IT Essentials Units 10-14 Practice Final Review Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive?

4

Drag the statements on the left to the mobile OS that they describe on the right. (Not all targets are used.) Android:

Apps are represented by shortcuts on the home screen, the os uses the launcher to define the format of home screens and the look and feel of user interface

What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)

Back up user data on a regular basis, Ensure that the operating system software and applications contain the latest updates.

A technician is troubleshooting a Windows 10 computer that displays an "Invalid Boot Disk" error message. What should be the first action the technician should take to troubleshoot the issue?

Change the boot order in the UEFI/BIOS settings to select the drive that has the operating system installed as the first boot device.

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

What is the name of the Windows Phone 10 digital, or virtual, assistant?

Cortana

What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?

Disk Utility

Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.)

Document the reason the customer called and create a support ticket. and Escalate the customer to a level two technician.

A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the internet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue?

Implement an Alternate Configuration IPv4 address on the laptop.

Match the scripting language with the script file name extension- .js

JavaScript

Which component uses the greatest amount of power on most mobile devices?

LCD Screen

Match the scripting language with the script file name extension- .sh

Linux Shell Script

Match remote access authentication methods to the description. (Not all options are used.)

Match remote access authentication methods to the description. (Not all options are used.)

What is the default file system used during a fresh installation of Windows 10?

NTFS

A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

NTOSKRNL.EXE starts the login file called WINLOGON.EXE.

A technician has just purchased a new Windows 10 PC and wants to transfer selected files, folders, profiles, and applications from the old Windows PC. What tool or utility does Microsoft recommend to do this?

PCmover Express

A technician is configuring a SOHO computer. The technician wants to create a local account that requires a password and wants a screen saver to appear if the person using the computer steps away for a period of time. Which two Windows Control Panels will the technician use to accomplish these tasks? (Choose two.)

Personalization and User Accounts

Match the scripting language with the script file name extension- ps1

PowerShell

What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)

Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure and Run chkdsk /F /R from the recovery console.

Match the scripting language with the script file name extension- .py

Python

A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications?

Reset this PC

A user has submitted a trouble ticket stating that their computer is showing the error "BOOTMGR is missing". The IT technician replicates the error and finds that it occurs after the POST of this Windows 10 machine. What are two possible solutions for this problem? (Choose two.)

Run chkdsk /F /R from the recovery console and Restore BOOTMGR using the Windows Recovery Environment.

A technician wants to split a large partition on a drive in a Windows 10 PC without loss of any data. How can this be accomplished?

Shrink the existing partition and create a new partition from the unallocated space.

A network administrator is tasked with deployment of Windows 10 Pro for a large number of new PCs in the company. The administrator uses a PC to perform a base installation together with standard company applications. The PC is tested to be fully functional. Which tool must the administrator use to remove all computer and user specific information before building a deployable image from the disk?

Sysprep.exe

What is the next troubleshooting step after a theory of probable cause has been established?

Test the theory to determine cause.

An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?

The BIOS boots the computer using the first drive that contains a valid boot sector.

Which statement is correct about installing a 32-bit operating system on a x64 architecture?

The OS will run correctly.

Drag the statements on the left to the mobile OS that they describe on the right. (Not all targets are used.) Apple:

The device has a physical home button, deleting an app from the home screen deletes the app from the device, closed source software, os has an all apps navigation icon

A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)

The display is set to a high level of brightness, An app is using too many resources, the device is roaming between call towers

Which statement is true regarding mobile devices using the Wireless Wide Area Network (WWAN)?

They require an adapter to link to a cellular provider's network through the nearest base station or transmitter.

True or False? Smartphones require an operating system before they can be operated.

True

What is a recommended best practice for a technician who must perform tasks that require administrative access?

Use a standard account with limited permissions, and then use the Run as Administrator option to perform the task that requires elevated privileges.

A technician is visiting a website and is using Google Chrome on a Windows 10 PC. The technician is trying to view the password for the website. The technician uses the Credential Manager to view the password but cannot see it. What could be the cause?

Web credentials are not saved for sites accessed by browsers other than Explorer and Edge.

Match the scripting language with the script file name extension- .bat

Windows Batch File

Which tool is available to transfer user data and settings from an old Windows 10 PC to a new Windows 10 PC?

Windows Easy Transfer, User State Migration tool

A technician has been asked by a manager to recommend a security solution for protecting a computer against Trojans. Which security technique should the technician recommend?

antimalware

An instructor is discussing facts about different mobile device operating software. The instructor states: "Remote backups are a cloud-enabled service for mobile devices." To which OS does this relate: iOS, Android, or both?

both

A company has a security policy that permits the reuse of wiped drives in other computers. The wiped drives are often used for additional storage or as a replacement drive. What are two methods that could be used to wipe data? (Choose two.)

degaussing equipment and data wiping software

A technician wants to create customized system image files that will be installed on computers in the network. Which administrative command-line tool or command can be used to address this?

dism

A technician has copied several commercial movies to a company server to be shared with colleagues. How would this behavior be classified?

ethically wrong and illegal

When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?

least privilege

What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)​

not properly creating or maintaining sandboxing features and enabling app access to the root directory

When performing computer forensics what is required to prove a chain of custody?

proper documentation procedures

What two roles or tasks are associated with level two technicians? (Choose two.)

remotely updating drivers and software on customer computers and gathering diagnostic information from a customer computer

What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?

to repair the operating system

A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are two purposes of botnets? (Choose two.)

to transmit viruses or spam to computers on the same network, to attack other computers

A technician has been notified of a problem on the network. After investigation, the technician determines that a specific internal company computer is launching an attack on other company computers. Which type of malware is being used?

trojan


Ensembles d'études connexes

Biology 2114 Unit IV Multiple Choice

View Set

gerontology ch. 1,2,3,5 (exam 1)

View Set

Properties of Multiplication and Addition

View Set

Supp_ch - ch4: Inventory control tools

View Set

Chapter 5 Infection Control: Principles and Practices

View Set