D317 - Practice Test - Chapter 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

cp command

copy a file

Shell

the interpreter between the user and operating system in Linux

yum command

the primary tool for getting, installing, deleting, querying and managing red hat enterprise Linux rpm software packages from official red hat software repositories, as well as other third party repositories.

Windows Home Edition

-can support one physical processer

You are manually configuring IPv4 addresses on a computer. The IP address is 200.100.1.10 and the network number is 200.100.0.0. What is the appropriate subnet mask for this computer?

255.255.0.0

Subnet mask

255.255.0.0 (we can see that the first octets are network number and the last two are host numbers, making the network number 200.100.0.0 for that IP address and subnet mask combination). The host computer is them 0.0.1.10

You have replaced a failed hard drive and need to prepare the new drive for data storage. Which utility will you use first?

diskpart

msconfig.exe

launches system configuration, which gives you access to boot configuration settings, running services, and links to other windows tools.

diskpart

lets the user see and manage partitions on the computers hard drives. -requires administrator status

You want to transfer files from your computer to a remote server. To do this, you want to connect to a shared directory on the server and copy the files. Which command-line utility will allow you to do this?

net

You are at a Windows computer with the Command Prompt open. You believe that a user is improperly accessing files on a shared folder named docs. On the Windows computer, the D:\userfiles folder is shared as docs. Which command will immediately stop the sharing of this folder?

net share docs /delete

netshare

net share is used to create shard folder. This is a valid command for managing shared resources, but netshare and netdom are not valid commands

You're troubleshooting a PC and want to see what ports TCP is connected on and the IP address of those connections. What command-line utility can you use to see statistics on network interfaces?

netstat

You need to start a new shell on a Linux workstation with root permissions. Which command should you use to do this?

su

su command

switch user, substitute user, or super user, is used to start another shell on a Linux computer. Without specifying a name, it's assumed you are trying to start a shell with super user (or root) authority.

Given the IP address of fe80::308c:fee2:2abc:8337, what do we know about this address?

It is an IPv6 address and it is not routable

pwd

Linux command that displays the user's current path.

Your system is running sluggishly and you want to know why. Which application shows CPU usage by core and allows you to end problematic processes and stop running services?

resmon.exe

You are in the Windows 10 command prompt, using Run as administrator. There is a directory named d:/files that you want to delete. It currently has six subdirectories and dozens of files in it. Which command should you use to delete d:/files?

rmdir d:\files /s

You are at a Windows command prompt. Which command allows you to copy files an directories, copy NTFS permissions, and mirror a directory tree?

robocopy

The hard drive performance on your Windows workstation has deteriorated over time. To attempt to improve performance, you want to ensure that files on the hard drive are written in contiguous blocks. Which Windows tool should you use to make this happen?

Optimize drives

True of False: IPv6 addresses do not have a subnet mask

True

You are working at a windows command prompt. Which command should you use to copy directories and subdirectories but not empty directories?

xcopy /s

Which is most likely the IP address of a router in a small network?

-In a network, especially a smaller one, the router will serve multiple purposes. In this scenario, it is the default gateway, the DHCP server, and the DNS server. -IPv4 address is the local computer's IP address -48-45-20-C1-12-BD is the MAC address, which is embedded in the computer's network interface card -255.255.255.0 is the subnet mask

Windows 7 Enterprise

-is the only Windows 7 edition that can't be upgraded to Windows 10 Pro. It can only be upgraded to Windows 10 education or Enterprise editions

What is the purpose of a subnet mask?

-is used to divide an IP address into two parts, Network ID and Host ID -Can be used to tell if two devices are part of the same Subnet (part of a network) -identifies the network portion of an IPv4 address

Spaces (macOS)

-multiple desktops -help organize their desktop objects

format

-once diskpart partition is created, this command will set up the new filesystem on the new volume

You're installing Windows 10 Pro edition on a workstation. How much memory must there be?

1 GB for 32-bit version and 2 GB for 64-bit version

You are working with a customer that has a small workgroup (peer-to-peer) network with Windows 10 PCs. The employee computers have a program that requires using the X: drive. SEveral computer users need to be able to access this drive, which is actually a shared folder located on the manager's PC. What can you do to make this drive available for other computer's to access as drive X:?

1. On each client computer, open File Explorer, click This PC, the click Map network drive. Choose drive letter X, then navigate to the shared resource 2. On the manager's PC, ensure that each user who will connect to the managers PC has a user account.

You've been asked to help with a network for a company that has 50 computers. They've been using workgroups, but it is getting too difficult. There is an assortment of Windows edition on the computers, including Windows Home, Windows Pro, and Windows Pro for Workstations. What will you do to set up their network?

1. Upgrade all the Windows Home PCs to Windows Pro and 2. Install a server with Active Directory explanation: a network with that many computers (more than 10) needs a domain for security management. Windows Home editions can't log into a domain, so they need to upgrade to at least windows pro edition. It is not necessary to upgrade them to Pro for Workstations or Enterprise editions.

You are at a command prompt on Windows at C:\. You need to get to C: Windows\system 32. Which command lines get you there?

1. cd windows\system32 2. cd C:\windows\system32

Eight binary bits that are all ones (11111111) equates to

255 in decimal, so the maximum value of a subnet mask's octet is 255

You are installing the Windows 10 Home 64-bit operating system on a friend's computer. What is the minimum storage space that must be available for the OST installation?

20GB

grep command

A Linux command that searches files for patterns of characters using regular expression metacharacters. The command name is short for "global regular expression print."

ls command

A Linux command used to list the files in a given directory.

pathping

A Windows utility that combines the functionality of the tracert and ping utilities to provide deeper information about network issues along a route; similar to UNIX's mtr command.

tracert

A command that determines the route data takes to get to a particular destination.

Which of the following Windows OS and editions cannot be upgraded to Windows 10 Pro directly from the desktop by performing an in-place upgrade? A. Windows 7 Enterprise B. Windows 8.1 C. Windows 10 Home D. Windows 8 Pro

A. Windows 7 Enterprise D. Windows 8 Pro

You are creating a network diagram for a company that has just hired you as a network admin. Which could be the default gateway on the company's network?

Answer: The Proxy Server and the Router

Your company has a DHCP server to automatically assign IP addresses to any nodes that connect to it. Which of the following would you want to assign a static IP address to? A. Workstation B. File Server C. Printer/MFD D. Local Printer

B. File Server C. Printer/MFD

A smartphone user has come to you for help. They would like a laptop so they can use a bigger screen but don't know what to choose. They're accustomed to doing their work online with Google Docs and their smartphone and saving it to the cloud. They would like to be able to use some of the same apps that they have available on their android phone. Cost is a factor. What type of laptop would you recommend for this user?

Chromebook

dig command

Can resolve a FQDN to an IP address on UNIX hosts.

xcopy /s

Copies directories and sub directories, but not empty directories

xcopy /e

Copies directories and subdirectories including empty ones

xcopy /h

Copies hidden and system files as well

You need to configure internet connections on a windows workstations. Which tabs of the internet options utility in control panel would you use to set the home page and enable the pop-up blocker?

General, Privacy

Which of the following IPv6 address types are routable?

Global unicast

Your laptop battery is getting older and won't hold a charge as long as it once did, so you want to ensure that, when you walk away from it for a period of time and it isn't plugged in, it will not use any power but save everything and let you pick up where you left off working. What power state will work for this scenario?

Hibernate

You're setting up security for a company that is expanding rapidly. Part of your plan is to create groups to manage permissions to folders, and then add those groups to grant them the permission they need. What utility will let you add users to groups?

Local users and groups

You just purchased a new computer that has four CPUs. What edition of Windows will you need, at a minimum, to take advantage of the computers processing capabilities?

Pro for Workstations

Which windows editions support ReFS (resilient file system)?

Pro for Workstations and Enterprise

You have been told to configure a static IP of 110.110.1.15 for a server. This server will need to be able to access the internet. Which one of the following is not a required setting to configure?

Proxy server

shutdown /r

Reboot after shutdown

rmdir /s

Removes directory and all contents

A technician is troubleshooting a computer that occasionally will not read data from the hard drive. What should they try first?

Run chkdsk at a command prompt to scan the drive and attempt to repair them. If that doesn't work, formatting is second option, and replacing drive is third.

sudo command

Run command with the security privileges of the superuser (Super User DO) -will run a single command as the alternate users

shutdown /m

Shuts down a different computer

shutdown /s

Shuts down system completely

Your spouse is trying to work at home but has started to complain about the constant notifications appearing on the computer and interrupting their work. What category can you access in Windows Settings to turn them off?

System

What tool lets you choose a diagnostic startup on the next restart? (windows)

System Configuration

msinfo32.exe

System Information

Which Linux utility is like the Windows Command Prompt?

Terminal

ps command

The command used to obtain information about processes currently running on the system.

What information do you need to connect to a PC using Remote Desktop?

The name under "How to connect to this PC" when remote desktop was enabled

You see an IP address with /48 after it. What does the /48 tell you?

The prefix length is 48 bits and the network uses the IPv6 addressing scheme

How do you change toa different drive?

Type the drive letter and a colon, such as D: and press Enter

Which Windows 10 edition supports up to 2 TB of RAM and a maximum of 2 CPU sickets?

Windows 10 Pro

A user with a Windows workstation recently received a second hard drive. Another administrator created a partition on the hard drive, and it's ready for use. The user will store the raw video files they create on that drive and insists that it be called the R: drive. Which of the following statements is true?

You can use Disk Management to change the drive letter to R:

Ipv4 addresses

are 32 bits long and consist of 4 octets, which is a group of 8 bits each, separated by a period. They are normally presented in dotted decimal notation, meaning each group of 8 bits is shown as a decimal number less than 256, with a period between each number, such as 192.168.1.1.

IPv6 addresses

are a 128-bit IP address presented as eight segments of four hexadecimal numbers each, separated by a colon. Where the hexadecimal number is 0 in any segment, it can be omitted and replaced simply by double colons (::). If consecutive segments are 0, they can be replaced by a single set of double colons, but only one set of double colons can exist in any given address-otherwise, you wouldnt be able to tell how many sets of zero are in each part of the IP address. *ex: fe80::308c:fee2:dabc:8337, the expanded address would be fe80:0:0:0:308c:fee2:dabc:8337. The first 3 segments (48 bits) are the site prefix, and the 4th segment (64 bits) are the interface ID, also sometimes called a token.

Addresses in the 192.168.x.x range

are nonroutable addresses, meaning they can only be used internally

Proxy Server

can serve as a gateway for a network because, if one exists, traffic will go through the proxy server before going into or out of the network. In the absence of a proxy server, the router serves as a gateway, forwarding traffic on to the next network or receiving external traffic and sending it to the proper device inside a network

Windows Pro

can support up to two physical processers

xcopy /a

copies files with the archive attribute set and doesn't change the attribute

Computer Management

gives access to several other resources, but not one that lets you end wayward applications

To turn off all notifications, or manage whether and how individual notification senders can interact with you

go to Windows Settings>System>then Notifications & actions. From there, you can turn off all notification or some

Chomrebook

has Chrome OS preinstalled. It's main user interface is Google Chrome and it can run apps designed for Android smartphones. -also known for being less expenseive

A user has called the help desk saying that the Internet is down on their Windows computer. After asking a few questions, you want to examine their network configuration to determine the cause of their computer's connectivity problem. You've talked them through accessing the Windows Command Prompt. What command will you have them type so they can read the computer configuration to you?

ipconfig /all

Switch

is an internal networking device that provides a central connection point for network nodes and uses the node's MAC address that is found on the NIC (network interface card) to send packets to the proper destination

Windows Pro for Workstations

is designed so that users can take advantage of the capabilities of high-end workstations. -can support up to 4 physical processors

rmdir /q

is quiet mode. When used with /s command, it will not ask if it is okay to remove all files and subdirectories, it will remove them without warning

del command

is used for deleting files, not directories or subdirectories

nbtstat

is used for troubleshooting netBIOS over TCP/IP

nslookup

is used to query a DNS server

Ping

is used to test connectivity between two computers -sends a series of four packets to a remote computer and waits for a reply. If the reply is received, you know that the local computer is able to reach the remote host.

Event Viewer

keeps a log of security, application, and system events

You are at a Windows command prompt, on the C: drive. You need to create a directory named files on the D: drive. What is the proper command and syntax to do this?

md d:\files

You're troubleshooting a network connectivity issue and want to see if the local computer can reach a particular server on the web. What command line will you use?

ping

netstat

presents statistics related to the installed network interfaces. By default, on a Windows machine, running the command will display a list of connections and the associated protocol, the source and target address, and the current state of the connection

Task managers users tab

provides information about any users that are connected to the local machine. This tab shows the user's identification and the resources that are being used by them. Right-click and choose Expand to see what they are using on your computer. You can also disconnect them from here, but it might be nicer to message them first.

net stat

shows what sockets (IP address plus port) are being used and by which protocols

You are at a Windows command prompt. A remote Windows workstation named advertising4 is misbehaving and needs to be shut down and rebooted. What is the proper syntax to shut down this remote system?

shutdown /r /m \\advertising4

The value of the first octet (ex: fe80)

tells us that this number is a link-local address, an internal number only and not routable

df command

this command is used to see the available disk space in each of the partitions in your system. Enter this command and you can see each mounted partition and their used/available space in % and in KBs.

net use

used to connect to shared resources

cd\

typing this command will take you to the root of whatever drive you are on. you can also type cd.. and press Enter to go back one directory at a time

cd

will change the directory but will not take you to a different drive

ipconfig /renew

will request a new IP address from the DHCP server, if one is available to the host PC

ipconfig /all

will show more detailed information than ipconfig alone will, such as whether the DHCP is enabled and what the DNS settings are


Ensembles d'études connexes

Sterilization and Disinfection of Patient/care Items in Oral Healthcare Settings

View Set

Old Testament Survey Unit 7 Quiz 2

View Set

FIN 323 Chapter 6 Homework Practice for Exam

View Set