TEST OUT CORE 2: (220-1102) Operating Systems PART #2
Which of the following processors allowed macOS users to run Windows on their computers? Answer AMD IBM M1 Intel
Intel
You are creating a Linux program that needs to write data to a hard disk. In order to save time, you decide to have your program call a pre-written code element that tells the operating system to perform the task. What is this focused pre-written code element called? Answer Distribution Kernel Embedded Library
Library
Which of the following is an open-source operating system? Answer Linux Windows Chrome OS macOS
Linux
Which Windows network location enables network discovery and allows files and printers to be easily shared? Answer Work Domain Private Public
Private
There are several cloud computing options available for Linux. Drag the cloud computing option on the left to its appropriate description on the right. Drag IaaS SaaS NaaS STaaS Drop Provides access to software and data through the cloud. Provides access to storage devices through the cloud. Provides network connectivity through the cloud. Provides access to virtual machines through a network connectio
SaaS STaaS NaaS IaaS
Which of the following identifies both the host computer and the network to which it belongs? Answer Subnet mask Host ID Network protocol NIC
Subnet mask
Jesse, a professional graphic designer, has just installed a new application on his system, which needs a lot of memory for timely processing and high-quality images. Jesse's computer has an integrated graphics card. Which of the following is MOST likely to happen when Jesse runs the application on his computer? Answer The battery life will diminish quickly when running the app. The graphics card will produce high-quality images without delay. The whole system will run slowly. The graphics card will generate a lot of heat.
The whole system will run slowly.
You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer? Answer Mark's computer does not have the same program you used to write the proposal. The file was corrupted during the sending process. The wrong file extension was used when saving the file. The wrong default app is selected for the type of file that you sent.
The wrong file extension was used when saving the file.
You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department. One of your users, Jaclyn in HR, is trying to access shared files from Tom's computer in the sales department. Jaclyn states she was able to previously access these files. As part of your troubleshooting, you verify that both Tom and Jaclyn can access the network printer in their departments. Which of the following would be the MOST likely reason Jaclyn is unable to access files on Tom's computer? Answer Jaclyn has an invalid IP address. Tom and Jaclyn are no longer on the same subnet. The subnet mask has been misconfigured. Tom has an invalid IP address.
Tom and Jaclyn are no longer on the same subnet.
You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? Answer %systemdrive%\Applications (32-bit) %systemdrive%\Program Files %systemdrive%\Applications %systemdrive%\Program Files (x86)
%systemdrive%\Program Files (x86)
you have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? Answer C:\Users\Documents and Settings\username C:\Users\username C:\Users\Profiles\username C:\Documents and Settings\username
C:\Users\username
Which of the following is a web-browser based operating system? Answer Linux macOS Chrome OS Windows
Chrome OS
Which of the following file systems on Linux uses checksums to verify a journal's integrity? Answer vfat ext2 ext3 ext4
ext4 --Only ext4 uses a checksum journal. --ext2 and vfat do not have a journal, and --ext3 does not use checksums.
Which of the following IP addresses are Class B addresses? (Select three.) Answer 115.33.0.0 195.155.0.0 129.0.0.0 224.15.55.2 190.65.2.0 132.12.0.0 64.2.2.64
+190.65.2.0 +129.0.0.0 +132.12.0.0 Class B IP addresses, where the 1st two bits are 10, are in the range of 128.0. 0.0 to 191.255. 255.255. This class is for medium networks and has 16 bits for network and 16 bits fo
Which of the following file extension types can be run from a Windows system Command Prompt? (Select three.) Answer .bat .rtf .exe .com .png .dll .sys
.bat .exe .com
Which of the following file extensions indicate a Windows system file? (Select two.) Answer .rtf .msi .dll .vxd .com
.dll .vxd
Which of the following extensions identifies a program packaged for use by Windows Installer? Answer .bat .msi .exe .dll
.msi
Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.) Answer 191.168.2.15 123.254.19.6 1.6.45.254 228.62.18.6 129.0.0.1 168.16.5.1
129.0.0.1 168.16.5.1 191.168.2.15 --Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their first octet.
You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem? Answer The router has not been configured to perform port forwarding. A firewall is blocking ports 80 and 443. Port triggering is redirecting traffic to the wrong IP address. A proxy server is filtering access to websites.
A proxy server is filtering access to websites.
Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall? ACL Circuit-layer gateway Application-level gateway Packet filtering
ACL --refers to a set of rules that specify which users or system processes are granted access to object as well as what operations are allowed on a given object
Which of the following is designed to provide a Linux command line interface? Answer GCC GIMP GPL Bash
Bash
When Linus Torvalds first released Linux version 0.02 in 1991, which utilities were included in the release? (Select three.) Answer Print server GCC compiler system Database server Bash shell Update utility File server Web server
Bash shell Update utility GCC compiler system
Which file system path is the default location for system files in Windows 11? Answer C:\Windows\Program Files (x86) C:\Windows\System32 C:\System32 C:\Windows C:\Program Files (x86)
C:\Windows
You have been given a .app file for your Macintosh computer. The file is a graphics editor that you plan to install. What would you normally do to install the graphics editor? Answer Drag the .app file from Mission Control to the Dock. Launch the .app file from the Terminal application. Launch the .app file and follow the installation instructions. Copy the .app file to the Applications directory.
Copy the .app file to the Applications directory.
You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices. Which of the following file system types would meet MOST, if not all, of your needs when formatting your USB drive? Answer FAT32 CDFS NFS NTFS
FAT32
For some time now, you have been using an application on your Windows 11 computer at home and while in the office. This application communicates with the internet. Today, your team lead decides to have a special team meeting at a local hotel. During this meeting, you obtain access to the internet using the hotel's network, but when you try to run your application, it cannot communicate with the internet. Which of the following Windows settings is MOST likely causing this behavior? Answer Network & internet Windows permissions Bluetooth & devices Firewall & security
Firewall & security
What is normally disabled by default on most Linux servers? Answer IaaS TUI GUI Embedded Linux
GUI
Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform for applications to run on. What is the name of this core component? Answer Central Processing Unit Kernel Interface Desktop Driver
Kernel
Which of the following Linux software applications provides word processing, spreadsheets, and presentations? Answer LibreOffice GIMP LightWorks Distro
LibreOffice
Ruth has a startup business and limited resources. She wants to save money by using an operating system on her business computers that has no associated fees for installation. Which of the following operating systems could Ruth install for free? Answer Linux macOS Chrome OS Windows
Linux
Which of the following must specifically be modified to embed Linux within intelligent devices (such as smart TVs and tablets)? Answer Linux operating system Linux utilities Linux distribution Linux user interface
Linux operating system
You are in the process of preparing a 128-GB flash drive and must determine which file system to use. Which of the following BEST describes the advantages of using the exFAT file system rather than NTFS on the flash drive? Answer Support for volumes over 32 GB Support for files over 4 GB Lower overhead and risk of corruption Access control lists and permissions
Lower overhead and risk of corruption
Which of the following is software that allows a user to access a computer's memory, file system, processes, and hardware? Answer CPU Application software RAM Operating system
Operating system
Which of the following is the term for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware? Answer Command line Utilities Kernel Operating system Driver
Operating system
Match each file system component on the left with the correct description on the right. Drag Partition Volume Directory File Drop A logical division of a storage device associated with a hard drive. A single accessible storage area within a file system. A container in a file system used to logically sort and organize data. A one-dimensional stream of bits treated as a logical unit. nothing selected
Partition Volume Directory File
Which Windows network location would you enable when you connect to a network at a hotel? Answer Private Public Work Domain
Public
You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each device will connect to each other and act a relay for the network signal so additional network infrastructure will not be needed. Which of the following best describes this type of network? Answer Wireless mesh network Local area network Wireless wide area network Personal area network
Wireless mesh network
Which of the following are valid IP addresses? (Select two.) Answer 172.16.1.26 2.2.2.2 10.384.0.3 192.168.1.512 254.7.1.417 256.0.0.1 1.254.1.1024
172.16.1.26 2.2.2.2
Which of the following IP addresses are Class C addresses? (Select three.) Answer 240.0.0.0 125.166.11.0 222.55.0.0 223.16.5.0 189.189.5.2 192.15.5.55
222.55.0.0 223.16.5.0 192.15.5.55 ---Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first octet. The address 192.168.123.132 is a class C address. Its first octet is 192, which is between 192 and 223, inclusive
Which of the following best describes Windows Compatibility Mode? Answer A software mechanism that allows Linux programs to run on Windows. A software mechanism that allows newer versions of Windows to run older applications. A software mechanism that allows older versions of Windows to run newer applications. A software mechanism that allows macOS programs to run on Windows.
A software mechanism that allows newer versions of Windows to run older applications.
Most operating systems have a GUI as part of their system. Which of the following BEST describes an operating system's GUI? Answer The primary component of a computer that retrieves, processes, and executes instructions. An important component of a computer that is used to store data and machine code while in use. The microprocessor's program that starts the system up after the computer is powered on. A user-friendly interface that uses icons and visual components to interact with the system.
A user-friendly interface that uses icons and visual components to interact with the system.
To increase security on your company's internal network, you want to implement a firewall that blocks gaming and adult content without examining transmitted packets and sessions. Which of the following firewall types would you implement to block this type of content? Answer Packet filtering Circuit-layer gateway Access control list Application-level gateway
Application-level gateway
You have installed your Windows 11 system on a C: drive. Where are your fonts stored on your Windows 11 system? Answer C:\Fonts\ C:\Windows\Fonts\ C:\Windows\Documents and Settings\Fonts\ C:\Documents and Settings\Fonts\
C:\Windows\Fonts\
Which of the following operating systems was derived from Linux? Answer Chrome OS Unix Windows macOS
Chrome OS
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run on Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select two.) Answer Make all users who need to run the application members of the local Administrators group. Run the application in its own memory space. Purchase a new application that runs on Windows 10. Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. Run the application in Compatibility Mode.
Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. Run the application in Compatibility Mode.
Two employees are unable to access any websites on the internet, but they can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue? Answer Identify the filter settings on the proxy server for specific internet sites. Reconfigure the clients to send all traffic directly to the ISP, bypassing the proxy server. Use ipconfig to confirm that APIPA has not assigned an IP address. Identify the proxy server name and port number in Internet Options.
Identify the proxy server name and port number in Internet Options.
Don is an accountant in the finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the MOST likely reason Don could not install the application? Answer Incorrect service pack level Insufficient permissions Insufficient system RAM Insufficient disk space Failed device driver
Insufficient permissions
A customer needs to use several applications. Currently, the computer cannot keep all the necessary applications open at the same time. Which of the following components should you consider upgrading? Answer System board Memory CPU Hard disk drive
Memory
Which of the following vendors offers the largest variety of editions for its operating system? Answer Apple macOS Microsoft Windows Google Chrome Ubuntu
Microsoft Windows
Linux has been a mainstay operating system in server rooms for many years, and it has grown even more pervasive in recent times. Which of the following types of devices has Linux taken over a large percentage of the market for? Answer Mobile devices Wi-Fi routers Printers Desktop workstations
Mobile devices
Which file system is required to control access using file and folder permissions on a Windows-based computer? Answer NTFS-formatted partition Ext4-formatted partition EFS FAT32-formatted partition
NTFS-formatted partition
Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility? Answer CPU capacity VRAM capacity RAM capacity SSD storage capacity
RAM capacity
Which of the following are popular Linux OS distributions? (Select three.) Answer NaaS Debian Ubuntu Terminal SaaS SUSE Library
SUSE Debian Ubuntu
To answer this question, complete the lab using the information below. You are the IT administrator for a small corporate network. You need to configure the laptop computer in the Executive Office to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to: Configure the proxy server settings. Proxy IP address: proxy.corpnet. localPort: 9000 Launch Lab
TEST OUT Lab: 14.9.4 Use a Proxy Server Complete this lab as follows: Access the proxy settings.Right-click Start and then select Settings. Select Network & Internet. From the left pane, scroll down and select Proxy. Maximize the window for better viewing. Configure a manual proxy. Under Manual proxy setup, slide the Use a proxy server button to ON. In the Proxy IP Address field, enter : proxy.corpnet.local for the IP address. In the Port field, enter 9000 as the port number. Select Save. & Close the Settings app.
To answer this question, complete the lab using the information below. You are the IT administrator for a small corporate network. One of the engineers needs to connect their computer (Office1) to the local network and internet using a static IP address. In this lab, your task is to: Configure the IP version 4 TCP/IP addresses using the settings below: IP address: 192.168.0.15 Subnet mask: 255.255.0.0 Default gateway: 192.168.0.5 Preferred DNS server: 163.128.78.93 Alternate DNS server: 163.128.80.93 Ping the DNS server to verify that the computer has a connection to the internet. Launch Lab
TESTOUT Lab 11.3.8 Configure TCP/IP Settings on Windows 11 complete this lab as follows: Configure the Ethernet adapter to use a static IP address. Right-click Start and then select Settings. Select Network & internet. Select Ethernet. From the right pane, scroll down to IP assignment and then select Edit. Under Edit IP settings, use the drop-down list to select Manual. For IPv4, slide the button to On .Configure the IPv4 addresses as follows: IP address: 192.168.0.15 Subnet mask: 255.255.0.0 Default gateway: 192.168.0.5 Preferred DNS server: 163.128.78.93 Alternate DNS server: 163.128.80.93 Select Save. Close the Settings app. Verify a connection to the internet. Right-click Start and then select Windows Terminal. From the PowerShell prompt, type ping 163.128.78.93
You are a junior IT professional at a small startup company. Your manager has asked you to prepare the marketing director's iPad and notebook computer for an upcoming conference that she is attending. While working on the notebook computer, you noticed that the integrated Wi-Fi adapter is not functioning. Complete the following on the iPad: Turn off airplane mode and connect the iPad to the CorpNet wireless network.Airplane Mode: DisabledPassphrase: @CorpNetWeRSecure!& Turn off Bluetooth. Turn on passcode. Current passcode:1542 Configure the iPad to require a passcode after 15 minutes of being idle. Turn off simple passcode and enter a new passcode. New passcode: PCProRocks Configure the iPad to erase all data after 10 failed passcode attempts. Configure VPN settings on the iPad: VPN type: PPTP Description: Office2 VPNServer: 198.28.56.110 Account: mbrown Leave the password field blank and all other settings as default. Complete the following on the Office2-Lap Computer: On the laptop, install the fastest USB wireless adapter from the Shelf. On the laptop, create a manual wireless network connection for the convention's Wi-Fi using the following settings: SSID: TechCon-WiFi Security: WPA2-Personal Encryption: AES Passphrase: T3chCon2024 Do not have the connection start automatically. On the laptop, configure power saving options to increase battery life as follows: Customize the plan to turn off the screen after 10 minutes when on battery power. Customize the plan to put the computer to sleep after 30 minutes when plugged in. Use the Best power efficiency plan.
Test Out lab: 15.6 Troubleshoot a Mobile Device Complete this lab as follows: On the iPad: Turn off airplane mode and connect the iPad to the CorpNet wireless network.On the iPad, select Click to view iOS.Select Settings.From the left pane, slide the Airplane Mode button to the off position.Select Wi-Fi.From the right, slide the Wi-Fi button to the on position.Under NETWORKS, select CorpNet.In the Password field, enter @CorpNetWeRSecure!& and then select Join. Turn off Bluetooth.From the Settings pane, select Bluetooth.From the right pane, slide the Bluetooth button to the off position. Turn on passcode.From the Settings pane, select Touch ID & Passcode.Select Turn Passcode On.Enter 1542 for the passcode.Re-enter 1542 for the passcode. Configure the iPad to require a passcode after 15 minutes of being idle.Select Require Passcode.Select After 15 minutes.At the top, select Passcode Lock. Turn off simple passcode and enter a new passcode.For Simple Passcode, slide the button to the off position.Enter 1542 for the passcode.In the passcode field, enter PCProRocks to change the passcode.Select Next.Enter PCProRocks to re-enter the new passcode.Select Done. Configure the iPad to erase all data after 10 failed passcode attempts.From the Touch ID & Passcode pane, slide the Erase Data button to the on position.Select Enable. Configure VPN settings on the iPad.From the Settings pane, select General.From the right pane, select VPN.Select Add VPN Configuration.Select PPTP.Configure the VPN settings.Description: Office2VPNServer: 198.28.56.110Account: mbrownSelect Save. On the Office2-Lap Computer: Install the fastest USB wireless adapter.From the top left, select Office2 to navigate back to the Workspace view.Above the laptop, select Back to switch to the back view of the laptop.Under Shelf, expand Wireless Adapters.Drag the 802.11a/b/g/n/ac USB Adapter to an open USB port on the laptop. Create a manual wireless network connection.Above the laptop, select Front to switch to the front view on the laptop.On the laptop, select Click to view Windows 11 to enter the operating system view.Select Start, and in it's search field, type Control Panel.Under Best match, select Control Panel.From Control Panel, select Network and Internet.Select Network and Sharing Center.Under Change your networking settings, select Set up a new connection or network.Select Manually connect to a wireless network and then select Next.In the Network name field, enter TechCon-WiFi.Using the Security type dropdown list, select WPA2-Personal.Make sure AES is selected as the encryption type.In the Security Key field, enter T3chCon2024.Clear Start this connection automatically.Select Next.Select Close.Close the Network and Sharing Center. Configure power saving options.Right-click Start and select Settings.From the right, select Power & battery.Select Screen and sleep.For On battery power, turn off my screen after, use the dropdown to select 10 minutes.For When plugged in, put my device to sleep after, use the dropdown to select 30 minutes.For Power mode, use the dropdown to select Best power efficiency.Close the Settings app.
You are the IT administrator for a small corporate network. The Marketing6 computer needs to connect to the local network and internet using a static IP address. Marketing6 also needs to connect to a testing network using a static IP address. The testing network will be set up at a later time. You have already installed the second network card for the testing network. In this lab, your task is to: Configure the IP version 4 TCP/IP settings for both network adapters using the settings below:EthernetIP address: 192.168.0.254Subnet mask: 255.255.255.0Default gateway: 192.168.0.5Preferred DNS server: 163.128.78.93Alternate DNS server: 163.128.80.93Ethernet 2IP address: 10.0.255.254Subnet mask: 255.255.0.0Default gateway: nonePreferred DNS server: noneAlternate DNS server: none
Test out Lab: 11.3.7 Configure TCP/IP Settings on Windows 10 Complete this lab as follows: Configure the Ethernet adapter to use a static IP address.From the notification area, right-click the Network icon and select Open Network & Internet settings.From the right pane, select Change adapter options to configure the Ethernet adapter.Right-click Ethernet and select Properties.Select Internet Protocol Version 4 (TCP/IPv4).Select Properties.Select Use the following IP address.Configure the addresses.IP address: 192.168.0.254Subnet mask: 255.255.255.0Default gateway: 192.168.0.5Preferred DNS server: 163.128.78.93Alternate DNS server: 163.128.80.93Select OK.Select Close. Configure the Ethernet 2 adapter to use a static IP address.Right-click Ethernet 2 and select Properties.Select Internet Protocol Version 4 (TCP/IPv4).Select Properties.Select Use the following IP address.Configure the addresses.IP address: 10.0.255.254Subnet mask: 255.255.0.0Default gateway: none (leave blank)Preferred DNS server: none (leave blank)Alternate DNS server: none (leave blank)Select OK.Select Close.
Jack has a small retail business. He had a custom application developed for his inventory tracking. All of Jack's company computers have an operating system on them that will soon reach end of life because a newer version was released two years ago. Jack is afraid that his custom inventory application won't be compatible with the new version of the operating system. Which of the following is a risk that Jack is taking if he continues to use the operating system after its end of life? Answer He may lose some of the OS's features that he relies on. The OS will become increasing vulnerable to cyberattacks. He may lose sales during the migration process. The custom application may no longer be compatible.
The OS will become increasing vulnerable to cyberattacks.
Which of the following BEST describes an IP address class? Answer The class defines the type of device that the address is assigned to (server, printer, workstation, etc.). The class is the version of the IP addressing standard that the address uses. The class refers to the range of IP addresses that a DHCP server has been authorized to assign. The class defines the IP address's default network address portion.
The class defines the IP address's default network address portion.
Tyler has a computer with a Windows 32-bit operating system. He wants to install an application that requires a 64-bit operating system. Which of the following is likely to happen if he tries to install it anyway? Answer Windows will use WOW64 to run the application, but the program will run slowly. Windows will isolate the 64-bit binaries by redirecting Registry calls to allow the program to run. The installation will fail. The program will install a 64-bit driver and will run normally.
The installation will fail
Which of the following BEST describes a CPU? Answer The part of the system that stores data used for the display. The part of the system that temporarily stores data that can be accessed in any order and simultaneously. The part of the system that retrieves instructions from a program, decodes them, and then executes them. The part of the system that stores and retrieves non-volatile data.
The part of the system that retrieves instructions from a program, decodes them, and then executes them.
Which of the following is currently the most in-use operating system in the world? Answer Chrome OS Ubuntu macOS Windows
Windows
Which of the following best describes the GNU General Public License (GPL) that is associated with the Linux kernel source code? Answer The Linux source code remains free to those who use it for non-commercial applications. You can freely utilize, but not change, the Linux source code. You need to pay a yearly fee to access and change the Linux source code. The Linux source code remains freely available to anybody who wants it.
You can freely utilize, but not change, the Linux source code.
You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname to its associated IP address? (Select two.) Answer DHCP FTP hosts file DNS BOOTP
hosts file DNS