,Final Exam Review
Match the scripting term to the description. $X 9 Loop "sample text" . "Press any key" %TEMP% #Start a. String b.Integer c. Variable d. Windows environment variable e. PowerShell comment f. Executes the same commands until a condition is met
$X (Variable) 9 (Integer) Loop (Executes the same commands until a condition is met) "sample text" (String) "Press any key" (String) %TEMP% (Windows enviroment variable) 1424 (Integer) #Start (PowerShell comment)
Match the script file extension to the description. .bat .ps1 .vbs .sh .py .js a.Windows PowerShell script file b.Unix or Linux shell script file c.Windows batch file d.JavaScript file e.Python script file f.VBScript file
.bat (Windows batch file) .ps1 (Windows PowerShell script file) .vbs (VBScript file) .sh (Unix or Linux shell script file) .py (Python script file) .js (JavaScript file)
In Linux, where are the commands required for system administration stored? a./opt b. /bin c. /usr d. /sbin
/sbin
Which of the following best describes a variable when implemented in a script? a. A container for storing data values that can be assigned, referenced, and manipulated. b. A line or portion of a script that the interpreter does not process. c. A portion of a script that executes multiple times until a condition is met. d. The part of a filename used to designate a file's association with a particular script language.
A container for storing data vaules that can be assigned, referenced, and manipulated
Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network? a. Access control list b. Directory permissions c. Digital Certificate d. Login script
Access control list
Which of the following security settings can best help minimize brute force attacks on local user account passwords? a. Account lockout threshold b. Audit logon failures c. Logon time restrictions d. Screen lock timeout
Account lockout threshold
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later? a. Members have limited privileges and are given a temporary profile. b. Backward compatibility for legacy operating systems and applications. c. Allows members to take ownership of files and folders. d. Provides a method for assigning rights to Guests who require Administrator access.
Backward compatibility for legacy operating systems and applications
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup? a. Boot Logging b. Safe Mode with Networking c. Windows Boot Manager d.Event Viewer
Boot Logging
Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence. What must Jacob maintain so the evidence can be used to prosecute the crime? a. Private property laws b. Incident documentation c. A backup of the data d. Chain of custody
Chain of custody
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity? a. Forced kill b. End-of-life c. Force Quit d. Distro
End-of-life
The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence? a. F10 b. F4 c. F12 d. F8
F8
A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems? a. First Aid b. grep c. macOS Recovery d. Time Machine
First Aid
Which of the following user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.) a. Administrator b. Admin c. Standard d. Limitede.Guest
Guest Administrator
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively? a. Repair USB or CD b. Live USB or CD c. Boot USB or CD d. Supplemental OS
Live USB or CD
What Windows process is responsible for authenticating users? a. Csrss.exe b. Smss.exe c. Lsass.exe d. Winlogon.exe
Lsass.exe
A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger. Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize. What should Derek perform next on the client's computer? a. Run memory diagnostics. b. Refresh Windows. c. Run a virus scan. d. Download a CPU diagnostic program.
Run a virus scan
Jordan is talking with a client on the phone. Jordan's company recently completed updates on the client's system and something is not working properly. The client asks Jordan why the company is always doing updates. Jordan explain that updates help to secure computer systems. What specific vulnerability do updates help prevent? a. Man-in-the-middle b. Zero-day c. DDoS d. Brute force
Zero-Day
What command can be used to totally wipe a hard drive clean, including the partitioning system? a. wpeinit b. bcdedit c. bootrec d. diskpart
diskpart
What is the value of X when execution ends in the following pseudocode? Set X As Integer For X = 100 to 0 Step -1 ' This is a comment Next X X = 100 a.1 b. 100 c. 0 d. -1
100
If your Internet home page has changed and a strange-looking search engine appears when you try to search the Internet, what type of attack are you experiencing? a. A network worm b. A new browser add-on was installed. c. A new web browser was installed. d. A redirect virus.
A redirect virus
What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.) a. Loads system registry hive b. Activates the HAL c. Starts the Session Manager d. Starts critical services
Activates the HAL Starts the Session Manager Starts critical services
As Windows 10 is loading, assuming it is enabled, what will happen when F8 is pressed? a. Boot in Safe Mode with Networking b. Gives the Command prompt c. Advanced Boot Options screen appears d. Boot in Safe Mode
Advanced Boot Options screen appears
Registry files, if deleted, can be restored from those saved in what folder? a.C:\Windows\System32\Config\Hive b.C:\Windows\System32\RegBack c.C:\Windows\System32\Config\RegBack d.C:\Windows\System32\WinBackup
C:\Windows\System32\Config\RegBack
James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels? a. Padlock b. Server lock c. USB lock d. Cable lock
Cable lock
An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed. Where do you go in the Windows operating system to view and delete root certificates? a. Certificate Manager b. Windows Defender c. Windows Security d. Action Center
Certificate Manager
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change? a. Click the Sharing tab and click Advanced Sharing. b. Click the Administrator user name and click the Edit button. c. Click the Advanced button to open Advanced Security Settings for the file. d. Click the Previous Versions tab, highlight the file, and click Restore.
Click the Advanced button to open Advanced Security Settings for the file
Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before. What is the issue with the client's computer? a. Corrupt hard drive b. Spam c. Computer virus d. Bad hard drive driverBoot
Computer Virus
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers? a. Disable Microsoft account resources. b. Configure logon time restrictions. c. Change the user account passwords. d. Set the BIOS to automatically power off the computers at closing time.
Configure logon time restrictions
The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred? a. Spyware b. Zero-day c. DDoS d. Botnet
DDoS
When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked. What type of attack is he attempting? a. Zero-day b. Dictionary c. Phishing d. Rainbow table
Dictionary
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company? a. Software tokens b. Digital certificate c. Access control list d. Multifactor authentication
Digital certificate
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs? a. Disable AutoRun. b. Enable screen lock. c. Disable AutoPlay. d. Disable the Guest account
Disable AutoRun
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore? a. Disable System Protection. b. Enable System Protection. c. Run the antivirus software on a restore point. d. Back up the restore point.
Disable System Protection
Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy's supervisor has asked her to make sure this does not happen again. What is the first thing Tracy should do to prevent this problem from happening again? a.User education b.MAC filtering c. Firewall d. Email filtering
Email filtering
James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. What setting in the Startup Settings screen will enable James to see which driver might be failing and causing his computer not to boot? a. Enable Safe Mode b. Enable Safe Mode with Command Prompt c. Enable Boot Logging d. Enable Debugging
Enable Debugging
What error messages are likely to appear if the BIOS/UEFI cannot find a Windows Boot Manager or cannot turn over operations to the boot manager? (Choose all that apply.) a. Invalid boot disk failure b. Error loading operating system c. Invalid partition table d. Missing operating system
Error loading operating system Invalid partition table Missing operating system
Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains. What can you tell Sara about the ESP partition? a. It was created by the MBR to store Windows boot and startup files. b. It was created by Windows to store the Windows OS files. c. It was created by GPT to store Windows boot and startup files. d. It was created by GPT to store Windows OS files.
It was created by GPT to store Windows boot and startup files.
You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords? a. Disable password complexity requirement. b. Lengthen the time period between forced password changes. c. Disable required passwords. d. Increase password length requirement.
Lengthen the time period between forced password changes
A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users? a. Linux b. Windows 10 Enterprise c. Mac OS X d. Windows 7 Professional
Linux
A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician? a. Swap partition b. NetBoot c. Key Chain d. HFS+
NetBoot
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity? a. Network printer b. Network drive mapping c. Administrative share d. Shared printer
Network Printer
The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update? a. Remove malware. b. Reinstall the network drivers. c. Reinstall Windows. d. Reinstall the security certificate.
Remove malware
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.) a. Require user account passwords. b. Add each user to the Guests group. c. Disable password complexity requirements. d. Change each account type to Administrator. e. Set failed logon restrictions. f. Require strong passwords.
Require user account passwords Set failed logon restrictions Require strong passwords
Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied. Based on these indicators, what should Joann do with her computer? (Select all that apply.) a. Roll back to a previous restore point. b. Run antivirus software. c. Check the file permissions. d. Disconnect from the network. e. Refresh Windows.
Run antivirus software Check the file permissions Disconnect from network
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker? a. Security tab b. Privacy tab c. Programs tab d. General tab
Security tab
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share? a. Create a system restore point on the server and all sales computers. b. Share the folder or volume on the file server that will store the shared data files. c. Map a network drive to the shared folder or volume on the file server on the sales computers. d. Run a system image backup of the file server, including all data folders.
Share the folder or volume on the file server that will store the shared data files
Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees this screen. What has happened to Holly's computer? a. She has downloaded a rogue antivirus. b. Someone has hijacked her email. c. She has received a spam message. d. She has received a security alert message.
She has downloaded a rogue antivirus
Which of the following are natively supported by the Windows, Mac, and Linux operating systems? a. Support for reading and writing to APFS volumes b. Support for reading and writing to FAT32 partitions c. Support for reading and writing to NTFS partitions d. Support for reading and writing to ext4 volumes
Support for reading and writing to FAT32 partitions
Samantha is having an issue with Windows crashing and believes that malicious software is causing it to crash. Samantha also has received application errors that have cause the applications to close. Which event log in the Event Viewer can Samantha inspect to see if malicious software is causing the Windows system to crash and the application errors, system errors, and other types of errors? a. Application b. System logs c. Security logs d. Setup logs
System logs
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen? a. TPM b. EFS c. MFA d. NIC
TPM
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder? a. Enable permission inheritance so the new permissions are inherited from the parent folder. b. Disable permission inheritance and explicitly assign the new permissions. c. Take ownership of the folder and then change permissions. d. Delete the folder and re-create it. Then assign the new permissions.
Take ownership of the folder and then change permissions
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes? a. The Lock Screen timeout of 60 minutes is not within the allowable range. b. The Lock Screen timeout policy does not apply to Windows 10. c. The technician should run the gpupdate /f command on the local computer. d. The Lock Screen timeout setting needs to be made in the AD OU GPO.
The Lock Screen timeout setting needs to be made in the AD OU GPO
A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message? a. The software repository is out of date and needs to be updated. b. The command syntax needs to be verified. c. The command needs to be preceded by sudo. d. The user account is not assigned a password
The command needs to be preceded by sudo
A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied? a. The file will inherit the permissions of the destination. b. The file cannot be copied from NTFS to FAT32. c. The file will lose all permissions. d. The file will retain its permissions.
The file will lose all permissions
While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share. Which of the following best describes this situation? a. The user bypassed the security of the file server. b. The firewall on the server is disabled. c. The principle of least privilege was not followed. d. The firewall on the user's computer is disabled.
The principle of least privilege was not followed
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties? a. The users in the sales department are in a different domain than the accounting department users. b. The technician should be using Local Security Policy instead of Group Policy. c. The technician is not signed in as a Domain Admin. d. The technician should be setting NTFS permissions instead of using Group Policy.
The technician should be setting NTFS permissions instead of using Group Policy
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files? a. The user lost access to the network shared drive when her password was reset. b. The technician erased all the data files while resetting the password. c. The user attempted to enter an incorrect password too many times. d. The user had previously encrypted her data files and folders using EFS.
The user had previously encrypted her data files and folders using EFS
Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer. What should she do before she runs the anti-malware program? a. Install Windows updates. b. Update malware drivers. c. Update malware signatures. d. Update malware software.
Update malware signatures
A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained? a. macOS does not require or utilize updates. b. A manual update of macOS is not possible. c. Updates are downloaded through Time Machine. d. Updates are found in the App Store.
Updates are found in the App Store
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer? a. Use Startup Repair. b. Use Safe Mode to boot. c. Use BIOS to see if the hard drive is available. d. Run sfc /scannow for Windows RE command prompt.
Use Safe Mode to boot
How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers? a. Use a third-party remote access app that uses a browser. b. Enable the Screen Sharing service in the Sharing window. c. Enable Remote Disc on both computers. d. Disable encryption on both ends of the Screen Sharing session.
Use a third-party remote access app that uses a browser
Match the Advanced Boot Options menu option with its function. - a. b. c. d. e. Use this option to see what did and did not load during the boot process. - a. b. c. d. e. This tool moves system boot logs from the failing computer to another computer for evaluation. - a. b. c. d. e. This option allows you to launch programs to help solve Windows issues without third-party drivers and software loaded. - a. b. c. d. e. Use this option when the video settings don't allow you to see the screen well enough to fix a defective setting. - a. b. c. d. e. Allows Windows to load without the graphical interface. a.Enable Debugging b.Enable Boot Loggingc.Enable Low-Resolution d.Enable Safe Mode e.Enable Safe Mode with Command Prompt
Use this option to see what you did not load during the boot (Enable Boot Logging) This tool moves system boot logs from the failing computer to another computer for evaluation (Enable Debugging) Programs to help solve Windows issues without third-party drivers and software loaded (Enable Safe Mode) Use this option when the video settings don't allow you to see the screen well enough to fix a defective setting (Enable Low-Resolution) Allows Windows to load without the graphical interface (Enable Safe Mode with Command Prompt)
Which of the following are closed source, proprietary operating systems? (Select TWO.) a. Windows 10 Home b. openSUSE Linux c. Mac OS X High Sierra d. Ubuntu Linux
Windows 10 Home and Mac OS X High Sierra
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled? a .A volume formatted with NTFS does not support EFS. b. The NTFS file system is corrupt. c. Windows Home editions do not support EFS. d. The user account is not a member of the Administrators group.
Windows Home editions do not support EFS
Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues. What tool can Henry use to create a bootable flash drive in Windows 10? a. Windows Media Center b. Windows DVD maker c. Windows ISO creator d. Windows Media Creation tool
Windows Media Creation tool
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet. Where can Eric go to look up the device driver's filename to determine what device uses the device driver? a. Windows BCD b. Window\Drivers c. Windows\System32\drivers folder d. Windows\System\drivers folder
Windows\Systems32\drivers folder
Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect. What type of malware has Gwen discovered? a. Worm b. Spyware c. Rootkit d. Trojan
Worm
What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop a. X = 1, the Do...Loop is endless. b. X = 1, the Do...Loop is not endless. c. X = 0, the Do...Loop is not endless. d. X = 0, the Do...Loop is endless.
X=1, the Do..Loop is endless
What command can be used to scan for Windows installations not stored in the BCD? a. bcdedit b. bootrec /fixmbr c. bootrec /scanOS d. bootrec /fixboot
bootrec /scanOS
What command can be used to repair a dual boot system? a. bootsect b. bootrep c. bootrec d. bcdedit
bootsect
Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred? a. DDoS b. Zero-day c. Botnet d. Spyware
botnet
What command can be used to check for file system errors? a. bootrec b. sfc /scannow c. chkdsk /r d. mdsched
chkdsk /r
A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function? a. cd b. chown c. ps d. clear
chown
A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function? a. rm b. cp c. ls d. apt-get e. grep
grep
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task? a. Boot Camp b. Mission Control c. Disk Utility d. macOS Recovery
macOS Recovery
A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process? a. kill b. dd c. ps d. vi
ps
If you suspect corrupted system files are causing issues, what command can be run to verify and restore the corrupted files? a. chkdsk /r b. sfc /scannow c. chkdsk /scannow d. sfc /r
sfc /scannow
What is responsible for getting a system up and going and finding an OS to load? a. BootMgr b. Startup BIOS/UEFI c. Windows Boot Manager d. Setup BIOS/UEFI
startup BIOS/UEFI
Which of the following best meets the requirements of a strong password? a. qwerty1234567890 b. t*M&2.zY7 c. johndoe123 d. p@ssw0rd
t*M&2.zY7
What command can be issued within Windows RE to enable networking? a. netsh if up b. ipconfig start c. netconf load d. wpeinit
wpeinit