.)

*Write *Modify

You need to view the contents of /var/log/auth.log file to get information about the users that have been logging on to the system. The auth.log file is a plain text file so you decide to use the cat command to review the file. However, the display fills up with text for several pages and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select two.)

*more /var/log/auth.log *less /var/log/auth.log

Which of the following identify the key difference between a worm and a virus? select two

- a virus relies on a host for replication - worms independently replicate themselves

You are logged in as a user with limited system privileges. You are the Linux system administrator and you have the password to the root user account. When you need to switch to root user to perform administrative tasks, what command would enter at the command prompt? Tip: The command must switch to the home directory and environment variables assigned to the root user. (typed)

su -

What is the best countermeasure against social engineering?

user awareness training

Match the operating system attribute on the left to the correct description on the right. Ability to use multiple processing devices. Ability to run multiple applications simultaneously. Ability to run multiple parts of an application simultaneously.

-Multiprocessing -Multitasking -Multithreading

You are purchasing a PC system that will be used as a file and print server in a small business. Which hardware selection criteria would be most important for this system? (Select two.)

-RAID 1+0 array -64bit multicore processor

Operating Systems performs

-Receiving user input from input hardware devices such as the keyboard or mouse -Sending user output to output hardware devices such as the monitor or a printer -Controlling the use of processing devices by applications -Serving as a platform for applications -Moderating hardware -Providing security -Managing the file system

Which of the following file extension types can be run from the command prompt? (select 3)

.bat .exe .com

Which of the following file extensions indicate a program file type? (select 2)

.com .exe

Which extension types can be run from the command prompt? (3) a. .com b. .exe c. .sys d. .dll e. .bat

.com .exe .bat

Which file extensions indicate a program file type? (2) a. .jpg b. .mp3 c. .vxd d. .com e. .exe

.com .exe

Which of the following file extensions indicated a Windows system file?

.dll .vxd

Which of the following extensions identifies a packaged for use by windows installer?

.msi

Which of the following extensions identifies a program packaged for use by Windows Installer? a. .bat b. .msi c. .exe d. .dll e. .pkg

.msi

Which file extensions indicates a Windows system file? (2) a. .vxd b. .dll c. .rtf d. .com

.vxd .dll

Which option used with the copy command makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use? a. /a b. /v c. /o d. /y

/y

Match the Windows version on the left with the appropriate system requirements or features on the right. Each Windows version may be used only once.

1 GHz processor (support for PAE, NX, and SSE2 not required) - Windows 7 800 MHz processor - Windows Vista Metro design interface - Windows 8/8.1 2 GB RAM for a 64-bit system - Windows 10

Drivers

A driver is a type of computer program that enables the operating system to interact with hardware devices

Which of the following best dedscribes a man-in-the-middle attack?

A false server intercepts communications from a client by impersonating the intended server

Which of the following is true of online software activation? (Select three)

1.)Before running a newly installed application, the user must activate their license online on the software vendor's website. 2.)With personal software licenses, the limit is usually 1-3 online activation. 3.)Persistent activation may require the license to be continuously re-activated online at a pre-configured interval.

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select two.)

1.)Configure the application to automatically download and install updates as they are released. 2.)Check the DataComLink Website regularly for patches and updates to the software.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 7. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. What should you try next to run the application? (Select two)

1.)Create a virtual computer that runs Windows XP. Run the virtual computer each time the application runs. 2.)Run the application in compatibility mode.

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select two.)

1.)In the Control Panel, select System and Security, then Security and Maintenance. 2.)In the Control Panel, select User Accounts, then User Accounts.

Which aspects of virtual memory can you configure on a Windows workstation? (Select two.)

1.)Maximum size of the paging file 2.)Location of the paging file

You manage a Windows 7 system. You want to view info about your computer including the CPU utilization percentage and information about disk read operations. Which tools could you use to do this? (2)

1.)Performance Monitor 2.)Task Manager

You manage a Windows system, You want to view information about your computer including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select two.)

1.)Performance Monitor 2.)Task Manager

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)

1.)Processes 2.)Details

What is the purpose of the Microsoft Management Console? (2)

1.)Provide a shell for running snap-ins 2.)Provide a common user interface for performing administration tasks

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select two.)

1.)Remote Desktop Users 2.)Administrators

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 10. You have checked the application vendor's website, but there is no update available. What should you try next to run the application? (Select two.)

1.)Run the application in compatibility mode. 2.) Create a virtual machine that runs an older version of Windows. Run the application within the virtual machine.

You have configured your windows system to automatically backup user data every night at midnight. You also take a system image backup once a month. What else should you do to ensure that you are protected against data loss? (Select two)

1.)Store a copy of all backups off-site. 2.)Regularly test restoration procedures.

Which of the following tools can you use to start the Print Spooler service if it is currently stopped? (Select three.)

1.)Task Manager 2.)Services console 3.)Net start

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select two)

1.)They are moving away from DRM because of several key shortcomings in the technology. 2.)They are adopting alternatives to DRM such as encouraged customers to not illegally share digital files.

Your computer seems to be running slow. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two)

1.)Use Resource Monitor to monitor memory utilization. 2.)Use Task Manager to monitor memory utilization.

In which of the following situations would restoring from backup be the best option? (Select two.)

1.)You accidentally deleted several important e-mails and need to restore them. 2.)You need to restore several word processing files that were accidentally deleted from your Documents folder.

To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select two.)

21 20

To access your company's internet network from home, you use Secure SHell (SSH). The admin has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?

22

To access your company's internal network from home, you have used Telnet. Security policy now prohibits the use of unsecure protocols such as Telnet. The administrator has recently implemented a firewall at the network perimeter and disabled many ports. Which port needs to be closed to prevent Telnet access from home?

23

Which port does Telnet use?

23

You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select two.)

25 110

You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. What (2) IP ports should you open in the firewall?

25 for SMTP// 110 for POP3

You are implementing a wireless access point for a small business. To secure the access point, you decide to implement WPA2 using AES to encrypt the data. The access point's configuration interface asks you to specify the AES key size. The business owner needs the access point to be as secure as possible. Which key size is the largest valid key size that AES can be configured to use?

256

Which of the following cellular network types does NOT provide Internet connectivity?

2G

Drag the cellular network specification on the left to its corresponding mobile technology generation on the right

2G - GSM CDMA 3G - LTE HSPA+ 4G - WiMAX

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.)

32 numbers, grouped using colons Hexadecimal numbers

Which port must be opened in a firewall of a Windows system in order Remote Desktop connections to be established with it?

3389

Which port must be opened in the firewall of a Windows system in order Remote Desktop connections to be established with it?

3389

You have been asked to implement a RAID 10 solution for a video editor's desktop workstation. What is the minimum number of hard disks than can be used to configure RAID 10?

4

To increase security on your company's internal network, the admin has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit car transactions. Which port needs to be enabled to allow secure transactions?

443

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

443

What is Regedit?

A tool that allows us to alter the windows registry.

What is Windows Memory Diagnostic?

A tool that tests the (RAM) on a computer for errors. Must be downloaded from Microsoft's Online Crash Analysis web site.

What is the Event Viewer?

A tool used to view logs about programs, system events, and security. Each entry is listed as a warning, error, or information event.

Educate the user as to how the problem was resolved and verify that they are satisfied with the results.

A user sends a print job to a network printer and it prints page after page of random characters. He calls the help desk and a technician discovers that somehow the wrong printer driver had been loaded on the users workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. What else should she do?

Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows operating system?

A volume control The current time. Explanation By default, the Notification Area is at the far right end of the task bar at the bottom of the computer screen. The Notification Area often displays the current system time, a volume control icon, and an icon allowing the control of display properties. Additionally, third party software may add icons to the Notification Area that provide shortcuts to specialized programs. The bulk of the Task Bar itself is dedicated to displaying icons for currently running applications. Windows 10 automatically add the most recently used applications to the dynamic "Most Used" sub menu of the Start Menu.

Consider the external ports for a typical PC system (pictured below). Drag the port type on the left to the letter on the right that best identifies it. (Each type can be used once.) A-J

A) HDMI b) Thunderbolt c) IEE 1394 d) USB e)VGA f) DVI g) RJ45 h) RJ11 i_Figer S/PDIF j) Audio Jack

Which mobile device architecture is used by Apple iPad devices running the iOS operating system?

ARM

You recently installed a Windows 10 System. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to being using an online Microsoft account to authenticate to the system instead. Click the option you would use in the Settings app t do this

Accounts

You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the option you would use in the Settings app to do this.

Accounts- Your accounts, email, sync, work, family

Which option in Control Panel is used to review your Windows 7 computer's status and resolve issues?

Action Center

Which partition type identifies the partition as one that holds the book loader program used to start the operating system?

Active

If you want to boot from a hard drive, what must it have?

Active partition

You want to upgrade your Windows 7 Professional computer to Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dualcore processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64bit version of Windows 10.

Add more memory

Your computer seems to be running slow. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What should you do?

Add more memory

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 BG of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes.

Which of the following describes a Man-in-the-middle attack?

An attacker intercepts communications between two network hosts by impersonating each host.

What file attribute identifies the file as having been modified since the last backup? a. Encrypted b. Read only c. Hidden d. Archive

Archive

Which utility lets you customize which files are processed at startup on Windows 7 systems?

Msconfig

Which utility lets you customize which files are processes at startup on Windows 7 systems?

Msconfig

You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CD that came with these systems to delete all partitions from the hard drives. Have you properly prepared these systems for disposal?

No, you should use disk wiping software to fully erase the drives.

The video driver on your Windows 7 computer is preventing the system form strating up successfully. You have already downloaded an updated driver and copied it to the computers hard drive. Which mode should you select from the windows advanced boot options menu that would most likely allow you to start the computer to continue fixing the problem?

enable VGA mode

a user complains that his usb scanner no longer works. You check Device mangaer and see the icon with a black down arrow on it. What should you do?

enable the device

you're troubleshooting a malfunctioning LCD display on a notebook computer system. After confirming that the notebook is recieving AC power, you plug in an external monitor. Ther external monitor does not display the output form the notebook after pressing the Fn key to toggle the display. Which of the following could be the cause?

failed video adapter

Lately you hear a clicking noise when reading or writing data from the hard disk. what is the most likely cause of the clicking?

failing hard drive

Which type of biometric authentication uses the ridges of your skin?

fingerprint

You have an existig computer that youve been using for years. you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor that is supported by the motherboard. when you star the computer, it beeps regurlaruly but nothing is shown on the screen and it doesnt start. What should you do?

flash the BIos Reinstall the old proocessor in the motherboard

after removing the printed paper from your laser printer, the toner smudges and can b wiped off in places. Which of the following is the most likely problem?

fuser rollers

After removing the printed paper form you laser printer, the toner smudges and can be wiped off in places. which of the following is the most likely problem?

fuser rolllers

which of the following is a symptom of a dirty drum or roller in a laser printer?

lines or splotches repeated at regular intervals on the print jobs

Which of the following is a symptom of a dirty drum or roller in a laser printer?

lines or splots repeated a t regular intervals on the print job

What would you enter at the command prompt on a Linux system to display a list of files and subdirectories that exist within the present working directory? (typed)

ls

You have just finished upgrading the 250 W power supply in your desktop computer to a 450 W power supply. Now the bios doesnt recognize one of the hard disk drives in the system during POST. What should you do?

make sure that the hard disk is connected to the power supply

You want to know more about the usage, command syntax, and the options available with the Linux ifconfig command. What would you enter at the command prompt to display this information about ifconfig? (typed)

man ifconfig

a computer has two hard disk drives installed on the primary IDE channel. You decide to move the second har drive to the second IDE channel. The secondary IDe interface ill have no other devies. How should you configure the second hard drive on the channel?

master or single

Which commands can you use to create a new directory? (select 2)

md mkdir

Which commands can you use to create a new directory? a. md b. newdir c. cd d. rd e. mkdir

md mkdir

you turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while but it doesnt appear that anything else is happening. THe hard drive activity light doesnt show activity, and you never hear the sound that plays when windows loads up. Which of the following are the most likely cause of the problem? select three

memory processor video card

When you load a partition management utility on a workstation running an OEM version of Windows 7, you notice that there is a hidden partition on the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?

no, this is the system recovery partition

You are testing the power supplly in a pc system by measuring the voltage available on the 4 pin molex connector. The voltage on the red wire is +5.1 volts. What should you do?

nothing the power supply is working normally

you have booted your windows 7 workstation into safe mode and enabled boot logging. To which log file is the boot logging information bow being written.

ntbtlog.txt

You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the hard drives. Have you properly prepared theses systems for disposal?

No, you should use disk wiping software to fully erase the drives.

Christian has enabled Boot Logging from the Advanced Startup Options menu of his Windows 10 workstation. Which file would he examine to see a list of drivers loaded during the startup process?

Ntbtlog.txt

You have booted your Windows workstation into Safe Mode and enabled Boot logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

You have a computer with a single hard disk configured as a basic disk with a single partition formatted with NTFS. The computer runs windows 7 enterprize. the disk has run out of space. You need to add space to the disk . You install a new hard drive and start Disk mmanagement. Which fo tghe following is required task to add space to the existing volume?

ON THE NEW HARD DISK. CREATE A NEW PARTITION WITOHUT A DRIVE LEtter

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On a RADIUS Server

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On a RADIUS server

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?

Open Source

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. What should you do?

Open the firewall port for the Remote Desktop program

Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?

Operating system

Which of the following components can be updated by the Windows Update service?

Operating system and critical driver files.

Several users have forwarded you an email stating that your company's health insurance provider has just launched a new web site for all employees to access the site they are told in the email to click a link and provide their personal information. Upon investigation, you discover that your company;s health insurance provider did not send this e-mail. What kind of attack just occurred?

Phishing

You have purchased new computers and will be disposing of your old computers. These computers were previously used for stroring highly-sensitive customer order information, including credit card numbers. What should you do prior to getting rid of the computers?

Physically destroy the hard drives with a hammer.

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch you music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers. Click the tab you would use in the Sound Properties window to do this.

Playback

Have you ever printed to that printer?

While answering help desk calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the following should be the first question you ask?

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch your music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers.

Playback

While using a new windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. click the tab you would use in the Mouse Properties window to do this.

Pointer Options

While using a new windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this.

Pointer Options

youre configuring devices on a SCSi bus. Youve installed a SCSI adapter in an expasion slot. Youve connected a SCSI hard disk drive to one of the middle connectors on the internal SCSI ribbon Cable. The end connector on the internal SCSI ribbon cable is connected to a SCSI DVD drive. Where should termination be enabled on this Bus?

one the SCSI adapter an on the DVD drive

Even if you perform regular backups, what must be done to ensure that you are protected

Regularly test restoration procedures.

Which of the following problmes is common ofor dot matrix printers?

paper scraps are caught in the feed mechanism

your manager has been using the same laptop computer without error for four years. Suddenly, the computer will not start and run correctly, What should you do to isolate the problem?

remove the batteries and attempt to run the computer form a wall outlet

How do you set file attributes? (select 2)

right-click the file, then select properties. use the attrib command.

You are installing the first SATA drive into a desktop computer system, but you do not have the drivers for the motherboards integrated SATA controller. Which of the following tasks will be required in the configuration process?

set the drive type in the BIOS to IDE

you recently upgraded a clients older workstations from windows xp to windows 7. The client has called to complain that the interface is very slow . For example, after clicking on the start button, the start menuslowly appears on the screen. How can you fix this problem without upgrading the hardware itself?

set the visual effects for best performance

You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use?

sfc /verifyonly

You want to scan your system for changed system files and autmatically revert to previous version for any file that has been altered. You want the scan to run once the next time the system boots. Which command should you use?

sfc/ scanonce

A user is trying to log into windows on her notebook computer. She enters the correct password for her user account, but the system wont let her authenticate, claiming the wrong passwork has been entered. Whats causing the problem?

she has turned Num lock on causing numbers to be sent from the keyboard instead of letters

After arriving early this morning, you turn on your computer to begin your work. Instanty, you see smoke and smell a strange odor coming form the computer. what should you do?

shut off the sysytem immediantly

How do you shutdown the computer from cmd?

shutdown /s (/r=restart, can add a delay by adding: /t (time in seconds)

What are the most common network traffic packets captured and used in a replay attack?

Authentication

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Authentication Encryption

Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.)

Authentication for agents and managers Encryption of SNMP messages

Which operating system does not use C:\Windows as the default location for system files?

windows 2000

Which windows version(s) use libraries to logically group files?

windows 7

you remove a SATA hard disk from a awindows 7 computer and put it in a system running windows 98. You are unable to read the dis; What is the most likely the porblem?

windows 98 does not support NTFS

Which of the following operating systems uses C:\Users\username as the default directory for user files? (select 2)

windows vista windows 7

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. later, you use the printer properties on your computer to print a test page. instead of a normal test page, you recieve several pages with garbled characters on them. what is the most likely cause of the problem?

wrong print driver

Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)?

xcopy /e

Which command would you use to copy all files in a directory, including all subdirectories (as well as empty ones)? a. copy /v b. xcopy /e c. copy /n d. xcopy /s

xcopy /e

An attacker is conducting passive reconnaissance on a targeted company. Which of the following could he be doing? (#2)

Browsing the organization's website.

Which command would you use to copy all files in the directory. including all subdirectories (as well as empty ones)?

xcopy /e

What type of security measures is a form of biometrics?

Fingerprint scanner

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

Firewall

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it is running on in a virtualization environment?

Hypervisor

Which of the following cellular types use MIMO to increase 3G data throughput? (Select two.)

LTE HSPA+

A SYN packet is received by a server. The SYN packet has the exact same address for both the sender and receiver addresses, which is the address of the server. This is an example of what type of attack?

Land Attack

Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he cant open a specific file on the computer. Which of the following will most likely correct the problem?

Make Manuel the owner of the file

Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will most likely correct the problem?

Make Manuel the owner of the file.

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. What should you do next?

Make sure that all installed applications run correctly

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an inplace upgrade. What should you do next?

Make sure that all installed applications run correctly.

A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?

Malware infection

A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alerts keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?

Malware infection.

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy-backing to gain access to your building. The individual in questions did not have a security badge. Which security measure could you implement to keep this from happening in the future?

Mantraps.

Which of the following is the name of the core of the operating system that is loaded into memory when the system boots up? This part of the operating system is responsible for Controlling security Managing the file system Providing a platform for applications to run on

Kernel Explanation The kernel is the core of the operating system that is loaded into memory when the system boots up. The kernel is responsible for Controlling security. Managing the file system. Providing a platform for applications to run on.

Os Components

Kernel- the bulk of the Os components Utilities- Basic fundamental functions Interface- Interact with the Kernel (command line, Linux) GUI(Graphic User Interface)

Which of the following are considered input devices? (Select three.)

Keyboard Microphone Scanner

What is Windows MMC?

Microsoft Management Console-which is a framework that provides a common user interface for performing system administration tasks.

You have a computer running Windows 7 Home Premium and need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?

Do nothing. Windows 7 can natively access exFAT file systems.

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and also to access specific folders.

Dock (not Spotlight, Terminal, Mission Control)

A user reports that a projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. What should you do next

Document the solution

A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. What should you do next in your troubleshooting strategy?

Document the solution. Explanation You have completed and tested the task, and verified full system functionality. You now document the solution, so if the same display issue returns, you or your replacement will know what to do.

You want to configure User account Control so when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?

Edit settings in the Local Security Policy.

What are the control panel option that is only available in Windows Vista?

Tablet PC Settings(for tablet pc programs), Sync Center(allowing for the sharing of files

One of the programs that launch automatically at startup is causing your Windows 10 workstation to lock up. You have examined the Startup folder, and the problem application is not present. Which Windows utility should you use to prevent the program from starting automatically?

Task Manager

Which of the following tools can you use to start the Print Spooler service if it is currently stopped?

Task Manager Services console Net start

Your computer has a quad-core processor that supports multi- threading installed. Given that the system is running Windows, how can you verify whether multi-threading has been enabled?

Task Manager can display CPU utilization graphs for eight processors.

What is the difference between Task Manager and Resource Monitor?

Task Manager is focused more on the management of applications and processes, where as Resource Monitor displays statistics that tell you about the operation of your computer.

Your computer has a single core processor that supports hyper-threading. in Windows how can you verify whether hyper-threading is enabled? (task manager)

Task Manager will show CPU utilization graphs for two processors.

Which tool lets you automatically start an application or run a script based on triggers?

Task Scheduler

You have an application that you would like to run every Monday a 3 p.m. on your Windows workstation. Which tool would you use to configure the application to run automatically?

Task Scheduler

You have an application that you would like to run every Monday at 3 .m. on your Windows workstation. Which tool would you use to configure the application to run automatically?

Task Scheduler

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. What should you do next in your troubleshooting strategy?

Test the solution Explanation After you implement a solution, you should always verify full system functionality. Sometimes more than one problem exists, or your solution may not have solved the problem. For example, in this case an incorrect driver for the video card could potentially continue to cause display issues. By verifying system functionality, you can ensure the problem is completely resolved. Explaining what you did, implementing preventative measures, and documenting the solution would occur after you have tested the solution to make sure the problem is completely fixed.

Which of the following is a characteristic of extended partitions?

They are subdivided into logical drives.

What is the program that appears to be a legit application utility, game, or screensaver and hat performs malicious activities surreptitiously?

Trojan horse

Which security measure uses a unique key that can be used for hardware system identification? a. Chassis intrusion detection b. DriveLock c. Trusted Platform Module (TPM) d. BIOS password

Trusted Platform Module (TPM)

You are the administrator of a Linux server. Following best practices for system security and effective administration, you always login to the system with a standard nonroot user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

How do you shut down a process in cmd?

taskkill /in (Image name) or PID number(process ID number) taskkill /(above) /F (will force close)

You manage 2 computers with the following user accounts: -Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. -Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder?

Type Admin for the username and specify the password

How do you open a blank MMC Console?

Type MMC in the Run box.

How can you see a list of valid switched for the cd command? a. Type cd | more b. Type cd help c. Type cd /? d. Type cd list

Type cd /?

Which connector on the back of a computer is used to attach a mouse to a modern PC system?

USB A

You have been asked to install Windows 7 on 10 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend?

Unattended

Which of the following are characteristics of VDSL? (Select Two)

Unequal download and upload speeds Supports both data and voice at the same time

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address you concerns?

Use cable locks to chain the laptops to the desks.

You have purchased new computers and will be disposing of our old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?

Use data wiping software to clear the hard drives

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?

Use data wiping software to clear the hard drives.

You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. What should you do?

Use dynamic disks and a spanned volume

What is the Windows Control Panel?

Use the Control Panel to customize features of devices and to configure how a computer looks and behaves. Use the various applets within the Control Panel to perform configuration tasks for specific features or devices.

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. Prior to the upgrade, you need to verify the compatibility of each computer with Windows 10. You want to gather the necessary information as quickly as possible. What should you do?

Use the Microsoft Assessment and Planning Toolkit (MAP).

You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. You want to gather the necessary information as quickly as possible. What should you do?

Use the Microsoft Assessment and Planning Toolkit (MAP).

You recently purchased a copy of Windows 10 from a retail store. However, the system you want to install Windows on doesn't have an optical drive. What is the best option to install Windows in this scenario?

Use the Windows 7 USB/DVD Download Tool to copy the installation files to a USB flash drive.

How do you set file attributes? (Select Two) a. Use the attrib command. b. Use the set command. c. Right-click the file, then select Attributes. d. Right-click the file, then select properties. e. Use the assign command.

Use the attrib command. Right-click the file, then select properties.

how can you reformat a drive from FAT32 to NTFS without losing the existing data?

Use the convert command at a command prompt

You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the design folder that apply when files are accessed both locally and remotely. What should you do?

Use the convert command from FAT32 to NTFS permissions.

You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?

Use the convert command to convert from FAT32 to NTFS, then configure NFTS permissions

You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. What should you do?

Use the convert command to convert from FAT32 to NTFS, then configure NTFS permissions.

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only minimum rights necessary on the computer. Which group should this user be a member of?

User

Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User Account Control (UAC)

Which component of Windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User Account Control (UAC)

which windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation

User Account Control (UAC)

Which component of Windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User Account Control (UAC) Explanation User Account Control (UAC) prompts the user for credentials or permission in an effort to minimize the dangers of unwanted actions or unintended software installation. Windows firewall protects the system from network attacks. Windows Firewall with Advanced Security (WFAS) is a feature with provides advanced firewall settings beyond the program or service rules enforced by Windows Firewall. Windows Defender scans software for malicious code.

Which component of Windows 7 prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User Account control (UAC)

You manage over 100 desktop computers, all currently running Windows Vista. You recently purchased replacement computers that have Windows 10 pre-installed. You want to move user data and setting from the old computers to the new computers . Which tool should you use?

User State Migration Tool

You manage over 100 desktop computers, all currently running Windows Vista. You recently purchased replacement computers that have Windows 10 preinstalled. You want to move user data and settings from the old computers to the new computers. Which tool should you use?

User State Migration Tool

On Windows system, which of the following is true of using groups?

User accounts are made members of a group. Group members have the access rights assigned to the group.

On a Windows system, which of the following is true of using groups?

User accounts are made members of a group. Group members have the access rights assigned to the group.

You have installed anti-malware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?

User awareness training.

What is the most common form of authentication?

Username and password

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of

Users

What does the rd command do when used with the /q switch?

Will not prompt you to confirm deletions

What does the /q switch the rd command do? a. Runs a query. b. Will not prompt you to confirm deletions. c. Reverses a drive deletion d. Removes sub directories in addition to files in the current directory.

Will not prompt you to confirm deletions.

What does the /q switch with the rd command do?

Will not prompt you to confirm deletions.

Which operating system(s) include the following features? • Cortana • Cloud storage • Continuum • Microsoft Store • Microsoft Edge

Windows 10

You're formatting a newly-installed hard disk with Disk Management and are at the point where you need to select the type of file system to be used. Which of the following scenarios would require selecting the FAT32 file system?

You need the disk to be backwards-compatible with older versions of Windows

You're formatting a newlyinstalled hard disk with Disk Management and are at the point where you need to select the type of file system to be used. Which of the following scenarios would require selecting the FAT32 file system?

You need the disk to be backwardscompatible with older versions of Windows.

In which of the following situations would restoring from a system image be the best option?

You need to restore a Windows system after a catastrophic hard drive failure.

In which of the following situations would restoring from a system image be the best option?

You need to restore a Windows system after catastrophic hard drive failure.

Given that you are using a Windows 10 system, in which of the following situations would reverting to a System Restore point be the best option?

You recently installed a new application and now the system behaves erratically.

I which of the followinf situations would driver rollback be the best tool to use?

You recently installed aa new video driver and now the system behaves erractically/

You have a computer currently running Windows 7. Which of the following reasons would justify performing a clean installation of Windows 10 on the system instead of an upgrade?

You want to dual boot both operating systems.

In which of the following situations would you most likely implement a demilitarized zone (DMZ)?

You want to protect a public Web server from attack.

A good reason to install a firewall?

You want to restrict Internet users from accessing private data on your network

a customer complains that a recently purcchased monitor no longer displays a picture. you verify that the monitor is powered on and that the video cable is securley fastened to the video port. Which fo the following actions should you direct the customer to take nesxt/

adjust the monitors settings using controls on the monitor

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt-get install httpd

Which file attribute identifies the file as having been modified since the last backup?

archive

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo

You're troublshooting a malfunctioning notebook computer system. The user has indicated that screen is always dark and difficult to reach even while the system is plugged into a wall outlet. You checked the system and determined that the backlight isnt working. Which of the following could be the cause?

the LCD cutoff switch is stuck in the off position

When you try to read a particular DVD r disc that was burned in a different computer, you recieve an error message, other DVD discs work fine in your drive. Which o f the following are the most likely problems?

the disc is dirty or scratched

you have a windows 7 system with two SATA hard drives, one used for the operating system and the other used for data. You have traced recent problems to a fault in the system motherboard. You replace the motherboard and reconnect all hardware. When you start the computer, the system shows the BIOS information screen, but then returns an error thatan operating system could not be found.What should you do?

change the boot order in the bios

you have purchases an LED monitor and connected it to the DVI port on your computer using a DVI cable.You configure the screeen resolution to 1440x900 with 24 bit color. The screen display seems to be fuzzy. What should yo do to correct the problem?

change the screen resolution to the native resolution of the monitor.

a dot matrix printer is printing faintly after replacing the print head, What should you do?

check the gap between the printer head and the paper

Mary reports that an applications shortcut icon no longer launches the application. You check your documentation and find that you have installed a new disk drive in her computer. What should you do first so Mary can run the application?

check the shortcut properties to make sure it is pointing to the correct file location

a dot matrix printer is printing faintly after replacing the print head. what should you do?

checkthe gap between the printer head and the paper

Which of the following utilites would you use to correct cross linked clusters within the file system on a windows workstation?

chkdsk

What would you use Control Panel's Region and Language?

to configure various settings such as language preference, default currency symbols, and date and time notation.

What would you use Control Panel's Windows Firewall?

to manage network traffic that is allowed or denied through the Windows host-based firewall.

What would you use Control Panel's Ease of Access?

to modify the behavior of input and display devices to accommodate users with special needs.

What would you use Control Panel's Devices and Printers?

to view, configure, add, or remove devices such as printers, scanners, and cameras.

What would you use Control Panel's Fonts?

to view, remove, or add to all fonts that are currently installed on the computer.

you have a laser printer that has worked fine until today, now whenever anything is printed, only black pages come out>Which part are you most likely to replace?

transfer corona

you have a complier that complies applications used in your business. You want to make sure that the compiler continues to run in the background., even if you open other applications. How can you adjust the amount of attention given to that application?

use task manager to modify the process priority

A user in sales cannot get his laptop to display through a project. He seems the screen output on the built in LCD display.but the video is not being on he projector. What should you do first?

use the FN key to redirect to the external video port

you are trying to access your office network with your winodws workstation form home using your organizations virtual private network. Your DSl moden has connected to your isp, but you cant connect to your office network. You issue the ipconfig command from the command prompt and learn that you system has ben assigned an ip address of 169.254.1.12 whats causing the problem?

you isp's DHCP server isnt working properly

In which of the following situations would restoring from a system image be the best option?

you need to restore a windows system after a hard drive failure

in which of the following situation would reverting to system restore point be the best option?

you recently installed a new application and now the system behaves erratically

in which of the following sitaions would driver rollback be the best tool to use?

you recently installed a new video driver and now the system behaves erractically

You're trying to access your office network with your Windows workstation from home using your organizations's virtual private network. Your DSL modem has connected to your ISP, but you cant connect to your office network. You issue the ipconfig command prompt and learn that your system has been assigned an ip address of 169.254. 1.12 Whats causing the problem?

your ISP's DHCP server isnt working properly

your....

your isp's DNS server is down

What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8 GB of RAM installed?

Equal to the amount of physical RAM.

You provide desktop support for a small company. The company has two locations int he same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a Remote Assistance connection and watch what the user is doing

You provide desktop support for small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a Remote Assistance connection and watch what the user is doing.

You recently purchased a new computer running windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old windows 2000 computer and placed on his new computer. Assuming the default directories are used during installation for both systems, which action is correct?

copy the fonts from C:\Winnt\Fonts to C:\Windows\Fonts.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.

Establish a Remote Desktop connection and update the driver

one corner of the image on a SVGA monitor always has more purple tint than the rest of the image. what is most likel the roblem?

data cable

You have just connected a new computer to your network. The network uses static ip addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

default gateway

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

yum install httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system?

yum list available

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

Yo have acompter running windows 7 home premium and need to accesss the contents ofa flash drive. The falsh drive has been formatted with the exFAT file system. Yo uwant to read the flash drive on your computer as quickly as possible with the least amount of effort. what should you do?

do nothing. Windows 7 can natively access exFAT file systems

youvbe just installed a new video card in a users windows workstation. However, when you power the system on, the screen is displayedin 16 colors at 640x480 resolution . Which of the followingwill resolve this problem?

download and install the latest driver from the video card manufacturers web site

You have just installled a new device in your windows 7 computer using the devices installation disc and the included drivers. After installation, the system crashed when you tr to use the device. what should you do?

download the latst driver from the manufacturers web site

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You want to force them to use a new password 5 days before changing it again. which policies should you configure? (2)

Minimum password age// Enforce password History

Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?

Modify the permissions on the document

Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. What should you do?

Modify the permissions on the document.

What is DirectX?

A set of programming interfaces for multimedia (video and audio)

Which of the following are true of Libraries?

A single folder can be added to multiple Libraries Each library can contain multiple folders from different file system locations

...

802.11n

Which disk types does Windows support? (Select 2)

Basic Dynamic

Which network service would you use to get the IP address from the FQDN hostname?

DNS

Which of the following utilities checks the disk for bad clusters?

chkdsk

Lately your computer is spontaneously rebooting and freezing. What is the most likely cause?

overheated CPu

Which of the following files extension types can be run from the command prompt?

.com .bat .exe

What is bootrec?

A command that (in a boot recovery environment) will allow you to direct how to fix the computers boot process.

What is a Snap In?

A program selected to be displayed in MMC. Can be run individually using the search feature with (.msc) at the end

You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem?

A proxy server is blocking access to the web sites.

You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. What might be causing the problem?

A proxy server is filtering access to websites.

Which of the following attacks tried to associate an incorrect MAC address with a known IP address?

ARP Poisoning

Multitasking

Ability to run multiple applications simultaneously.

Multithreading

Ability to run multiple parts of an application simultaneously.

Multiprocessing

Ability to use multiple processing devices.

you want to uprade your Windows 7 Professional computer wot Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10. What should you do?

Add more memory

What Security Practice is an example of the Principle of Least Privilege?

All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.

Which security practice is an example of the Principle of Least Privilege?

All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.

Which of the following functions are performed by proxy servers?

Block employees from accessing certain websites. Cache web pages.

You need to configure a Windows workstation with the IP address of the proxy server for your network.

Connections.

Which of the following phone attacks adds unauthorized charges to a telephone bill?

Cramming

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer ( not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable Secure Desktop

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable Secure Desktop

Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: -Server systems are kept in a locked server room. -User accounts on desktop systems have strong passwords assigned. -A locked door is used to control access to the work area. Users must use ID badges to enter the area. -Users connect their personal mobile devices to their computers using USB cables. -Users work in three 8-hour shifts per day. Each computer is shared by three users. Each has a limited account on the computer they use. Based on this information, what should you recommend your client do to increase security?

Disable the USB ports on user's workstations.

One of the Windows 7 workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. What should you to increqase the security of his system?

Disable the Guest account

Which tool would you use to create and delete partitions on hard drives?

Disk Management

You purchased a new LED monitor for your computer. On the back of the monitor you see the following port (pictured below). Which type of cable should you use to connect the monitor to your computer?

Display Port Cable

You have just installed a new deice in you windows computer. After installation, you cant use the device. you check in Device manager and find an icon for the device with a yellow exclamation mark over it. What should you do?

Download the latest driver form the maunfacturer's web site/

Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2008 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing?

Downloading a file

What security measures encrypts the entire contents of a hard drive?

DriveLock

Which implementation is most secure?

EAP-TLS

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?

Edit settings in the Local Security Policy

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the properties for the file; assign Mary the Deny Full Control permission

The D:\ drive in your computer has been formatted with NTFS. The sales group on your computer has been given allow full control to the D:\Sales folder. The Mary User account is a member of the sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the properties for the file; assign Mary the Deny Full Control permission.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. How can you prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the properties for the file; assign Mary the Deny Full Control permission.

You want to set the encryption attribute for the C:\payroll.xls file. What should you do?

Edit the properties of the file in Windows Explore

You want to set the encryption attribute for the C:\payroll.xls file. What should you do?

Edit the properties of the file in Windows Explorer

You want to set the encryption attribute for the C:\payroll.xls file. What should you do? a. At a command prompt, type: attrib c:\payroll.xls +e b. At a command prompt, type: encrypt c:\payroll.xls c. Edit the properties of the file in Windows Explorer d. At a command prompt, type: attrib +e c:\payroll.xls

Edit the properties of the file in Windows Explorer

A user sends a print job to a network printer and it prints page after page of random characters. He calls the Help Desk and a technician discovers that somehow the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. What else should he do?

Educate the user as to how the problem was resolved and verify that they are satisfied with the results

A user sends a print job to a network printer and its prints page after page of random characters. He calls the Help Desk and a technician discovers that somehow the wrong printer driver had been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly, and documents the resolution. What else should she do?

Educate the user as to how the problem was resolved and verify that they are satisfied with the results. Explanation After resolving any incident, you should spend a few minutes with the user, client, or customer and explain how the problem was resolved and verify that they satisfied with the results.

Which of the following describes an IPv6 address? (Select two.)

Eight hexadecimal quartets 128bit address

Which of the following actions directly improves system security on Windows systems?

Enable the Windows firewall. Install anti-malware software.

Which of the following features are supplied by WPA2 on a wireless network?

Encryption

You are investigating the use of Web site and URL content filtering to prevent users from visiting certain Web sites. Which benefits are the result of implementing this technology in your organization? (Choose two.)

Enforcement of the organization's Internet usage policy An increase in bandwidth availability

You need to boot a Windows 7 system into Safe Mode. Which key should you press during the system boot to access the Advanced Boot Options menu?

F8

You need to boot a windows 7 system into safe mode. Which key should you press during the system boot to access the advanced boot options menu?

F8

You have a computer running Windows 7. You need to format a 64 GB flash drive as a single volume. You want the drive to support quick removal, and minimize memory and processor use when reading and writing to the drive. Which file system should you choose?

FAT64

Which of the following is a valid IPv6 address?

FEC0::AB:9007

Which of the following is a secure alternative to FTP that uses SSL for encryption?

FTPS

What are (2) biometric devices?

Face scanner /// Retina scanner

You need to protect the user data on a Windows 8.1 system. Which tools could you use to do this?

File History

How do you write the data seen in MSINFO32?

File-Save and write the information to a file.

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?

Format

You have physically installed a new hard disk drive in your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the hard disk drive in Widows Explorer, but get an error message. Which utility will you most likely use to solve the problem?

Format

If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set and security permissions on the folder?

Full Control

If a folder exists on an NTFS partition, what is the minimum permission needed by a user to set any security permissions on the folder?

Full Control

Which Windows component can be used to display information such as weather forecasts, time, and news headlines on the desktop?

Gadgets (not Notification Area)

Which Windows component can be used to display information such as weather forecasts, time, and news headlines on the desktop?

Gadgets Explanation Windows gadgets can be used to display weather forecasts, notes, time, news headlines, or virtually any other information on the desktop. On Windows 7, gadgets can be displayed on the desktop. Gadgets are small, single-programs that you can add or remove from the desktop. Computer Management provides quick access to commonly-used management application. Notification Area displays the time and date, and icons that represent the applications and processes that are running behind the scenes on your computer. User Account Control (UAC) prompts the user for credentials or permission in an effort to minimize the dangers of unwanted actions or unintended software installations.

You are purchasing several PC system that will be used as thin clients in a large

Gigabit Ethernet adapter

While answering Help Desk calls, a field customer calls and complains that he cannot print to a workgroup laser printer. Which of the following should be the first question you ask?

Have you ever printed to that printer? Explanation When a customer reports a problem, it is important to ascertain the extent of the problem. The fact that the user cannot print to a particular printer should first be approached from the standpoint of determining if they ever could and, if so, what has changed since then. Checking cables and restarting the printer are all actions that could be taken to resolve the issue. However, you should first identify the extent of the problem before attempting solutions.

Which of the following are common forms of social engineering attack?

Hoax virus information emails

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?

ICMP

your monitor is displaying images using odd colors. Which of the following is a solution to this problem?

INCREASE THE COLOR DEPTH

Which of the following is the best countermeasure against man-in-the-middle attacks?

IPSec

Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?

IPSec

What security protocols establish a secure connection and encrypt data for a VPN? (3)

IPSec, PPTP, L2TP

Two employees cannot access any websites on the Internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problems. What should you do?

Identify the proxy server name and port number in Internet Options.

Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?

If the battery dies during the update, the operating system could become corrupted

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. What would happen to your iPad if you disconnect it before the operating system update is complete?

If you disconnect during the update, the operating system could become corrupted.

A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: • They use an 802.11a wireless network. • The wireless network SSID is set to BWLAN. • The wireless network is not broadcasting the network SSID. • The wireless network uses WPA2 with AES security. • Omnidirectional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security?

Implement directional access points.

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration.

Implement version 3 of SNMP.

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. for security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

Where would you configure when Windows checks and downloads updates on a Windows 7 Computer?

In control Panel, System and Security.

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop?

In the Control Panel, select User Accounts, then User Accounts In the Control Panel, select System and Security, then Security and Maintenance

Which of the following are true concerning the Virtual Desktop Infrastructure (VDI)? (Select two.)

In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. User desktop environments are centrally hosted on servers instead of on individual desktop systems.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file; when you type you want the existing text that comes after the cursor to be pushed down. What mode do you need to be in to do this?

Insert Mode

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?

Install a privacy filter on the monitor. Secure the system to the desk with a cable lock.

You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?

Install a proxy server. Allow Internet access only though the proxy server.

You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?

Install a proxy server. Allow Internet access only through the proxy server.

Which of the following is true of the Guest user account on Windows system?

It is disabled by default.

Which of the following is the name of the core of the operating system that is loaded into memory when the system boots up? This part of the operating system is responsible for • Controlling security • Managing the file system • Providing a platform for applications to run on

Kernel

What are the most common means of virus distribution? (2)

Malicious web sites // email

The number of hard faults that occur each second.

Memory Pages per Second

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which (2) policies should you configure?

Minimum password length // Account lockout threshold

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?

Modify the NTFS permissions on the folder.

You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. You want to keep all other CMOS settings. What should you do? a. Move the motherboard jumper. b. Press Ctrl Alt Del while booting the computer. c. Flash the BIOS d. Press F2 while booting the computer.

Move the motherboard jumper.

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?

Move the router to a secure server room.

Operating system other attributes

Multi-processing is the ability to use multiple processing devices. -Multi-tasking is the ability to run multiple applications simultaneously. Two common variations are: Cooperative multitasking mean that multiple processes must work together for the operating system to work effectively. 2) Pre-emptive multi-tasking forces applications to share the CPU. -Multi-threading is the ability to run multiple parts of an application simultaneously.

Which feature allows a tablet to recognize multiple finger touches at the same time?

Multi-touch

Members of the Sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed. Which solution should you use?

NAC

What is required to control access to the file system using file and folder permissions on a Windows-based computer?

NTFS-formatted partition

What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?

Near a window

What is the least secure place to locate an access point with an omnidirectional antenna when creating a wireless cell?

Near a window

What is the least secure place to locate an omnidirectional access point when creating a wireless network?

Near a window

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small Middle Eastern nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since. What type of attack occurred in this scenario?

Nigerian 419 scam.

When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?

No, this is the system's recovery partition.

To protect a Windows 8.1 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

Christian has booted his windows 7 workstation in safe mode and enabled boot logging. Which file would he examine to see a list of drivers loaded during the startup process?

Ntbtlog.txt

Which type of active scan turns off all flags in a TCP header?

Null

You have a computer with a single hard disk configured as a basic disk with a single partition formatted with FAT32. The computer runs Windows XP professional. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. What is a required task to add space to the existing volume? a. Extend the C:\ volume. b. Upgrade both disks to dynamic. c. Create an empty folder on the new hard disk. d. On the new hard disk, create a new partition without a drive letter.

On the new hard disk, create a new partition without a drive letter.

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?

On the system volume

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two.)

Parabolic Highgain

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Up to this point, which step have you forgotten in your troubleshooting process?

Perform a backup Explanation You need to perform a backup before making changes. The backup could be used to restore current settings or data in the event of additional issues resulting from the troubleshooting process. You have already established a probable cause and created an action plan. Verifying and documenting the solution occurs after the problem has been resolved.

Which tool can you use to display stats that tell you about the operation of your computer?

Performance Monitor

You nee to enable a screen saver password on the Windows 7 workstation in your organization. What CP option should you use to do this?

Personalization

You need to enable a screen saver password on the Windows workstation in you organization. Which Control Panel option should you use to do this?

Personalization.

SFTP uses which mechanism to provide security for authentication and data transfer?

SSH

which of the following commands verifies that TCP/IP is working correctly on the local computer?

Ping 127.0.0.1

Which of the following Denial of Service (DoS) attacks uses ICMP packets and will only be successful if the victim has less bandwidth than the attacker?

Ping Flood

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are.

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch you music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers. Click the tab you would use in the Sound Properties window to do this.

Playback

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Up to this point, which step have you forgotten in your troubleshooting process?

Preform a backup

Drag the Web threat protection method on the left to the correct definition on the right.

Prevents visiting malicious Web sites Web threat filtering Prevents outsided attempts to access confidential information Antiphishing software Identifies and disposes of infected content Virus blockers Prevents unwanted email from reaching your network Gateway email spam blockers Prevents visiting restricted Web sites URL content filtering

Which of the following are considered computer hardware? (Select two.)

Printer Motherboard

What tool can you use in the Control Panel to control how many times, dates, numbers, and currency are formatted and displayed for your computer?

Region and Language

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer?

Process. Details.

On a Windows system, which Task Manager Tab would you use to adjust the priority given to a specific program?

Processes

On a Windows system, which Task manager tab would you use to adjust priority given to a specific program?

Processes

Which computer function takes data through a series of procedures as defined by a set of instructions?

Processing

The amount of time the processor spends performing non-idle tasks.

Processor utilization

You use your computer to type documents in Portuugese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. What tool would you use to configure your computer for the new keyboard so you can switch between the Portuguese and the English keyboards?

Region and Language in the Control Panel

You have a workstation running a 64-bit versions of Widows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the least amount of effort and cost.

Purchase a 64-bit upgrade version of Windows 10; perform an in-place upgrade.

You have a workstation running a 64bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do?

Purchase a 64bit upgrade version of Windows 10; perform an inplace upgrade.

You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?

Quarantine the computer

You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?

Quarantine the computer.

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

You have a file which you would like other users to see, but not modify. which file attribute should you use?

R

You have a file which you would like others users to see, but not modify. which file attribute should you use? a. R b. A c. H d. S

R

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement?

RAS

You recently purchased a USB audio head set and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic.

Recording

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic. click the tab you would use in the Sound Properties window to do this.

Recording

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic. Click the tab you would use in the Sound Properties window to do this.

Recording

Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a unstable state. During the recovery process, you want to preserve as much data as possible including apps purchased from the Microsoft Store as well as your user's data files. Which option should you use?

Refresh Your PC

Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a usable state. During the recovery process, you want to preserve as much data as possible including apps purchased from Microsoft Store as well as your user's data files. Which option should you use?

Refresh Your PC

Which tool lets you view and directly edit the registry?

Regedit

Which of the following is the process f fixing problems detected by anti-virus software so that the computer is restored to its original state?

Remediation

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?

Remediation.

Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks.

Remote Assistance

Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?

Remote Assistance

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need.

Remote access

Which of the following can be used to create a secure connection to a remote server?

SSH

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. What else could you do to increase the security of this system?

Remove the optical drive. Disable all USB ports in the BIOS/UEFI firmware configuration.

Which of the following are likely symptoms of malware infections?

Renamed system files. Changed file permissions.

Marcus was attempting to tweak his workstations operating system when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. After pressing f8 , which option should be choose?

Repair your computer

Which of the following network services or protocols uses TCP/IP port 22?

SSH

A file you have been working on for several days was corrupted when you shut your Windows 7 system down uncleanly. You want to restore a previous version of the file, overwriting the existing file that has been corrupted. Click the option you would use in the properties of the file to do this.

Restore

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the Internet, and that the malware has infected the system. Based on your suspicions, what actions could you take to correct the problem?

Revert the system to a restore point created before the malware infection occurred. Use an anti-malware scanner to scan for and remove the infection.

How do you set file attributes?

Right-click the file, then select Properties. Use the attrib command

Which of the following protocols can be used to securely manage a network device from a remote connection?

SSH

You have a computer that currently has Windows Vista installed. You want to upgrade the system to Windows 10. You want to retain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?

Run Scanstate in Windows Vista. Perform a clean ( custom) installation of Windows 10 on the existing hard drive. Boot into Windows 10 and reinstall all applications. Run Loadstate.

You have a computer that currently has Windows Vista installed. You want to upgrade the system to Windows 10. You want to retain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?

Run Scanstate in Windows Vista. Perform a clean (custom) installation of Windows 10 on the existing hard drive. Boot into Windows 10 and reinstall all applications. Run Loadstate.

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer running Windows Vista to the new computer. How can you do this with the least amount of effort?

Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications.

You have just purchased a new computer that runs Windows 7. You would like to transfer all of the applications and user data from your old computer running Windows XP to the new computer. How can you do this with the least amount of effort?

Run Windows Easy Transfer on the old computer and the new computer. Reinstall any applications.

You have installed anti-malware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next to make sure that there arent any existing files on your system that are infected?

Run a full scan

While browsing the Internet, a pop-up browser windows is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. What should you do?

Run a full system scan using anti-malware software installed on your system. Update the virus definitions for you locally-installed anti-malware software.

You have a Windows 10 system that was recently upgraded from Windows 7. One of the installed applications worked fine under Windows 7, but now does not run in Windows 10. you have check the application vendor's website but there is no update available. What should you try next to run the application?

Run the application in compatibility mode.

You have a Windows 7 computer that was recently upgraded from Windows XP. An installed application worked fine in Windows XP, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. Which options should you try to run the application?

Run the application in compatibility mode. Run the application in XP mode.

Which of the following Internet services provides equal upload and download bandwidth?

SDSL

As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.)

SFTP SCP

Which protocol uses traps to send notifications from network devices?

SNMP

Drag each IP port number on the left to its associated service on the right. Be aware that some port numbers may be used more than once.

SNMP 161 TCP and UDP SSH 22 TCP and UDP TFTP 69 UDP SCP 22 TCP and UDP Telnet 23 TCP HTTPS 443 TCP and UDP HTTP 80 TCP FTP 20 TCP SMTP 25 TCP POP3 110 TCP

Which of the following tools allow for remote management of servers? (Select two.)

SSH Telnet

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP?

SSID

Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?

SSID broadcast

FTPS uses which mechanism to provide security for authentication and data transfer?

SSL

Which protocol does HTTPS use to offer greater security in Web transactions?

SSL

You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet?

SSL

You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)

SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed

Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?

SaaS

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following is the most susceptible to interference related to atmospheric conditions?

Satellite

Good documentation will:

Save you time and money in the troubleshooting process

Good documentation will:

Save you time and money in troubleshooting problems. Explanation By keeping adequate documentation, you can reduce the time and money spent troubleshooting. While documentation can help reduce troubleshooting, it can never completely eliminate it. Documentation helps you know when regular maintenance of hardware is required, but does not eliminate maintenance.

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To increase performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

Startup

Youre troublshooting a computer running windows 7. The operating system has halted and a blue screen has been displayed on the monitor with an error message. What is the first step you should take in troublshooting the issue?

Search for the error in Microsoft's knowledgebase or in a search engine on the internet

How do you access msconfig?

Search msconfig OR Start-All Programs-Accessories-System Tools-System Configuration

How do you run MSINFO32?

Search-MSINFO32 OR all programs-Accessories-System Tools-System Information

How do you open Regedit?

Search-Regedit OR Regedt32

You have a computer that runs Windows 7. Where would you go to check if the system can recognize and use any installed anti-virus software?

Security center

What does msconfig allow you to configure?

Startup Preferences | System Components View and customize Windows setup components | bootup configuration | turn on/off services | enable/disable startup utilities and programs

Which of the following tools can you use to start the print spooler service if it is currently stopped? select two

Services console and net start

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (you account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system?

Set a screensaver password. Disable autorun on the system.

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. What's causing the problem?

She has turned Num Lock on causing numbers to be sent from the keyboard instead of letters.

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to displse of the discs. What method should you use to best prevent extracting data from the discs?

Shredding

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?

Shredding.

What is a hardware device that contains ID info and which can be used to control building access or computer logon?

Smart card

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?

Smurf

Explanation

Some operating systems also have attributes such as: Multiprocessing is the ability to use multiple processing devices. Multitasking is the ability to run multiple applications simultaneously. Multithreading is the ability to run multiple parts of an application simultaneously.

Which of the following could easily result in a denial of service attack if the victimized system had too little free storage capacity?

Spam

Which of the following could easily result in a mailbox being full so that messages can't be received?

Spam

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

Spamming

You are looking at a female TRS connector on the computer. Which device uses this connector?

Speaker

Which of the following best describes the use of Libraries in Windows

Special folders that group files and folders, possibly stored in both local or network locations into a single logical folder

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

A router on the border of your network detects a packet with a source address that is from an internal client but the packet was received in the Internet-facing interface. This is an example of what form of attack? (#1)

Spoofing

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. What form of attack has occurred in this scenario?

Spoofing.

You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used. Even though the monitor is made by a different manufacturer than the desktop computer, it still works with the computer. Which computer design concept makes this possible?

Standardization

Match each Windows version on the left with its associated features on the right. Each Windows version can be used once, more than once, or not at all.

Start Screen similar to the Windows Phone - Windows 8/8.1 Enhanced Aero features including Snap, Shake, and Peek - Windows 7 Windows Sidebar - Windows Vista Metro design interface - Windows 8/8.1 Free upgrade available - Windows 10 Introduced the Libraries feature - Windows 7 Microsoft Edge web browser - Windows 10

Match each Windows version on the left with its associated features on the right. Each Windows version can be used once, more than once, or not at all.

Start Screen similar to the Windows Phone Windows 8/8.1 Enhanced Aero features including Snap, Shake, and Peek Windows 7 Windows Sidebar Windows Vista Metro design interface Windows 8/8.1 Free upgrade available Windows 10 Introduced the Libraries feature Windows 7 Microsoft Edge web browser Windows 10

What are 2 ways to open Computer Management Tool?

Start-(right click) Computer, Manage | OR In control panel, open Administrative Tools, double click Computer Management

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)

TLS and SSL

Which security measure uses a unique key that can be used for hardware system identification?

TPM- trusted platform module

You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?

Static

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow Internet hosts to contact the server to browse a personal Web site. What should you use to allow access?

Static NAT

What types of input can be used to alter the Registry?

String text, Hexadecimal or Binary

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses.

A VPN is used for what purpose?

Support secured communications over an untrusted network

What is msconfig?

System Configuration Utility to configure your system to enable optimal troubleshooting and diagnosis of technical issues. Use the System Configuration Utility to

You need to configure when Windows checks for and downloads updates from Microsoft's update servers on a Windows 7 system. Which option in control Panel should you use to do this?

System and Security

You need to configure when Windows updates and check for an downloaded from Microsoft's update servers on a Windows 7 system. Which option in Control Panel should you use to do this?

System and Security

You need to enable Remote Desktop on a user's Windows 10 system s that you can manage it over the network from your office. Click the option you would use in Control Panel to do this.

System and Security

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. click the option you would use in Control Panel to do this.

System and Security

What encryption method is used by WPA for wireless networks?

TKIP

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)

TKIP encryption Preshared key

You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victims of a social engineering attack. What should you recommend they do to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks

Which of the following Denial of Service (DoS) attacks does the victim's system rebuild invalid UDP packets, causing the system to crash or reboot?

Teardrop

A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next?

Test the solution

A user reports that her monitor has stopped working. While troubleshooting the issue, you discover a bad video card in the system. You replace the card and connect the monitor cable to the card. What should you do next in your troubleshooting process?

Test the solution

A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next?

Test the solution Explanation After implementing the solution, verify full system functionality. Make sure that the solution has fully fixed the problem and has not caused any other problems. Document the problem and solution after it has been fixed and verified. Determine if escalation is needed and create an action plan before implementing the solution.

What does the /a switch used the copy command indicate? a. That the file can be decrypted before copying b. That symbolic links should be copied along with the file c. That the file is an ASCII text file d. That the file is a binary file

That the file is an ASCII text file

What does the /a switch used with the copy command indicate?

That the file is an ASCII text file

What does the /a switch used with the copy command indicate?

That the files is an ASCII text file

Whcih of the following is true about a primary partitions?

The active partition must be a primary partition

Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows operating system? (Select two.)

The current time A volume control

Which of the following describe the EDGE cellular technology? (select two.)

The first Internet compatible technology Offers speeds of 400-1,000 Kbps

Which are examples of a strong password?

TuxP3nguinsRn0V3l. il0ve2EatIceCr3am.

You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 10. You need to transfer use profile information and data files from ComputerA to ComputerB. Which tools could you use to do this?

USMT Windows Easy Transfer

How can you reformat a drive from FAT32 to NTFS without losing the existing data?

Use the convert command at a command prompt

Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an software installation.

User Account Control (UAC)

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

Users with the correct WEP key

Utilities

Utilities are the features or programs included with an operating system that perform system related tasks. Common Windows utilities are My Computer and the Control Panel.

You are looking at a high-density (three-row) female DB-15 connector on the computer as shown in the figure below. What device uses this connector?

VGA/SVGA monitors

What is the purpose of the Services Snap in?

View and manage software processes running in the background

The presence of unapproved modems on desktop systems gives rise to the LAN being vulnerable to which of the following?

War dialing

you are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer propterties on your computer to print a ptest page. Instead of a normal test page, you recieve several pages.with garbled charcters on them. What is the most liekly cause of the primblem?

Wrong print driver.

You replaced the print catridge on an inkjet printer. What should you do next?

calibrate the printer

Which command would you use to change the current directory to the immediate parent directory?

cd ..

How do you establish a remote desktop session in cmd?

mstsc /v:(IP of remote host)

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions?

net use

How can you see a list of valid command parameters for the net use command?

net use /?

What is a firewall function?

packet filtering

On a windows system, which task manager tab would you use to adjust the priority given to a specific program?

processes

What is MSINFO32?

provides a single location to view (ONLY) information such as: Operating system version | Computer manufacturer, processor type, available memory | Installed devices and drivers used | Running tasks | Applications that run at system startup

What would you enter at the command prompt on a Linux system to display the present working directory? (typed)

pwd

you are testing the power supply in a PC system by measuring the voltage available on the 4 pin molex connector. the voltage on the yellow wire s +10.1 volts. hwat should you do?

replace the power supply

You have just installed a maintenance kit in you laser printer. What should you do next?

reset the page coutn

What would you use Control Panel's Action Center?

review recent error messages and options for resolving issues.

Which of the following conditions would typically result in replacing the drum on a laser printer?

spots as regular intervals on the page

...

unavailable DHCP server

...

your ISP's DNS server is down

What are the tabs in Windows Task Manager?

Applications, Processes, Services, Performance, Networking and Users

You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path? (Select two.)

* %tmp% * C:\Users\username\AppData\Local\Temp

Which of the following file extension types can be run from the command prompt? (Select three.)

* .bat * .com * .exe

Which of the following file extensions indicates a Windows system file? (Select two.)

* .vxd * .dll

How do you set file attributes? (Select two.)

* Rightclick the file, then select Properties * Use the attrib command

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting an SSID of Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security? (Select two.)

*Change the SSID to something other than the default. *Disable SSID broadcast.

You've just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select two.)

*Configure the WAP to filter out unauthorized MAC addresses. *Use the WAP's configuration utility to reduce the radio signal strength.

You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning? (Select two.)

*Create a system backup of the hard drive prior to running the upgrade. *Verify that the computer meets the minimum requirements.

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting an SSID of Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security? (Select two.)

*Disable SSID broadcast. *Change the SSID to something other than the default.

The sales engineers in your organization use virtual machines to model deployments in the lab prior to actually implementing them in your customers' physical environments. You are concerned that a malicious insider could gain access to the sensitive data on these virtual machines. What should you do? (Select two.)

*Disable the USB ports on the hypervisor hardware. *Use file and folder permissions to restrict access to the virtual hard disk files.

Which installation method is best for large numbers of computers that share the same hardware configuration? (Select two.)

*Disk image *Network installation

Which of the following are true of Libraries? (Select two.)

*Each Library can contain multiple folders from different file system locations. *A single folder can be added to multiple Libraries

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select three.)

*File Explorer *Network *Computer

You have a computer with a 64bit dualcore processor that runs the 32bit version of Windows 7 Professional edition. You would like to upgrade to the 64bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this? (Select two.)

*Get 64bit drivers for all hardware *Perform a clean installation

Your organization is frequently visited by sales reps. While onsite, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. What should you do? (Select two.)

*Implement static IP addressing. *Implement MAC address filtering.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's Accounting department. She received a single Windows 10 installation disc with the licenses. Which of the following would be the best installation methods to use? (Select two.)

*Install one system and image it to the other systems. *Use a network installation.

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (Select two.)

*Place the files on an NTFS partition. *Configure both share and NTFS permissions.

You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following keypress sequences will get you into Replace Mode? (Select three.)

*Press Insert, then press Insert again *Press the 's' key, then press Insert *Press the 'i' key, then press Insert

What should you do (if possible) before flashing the BIOS? select two

- Connect the computer to a UPS - Backup CMOS settings

you have a small wireless network that uses multiple access points. the network uses WPA and borad casts the SSID WPS2....

- TKIP ecryption - Preshared key

One day while trying to start you windows xp computer, the system displays the following error: windows could not start because the following file is missing or corrupt: windows\system32ntoskml.exe. Please reinstall a copy of the above file. The problem occurs immediately after the operating system loading message. You are unable to boot into dafe mode. Which of the following will most likely fix the problem? select two

- boot into the recovery console and run bootcfg/rebuild - boot into the recovery console and perform an automatic operating system scan and repair

Which of the following are likely symptoms of malware infection? select two

- changed file permissions - renamed system files

Lately your computer is spontaneously shutting down only after a few minutes of use. What s the most likely cause? slect two

- coo,ing fans clogged with dust or overheated CPU

You have a small wireless network with less than 50 client computers. You upgraded the hardware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. Your need the greatest amount of security with e lest amount of effort, and withouth replacing any of the wireless infastrucure. What should you do? select two

- implement WPA2-AEs - configure each client with the same key

You are in the process of configuring a new computer.The motherboard has six memory slots and supports triple channel memory. You install two memory modules. When you boot the computer, thye bios recognizes both modules, but the memory only runs in dual channel mode. What should you do? select two

- install a third, identical memory module - move the modules to the correct motherboard slots

which of the following tools can you use to start the print spooler service if i is currently stopped? select two

- net start - services console

you are troublshooting network connections on a windows workstation and you want to view a list of connections on the compuer. HOw can you do this? select two

- on the start menu, click control panel, then click network and internet - on the star menu, right click network, and select properties

To test a power supply, you want to use a mulitmeter to measure the voltage on a molex hard disk drive connector. To do this, you need to turn the power supply on. Which pins on the 24 pin motherboard connector coming from the power supply can be shunted to turn the power supply on? select two

- pins 15 & 16 - Pins 16- &17

you hae added a new 1 Tb hard disk to a windows computer. the disk is condfigured as a basic disk. Which of the following can be configured on this disk? select tw

- primary partitions - extended partititions with logical drives

while browsing the internet, the internet explorer browser window hangs an stops responding. Which task mananger tab would you use to end internet explorer? select two

- processes and applications

while browsing the internet, a popup browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to scan for and remove the virus. What should you do? select two

- run a full system scan using the antivirus software installed on your system - update the virus definitions for your locally installed anti virus software

You have a windows 7 computer that was recently upgraded from windows xp. An installed application worked fine in Windows xp. but now it does not run in Windows 7. Y ouhave checked the application vendor's web site but there is no update available. That should you try to run the application? select two

- run the application in compatibility mode - run the application in XP mode

you lobby receptionist uses a laptop computer her day to day tasks. you are concerned about the security of her system. What should you do? select two

- secure the laptop to the desk using a cable lock - configure the laptop with a biometric fingerprint scanner

You have connected a two drives to the primary IDE interface in a pc system. How could the drives be configured? select two

- set one driver to master and the other to Slave or Set both drives to cable select

You recently upgraded a clients older workstations from winodws xp to windows 7. The client has called to complain that the new interface is very slow. for exanple, after clicking on the start vbutton, the start menu slowly appears on the screen. How can you fix this problem? select two

- set the visual effects for best performance - upgrade the video board installed in the system

you're troubleshooting a malfunction notebook ccomputer system. the user has indicated that the screen suddenly became dark and difficult to read while h was downloading a large file through his wireless network card while the system was plugged in at his desk. You;ve checked the system and determined that the backlight has stopped working.

- the cold cathode fluorescent lamp has burned out andneeds to be replaced - the inventor in theLCD assembly has malfunctioned

you're troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. When you connect an external monitor to the system, the Windows desktop is displayed properly on the monitor. What could be causing this problem? select two

- the display output has been redirected to the external montiro port using the FN key - the LCD assembly is malfunctioning

youre attempting to diagnose a problem with a notebook computer. The user reports that it displayed a message indicating that the battery was low, then it shut down by itself even though it was plugged into a wall output. You've checked the AC adapter and found that the LED light is lit when plugged into a wall outlet. What should you check next? select two

- verify that the AC adapter produces the correct DV voltage for the notebook computer - verify that the power LED on the notebook computer is lit when plugged into the wall outlet.

in which of the following situations would restoring from a backup be the best option? select two

- you accidently deleted several important emails from outlook and need to restore them - you need to restore several word processing files that were accidently deleted from my documents

You have been tasked with designing a workstation that will run VMware Workstation virtualization software. It will be used by a software engineer to run virtual machines for application development and testing. Which criteria should be included in your design for this system? (Select two.)

-64bit processor with 8 cores -RAM configured to run in quadchannel mode

You want to purchase a home theater computer system. Which hardware selection criteria would be most important for this system? (Select two.)

-HTPC form factor -Video card with HDMI output

You have just finised upgrading the CPU in your desktop system. After running the system for about 15 minutes, the system spontaneously shuts down. What should you do first to troubleshoot the problem? select two

-check the thermal shutdown threshold in the bios - check the CPU fan power

You are troubleshooting a network communication problem to the www.widgets.com server. Which of the folowing will give you the ip address of that server? select two

-nslookup www. widgets.com - ping www.widgets.com

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (select two)

1) Enable the Erase Data option 2) Disable the Simple Passcode Option

Drag the computer function on the left with its associated hardware component on the right. (Each option can be used more than once.) Hard disk Printer Keyboard CPU Speakers RAM DVD-RW Microphone

1) Storage 2) Output 3) Input 4) Processing 5) Output 6) Processing 7) Storage 8) Input

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 7 PC to the device. How can you connect the device to the PC? (select two)

1) USB cable 2) Wi-Fi wireless connection

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a "paper license" and a single key for updating 10 users. Since this is an enterprise paper license there is no mechanism that enforces a limit to the number of times the key can be used so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select two)

1.)You risk losing your job. 2.) You expose your company to litigation by violating the software license agreement.

Your Windows 7 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this? (Select two.)

1.)w32tm /query /source. 2.) w32tm /query /status.

you have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. THe default gateway address is 192.168.1.254. and the router is proiding DHCP on the network. The 2 computer has been assigned the ip address of 192.168.1.55. which o f the foloowing is considered the loopback address for the 2 computer?

127.0.0.1

you have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The 2 computer has been assigned the ip address of 192.168.1.55 which of the following is considered the loopback address for the 2 computer?

127.0.0.1

You want to close all ports associated with NetBIOS on your network firewalls to prevent attacks directed against NetBIOS. Which ports should you close?

135, 137139

Which of the following are valid IPv6 addresses? Select all that apply.

141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552

Which port number is used by SNMP?

161

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

169.254.0.0 - 169.254.255.255

Given that your windows workstation has automatic private ip addressing implemented using default settings, which of the following TCP/ IP addresses could be automatically assigned to the sstem should your DHCP server go down or become inaccessible?

169.254.1.26

given that your winodws workstation has autmoative private ip addressing implemented using default setting, which of the following TCP/ IP adreesses could be automatically assigned to the system should your DHCP server go down or become inaccessible?

169.254.1.26

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.)

172.17.128.0 172.17.0.0

Which of the following specifications identify security that can be added to wireless networks? (Select two.)

802.11i 802.1x

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless stragegy must support a transmission range of 150 feet, use a frequency range of 2.4 Ghz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

802.11n

you are designing a wireless network or a client. your client needs the network to support a data rate of at least 54 mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 Ghz. Which 802.11 standards will work best in this situation? select two

802.11n 802.11a

What is Dxdiag?

A DirectX diagnostic tool-that tests the DirectX system

What can be found in Performance Monitor?

A counter identifies a specific statistic, such as % Processor Time or % Disk Free Space. | You can add or remove counters to customize the statistics you can see. | Real-time data are displayed in a graph. | Performance Monitor by itself does not save any data. To save statistics over time, use a data collector set.

Which of the following are true of libraries in windows 7? (select 2)

A single folder can be added to multiple libraries. Each library can contain multiple folders from different file system locations.

While browsing the Internet, you notice that the browser displays pop-ups that are targeted towards recent keyword searches you have performed. What is this an example of?

Adware

Which techniques are used in a pharming attack to redirect legitimate web traffic to malicious web sites? (Select two.) A. Exploiting DHCP servers to deliver the IP address of poisoned DNS servers. B. Dictionary attack. C. Search engine results poisoning. D. Man-in-the-middle attack. E. Changing the host's file of a user's computer.

A. Exploiting DHCP servers to deliver the IP address of poisoned DNS servers. & E. Changing the host's file of a user's computer. Explanation: Pharming redirects one website's traffic to another, bogus website that is designed to look like the real web site. Once there, the attacker tricks the user into supplying personal information, such as bank account and PIN numbers. Pharming works by resolving legitimate URLs to the IP address of malicious web sites. This is typically done using one of the following techniques: • Changing the hosts file of a user's computer • Poisoning a DNS server • Exploiting DHCP servers to deliver the IP address of malicious DNS servers In DHCP leases. Search engine results poisoning is not typically associated with pharming attacks. A man-in-the-middle attack occurs when the attacker intercepts legitimate network traffic and then poses as one of the parties involved in the network communication. A dictionary attack is used to crack passwords by guessing the password from a list of likely words.

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the swap file? A. On the system partition B. Split the file between two hard disks C. On a USB flash device D. On a drive other than where the operating system files are stored

A. On the system partition Explanation: You must place the swap file on the system partition if you want the system to be able to create a memory dump file when it.

Which of the following are likely symptoms of malware infection? (Select two.) A. Renamed system files. B. Cookies placed by a web site recently visited. C. Operating system updates that were installed without your knowledge. D. Receipt of phishing e-mails in your inbox. E. Changed file permissions.

A. Renamed system files. & E. Changed file permissions. Explanation: Common symptoms of a malware infection include the following: • Slow computer performance • Internet connectivity issues • Operating system lock ups • Windows update failures • Renamed system files • Disappearing files • Changed file permissions • Access denied errors Cookies are commonly placed by legitimate web sites and aren't considered a major security threat. Windows operating systems automatically install updates by default. Receiving phishing e-mails doesn't necessarily indicate that the system is infected with malware. It's more likely your e-mail address has been picked up and Included on a list.

You just created a snapshot of a virtual machine while it was running. What information is saved in the snapshot? (Select two.) A. The current contents of the virtual machine's CPU registers. B. The current contents of the virtual machine's video memory. C. The current contents of the virtual machine's RAM. D. The current contents of the hypervisor host's paging file. E. The current contents of the hypervisor host's hard disk cache.

A. The current contents of the virtual machine's CPU registers. & C. The current contents of the virtual machine's RAM. Explanation: Snapshots contain the current state of a virtual machine, including the contents of its disk file, system RAM, and CPU registers. Using the snapshot file, the virtual machine can be rolled back to a prior state in time. The virtual machine's video memory is not captured in a snapshot file. The state of the hypervisor host is not captured in a snapshot.

Which term refers to a software implementation of a computer system that executes programs like a physical machine as a self-contained and autonomous system? A. Virtual machine B. Hypervisor C. Physical host D. Workload management

A. Virtual machine Explanation: A virtual machine is a software implementation ot a computer system that executes programs like a physical machine. A virtual machine functions as a self-contained and autonomous System. A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on. Workload management relates to the portability of virtual machines.

A SYN attack or a SYN flood exploits or alters which element of the TCP three-way handshake?

ACK

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)

AES encryption 802.1x

IPSec is implemented through two separate protocols. What are these protocols called?

AH and ESP

What is the name of the set of features that improves the visual appearance of Windows? These features include, but are not limited to, the following: • Glass effects • Window animations • Flip 3D • Snap • Shake

Aero

What does the following command do? attrib +s +r -a myfile.dll

Adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll

What does the following command do? attrib +s +r a myfile.dll

Adds the System file attribute, adds the Readonly attribute, and removes the Archive attribute to the file myfile.dll.

What does the following command do? attrib +s +r -a myfile.dll

Adds the system file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll.

What does attrib +s +r -a myfile.dll do? a. Adds the system file attribute, adds the write-only attribute, and removes the archive attribute to the file b. Removes the System file attribute, removes the read-only attribute, and adds the archive attribute to the file c. Adds the system file attribute, removes the read-only attribute, and removes the archive attribute to the file d. Adds the system file attribute, adds the read-only attribute, and removes the archive attribute to the file

Adds the system file attribute, adds the read-only attribute, and removes the archive attribute to the file

You manage a computer that runs Windows 7. You want to create a new user account and allow the user to create and save files, install applications, and change the system time. What group membership should you assign for the new user?

Administrators

You manage a computer that runs Windows 7. You want to create a new user account and allow the user to create and save files, install applications, and change the system. What group membership should you assign for the new user?

Administrators

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of enable this configuration?

Administrators Remote Desktop Users

You need to configure File History to automatically delete any stored snapshots that are older than 1 month. click the option you would use in Control Panel to do this.

Advanced Settings

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced System Settings in Control Panel.

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced System settings in Control Panel

What is the name of the set of features that improves the visual appearance of Windows? These features include, but are not limited, the following: Glass effects Window animations Flip 3D Snap Shake

Aero Explanation Windows Aero is a set of features that improves the visual appearance of Windows. Features of Aero include: Glass effects on window borders that make borders semi-transparent (translucent). Window animations when windows are opened or closed. Taskbar thumbnails show the contents of an open windows when you move the mouse over items on the taskbar. Windows Flip shows thumbnails of running programs when you use the Alt+Tab keys to switch between running programs. Aero Flip 3D is activated with the Window + Tab key shows an expanded 3D view of running programs. The Show Desktop button (on the right side of the Taskbar) hides all open windows. Hovering over the button makes the content of all open windows disappear (called Peek). Snap is a new feature that maximizes a window as your drag its border to the edge of the screen. Snapping multiple windows on the screen tiles them side-by-side. In Windows 10, Snap is limited to four apps on the desktop and two apps on a tablet. Shake lets you hide all but the current window. Click the top window border, and shake the mouse to hide or unhide all other open windows.

What permissions do member of the Users group have to these two files in the C:\PublicReports folder?

Allow Full Control to both

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. What permissions do members of the Users group have to these two files in the D:\PublicReports folder?

Allow Full Control to both

Applications

An application is a subclass computer program that is designed for end users. Examples are database, spreadsheet, and word processing programs. Applications frequently come in suites.

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. What permissions do members of the Users group have to these two files in the C:\PublicReports folder?

Allow Full Control to both

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the the properties for the following two files and assign the Deny Read permission to the user group: Reports.doc Costs.doc The D:\ drive allows the Full Control permission to the User group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports What permissions do members of the Users group have to these two files in the D:\PublicReports folder?

Allow full control on both.

What permissions do member of the Users group have to these two files in the C:\PublicReports folder?

Allow full control to both

Which of the following best describes the ping of death?

An ICMP packet that is larger than 65,536 bytes

Interface

An interface is what allows the user to interact with the kernel and utilities. There are two main types of interfaces: 1. In command line interfaces, commands are executed through instructions written into a command line. Examples of command line-based interfaces are MS-DOS and aspects of Linux. 2. In a graphical User interface(GUI), the user executes command by clicking on graphics and symbols. An example of graphical user interface is Windows.

A company executive has just ought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select two)

App reviews and rating will help you choose an effective anti-virus app Anti-virus apps are available for purchase from Android app stores

OS Tasks

Application Platform, Moderating Hardware, Provide security, and Manages Filesystem.

Match the applicationaware network device on the right with the appropriate description on the left. Each description may be used once, more than once, or not at all.

Applicationaware proxy Improves application performance Applicationaware firewall Enforces security rules based on the application that is generating network traffic, instead of the traditional port and protocol Applicationaware IDS Analyzes network packets to detect malicious payloads targeted at applicationlayer services

What is the difference between an Application and a Service?

Applications are used by the end user where as Services run in the background.

Which parameters of virtual memory can you control on a Windows workstation? (Select two.) A. Maximum time between memory swap operations B. Location of the paging file C. Minimum size of the paging file D. Minimum time between memory swap operations E. Maximum size of the paging file

B. Location of the paging file & E. Maximum size of the paging file Explanation: While the default behavior of Windows is to allow the operating system to manage virtual memory settings, the system administrator can control both the maximum size of the virtual memory paging file and the disk partition upon which the paging file is stored.

While browsing the Internet, a pop-up browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to scan for and remove the virus. What should you do? (Select two.) A. Use a search engine on the Internet to learn how to manually remove the virus. B. Run a full system scan using the anti-virus software installed on your system. C. Update the virus definitions for your locally-installed anti-virus software. D. Click on the link provided to scan for and remove the virus. E. Close the pop-up window and ignore the warning.

B. Run a full system scan using the anti-virus software installed on your system. & C. Update the virus definitions for your locally-installed anti-virus software. Explanation: This is an example of a rogue anti-virus attack. As such, you should assume that your system may have been infected by some kind of malware, possibly by one of the sites you visited recently. You should first close your browser window and then update the virus definitions for your locally-installed anti-virus software. Once done, you should run a full system scan using the anti-virus software installed on your system. Clicking the link provided would be the worst choice as it will most likely install a host of malware on your system. Ignoring the message is unwise as your system has probably been infected with malware that should be removed. You shouldn't try to manually remove the virus as the message displayed by the rogue anti-virus attack is probably fictitious.

You have a computer where a removable disk drive has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more OS's. The drive is currently configured using drive letter D:. What should you do?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You have a computer where a removable disk drive has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:. What should you do?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You want a security solution that protects the entire hard drive, preventing access even when it is moved to anther system. which solution would you choose?

BitLocker

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group. Which of the following statements correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware form the Internet, and that the malware corrupted the boot block. Based on your suspicions, what actions could you take to correct the problem?

Boot from the Windows 7 installation DVD and use the Recovery Environment to run a start up repair. Reimage the machine.

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem you suspect the user unknowingly downloaded malware from the internet, and the malware corrupted the boot block. Based on your suspicions, what actions could you take to correct the problem? (2)

Boot from the Windows 7 installation DVD and use the Recovery Environment to run a startup repair. // Reimage the machine

Your anti-virus software has detected malware on your system. However, the anti-virus software is unable to remove it, and when you try to delete the files, you can'y because they are in use. What should you try first?

Boot into Safe Mode and try removing the malware

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it, and when you try to delete the files, you can't because they are in use. What should you try first?

Boot into Safe Mode and try removing the malware.

Mission Control is a desktop and windows management utility that is used to access several Mac OS features. Which of the following are Mac features accessed through Mission Control? (Select three.)

Dashboard All Windows Multiple Desktops

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting.

Buttons

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.

Buttons

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.

Buttons

Match the Mac key labels on the left with the corresponding Mac key descriptions on the right. -The primary modifier key on Apple systems, used like the Ctrl key on a Windows system -Primarily used for text document navigation -Used for application and navigation shortcuts -Typically only found on Apple notebooks and is used to access the F1-F12 keys on the keyboard

C D A B

You have a Windows system shared by three shift workers. Files that are used by all users are strored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D:\ drive

Which tool would you use to adjust the operation of virtual memory in Windows Vista or Windows 7? A. Clock, Language, and Region in Control Panel B. Hardware and Sound in Control Panel C. Advanced System Settings in Control Panel D. Administrative Tools in Control panel

C. Advanced System Settings in Control Panel Explanation: You manage virtual memory using Advanced System Settings in Control Panel. You can control the size and the location of the paging file. You use Hardware and Sound in Control Panel to manage hardware devices, such as printers. You use Administrative Tools to load MMC consoles such as Services or Computer Management.

What is the recommended size of the paging file under normal circumstances on a Windows 7 system with 4 GB or RAM installed? A. As large as possible. B. 1.5 times the amount of physical RAM. C. Equal to the amount of physical RAM. D. No more than 3 times the amount of physical RAM.

C. Equal to the amount of physical RAM. Explanation: Unless you are running applications that require large amounts of swap file space, the optimal setting for virtual memory swap file size is about the same size as the amount of physical RAM in the computer on Windows 7 systems with more than 1 GB of RAM installed. With less than 1 GB of RAM installed, then the recommendation is to set the size of the paging file to 1.5 times the amount of RAM installed in the system. If the paging file is too small, the system will spend excess time swapping memory data in to and out of the swap file. This condition is known as thrashing, where system performance (particularly usability) becomes very poor, but hard drive activity is almost constant.

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it is running on in a virtualization environment? A. Virtual machine B. Workload management C. Hypervisor D. Virtual Hard Disk

C. Hypervisor Explanation: A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor manages access to system resources such as: • CPU • storage • RAM A virtual machine is a software implementation of a computer system that executes programs like a physical machine. A Virtual Hard Disk is a disk file used by a virtual machine. Workload management relates to the portability of virtual machines.

A customer complains of a slowly-operating Windows system. In researching the problem, you notice that the computer's hard disk drive light stays illuminated for long periods of time as more applications are loaded. To speed up the computer, which of the following components should you consider upgrading? A. System board B. Hard disk drive C. Memory D. CPU

C. Memory Explanation: When a Windows-based computer does not have sufficient memory, data is often written to the hard disk drive instead. This is called virtual memory. To speed up the computer, you should add more memory so the computer does not need to rely on virtual memory. Memory is often the first component you should consider upgrading to improve performance. Upgrading the CPU could result in faster performance, but the fact that the hard disk light is on constantly indicates heavy use of virtual memory.

Several employees have forwarded you an e-mail indicating that your company's health insurance provider has just launched a new benefits management web site that all employees must start using. The employees are told in the e-mail to click a link to access the site. Once there, they are required to provide their Social Security number. However, you have discovered that your company's insurance provider did not send this e-mail. What kind of attack just occurred? A. Piggybacking B. Denial of Service C. Phishing D. Trojan Horse

C. Phishing Explanation: A phishing attack has occurred. In a phishing attack, a spoofed e-mail containing a link to a bogus web site is used to trick users into revealing sensitive Information, such as a username, password, or social security number. Both the e-mail and the web site used in the attack appear to be legitimate on the surface. Piggybacking occurs when an unauthorized person follows behind an authorized person to enter a secured area. Denial of Service (DoS) attacks flood a target host with so many bogus requests that it can no longer respond to legitimate network requests. A trojan horse is a type of malware that pretends to be a legitimate application.

The sales engineers in your organization use virtual machines to model deployments in the lab prior to actually implementing them in your customers' physical environments. You are concerned that a malicious insider could gain access to the sensitive data on these virtual machines. What should you do? (Select two.) A. Create snapshots of each virtual machine an a regular schedule. B. Configure the hypervisor to use paravirtualization. C. Configure the hypervisor to use full virtualization. C. Use file and folder permissions to restrict access to the virtual hard disk files. D. Disable the USB ports on the hypervisor hosts.

C. Use file and folder permissions to restrict access to the virtual hard disk files. & D. Disable the USB ports on the hypervisor hosts. Explanation: Virtual machine portability represents a security issue. Because virtual machines are easy to copy, an attacker, such as a malicious insider With a USB drive, can very easily make a copy of a virtual machine that contains proprietary or sensitive information. To prevent this, you should implement file system and share permissions that restrict access to the virtual machine disk files. You should also lock the hypervisor host when not in use. You should also consider disabling the USB ports on the hypervisor host. Full and paravirtualization are mechanisms that define how physical hardware is accessed by virtual machines running on a hypervisor host creating snapshots of the virtual machines protects them from disasters and malware infections, but it doesn't secure the data within the virtual machines.

The paging file on a hard drive is sometimes called: A. Extended memory B. Upper memory C. Virtual memory D. Random access memory

C. Virtual memory Explanation: A paging (swap) file on a hard drive is sometimes called virtual memory, because it mimics real memory (though at a much slower speed). The process of moving data from RAM to disk (and back) is known as swapping or paging. Random Access Memory (RAM) is used as a temporary data storage location and is called physical memory. The terms extended and upper memory refer to memory above the first megabyte of address space in an IBM PC With an 80286 or later processor.

You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. To do this, you need to configure a RADIUS Server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is part of the complete solution)

Configure the RADIUS server with a server certificate and Configure all wireless access points with client certificates.

Which of the following identify the key differences between a worm and a virus? (Select two.) A. Worms usually destroy data while viruses gather sensitive information. B. Worms must be launched by some other process on the system. C. Worms independently replicate themselves. D. Viruses must be launched by some other process on the system. E. A virus relies on a host for replication.

C. Worms independently replicate themselves. & E. A virus relies on a host for replication. Explanation: A worm can independently replicating itself. It uses an available network connection to send copies of itself to other computers. A virus, on the other hand, must infect a file for it to be replicated. The virus is replicated when the infected file is copied to another computer. Worms and viruses are not always dependent upon other processes to launch them. Both worms and virus are capable of destroying data or gathering sensitive information.

Where system root is the C: drive, what is the path to the system files that hold user profiles in Windows 10?

C:\Users\username

Where system root is the C: drive, which is the path to the directories that hold user profiles in Windows 10?

C:\Users\username

You need to see the temporary files on a machine running windows 7. Which directory holds the user temporary files, and what environment variable stores the temporary directory path? (select 2)

C:\Users\username\AppData\Local\Temp %tmp%

You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path?

C:\Users\username\AppSata\Local\Temp %tmp%

Which file system path is the default location for system files in Windows 10?

C:\Windows

Which of the following services are available regardless of whether the telephone company network is available?

Cable modem

You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from accessing the access point (AP) configuration utility?

Change the administrative password on the AP.

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.)

Change the default administrative user name and password. Use an SSH client to access the router configuration.

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?

Changing the administrative password

Which of the following would indicate when a system case cover is removed? a. DriveLock b. Chassis intrusion detection c. Trusted Platform Module (TPM) d. BIOS password

Chassis intrusion detection

Which of the following would indicate when a system case cover is removed?

Chassis intrustion detection

a dot matrix printer is printing faintly after replacing the print head. what should you do?

Check the gap between the printer and the paper

You have just installed a new USB card reader in your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?

Check the manufacturer's website for information about the error. Explanation For information about a specific error, check the manufacturer's website. Taking any other action might fix the problem, but would most likely just waste time. In most cases, device-specific problems can be corrected with a new driver or other software update.

You have just installed a new USB card reader in your Windows computer. Every time you preform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?

Check the manufacturers website for information about the error

You want to configure your Windows 10 workstation such that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft. Click the option you would use in the Settings app to do this.

Choose how updates are delivered

You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer. Assuming the default directories were used during installation for both systems, which action is correct?

Copy the fonts from C:\Winnt\Fonts to C:\Windows\Fonts.

Which tool can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?

Clock, Language, and Region

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which option in Control Panel would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?

Clock, Language, and Region

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which option in Control Panel would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboard?

Clock, Language, and Region

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which option in Control Panel would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboard?

Clock, Language, and Region

When designing a firewall, what is the recommended approach for opening and closing ports?

Close all ports; open only ports required by applications inside the DMZ.

Which of the following is not true regarding cloud computing?

Cloud computing requires enduser knowledge of the physical location and configuration of the system that delivers the services.

Which type of Internet service uses the DOCSIS specification?

Coaxial cable

Which of the following is not a reason to use subnets on a network?

Combine different media type on to the same subnet.

You're working on a Mac computer that has an issue with a non-responsive application. You need to stop the application using the Force Quit feature. Which of the following keyboard shortcuts can be used to access the Force Quit feature?

Command+Option+Esc

The amount of memory that has been assigned to running process.

Commit Charge

Which Windows tools would you use to browse the file system on a drive? (Select three.)

Computer File Explorer Windows Explorer

Where is Disk Management located within Windows?

Computer Management

System Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System protection for the C: volume. Click the option you would select to do this.

Configure

Following Windows installation, you enabled the built-in Admin account . You remove the password for this account, You enable remote Desktop on your computer using the default settings.. From home, you try to access your computer using Remote Desktop using the Admin account but you are unable to log on. What should you do?

Configure a password for the Admin account

You want to configure your computer so that a password is required before the operating system will load. What should you do?

Configure a user password in the BIOS

You want to configure your computer so that a password is required before the operating system will load. What should you do? a. Configure an administrator password in the BIOS. b. Configure a user password in the BIOS c. Configure chassis instruction detection d. Require complex passwords in the local security policy

Configure a user password in the BIOS

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)

Configure all wireless access points with client certificates. Configure the RADIUS server with a server certificate.

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:/ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D: /drive.

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D: drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D: drive.

You have a Windows 7 computer shared by 3 users. Files that are used by all users are stored on the D:/ drive in various folders. The users that have created hundreds of files on this drive are having a hard time finding the files they need. What feature can you configure to improve access for users?

Configure indexing to include the D:/ drive

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using WiFi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public WiFi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)

Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?

Configure the software to automatically download the virus definition files as soon as they become available.

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stole, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

Which Windows component lets you modify system parameters stored in the registry using a GUI interface?

Control Panel

Which windows component lets you modify system parameters stored in the registry with a GUI interface?

Control Panel

You have just installed a new keyboard that includes special programmable buttons. You installed the custom driver that came with the keyboard. Now you want to configure what the special keyboard buttons do. Which Windows utility would most likely let you manage these settings?

Control Panel

You install a new keyboard and custom driver-how would you configure what the special buttons do in windows?

Control Panel

You recently purchased a new computer running Windows 7 for your company's graphic designer. The graphic designer needs his design fonts removed from his old Windows 2000 computer and placed on his new computer. Assuming the default directories were used during installation for both systems, which action is correct?

Copy the font from C:\Wint\Fonts to C:\Windows\Fonts

You are helping a customer over the phone who needs to connect a monitor that uses a digital interface. Which port should you instruct her to look for on the back of her PC?

DVI

What function is performed by the TMP?

Create a hash of system components

Which of the following functions are performed by the TPM? a. Provide authentication credentials b. Create a hash of system components c. Encrypt network data using IPSec d. Perform bulk encryption

Create a hash of system components

Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new hard disk to the computer. What should you do to add space to the C:\ drive? a. Strip the C:\ volume to the second disk b. Span the C:\ volume to the second disk c. Create a mount point using space on the second disk d. Extend the C:\ volume to the second disk

Create a mount point using space on the second disk.

What is the primary function of the IKE protocol used with IPSec?

Create a security association between communicating partners

A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next?

Create an action plan.

A user reports that she she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next?

Create an action plan. Explanation At this point, you should create an action plan and account for side effects of the proposed plan. Identifying the effects ahead of time helps you put measures into place to eliminate or reduce any potential negative consequences. Escalation is not necessary because you are already in charge of managing and maintaining the desktop computers. Fix the problem only after creating the action plan and identifying possible effects. Document the problem and the solution after the problem has been fixed and the solution has been verified.

You are providing telephone support for a user who is trying to connect a computer to a projector. You know that the projector only has a VGA port. How would you describe the connector that the user should look for?

D-shaped with 15 pins

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attacks?

DDoS

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?

DNS

Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?

DSL

your desktop workstation system uses a scsi bus to connect storage devices. the SCSI host adapter is assigned an ID of 7, the SCSI hard disk is assigned an ID % the SCSI tape drive is assigned an ID of 3, and the SCSI DVD drive is assigned an ID of 0. which device has the lowest priority on the SCSI bus.

DVD drive

The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: • Allow Full Control to the D:\Reports folder • Deny Full Control to the D:\Sales folder • Deny Full Control to the D:\Reports\2010reports.doc file • Allow Full Control to the D:\Sales\2010sales.doc file What effective permissions does Mary have to both files?

Deny Full Control to both

What permissions do member of the Users group have to these two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow full control to costs.doc

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. What permissions do members of the Users group have to these two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc

What permissions do member of the Users group have to these two files in the C:\PublicReports folder?

Deny full control to both

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue. What should you do next?

Deploy the hotfix on a test computer.

On Windows 10 system, which Task manager tab would you use to adjust the priority given to a specific program?

Details

On a Windows 10 system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details

On a Windows 10 system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details.

A user reports that he can't send print jobs to a specific printer. You go to the user's computer and reproduce the problem. What should you do next?

Determine if anything has changed. Explanation After identifying the problem, determine if anything has changed. For example, question the user and identify user changes to computer. From there, you establish a theory of probably cause, and continue through the troubleshooting process. Before you can establish a probable cause, do additional work to see what might have changed. After selecting a probable cause, determine if escalation is required, then create an action plan and implement the solution.

A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. What should you do next?

Determine if escalation is needed. Explanation After you identify the most probable cause, escalate the problem if it s beyond your ability to fix or your scope of management. For example, the problem might be in the network server configuration that you are not authorized to correct. When forwarding the problem onto someone else, be sure to describe the nature of the problem, the actions you have already taken, and the symptoms that lead you to believe the problem is outside of your area of responsibility. If you have decided that escalation is not necessary, create an action plan that includes the fix and identifying possible effects of implementing the fix. After the solution has been implemented, verify that it works and that there were no unforeseen consequences. Finally, document the problem and the solution.

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?

Device Manager

Which system utility would you use to trouble shoot hardware devices, examine and control the resources used by specific devices and install updated device drivers/

Device manager

Which of the following protocols can TLS use for key exchange? (Select two.)

DiffieHellman and RSA

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?

Disable SSID broadcast

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allows management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been disabled on the system. What should you do to increase the security of this system?

Disable the Guest account.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for workrelated purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security?

Disable the switch ports connected to the network jacks in the reception area.

You have physicallt installed a new hard disk drive in your computer and configured the disk in the bios using the CMOS setup program. You try to access the hard disk drive in Windows explorer, but the drive is not displayed. Which utility will you most likely use to solve the problem?

Disk Management

The number of read and write requests that are waiting to be processed.

Disk Queue Length

The amount of time that the disk subsystem is busy reading from and writing to disk.

Disk Time

You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The installation starts but does not detect the RAID array. What should you do?

During the install, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows.

You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of Network Address Translation (NAT) should you implement?

Dynamic

Which remote access authentication protocol allows for the use of smart cards for authentication?

EAP

Which remote access authentication protocol allows for the use of smart cards for authentication?

EAP

Which EAP implementation is most secure?

EAPTLS

What security solutions would prevent a user from reading a file which she did not create?

EFS

Which techniques are used in pharming attack to redirect legitimate web traffic to malicious websites?

Exploiting DHCP servers to deliver the IP address of poisoned DNS servers. Changing the hosts file of a user's computer.

You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks? (Select 2)

Extended partitions with logical drives Primary partitions

Consider the cable connectors used by various peripheral devices (pictured below). Drag the letter on the left to the peripheral device on the right that would most likely use the connector type. A-H

External Storage Device G Analog Monitor D Video Camera C HDTV A Dial-up Modem H Digital Monitor (without audio) E Network Adapter Headphones F Headphones B

Which of the following is a privately controlled portion of a network that is accessible to some specific external entities?

Extranet

You can use these finger motbns to perform specific functions on a Mac OS system: • Right-click: Tap with two fingers to right-click • Smart zoom: Double-tap with two fingers to zoom in on a web page, image, or document (double-tap again to zoom out) • Scroll: Slide up or down using two fingers to scroll up or down • Zoom: Spread two fingers apart to zoom in. Bring fingers back together to zoom out • Page navigation: Slide two fingers left or right to navigate between pages in a document • Mission Control: Slide four fingers straight up to open Mission Control • All apps: Slide four fingers straight down to display all windows of the active app What is the name of the Mac feature that makes these finger motbns available?

Gestures

You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this?

Get 64-bit drivers for all hardware Perform a clean installation

Save you time and money in troubleshooting problems.

Good documentation will:

After installing some software a few days ago your DVD drive tray randomly began to open and close. Today, you were called into our boss's office to discuss why you are calling 900 numbers while at work. Which type f malware would create these symptoms?

Grayware

On a Windows system, which of the following is true about groups?

Group members have access rights assigned to the group.

On a Windows system, which of the following is true of groups?

Group members have the access rights assigned to the group

Which component within a tablet device measures acceleration horizontally and vertically at the same time?

Gyroscope

What TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?

HTTPS

Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?

HTTPS

Which of the following protocols uses port 443?

HTTPS

Which protocol is used for securely browsing a Web site?

HTTPS

You need to configure settings for a USB printer that you have just connected to your Windows 7 system. Which option in Control panel should you use to do this?

Hardware and sound

What are the three categories MSINFO32 displays?

Hardware | Components | Software

When answering a helpdesk call, a field customer calls and complains that he cannot print to a workgroup laser printer. What should be the first question you ask?

Have you printed to this computer before

A user calls to report a problem. She is trying to install an application on a Windows 10 system, but cannot. In the past, she installed applications on her Windows XP system without any issues. Her user account has always been a member of the Power Users group. What do you suspect is causing the installation issue?

Her group membership denies program installation on the operating system.

A user calls t report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software

A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the User Group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software.

The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. What type of attack has occurred in this scenario?

Hijacking.

Match the Active Directory component on the left with the appropriate description on the right. Each component may be used once, more than once, or not at all.

Holds a copy of the Active Directory database Domain Controller Manages access for a workstation Computer Object Manages access for an employee User Object Can be created to logically organize network resources Organizational Unit Cannot be moved, renamed, or deleted Generic Container Defines a collection of network resources that share a common directory database Domain

What are the control panel option that is only available in Windows 7?

Homegroup, Action Center and RemoteApp and Desktop Connections

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

Hotfix

Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?

ISDN BRI

Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)

ISDN BRI ADSL

A user reports that he can't send print jobs to a specific printer. You go to the user's computer and reproduce the problem. What should you do next?

Identify if anything has changed

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working". What should you do first in your troubleshooting strategy?

Identify the problem

What are the 8 troubleshooting process steps?

Identify the problem Back up the system Identify possible causes and identify a theory of probably cause Test your theory Create an action plan Test the solution Ensure satisfaction Document the solution and process

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do first in your troubleshooting strategy?

Identify the problem. Explanation Currently you have no idea what problem the user is having. The first step would be to identify the problem. You would ask questions to identify what the problem and its symptoms are. You would find out what has changed only after you know a bit more about the problem. Before taking any actions, back up the system to protect user data. Establishing a theory and a plan of action occurs only after you know what the problem is.

Two employees cannot access any sites outside of the local network, but can still access internal files on other internal subnets. Other employees are not experiencing the same problem. You suspect the issues may have something to do with the proxy server on your network and the settings in Internet Explorer. What should you do?

Identify the proxy server nae and port number in Internet Options.

You have created a custom library usng D:\Stats as the path to the libary. You want the files in the D:\Reports folder to be available in the library you created. The files should also still be accessible using the D:\Reports folder. What should you do?

Includes the D:\Reports folder in the library

under which circumstances would using the Last known good option be most likely to correct the problem?

If you made a system change and then the start up fails before the logon screen

The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for guests. The owner has asked that you implement security controls such that only paying guests are allowed to use the wireless network. She wants guests to be presesnted with a loging page when they initially connect to the WLAN. After entering a code provided at check in, guests should then be allowed full access to the Internet. If a user does not provide the correct code, they should not be allowed access to the internet. What should you do?

Implement a captive portal

The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for guests. The owner has asked that you implement security controls such that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, guests should then be allowed full access to the Internet. If a user does not provide the correct code, they should not be allowed to access the Internet. What should you do?

Implement a captive portal.

Your organization uses a Web server to host an ecommerce site. Because this Web server handles financial transactions, you are concerned that it could become a prime target for exploits. You want to implement a network security control that will analyze the contents of each packet going to or from the Web server. The security control must be able to identify malicious payloads and block them. What should you do?

Implement an applicationaware IPS in front of the Web server.

You have a windows 7 computer. You have created a custom library using D:\Stats as the path to the library. You want the files in the D:\Reports folder to be available in the library you created. The files should also still be accessible using the D:\Reports folder. What should you do?

Include the D:\Reports folder in the library.

You need to place a wireless access point in your two story building. While trying to avoid interference, which of the following is the best location for the access point?

In the top floor

You need to place a wireless access point in your twostory building. While trying avoid interference, which of the following is the best location for the access point?

In the top floor

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. What should you do?

Include the D:\Reports folder in the Library.

You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which Windows feature improves the speed of file searches on your computer?

Indexing service

You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which feature improves the speed of file searches on your computer?

Indexing service Explanation Windows includes a new indexing service that catalogues objects and files on your computer to improve the speed of searches on your computer. The search is typically fast because it is not searching the complete hard drive but instead is looking though the index. Aero Flip 3D shows an expanded 3D view of running programs. Windows Explorer provides a graphical user interface (GUI) for viewing and managing the file system. Quick Launch is a toolbar that contains shortcuts to designated programs. Cloud storage is an optional tool that provides integrated access to OneDrive, which provides free storage space in the cloud.

You have installed anti-malware software that checks for viruses in email attachments. Yu configure the software to quarantine any files with problems. You receive an email w/ an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. hat has happened to the file?

It has been moved to a folder on our computer.

You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. You want to install Windows 10 on this system. You need to use the edition of Windows 10 that will use the full 6 GB of available RAM. What should you do?

Install Windows 10 64-bit Enterprise edition

You are working as a desktop technician for a small company. You recently bought a new desktop computer with 6 GB RAM and a video card with 512 MB of memory. You want to install Windows 10 on this system. You need to use the edition of Windows 10 that will use the full 6 GB of available RAM. What should you do?

Install Windows 10 64-bit Enterprise edition.

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. What should you do to complete this installation?

Install Windows in the same way you would a system that uses a standard hard disk drive.

You are a desktop technician for a small company and recently installed Windows & on an older workstation. Once complete, you notice that the Flip 3D feature is not available. You need to enable Flip 3D. What should you do?

Install a video card that supports Aero

What 2 actions taken directly improves system security on Windows systems?

Install anti-virus software. // Enable the Windows firewall

Which of the following actions taken on a Windows workstation will directly improve system security?

Install the latest updates

You are the network administrator for a small company. You purchase eight copies of Windows at a local retail outlet. You install Windows successfully on eight computers in the office. A month later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. What should you do?

Instruct the employees to activate their Windows installation.

You are the network administrator for a small company. You purchase eight copies of Windows at a local retail outlet. You install Windows successfully on eight computers in the office. A mount later you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. What should you do?

Instruct the employees to activate their Windows installations

Don is an accountant in the Finance department. For the last several months he has been testing an online accounting program. After speaking with his manager, don received permission to download a streamlined version of the software which requires a local installation. after downloading, Don tried to install the application, but the operating system will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions

Don is an accountant in the Finance department, and for the last several months has been testing an online account program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. After downloading, Don tries to install the application on his Windows 10 workstation, but the operating system does not allow it. Out of frustration, he calls the Help Desk. The Help Desk personnel comes to Don's machine and installs the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions.

Which of the following is true of the Guest user account on a Windows system?

It is disabled by default.

What are the Snap-ins that MMC provides a frame for?

Local Users and Groups | Device Manager | Disk Management | Print Management | Component Services | Windows Firewall with Advanced Security

You are designing a wireless network implementation for a small business. the business deals with sensitive customer information, so data emanation must be reduces as much as possible. The floor plan of the office is shown below. Match each type of access point antenna with the appropriate location on the floorplan.

Location = type A= Directional B= Directional C=Omnidirectional D= Directional E= Directional F= Directional G= Directional

Which aspects of virtual memory can you configure on a Windows workstation?

Location of the paging file. Maximum size of the paging file.

Which of the following is an advantage of the exFAT file system over NTFS?

Lower memory and processor resource use

Which of the following do switches and wireless access points use to control access through the device?

MAC Filtering

Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

MAC address filtering

Which of the following do switches and wireless access points use to control access through the device?

MAC filtering

Which of the following networking devices or services prevents the use of IPSec in most cases?

NAT

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)

Near backup generators Near cordless phones

When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?

No, this is the system's recovery partition.

To protect user data on a Windows 7 system, you've configured System Restore to automatically create restore points for the C:\volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your user's data?

No, you need to create a backup of your user data as well.

To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect you user's data files. Will the configuration adequately protect your system in the event of a hard disk failure?

No, you need to create an image of your Windows system as well.

To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect your user's data files. Will this configuration adequately protect your system in the even of a hard disk failure?

No, you need to create an image of your Windows system as well.

Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?

Operating system. Explanation An operating system is a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware. Operating systems perform actions such as: Receiving user input from input hardware devices such as the keyboard or mouse. Sending user output to output hardware devices such as the monitor or a printer. Controlling the use of processing devices by applications. Serving as a platform for applications. Moderating hardware. Providing security. Managing the file system.

Leave Blank

Page File Usage

You are connecting an older, dot matrix printer to a computer. The printer's cable is a D-shaped connector with 25 pins. Which port type does the printer connect to?

Parallel port (25 pins)

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

Performance

Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system?

Performance Monitor

You manage a Windows 7 system. You want info about all of the programs running on your system and sort each program based on the amt of memory and CPU that the program uses. What tool would you use?

Performance Monitor

What permissions do member of the Users group have to these two files in the C:\PublicReports folder?

Permissions are removed from both files

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports The C:\ drive is formatted with the NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the the properties for the following two files and assign the Deny Read permission to the user group: Reports.doc Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports What happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. What happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files

Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all.

Provides a high-level overview of the organization's security program. -- Organizational Security Policy Defines an employee's rights to use company property. -- Acceptable Use Policy Identifies the requirements for credentials used to authenticate to company-owned systems. -- Password Policy Identifies a set of rules or standards that define personal behaviors. -- Code of Ethics Sets expectations for user privacy when using company resources. -- Acceptable Use Policy Specifies that user accounts should be locked after certain number of failed logins attempts. -- Password Policy

Match each description on the left with the appropriate cloud technology on the right.

Public cloud Provides cloud services to just about anyone. Private cloud Provides cloud services to a single organization. Community cloud Allows cloud services to be shared by several organizations. Hybrid cloud Integrates one cloud service with other cloud services.

You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. What should you do?

Purchase a full version of Windows 10; perform a custom installation.

You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. What should you do?

Purchase a full version of Windows 10; perform a custom installation.

Which of the following drive configurations uses striping with parity for fault tolerance?

RAID 5

You have a custom database application that your company has been using for several years. The application worked correctly when your organization used Windows XP systems. Recently, you purchased new Windows 10 systems for you sales team members. Each user is a member of the Users group on the local systems. you install the custom application successfully. When the sales employees log on and try to run the application, the program splash screen loads, but then seems to hang. What should you do first?

Run the application as Administrator.

You have a Windows XP system with a single hard disk configured as a basic disk w/ a single partition formatted with FAT32. The disk is running out of free space and you need to add additional space to it. You install a new hard drive and start Disk Management. What are required tasks to add space to the existing volume? (Select Two) a. Run the convert command. b. Create an empty folder on the C:\ drive. c. Initialize the new disk using GPT. d. Extend the C:\ volume. e. Upgrade both disks to dynamic.

Run the convert command. Create an empty folder on the C:\ drive.

What are the three break downs of Event Logs?

The Application log-a list of all application related events such as application installations, un-installations, and application errors. The System log a list of all system-related events such as system modifications, malfunctions, and errors. The Security log contains a list of all security-related events such as security modifications and user login events.

When you try to boot your computer, it hangs after POST. When you access the CMOS setup pprogram, you see that the date is several years behind and the time is set to 12:01am. What is the most likely problem?

The CMOS battery has failed

You administer a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: • IP address: 192.168.23.8 • HTTP Port: 1030 • SSL Port: 443 Users complain that they can't connect to the Web site when they type www.westsim.com. What is the most likely source of the problem?

The HTTP port should be changed to 80.

A user needs to copy a file from an NTFS partition o a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and encryption. When the folder is copied, is true? a. The R attribute is retained on the file. b. Only the NTFS permissions are retained on the file. c. The R and encryption attribute are retained on the file. d. None of the NTFS permissions or attributes are retained on the file. e. The attributes and NTFS permissions are retained on the file.

The R attribute is retained on the file.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?

The R attribute is retained on the file.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?

The R attributes is retained on the file

A user needs to copy a file from NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and Encryption. When the folder is copied, which of the following is true?

The R attributes is retained on the file.

Your iPad is configured to do remote backups everyday to iCloud. What conditions are required for the iCloud backup to take place. (Select three)

The iPad has to be plugged into a power source The iPad has to have an Internet connection The iPad screen has to be locked

Kernel

The kernel is the core of the operating system that is loaded into memory when the system boots up. It is responsible for controlling security, managing the file system, and providing a platform for application to run on. the user rarely interacts directly with the kernel.

Which of the following are true regarding the recovery partition on a Windows system?

The recovery partition can be used to restore the system to its original state when it shipped from the manufacturer.

You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the neccessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?

The system is vulnerable because LEAP is susceptible to dictionary attacks.

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the necessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?

The system is vulnerable because LEAP is susceptible to dictionary attacks.

You suspect that an Xmas tree attack is occurring on a system. Which of the following could result if you do not stop the attack?(Select two)

The system will be unavailable to respond to legitimate requests AND the threat agent will obtain information about open ports on the system

What are the 3 Panes that an MMC is comprised of?

The tree pane (on the left) organizes objects in a hierarchy. The results pane (in the middle) shows objects and configuration options. The actions pane (on the right) lists the actions you can take on objects. (The actions pane is new with Windows Vista.)

Which of the following technologies does GSM use to allow multiple connections on the same frequency?

Time division multiple access

What purpose does a wireless site survey serve? (Choose two)

To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.

What purposes does a wireless site survey serve? (Choose two.)

To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the network and the backup media.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security?

Train the receptionist to keep her iPad in a locked drawer when not in use.

You have just installed anti-virus software on all computers on your company networks. Which additional actions should you take yo help protect systems from malicious software? (2)

Train users to scan removable storage devices before copying files. // Train users to update the virus definition files frequently

While trying to log on, a user accidently typed the wrong password three times, and now the system tells him that he can't log on because of too many incorrect passwords. He still remembers his password, but just typed it wrong. He needs access as quickly as possible, what should you do?

Unlock the account

If your anti-virus software doesn't detect and remove a virus, what should you try first?

Update your virus detection software

Which of the following actions adds new features and fixes bugs for anti-malware software?

Updating the anti-malware software

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without loosing any data. What should you do?

Upgrade the disk to a dynamic disk

You are preparing for an installation of 64-bit Windows 10 on a computer that is currently running a 64-bit version of Windows 7. You perform a hardware inventory on the computer and not the following: -Processor = 2.0 GHz -Free Hard Drive Space = 200 GB -RAM = 1 GB -DVD drive = 18x -100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 7. What should you do?

Upgrade to at least 2 GB of RAM.

You are preparing for an installation of 64bit Windows 10 on a computer that is currently running a 64bit version of Windows 7. You perform a hardware inventory on the computer and note the following: • Processor = 2.0 GHz • Free Hard Drive Space = 200 GB • RAM = 1 GB • DVD drive = 18x • 100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 7. What should you do?

Upgrade to at least 2 GB of RAM.

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a locked server closet. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router's console port. You've configured the device with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?

Use SCP to back up the router configuration to a remote location.

You have an application that processes videos used in your online business, which requires a significant amount of processor time. You want to make sure that the application receives adequate access to the CPU, even if you open other applications. How can you adjust the amount of attention given to that application?

Use Task Manager to modify the process priority.

You have an application that renders videos in your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application?

Use Task Manager to modify the process priority.

Why would you use Windows Task manager?

Use Task Manager to view the current state of the system and running applications.

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do?

Use a router to configure a subnet for the accounting computers

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned someone might walk by and take of of these laptops. Which of the following is the best protections to implement to address your concerns?

Use cable locks to chain the laptops to the desks.

You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning?

Verify that the computer meets the minimum requirements. Create a system backup of the hard drive prior to running the upgrade.

What is the purpose of the Services Snap-in?

View and manage software processes running in the background

What is the purpose of the dxdiag tool?

View information related to DirectX operation

What is the purpose of the dxdiag tool?

View information related to DirectX operation.

Recently, a Windows 10 update was automatically download and installed on your Windows 10 system. However, after installing the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.

View your update history

Which of the following is another name for the paging file?

Virtual Memory.

Which term refers to a software implementation of a computer system that executes programs like a physical machine?

Virtual machine

Which of the following is another name for paging file?

Virtual memory

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Virus

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

What wireless security methods use a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, WPA2 Personal

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

You have a windows xp professional wokstation that does not currently have the recovery console installed. Which command should you use to install the recovery console?

WINNNT32/ CMDCONS

Which of the following provides security for wireless networks?

WPA

What provides security for wireless networks?

WPA2

Which of the following is the most secure security protocol for wireless networks?

WPA2

You need to secure your wireless network. Which security protocol would be the best choice?

WPA2

You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?

WPA2 and AES

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?

Web server, e-mail server

Under what conditions should you choose exFAT over FAT32 or NTFS? (Select 2)

When creating a volume over 32 GB in size When formatting removable flash devices.

Which operating system (s) include the following features? Cortana Cloud storage Contimuum Microsoft Store Microsoft Edge

Windows 10 Explanation Windows 10 has the following new features: Customizable Start Menu- Let's you to organize your apps and shortcuts. Microsoft Store- Allows you to purchase music, videos, games, and apps. Cortana- Provides you with a personal assistant for web searching. This feature is only available in the United States, United Kingdom, China, France, Italy, Germany, and Spain. This feature is hardware dependent. Windows Hello-- Uses face and fingerprint sign in. This feature is hardware dependent. Photos app-- Organizes photos and videos in one location. Cloud storage-- Provides integrated access to OneDrive, which provides free storage space in the cloud (optional). Continuum-- Allows you to switch between PC, tablet, and phones modes. This feature is hardware dependent.

Aero is a feature of which Windows versions and editions?

Windows 7 Home, Professional, ultimate and Enterprise

You remove a hard disk from a Windows 7 system and put it in another system that is running Windows 98. You are unable to read the disk. What is most likely the problem?

Windows 98 doesn't support NTFS.

Which Windows tool would you use to browse the file system on a drive?

Windows Explorer File Explorer Computer Explanation Computer, Windows Explorer, and File Explorer are graphical user interfaces designed to give the user easy access to the file system. The Taskbar shows running programs and icons for launching programs. The Notification Area shows icons for running services and notifications. Network acts as a built-in network browser showing all networks and shared folders to which the user has access.

What is the Windows Registry?

Windows uses this to set up entire windows enviroment

What form of networking is highly susceptible to eaves dropping (data interception) and must be secured accordingly?

Wireless

Which of the following forms of networking is highly susceptible to eavesdropping and must be secured accordingly?

Wireless

your laser printer prints a vertical black line on every page. You change the toner cartidge but the problem does not go away. What is the most likely problem?

a corona wire is dirty

Is Computer Management a MMC?

Yes it is a pre-built/pre-defined console for MMC.

You currently use the Thunderbird e-mail client on your desktop PC. You use it to connect to an e-mail server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad and want to configure its Mail app to connect to your e-mail server. Can you do this?

Yes, you can configure the Mail app on an iPad to connect to an e-mail server using the IMAP and SMTP protocols

In which of the following situations would restoring from a backup be the best option?

You accidentally deleted several important e-mails and need to restore them. You need to restore several word processing files that were accidentally deleted from your Documents folder.

Identify the problem

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do first in your troubleshooting strategy?

Test the solution.

You are responsible for managing client workstations for your company. A user calls and explains that her monitor does not work. While troubleshooting the issue, you discover a bad video card in the system. You replace the card you connect the monitor cable to the card. What should you do next in your troubleshooting strategy?

Verify full system functionality.

You are responsible for managing client workstations for your company. A user is unable to access data an external hard drive. You investigate the problem in determine that the USB cable connection to the hard drive is damaged. You replace the cable. What should you do next?

Determine if anything has changed.

You are responsible for managing client workstations for your company. A user reports that he can't send print jobs to us to specific printer. You go to the user's computer and reproduce the problem. What should you do next?

Determine if escalation is needed.

You are responsible for managing client workstations for your company. A user reports that he cannot access several network files. After some investigation, you determine that the problem is with a network server. What should you do next?

Perform a backup.

You are responsible for managing client workstations for your company. A user reports that her system is running slow when saving files. You identify what has changed in determine that you would need to upgrade her hard disk. You identify the components that are required and decide to schedule the repair for later that afternoon. Up to this point, which step have you forgotten in your publishing process?

Create an action plan.

You are responsible for managing client workstations for your company. A user reports that she can't turn her computer on. After some investigation, you find that the power supply is malfunctioning. What should you do next?

Document the solution.

You are responsible for managing the clients workstations at your company. A user in the conference room called concerning the digital projector and display issues when the projector is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. What should you do next in your troubleshooting strategy?

What are the two ways of getting help with a command in cmd?

You can enter: (the command space) /? OR typing:help (space) command

Check the manufacture's Web site for information about the error.

You had just installed a new USB card reader in your Windows computer. Every time you perform a certain action using the card reader, you get an error message that you've never seen before. What should you do first?

You are a PC technician for a national computer retailer. You are asked to build each of the systems listed on the right. You need to use the most appropriate hardware components to ensure that each of these systems will fulfill its intended role. Drag and drop the most appropriate list of components on the left to the system type on the right that needs those components to accomplish the work it is expected to do. (One list of components will not be the most appropriate for any of the systems listed on the right.)

[*Home Office Server • 2 TB RAID 5 disk array • 600W power supply • No audio adapter • Integrated video adapter] [ *Gaming PC • 1000W power supply • 1 TB SATA HD • Dual SLI 6GB PCIe video adapters • 5.1 channel surround sound adapter • Liquid CPU cooler] [ *Home Theater PC • HDMI output • Compact form factor • 5.1 channel surround sound adapter • TV tuner adapter] [ *Virtualization Workstation • AMD 12core, 4 GHz CPU • 4 TB SATA HD • 32 GB DDR4 RAM • Hardware-assisted virtualization] [* Thin Client Workstation • Intel Celeron dualcore , 2.7 GHz CPU • 500 GB SATA HD • 2 GB DDR3 RAM • Few or no applications installed] [*Audio/Video Editing Workstation • Intel Core i7 sixcore, 3.4 GHz CPU • 2 TB SSD SATA HD • 16 GB DDR4 RAM • Highend audio adapter with speaker system • Highend video adapter with dual displays ]

Match the Windows version on the left with the appropriate system requirements or features on the right. Each Windows version may be used only once.

[1 GHz processor (support for PAE, NX, and SSE2 not required) *Windows 7] [800 MHz processor *Windows Vista] [Metro design interface *Windows 8/8.1] [2 GB RAM for a 64bit system *Windows 10]

You are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office: • Gaming PC • Home Office Server • Thick Client Workstation Drag and drop each workstation type onto the most appropriate PC hardware on the left. Each workstation type can be used more than once.

[2 TB RAID 5 disk array *Home Office Server], [1000 W power supply *Gaming PC], [1 TB SATA HD *Gaming PC], [400 W power supply *Thick Client Workstation], [600 W power supply *Home Office Server], [500 GB SATA HD *Thick Client Workstation], [Dual SLI 6 GB PCIe video adapters *Gaming PC], [No audio adapter *Home Office Server], [5.1 channel surround sound adapter *Gaming PC], [512 MB PCIe video adapter *Thick Client Workstation], [Integrated video adapter *Home Office Server], [Basic desktop application s installed *Thick Client Workstation], [Liquid CPU cooler *Gaming PC]

You are a PC technician for a national computer retailer. A business customer asks you to build three custom computers to be used by employees at a branch office: • CAD / CAM Design Workstation • Home Theater PC • Virtualization Workstation Drag and drop each workstation type onto the most appropriate PC hardware on the left. Each workstation type can be used more than once.

[6 GB GDDR5 PCIe video adapter *CAD / CAM Design Workstation], [HDMI output *Home Theater PC (HTPC)], [Compact form factor *Home Theater PC (HTPC)], [32 GB PC42130 DDR4 ECC RAM CAD / *CAM Design Workstation], [32 GB PC42130 DDR4 RAM *Virtualization Wworkstation], [4 TB SATA HD *Virtualization Wworkstation], [1 TB SATA HD *CAD / CAM Design Workstation], [5.1 channel surround sound adapter *Home Theater PC (HTPC)], [TV tuner adapter *Home Theater PC (HTPC)], [Integrated video adapter *Virtualization adapter], [Remote control *Home Theater PC (HTPC)]

Match each cloud computing definition on the left with the appropriate characteristic on the right. Each characteristic may be used once, more than once, or not at all.

[Provides resources to a single organization *Private cloud] [Combines public, private, and community cloud resources from different service providers *Hybrid cloud] [Designed to be shared by several organizations *Community cloud] [Provides computing resources that are accessible by the general public *Public cloud] [Keeps one organization data separate and secure from any other organization using the same service provider *Private cloud]

Match the virtualization implementations on the left with the appropriate characteristic on the right. Each type of implementation may be used once, more than once, or not at all.

[The virtual machine completely simulates a physical computer system. *Full virtualization] [Operating systems do not need modification to run within virtual machines. *Full virtualization] [Only some of the components of a virtual machine are virtualized. *Partial virtualization] [Guest operating systems directly access hardware resources in the hypervisor host system. *Paravirtualization]

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which format would you use?

\\Home1\Pictures

what is a recovery partition?

a partition created by the computer manufacturer to restore the system to its original state

What is a Service?

a program that processes requests from other applications or users. Services can start automatically and stay constantly running in the background, waiting for service requests. Use the Services snap-in to view and manage running services. The service startup behavior determines how the service is started.

a costumer complains tthat a recently purchases plasma montior no longer displays a pcture. ou verify that the monitor is powered on and that the video cable is securly fastened to the DVI video port. Which of thefollowing actions shoul you direct the customer to take next?

adjust the monitors settings using controls on the monitor

you are the administrator for your company and you have been asked to get the company accounting program installed on some new windows 7 laptops. When you install this software one the new PCs you discover that it will not run because User Account Control keeps causing it to fall. Because the accounting program was designed by the company and it will not be upgraded anytime soon, you must get it to work as is with UAC. What can you do to get the application to work with UAC. Choose the best solution

alter the program settings to Run this program as an administrator

You are working at a command line and want to add the read-only attribute to a file and remove the hidden attribute. Which command would you use?

attrib +r -h

You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. which command would you use? a. attrib +ro -h b. attrib add r remove h c. attrib +r -h d. attrib /add r /remove /h

attrib +r -h

which LCD component is used to illuminate a notebook computers display?

backlight

What would you enter at the command prompt to start a new Bourne-again shell (bash) session? (typed)

bash

6 months ago, you purchased a new laptop. Since then, you have noticed that the battery life has been steadily going down. When it was new, a full charge lasted about 3 hours. Now you are lucky to geet 2 hours before the battery charge level drops below 5%. What should be your first step to correct this problem?

calibrate the battery

What are (2) functions performed by proxy servers?

block employees from accessing certain web sites // cache web pages

Which of the following represent the correct boot sequence in windows xp after the bios has passed control over to NTLDR?

boot - NT Detect - NTO

Which windows 7 operating system startup

boot configuration data

one day while trying to start your windows xp computer, the system displays the following error: invalid parition table. Which of the following will most likely fix the problem?

boot into the recovery console and run the fixmbr command on the boot volume

one day while trying to start your windows 7 compute.r The system displays the following error: windowss could not start because of a computer deisk hardware configuration problem. Could notread from the selected boot disk. Check boot path and disk hardware. Whichc of the following will most likely fix the problem?

boot into the recovery environment and run the bootrec/ rebuilding command

Greg. a graphic artist, installs a new art application on his windows 7 computer. The application prompts Greg to install an updated video driver, which is unsigned. Greg accepts the unsigned drive and completes the installation. Greg uses the system for several days, and then reports that his display doesnt seem to refresh properly under some conditions. You want to configure gregs computer to use the previous driver until the manufacturer provides a signed drived, but he still needs to able to use the appliation he installed. What should you do?

boot the system into safe mode. Open Device manager, and select the video driver. Open the drivers properties and select roll back driver.

What would you use Control Panel's System and Security?

configure Windows Update, manage Power Options, configure Backup and Restore, and use Administrative Tools.

You have ust replaced the motherboard in your computer. Your computer starts, but the hard disk light does not comeon on while the system is booitng. What should you do?

connect the hard disk, LED to the motherboard

You have a custom database application that your company has been using for several years. The application works fine on all of your windows xp systems. You have just purchased a new windows 7 system for one of your sales team members. you make this user a member of the users group on the local system. you install the custom application successfully. When the sales person logs on an tries to run the application, the program splash screen loads but then seems to hang. what should you do first?

grant the user permissions to the directories and files used by the application

You find that someone has set up an unauthorized account, with the username badmin, on the Linux server. You have disabled the account but you need to find out when and how this user has been gaining access to the system. The first step you decide to take is to inspect the contents of the /var/log/auth.log file to find information related to badmin logging into the system. Which command can you use to search through the auth.log for lines that contain the username you're looking for?

grep "badmin" /var/log/auth.log

all members of the Sales team use laptop computers while traveling to connect to the internet. Each laptop head a built in wireless network card that supports 802.11b/g/n. You have trained each user to be able to create new wireless connections in order to connect to wireless networks in airports and at hotels. YOu get a call from one user stating that her wireless connection no longer works. She has checked the wireless cards hardware switch is in the on position

have her verify that the wireless cards hardware switch is in the On positino

What do biometrics use to perform authentication of identity?

human characteristics

What would you enter at the command prompt on a Linux system to display the IP addresses and the subnet masks assigned to each network interface on a Linux system? (typed)

ifconfig

a user reports that he cant browse to a specific web site on the internet. From his computer, you find that a ping test to the web server succeeds. a trace route test shows 17 hops to the destination web server. What is the most likely cause of the problem?

incorrect DNA server address

you manage a network that has multiple internal subnets. You connect workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig/ all and see the following: ... What is the most likely cause of the problem?

incorrect default gateway

You manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0 subnet which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. you run ipconfig/ all and see the following: ... What is most likely the cause of the problem?

incorrect subnet mask

You have installed a new computer with a quad core 64 bit processor, 6 GB of memory, and a PCI e video card with 512 MB of memory. After installing the operating syste, , you see less than 4 GB of memory showing as avavailbe in Windows. What should you do?

install a 64 bit version of the operating system

You're troubleshooting an older laser printer that is creating "accordion jams" where the paper is crumpled as it exits the printer moving into the output tray. What can you do to fix this problem?

install a maintenance kit

you're troublshooting an older laser printer that is creating accordion jams, where the paper is cumpled as it exists the printer moving into the output treay. What can you do to fix this problem?

install a maintenance kit

Your computer currently runs windows 7 eterprize edition. You ant to create a Raid 10 aray using four newly installed SATA disks. Whe you go to Disk Management, the option to create the Raid 10 array is not avaible. What should you do?

install an Add-on Raid controller

you are trying to print complex images on an older that uses a parallel connection to your workstation. The pages produced cut off the bottom third of each image you print. Which of the following resolutions will fix the problem?

install more memory in the laser printer

yuu have an existing computer urnning windows 7 entriprize. you want to configure a raid5 array in the computer. You install three new SATA drives, then use the Raid controller integrated into the motherboard to define a raid 5 array using them, when ou booot the computer, window does not show the logical raid drive you just created. what should you do?

install the drives for the raid controller

the crt monitor dipslays a thick black border around the main screen image. What shoudl you ise to fix this problem?

monitor hardware controsl

One of the programs that launches automatically at startup is causing your windows workstation to lock up. You have to prevent the program from starting automatically?

msconfig.exe

Several employees have forwared you an email indicating that your companys health insurance provider has just launched a new benefits management web site that all employees to provide their social security number. However, you have discovered that your company;s insurance provider did not send this email. WHa kind of attack just occured?

phising

You are troublshooting connectivity between you computer and the www.widgets.comserver whose Ip address is 192.168.1.1. Which of the following commands tests connectivity to the device as well as name resolution?

ping www.widgets.com

you're troubleshooting a malfunctioning notebook computer. Nothing appears on the LCD display when the system is powered on. What is the first thing you should do?

plug in an external monitor

Yo u have just installed several devices at once to a computer. but now the computer fails to boot properly. What shoud you do?

remove all of the newly added devices and install them once at a time

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?

ps -e

Your laptop carrying case is designed for a 15 inch laptop, yet you think you can squeeze your 16 inch laptop into it. Before slipping the laptop into the case, What should you do?

remove any ExpressCards from their slots

Due to a blackout, power is no longer coming from the wall putlet and your compter is now offf. You do not have a UPS and you need to remove a disc out of the Dvd Drive. hwat is the easiest method for retrieving the disc?

push a unbent paperlcip into the hole on the front of the drive

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which command lets you delete subdirectories in addition to files in the current directory? a. rd /q b. rd /f c. rd /a d. rd /s

rd /s

Which command lets you delete subdirectories in addition to files in the current directory?

rd/s

Rodney, a user in the research department, reports that he is getting STOP errors while using his Windows 7 Computer. You ask rodney if anything has changed recently on the computer. Rodney explains that he ran the installation program for his PDA and everything worked fine until he tried to hot sync. Now any time he hot syncs, he has to reboot the computer. You need to fix Rodneys computer and prevent rodney from using the PDA until you can install an updated river. What should you do?

reboot the sysem and select safe mode. Disable the PDAs driver in Device manager

Rodney...

reboot the system and select safe mode. Disable the PDAs driver in device manager

While working on your windows 7 system, the system encounters a critical error. For a brief second you see the blue screen indicating the error. Before you can read the error, however, the system reboots. After rebooting and logging back on, the same thing happens again. What should you do so that you can read the error message next time it happens without the system rebooting?

reboot the system. Press f8 and disable the automatic restart feature

a user in the research department, reports that heis gettin STOP erros on his winows system during startup . You ask him if anything has changed recently on the computer. He explains that he ran the installation program for his PDA just before revieing the first STOp error. He immediantly rebooted and has not been able to use Windows 7 since then due to STOP erroes during the boot process. You need to fix his computer. What should you do?

reboot the system. Selct last known good configuration form the advanced startup options

you're troubleshooting a notebook system that uses a digitzer paf and stylus ffor user input. The user has complained that the digitezer pad registers stylus taps about 1 inch to the right of where the tap actually occured. How can you fix this problem?

recalibrate the digitizer pad

when you print from your laser printer, the paper contains faint images from previous print outs. Which components should you check? select two

rubber scraper and discharge lamp

You have just installed a new hardware device, upgraded the driver, and installed the custom software that came with the device. now you cant get the device to work. what should you do first?

run any diagnostic software tha came with the device

You have a Windows Vista Computer that was recently upgraded from Windows XP. One application worked fine in windows xp but now does not run in Windows vista. You have checked the application vendors web site but there is no update available. What should you try next to run the application?

run the application in compatibility mode

the video driver on your windows 7 computer is preventing the system form starting up successfully. You have already downloaded an updated driver and copied it to the computes hard drive. Which mode should you select form the windows advanced boot options menu to ensure that the system can complete the boot process?

safe mode

A malfunctioning video driver is preventing your windwos system from starting successfully. Which startup option oshould you choose so you can copy an updated driver from the help desk support server?

safe mode with networking

Which of the following best describes the use of libraries in windows 7?

special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

which of the following conditions would typically rsult in replacing the drum on laser printer?

spots at regular intervals on the page

while troubleshooting a network issue, you successfully ping the 127.0.0.1 IP address, Which of the following is true?

the tcp/ip protocol suite is working correctly on the local computer.

How do you see a list of valid switch for the cd command?

type cd /?

You administer a etwork with windows and linux servers, and windows 7 clients. A USER CLASS AND INDICATED THAT HE IS UNABLE to access resources on the network. You type ipconfig on the users computer and recive the following output: --- You check your NIC and see the link light on. What might the problem be?

unavailable DHCP server

Which of the following should you do if you cannot turn a laptop off?

unplug the AC power an remove the battery

You rmotherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4GB modules and boooting your system, you find that windows only recognizes 2.5 GB of RAM. What should you do?

upgrade to a 64 bit version of windows

You have a desktop computer that uses a 20 watt power supply. You recently added a disk RAID 10 array to the system and now it spontanously shuts down. What should you do?

upgrade to a power supply trhat provdes more watts.

You're conducting scheduled maintenance on a laser printer. you notice that there is a buildup of excess toner inside the interior of the printer. which of the following is the proper way to remove it?

use an antistatic vaccum

you're conducting scheduled maintenance on a laser printer. You notice that ther is a buildup of excess toner inside the interior of the printer. Which of the following is the proper way to remove it?

use an antistatic vaccum

A USER has called to complain that her computer wont boot. It stops at the bios startup screen right after the memory has been tested and displays a 301 keyboard error. What should you do first?

verify that no keys are being pressed down during POST

Which of the following paper types should you not be used in inkjet printers?

very glossy paper

Whihc of the following paper types should not be used in inkjet printers?

very glossy paper

What would you use Control Panel's Hardware and Sound?

view and configure the current system sound settings, installed audio devices, sound cards, printer settings, and other hardware settings.

Your Windows 7 client system are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?

w32tm /tz

Your Windows 7 client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?

w32tm /tz


Kaugnay na mga set ng pag-aaral

4 - Life Insurance Policies - Provisions, Options and Riders - Exam 1

View Set

Interaction Between People and Their Environment

View Set

Chapter 10 Quiz, Sociology #4 Chapter 10, Sociology Chapter 8, ch 18, Sociology Chapter 10, Chapter 8: Section Quiz, Sociology Ch. 14, Sociology ch 11, Sociology ch 11, Sociology Final, Sociology 100 #3, sociology ch. 12 questions, Ch. 12 Sociology s...

View Set

Pearson Literature 10, Unit 2, Part 2

View Set

Chapter 5: Nevada Statutes and Regulations Common to All Lines

View Set

European History Unit 4: Enlightenment and Enlightened Despots

View Set