1353 C.4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following file types contains an identical image of data and is found on an optical disc?

.iso

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones that you will copy. You want the file copy to proceed automatically without prompting you about overwrite existing files. Which copy command switch should you use?

/y

Which of the following IP addresses are Class B addresses? (Select three.)

132. 190. 129.

You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but you restrain from making any comments. At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer. A quick test determines that the device is now working. Whi

Active listening Avoid being judgmental

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches that you have performed. Which of the following is this an example of?

Adware

Which of the following BEST describes a scripting language?

An interpreted programming language used to write scripts.

Which of the following is the process of tracking and managing an organization's assets?

Asset management

What should you do to help protect against data loss before you perform system updates, add new applications, or make other changes to your computer?

Back up your computer

Which of the following can be used to back up a company's certificate database?

Certificate Manager

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password.

System Restore is currently disabled for all volumes on a Windows 11 system. You need to enable System Protection for the C: volume. Click the option you would select to do this.

Configure

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.)

Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

You have a computer with a single hard disk, which is configured as a basic disk with an NTFS-formatted single partition. The computer runs Windows 11. The disk has run out of space, and you want to add more space to the disk. You install a new hard drive and start Disk Management. Which of the following is a required task to add space to the existing volume?

Create a new partition without a drive letter on the new hard disk.

You are in the process of preparing to install Windows 11 on your Windows 10 computer. Which of the following pre-installation steps are critical to complete if you are performing a clean installation? (Select two.)

Create a system image Back up existing data

Which of the following are the FIRST settings you should check if you suspect that a malware attack has impacted your internet connection? (Select two.)

DNS settings Proxy setting

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the two files below and assign the Deny Read permission to the Users group. Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission for the Users group. There are no other permissions assigned except the default permissions. You then take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read for Reports.doc and Allow Full Control for Costs.doc.

Which type of contract are you typically required to accept when obtaining a proprietary software license?

EULA

What should be your top priority when responding to emergencies and hazardous situations?

Ensure the safety of people in the area.

You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly?

Event Viewer

You want to adopt a rotation scheme for your Windows systems that works by keeping data for 30 days and then has the data from the 31st day overwrite the data from the first day. Which of the following is the rotation backup type you should use?

FIFO

You work at the IT help desk in your company. An employee calls to report a problem with her workstation, and a service ticket is assigned to you. You respond to the service ticket immediately and arrive at the employee's workstation within minutes. When you say hello, she responds in Spanish. You realize that she only speaks Spanish, and you only speak English. What should you do?

Find an interpreter

Which permission does a user need to set security permissions for a folder that exists on an NTFS partition?

Full Control

You have accepted a position working in a local hospital's IT department. Which of the following government regulations would be the most important for the hospital to be in compliance with?

HIPAA

Which of the following is a feature of a sheep dip computer?

Has port monitors and file monitors.

Which of the following is a myth regarding electrostatic discharge (ESD)?

If you can't feel ESD, the surge is not sufficient to harm computer components.

The AAA security standard includes authentication, authorization, and accounting (logging of user actions). Which of the following authentication protocols only provides authentication?

Kerberos

You are creating a Linux program that needs to write data to a hard disk. In order to save time, you decide to have your program call a pre-written code element that tells the operating system to perform the task. What is this focused pre-written code element called?

Library

You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

Which of the following Microsoft accounts keeps all your associated profile information exclusively on your computer?

Local User Account??

You are setting up a network for your company and need to know the MAC address and IP address for a Windows computer. Under which of the following categories in the Windows 10 Settings app can you find both the MAC address and the IP address?

Network & Internet

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request?

Network share

You upgraded your Windows 10 workstation to Windows 11 several months ago. Recently, however, you notice that the operating system is often behaving strangely, especially when creating files or accessing certain features. What can you do as a FIRST step to try and resolve these issues?

Perform an in-place upgrade.

Which documents are generally finished and approved before a project begins? (Select three.)

Project plan Risk Assessment Budget

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility?

RAM capacity

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

Which of the following is the name for a special computer that is used for malware analysis?

Sheep dip computer

Which authentication category does a username and password fall under?

Something you know

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering on your computer, Windows 11 will not start. Which of the following tools should you use FIRST to try and resolve the issue?

Startup Repair

Jason owns a MacBook Pro and is having an issue with his USB drive. Which of the following tools could Jason use to view information about the USB drive controller?

System Information utility

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue?

System Restore

Which of the following are common uses for scripting? (Select three.)

System updates Network drive remapping Automated backups

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

You are about to begin an upgrade of a Windows 10 workstation to Windows 11. What should you do before beginning? (Select two.)

Verify that the computer meets the minimum requirements. Create a system backup of the hard drive.

Which of the following wireless security methods uses a common shared key that is configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you MOST likely boot into?

WinPE

You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it. What is the MOST likely cause of the issue?

You deleted a group that was created by the third-party application.

In which of the following situations would driver rollback be the BEST option to use?

You recently installed a new video driver, and now the system behaves erratically.

Which of the following are advantages of using an online Microsoft account? (Select two.)

Your account profile information is synchronized to other computers. You have automatic access to the Microsoft Store.

Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?

bash

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps:

bootrec /fixmbr

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname to its associated IP address? (Select two.)

hosts file DNS

While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

Which tool would be the BEST choice for securing cable wiring to a patch panel?

punch down tool

A macOS user has forgotten the location of an important spreadsheet document. Which macOS feature could they use to find the spreadsheet?

spotlight

Windows includes a component that provides an easy way to access the most useful programs and services on your computer. This component lets you: Search for a known application. List all applications in alphabetical order. Pin or unpin an application to the Start menu. Switch users. Shut down or restart the computer. What is this component called?

start menu

Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. Now, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.

view your update history

Which of the following are safe methods for lifting heavy objects? (Select two.)

Bend your knees and keep your back straight. Lift with your legs.

Which formatting method is done by the manufacturer to write new sectors and tracks to a hard drive?

Low-level formatting

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

startup

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following security measures would you MOST likely implement to keep this from happening in the future?

Access control vestibule

As you arrive on-site to fix an issue, you are met by a frantic employee who immediately details how critical the issue is and how important it is to fix it as quickly as possible. Having seen this same issue many times, you say to the customer, "Stop worrying. I know what I'm doing." Which of the following professionalism principles are you failing to follow?

Avoid dismissing customer problems

You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation. Which of the following pre-installation steps should you perform next?

Back up existing data.

Which Windows feature can you use to encrypt a hard drive volume?

BitLocker

When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive?

BitLocker with TPM

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

You have decided to install a new Ethernet network adapter in your Windows 11 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST method in this scenario to get Windows to load properly?

Boot to Safe Mode and uninstall the network driver.

You manage a large number of workstations that belong to a Windows domain. You want to prevent someone from gaining access to login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?

Device Manager

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows?

Disable and then enable devices and services one by one.

Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.)

Disable electronic access for the employee. Collect physical access items from the employee.

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable the Secure Desktop.

You are an IT technician for your company. Vivian, an employee, has been receiving error messages, indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian called again because she is still having the same issue. You now suspect that a corruption or a renaming of the system files is being caused by malware. Which of the following is the FIRST step you should take to remove any malware on the system?

Disconnect Vivian's computer from the network.

You've just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website.

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building?

Magnetometer

To protect a Windows 11 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No. You need to enable File History.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 10 to Windows 11 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 10 operating system?

Restore her system using the recovery partition.

Which of the following paths open the Computer Management tool in Windows? (Select two.)

Right-click the Windows icon and select Computer Management. In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon.

As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been given to you from another Level 2 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop?

The remote session from the original Level 2 operator has not been disconnected.

Anna, a user, downloaded a free PDF editing application from the internet. Now her laptop constantly displays desktop pop-ups, and several applications don't start. Which of the following types of malware was Anna the victim of?

Trojan

You have logged into your banking website using a password, but now the website indicates that it sent you an email with a confirmation code that you need to retrieve and enter before you can continue to access the website. Which of the following security measures is being used?

Two-factor authentication

In which of the following Windows 10 Settings app categories can you find reports on your device's health?

Update & Security

While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.)

Update the virus definitions for your locally installed anti-malware software. Run a full system scan using the anti-malware software installed on your system.

You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. Which of the following is the BEST step to perform?

Use dynamic disks and a spanned volume.

You have just installed Windows 11 on your laptop, purchased an infrared camera, and set up Windows Hello facial recognition as your login option. As part of the setup process, you enter a PIN as a backup login method. After a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your PIN. Because it has been several weeks, you have forgotten the exact number. You attempt to enter your PIN at least 24 times, but are never locked out. What is the MOST likely reason that you have not been locked out after several failed PIN login attempts?

Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

While using a Windows 11 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select two.)

Your user files were not affected when the system was reverted to the restore point. You must reinstall any applications that were installed after the restore point was taken.

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs?

custom/clean installation

You are an IT administrator, and you are troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the Group Policy on that computer. Rather than reboot the computer, you decide to open a Command Prompt that you can manually apply the refresh from. Which of the following is the BEST command line tool for you to use to accomplish this task?

gpupdate

Anna is an account rep for a financial firm and has submitted a ticket in the company ticketing system to resolve an issue with a high-profile customer's account. The account is frequently losing important financial transactions. She has filled out the following information on the ticket: Customer's name and contact information Relevant problem information After waiting three days, the ticket is assigned to a tier-two support operator and set to an in-progress status. In addition, the operator sends the ticket back to Anna with a request for information about her work computer. She is frustrated because a resolution to the issue is not being addressed. SOLUTION: Anna decides to set a severity level to indicate the high priority of the issue and then sends information back to the operator about her computer, which includes the application experiencing the problem, the device's network ID, and the operating system.

yes


Ensembles d'études connexes

Human Resource Management chapters 2 & 3

View Set

Chapter 15: Postpartum Adaptations

View Set

Chapter 7 The Skeletal System: The Axial Skeleton

View Set

EMBEDDED SYSTEMS MIDTERM QUIZZES REVIEW (except for ESSAY)

View Set

Medical Terminology Chapter 17 Abbreviations: The Eye

View Set

Ch 3 The Chemistry of Organic Molecules

View Set

EMT-B Chapter 30 - Abdominal and Genitourinary Injuries (Multiple)

View Set