Alexa_Week11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? A) Allow Full Control for both. B) Deny Read for Reports.doc and Allow Full Control for Costs.doc. C) Deny Read for both. D) Allow Full Control for Reports.doc and Deny Read for Costs.doc.

A) Allow Full Control for both.

Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS? A) POST B) Winload.exe C) Boot Loader D) WININIT

A) POST

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive? A) The file will no longer be encrypted. B) The file remains secure and accessible. C) The file is compressed and remains secure. D) The file becomes inaccessible.

A) The file will no longer be encrypted.

You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer? A) The wrong file extension was used when saving the file. B) The file was corrupted during the sending process. C) The wrong default app is selected for the type of file that you sent. D) Mark's computer does not have the same program you used to write the proposal.

A) The wrong file extension was used when saving the file.

Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue? A) Verify that the BIOS/UEFI is configured to use the correct video adapter. B) Check the motherboard documentation for information on beeps. C) Boot the system from the installation disc and repair the system. D) Use System Restore from Safe Mode to select a working restore point.

A) Verify that the BIOS/UEFI is configured to use the correct video adapter.

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use? A) attrib +r -h B) attrib add r remove h C) attrib /add r /remove /h D) attrib +ro -h

A) attrib +r -h

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt? A) shutdown -h +10 message B) shutdown 10 -h message C) shutdown -p 10 message D) shutdown -r +10 message

A) shutdown -h +10 message

When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive? A) BitLocker To Go B) BitLocker with TPM C) Windows Security D) Microsoft Defender

B) BitLocker with TPM

You experience startup errors after you install a new device. What should you do FIRST to resolve the issue? A) Disable automatic restart. B) Boot in Safe Mode and roll back the driver. C) Recover the system image. D) Boot in Safe Mode and disable all unnecessary devices.

B) Boot in Safe Mode and roll back the driver.

You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? A) C:\Users\Documents and Settings\username B) C:\Users\username C) C:\Users\Profiles\username D) C:\Documents and Settings\username

B) C:\Users\username

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.) A) Place the files on a FAT32 partition. B) Configure both share and NTFS permissions. C) Configure NTFS permissions. D) Configure share permissions. E) Place the files on an NTFS partition.

B) Configure both share and NTFS permissions. E) Place the files on an NTFS partition.

Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is the MOST likely source of the problem? A) Missing or corrupt file B) Corrupt MBR or partition table C) Corrupt boot sector D) Inaccessible boot disk

B) Corrupt MBR or partition table

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows? A) Launch and use the utilities provided in the Recovery Environment. B) Disable and then enable devices and services one by one. C) Disable Driver Signature Enforcement. D) Disable automatic restart on system failure.

B) Disable and then enable devices and services one by one.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users? A) Edit the folder properties and assign the Sales group the Deny Full Control permission. B) Edit the file properties and assign Rachel the Deny Full Control permission. C) Edit the folder properties and assign Rachel the Deny Full Control permission. D) Remove Rachel from the Sales group. E) Edit the file properties and assign the Sales group the Deny Full Control permission.

B) Edit the file properties and assign Rachel the Deny Full Control permission.

While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command? A) It adds the System file attribute, removes the Read-only attribute, and removes the Archive attribute for myfile.dll. B) It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll. C) It adds the System file attribute, adds the Write-only attribute, and removes the Archive attribute for myfile.dll. D) It removes the System file attribute, removes the Read-only attribute, and adds the Archive attribute for myfile.dll.

B) It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied? A) Only the R and Encryption attributes are retained on the file. B) Only the R attribute is retained on the file. C) All the attributes and NTFS permissions are retained on the file. D) None of the NTFS permissions or attributes are retained on the file. E) Only the NTFS permissions are retained on the file.

B) Only the R attribute is retained on the file.

Which of the following statements are true regarding administrative shares? (Select two.) A) Adding a ! sign to the end of a share name creates an administrative share. B) To connect to an administrative share, you must use the UNC path. C) If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network. D) Default administrative shares grant access to the Administrators or Power Users group. E) By default, Windows automatically creates an administrative share for every volume.

B) To connect to an administrative share, you must use the UNC path. E) By default, Windows automatically creates an administrative share for every volume.

You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip? A) You can boot the hard drive from another computer without providing the startup key. B) You can boot the hard drive without providing the startup key. C) You are prompted to insert a USB drive with the startup key. D) You are prompted to provide the startup key before booting the hard drive.

B) You can boot the hard drive without providing the startup key.

While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder? A) sfc B) md C) del D) cd E) rd

B) md

A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions? A) netstat B) net use C) tracert D) ipconfig

B) net use

Which of the following is true of the Windows BitLocker program? A) BitLocker is designed for use on the Home version of Windows 10 and later. C) BitLocker is designed to protect files against offline access only. D) BitLocker is designed to encrypt individual files. E) BitLocker is designed to protect files against offline and online access.

C) BitLocker is designed to protect files against offline access only.

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file? A) Bob has Full Access to the file and can open, read, write, delete, and change permissions on the file. B) Bob can open and read the file, but he cannot write changes to the file. C) Bob can open, read, and write changes to the file. D) Bob cannot search for or open the file. E) Bob can find the file in a search, but he cannot open the file.

C) Bob can open, read, and write changes to the file.

A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file? A) Administrative share B) Single sign-on C) EFS D) BitLocker

C) EFS

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request? A) VPN connection B) Administrative share C) Network share D) Hidden share E) Remote Desktop connection

C) Network share

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written? A) Bootlog.txt B) Myboot.txt C) Ntbtlog.txt D) Boot.log

C) Ntbtlog.txt

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.) A) Device drivers are loaded into memory. B) The EFI boot manager initializes. C) System memory is initialized, verified, and allocated. D) Power is supplied to the CPU. E) The CPU and chipset are verified and fully initialized.

C) System memory is initialized, verified, and allocated. E) The CPU and chipset are verified and fully initialized.

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories? A) xcopy /s B) copy /n C) xcopy /e D) copy /v

C) xcopy /e

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? A) %systemdrive%\Program Files B) %systemdrive%\Applications C) %systemdrive%\Applications (32-bit) D) %systemdrive%\Program Files (x86)

D) %systemdrive%\Program Files (x86)

Which file attribute identifies the file as having been modified since the last backup? A) Read-only B) Hidden C) Encrypted D) Archive

D) Archive

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption? A) BitLocker B) Microsoft Defender C) EFS D) BitLocker To Go

D) BitLocker To Go

Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot, and now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent him from using the TV until you can install an updated driver. What should you do? A) Use the Reset This PC option in the Settings app. B) Boot the system from a Windows installation disc and select the Startup Repair option. C) Re-install Windows from the installation disc. D) Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager. E) Reboot the system and select Safe Mode. Edit the properties of the TV tuner driver in Device Manager and select Roll Back Driver.

D) Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

Which of the following security solutions would prevent you from reading a file that you did not create? A) IPSec B) BitLocker C) VPN D) EFS

D) EFS

After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file? A) EFS creates a symmetric key. B) EFS instructs Windows to create a key pair (private and public). C) EFS stores the FEK with the public key. D) EFS encrypts the FEK by creating a key pair (private and public).

D) EFS encrypts the FEK by creating a key pair (private and public).

You are using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function? A) Command Line Mode B) Text Mode C) Command Mode D) Insert Mode E) Replace Mode

D) Insert Mode

You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder? A) Permissions are kept on both files. B) Permissions are kept for Reports.doc but removed from Costs.doc. C) Permissions are removed from Reports.doc but kept for Costs.doc. D) Permissions are removed from both files.

D) Permissions are removed from both files.

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue? A) Go Back to the Previous Build B) Use BOOTMGR C) Reset this PC D) System Restore

D) System Restore

Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys? A) USB device B) BIOS/UEFI C) BitLocker partition D) Trusted Platform Module (TPM)

D) Trusted Platform Module (TPM)

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer? A) Attach the file to an email and have the user copy the file to the correct folder. B) Establish remote assistance and transfer the file within the session. C) Have the user share the folder as a local share and copy the file to the share. D) Use the C$ administrative share to copy the file.

D) Use the C$ administrative share to copy the file.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format? A) Home1:\\Pictures B) Home1:Pictures C) .Home1:Pictures D) \\Home1\Pictures

D) \\Home1\Pictures

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? A) ps B) grep C) ls D) chmod

D) chmod

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? A) sudo B) cd C) ls D) grep

D) grep

You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again? A) copy B) xcopy C) teracopy D) robocopy

D) robocopy

While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file. Which of the following tools would be best suited for this task? (Select two.) A) ls B) dd D) tail C) head E) cat

D) tail E) cat

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.) A) RDP B) WEP C) WPA D) FTP E) IPsec F) PPTP G) L2TP

E) IPsec F) PPTP G) L2TP

Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?

bash

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: Boot the system from the Windows 11 installation DVD. Access the Recovery Environment. Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr

What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?

ip

You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command?

man cat

What would you enter at the shell prompt on a Linux system to display the present working directory?

pwd

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the Command Prompt that will, by default, switch you to the root user and require you to enter the root password?

su -


Ensembles d'études connexes

Microeconomics Chapter 3: Where Prices Come From: The Interaction of Demand and Supply (Exam)

View Set

Lectura 5: Manaus: De los pilotes a tierra firme

View Set

Exam 1 RNSG 1533 COGNITION AND COPING

View Set

Chapter 6: Genetics and Genomics

View Set

Marketing Exam 4 Study Guide 2.0

View Set

Chapter 7 - Advanced Shell Programming

View Set

Physics Unit 9: Force and Motion

View Set