OperatingSystemTest1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter? a. "A" and "C" b. No filters are required c. "B" only d. "C" only e. "A" only f. "A" and "B"

"B" only

Jerry is working at the desk of a client in the marketing department of his company. The client thinks that the problem is the video card, because he has a computer at home with the same problem. The client explains to Jerry that when he fixed the problem, he had to reseat the video card. What should Jerry do when dealing with the client? (Select all that apply.) a.Use computer jargon when talking with the client. b.Check the simple things first to make sure you do not miss anything. c.Ask the client to backtrack to see what things he tried in order to fix the computer. d.Explain that you are certified and don't need his help. e.Compliment the client on his knowledge.

-Check the simple things first to make sure you do not miss anything -Ask the client to backtrack to see what things he tried in order to fix the computer -Compliment the client on his knowledge

Sara receives a call from a customer who just purchased her first computer with Windows 10 installed. She is having some issues using the new computer and needs help setting up a printer. What should Sara do when working with the inexperienced customer? (Select all that apply.) a.Keep a positive attitude. b.Avoid asking the customer to take steps that might destroy files or settings. c.Frequently ask the customer what she sees on the screen. d.Use technical jargon to teach the customer how to understand technicians. e.Explain that because of her inexperience, the customer should not try to install the printer.

-Keep a positive attitude. -Avoid asking the customer to take steps that might destroy files or settings. -Frequently ask the customer what she sees on the screen.

Lane is very nervous about going to visit the person on his help desk ticket. There are several notes from senior technicians about the client, and most of the notes are about how difficult she is to deal with. ​ What advice can you give Lane for dealing with this difficult client? (Select all that apply.) a.Try not to argue with her or be defensive. b.When talking with her, use clarifying statements to show her you understand the problem. c.Just ignore her and get to work on the computer. d.Don't dismiss what she says the problem might be.

-Try not to argue with her or be defensive. -When talking with her, use clarifying statements to show her you understand the problem. -Don't dismiss what she says the problem might be.

What is the maximum number of partitions allowed using the GUID Partition Table (GPT) method for partitioning a drive for Windows? :a. 64 b. 256 c. 128 d. 4

128

The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives? a. 4TB b. 1TB c. 2.2TB d. 1.2TB

2.2 TB

Which of the following is a wireless Internet connectivity method that utilizes cellular technology? a. 802.11ac b. 3G c. Satellite d. WiMAX

3G

What is the maximum amount of memory supported by a 32-bit Windows operating system? a.16GB b.4GB c.1GB d.32GB

4GB

What type of OS should you install for best performance when you have enough RAM? a. 64-bit b. 8-bit c. 16-bit d. 32-bit

64-bit

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.) a. 802.11ac b. 802.11a c. 802.11g d. 802.11b e. 802.11n

802.11ac 802.11n

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA? a. TACACS b. TKIP c. RADIUS d. AES

AES

John recently upgraded from Windows 8.1 to Windows 10, after the upgrade is complete, on the right-hand side of his desktop there is a new area that contains a way to toggle several Windows features on and off, access the Settings app, and view notifications. ​ What is this area called in Windows 10? a.Action Center b.Cortana c.Control Panel d.Task View

Action Center

During your discussion with a client about a problem with his computer, you realize that he is explaining a problem you have seen several times. ​ What should you do when you realize you understand the problem? a.Ignore what the client is saying and get to work. b.Actively listen to the client until he finishes explaining the problem. c.While the client is explaining the problem, start looking up the fix for the problem on your phone. d.Interrupt the client so that you can get to work right away.

Actively listen to the client until he finishes explaining the problem

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure? a. Default gateway b. Address reservation c. Subnet mask d. VPN tunnel

Address reservation

From this window, where do I click next to get to the following window? a.System protection b.Device Manager c.Advanced system settings d.Change settings

Advanced system settings

What is another name for several small utility programs that are found in the Control Panel? a.System processes b.Applets c.Extensions d.Downloads

Applets

Richard has been called to the human resources department to repair a desktop computer. The woman using the computer is currently working on the company's payroll and wants to get her computer working quickly so that everyone will be paid on time. While working at her desk, Richard notices that the paperwork she is entering into the system has his coworkers' bank account information. ​ What should Richard do when he discovers this paperwork? a.This information might be useful to have, so he should take a picture. b.Put something over the papers so that he can't see the information. c.Ask the client to remove the documents. d.Ignore the paper and finish working on the computer.

Ask the client to remove the documents.

Isaac was assigned to work on a computer in his company's R&D department. While working on the system, Isaac received several text messages and emails from his coworkers about another issue in the data center. Isaac answered the text messages as they came in and finished working on the computer system in the R&D department. The next day Isaac was called into his supervisor's office. His supervisor told him that he received a complaint that Isaac was on his phone instead of working on the problem with the computer. ​ What should Isaac have done differently to avoid this complaint? a.Clarified with the client the nature of the problem. b.Provided proper documentation. c.Avoided distractions. d.Made sure he was culturally sensitive.

Avoided distractions

What is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started? a. Control Panel b. Kernel c. BIOS/UEFI setup d. Device driver

BIOS/UEFI setup

Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? a. Device Manager b. Control Panel c. Start menu d. BIOS/UEFI setup

BIOS/UEFI setup

If using a dual or multiboot configuration, what screen appears during the boot sequence? a. OS select BIOS screen b. Boot loader menu c. Secure Boot OS paged. d. Multi-Windows Login screen

Boot loader menu

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements? a. Cellular hotspot b. Dial-up c. Cable d. Satellite

Cable

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router? a. Set encryption standard. b. Disable SSID. c. Check radio power levels. d. Change default username and password.

Change default username and password.

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement? a. Change the router's default administrative password. b. Enable DHCP on the router and configure IP address reservations for the wireless clients. c. Disable the router's radio in the wireless network settings. d. Configure MAC filtering on the router and allow access to only the technician's computer.

Change the router's default administrative password

What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed? a. Clean install b. Standard c. Dual boot d. In-place upgrade

Clean install

Which products are considered to be hypervisors? a. Client Hyper-V b. VirtualBox c. Virtual PC d. VMware Player e. VMVisor

Client Hyper-V VirtualBox Virtual PC VMware Player

Jenny is preparing to install Windows 10 on a system that has a version of Windows 8.1 installed. This version of Windows 8.1 runs slowly and crashes occasionally. The optical drive also does not work, so Jenny decides to use a flash drive to install Windows 10. Jenny wants to remove all the programs and data from the computer and start over with Windows 10. a. In-place upgrade b. Repair installation c. Recovery installation d. Custom installation

Custom installation

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients? a. FTP server b. DHCP server c. Wireless access point d. Firewall e. Multi-port switch

DHCP server

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address? a. Subnet mask b. IP address c. DNS d. Gateway

DNS

Which of the following will use an RJ-11 connector for connectivity? a. Cable b. Cellular c. DSL d. Ethernet e. Fiber

DSL

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.) a. DSL modem b. Dial-up modem c. Cable modem d. Network interface card e. Firewall

DSL modem Cable modem

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task? a. Quality of service b. Demilitarized zone c. MAC filtering d. Port forwarding

Demilitarized zone

Which of the following is not considered good customer service? (Select all that apply.) a.Be on time. b.Avoid distractions. c.Meet timelines, and if not possible, explain why. d.Follow up with the customer. e.Disclose the experience on social media. f.Meet expectations.

Disclose the experience on social media

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create? a. Selective b. Dual c. Controlled d. Cross

Dual

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.) a. Enable MAC filtering. b. Disable SSID broadcasting. c. Lower radio power levels. d. Set up firewall settings. e. Add access points.

Enable MAC filtering. Disable SSID broadcasting. Lower radio power levels.

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection? a. Configure the laptop to a static IP address on the corporate LAN subnet. b. Call the help desk at the corporate office to obtain a random VPN password. c. Enter the same user name and password used on the corporate network. d. Select the encryption and authentication methods in Connection Properties.

Enter the same user name and password used on the corporate network

George is working onsite at a client's desk. The client's phone rings during George's visit, and the client explains that she must take the call. What should George do in this situation? a.Leave and go to another client. b.Stay and work on the computer during the phone call. c.Excuse himself and check back when the call is complete. d.Explain he does not have time to wait.

Excuse himself and check back when the call is complete

During your service call at the residence of a customer, you discover you will need a part that you don't currently have. What should you do in this case? a.Explain the situation and give the customer options on how to order the part and when you will return to complete the repair. b.Tell the customer to purchase the part and call when she receives it. c.Tell the customer you need the part, do research on the part, and schedule a time to come back and fix the computer. d.Leave and get the part and come back.

Explain the situation and give the customer options on how to order the part and when you will return to complete the repair

You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are available in Windows 10 for a local hard drive? (Select all that apply.) a. exFAT b. FAT32 c. CDFS d. ext4 e. NTFS f. HFS

Fat32 NFTS

What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi? a.File extension b.File path c.File version d.File name

File Extension

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps? ​ a. 802.11n Wi-Fi b. Fifth-generation cellular c. Third-generation cellular d. Fourth-generation cellular

Fourth-generation cellular

What two methods are available for Windows to use to partition a drive? a. GPT b. exFAT c. UEFI d. MBR

GPT MBR

When working with customers, you should always try to keep a positive attitude. Why is it important to maintain a positive attitude when working with customers? a.Helps to establish a good customer relationship. b.Helps the customer feel confident you can fix the problem. c.Shows that you have the knowledge needed to fix the problem. d.Helps you to be more reliable.

Helps to establish a good customer relationship

Which of the following is used to uniquely identify a computer on a network? a. Serial number b. Network ID c. IP address d. Microsoft ID

IP address

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites? a. Implement MAC filtering on the SOHO router for the PCs that are accessing the site. b. Configure a firewall with content filtering on the PCs of users who are visiting the site. c. Configure a firewall and add the site the users are visiting to the whitelist. d. Implement a blacklist on the firewall and add the site the users are visiting.

Implement a blacklist on the firewall and add the site the users are visiting.

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host? a. When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface. b. To assign a secondary DNS server IP address to a specific network interface on the workstation. c. To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted. d. In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet

Tracy has completed installing Windows 7 on a computer and is ready to install a printer. Tracy attaches the printer to the computer and a message pops up that a new device is being installed. When the process is done, she tries to locate the printer, but the printer is not available. What can Tracy do to use the printer? a. Check the printer cable. b. Check UEFI/BIOS to make sure printing is enabled. c. Install the driver from the manufacturer's website. d. Turn the printer off and on again.

Install the driver from the manufacturer's website

Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is very upset about the email issue. He is complaining about the email service and the IT department in general. What should Derek do to defuse the situation? a.Hang up the phone. b.Call the supervisor and ask for help with the customer. c.Let the customer vent and then restart the conversation. d.Defend the IT department.

Let the customer vent and then restart the conversation

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router? a. Disable SSID broadcasting b. MAC filtering c. WPS d. Port forwarding

MAC filtering

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group? a. Satellite Internet b. Mobile hotspot c. Cell phone tethering d. Dial-up Internet

Mobile hotspot

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings? a. Network Control Center b. Administrative Tools c. Internet Options d. Network and Sharing Center

Network and Sharing Center

You have connected a cable Internet connection as shown in the exhibit. ​ At what location should you place a filter? a. "A" and "C" b. "A" only c. "B" only d. No filters are required e. "C" only f. "A" and "B"

No filters are required

Patrick is working on a computer that is having wireless network connection issues. Patrick decides that he needs to take the laptop with him to repair it and then return it to the user. While Patrick is replacing the wireless network card, he receives a phone call from the user. The user wants to know where the laptop is because he is leaving on a business trip that day and needs the computer. ​ What should Patrick have done to avoid this situation? a.Provided proper documentation on the service provided. b.Not been distracted by text messages while working on the computer. c.Actively listened to the user. d.Offered the user different repair options.

Offered the user different repair options

What type of software is used to control a computer? a.Application b.Operating system c.Utility d.Interface

Operating System

Penny is setting up computers at a local nonprofit organization. The computers were donated by a company that was upgrading to new computers. Penny must decide whether to use a 32-bit or 64-bit version of Windows 8.1. What hardware on the computers should Penny check? (Select all that apply.) a. RAM b. Motherboard c. Network card d. Video card e. Hard drive f. Processor

RAM Hard drive Processor

What connector is shown in the exhibit? a. F-type b. USB-A c. RJ-45 d. RJ-11

RJ-45

What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? a. BitLocker b. Secure Boot c. Execute Disable Bit d. UEFI Defender

Secure Boot

What term refers to a major update release on Windows 7? a. System release b. Update pack c. Security update d. Service pack

Service pack

In Windows 10, you can find this user-friendly interface to access numerous Windows settings? What is the name of this user-friendly interface? a. Settings app b. Control Panel c. Computer Management console d. Administrative Tools

Settings app

Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed on her computer. Where can Wanda find this information quickly in Windows 10? a.System window b.System Information applet c.UEFI/BIOS System information d.Windows Information

System Window

Scott has just completed installing Windows 8.1 and needs to install several applications on the computer before returning it to his client. What should Scott check prior to installing the applications? (Select all that apply.) a. System requirements b. CPU priority c. Network status d. Hard drive space

System requirements Hard drive space

Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs to have several other applications open so that he can research the project. ​ What feature in Windows 10 will allow Manuel to view Visual Studio on the full desktop and have other applications open at the same time? a.PowerShell b.Snap Assist c.Task View d.Live tiles

Task View

Henry is sent to work with a customer at the company's satellite branch in another town. During his visit, he notices that most of the computer users are not following the corporate guidelines on password safety and are looking at their personal emails, which is not allowed for security reasons. What can Henry do about these corporate policy issues? a.Confront the employees about the issue. b.Train the employees on why these issues are security concerns. c.Ignore the security problems. d.Wait until he returns to his office and inform his supervisor.

Train the employees on why these issues are security concerns

John is trying to find everything on his computer associated with a new application that he downloaded. Is it true or false that when using the search box in Windows 10, you can search for an app or a file or search for its name on the web? True False

True

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George? a. Use port forwarding. b. Use WPA2 .c. Use a firewall. d. Use Parental Controls.

Use Parental Controls

Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in a workgroup. What is the easiest way for Sam to install the application on all the computers? a. Have multiple copies of the software on a DVD. b. Use a network share to share the installation files. c. Have a USB device for every computer. d. Go to the Windows Store and install the software on each computer.

Use a network share to share the installation files.

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured? a. Firewall b. VPN tunnel c. DHCP server d. Address reservation

VPN tunnel

What is it called when software is used to simulate the hardware of a physical computer? a. Compatibility mode b. Dual boot c. Virtual machine d. Windows Run as Administrator

Virtual Machine

What is it called when a partition is formatted with a file system and assigned a drive letter? a. Operating system b. Volume c. Path d. Product key

Volume

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest? a. WAN, WLAN, PAN, LAN b. WAN, MAN, LAN, PAN c. MAN, WAN, WLAN, PAN d. PAN, WLAN, MAN, WAN

WAN, MAN, LAN, PAN

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used? a. WMN b. WLAN c. PAN d. MAN

WMN

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer? a. WPA2-PSK, AES b. WPA-PSK, TKIP c. WPA2-Enterprise d. WPA2-PSK, TKIP

WPA2-PSK, AES

Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to connect to the cloud and thus have security in case the laptops are stolen. What version of Windows 8.1 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop? a.Windows 8.1 Basic b.Windows 8.1 Pro c.Windows 8.1 Enterprise d.Window 8.1 Core

Window 8.1 Core

Larry wants to upgrade to Windows 10. He will use his computer both at home and at work and will need to connect to his company's Wi-Fi network to share files over the network. Which version of Windows 10 would you recommend to Larry? a.Windows 10 Pro b.Windows 10 Home c.Windows 10 Enterprise d.Windows 10 Education

Windows 10 Home

What version of Windows 10 is a valid, in-place upgrade path for a computer that has Windows 7 Starter edition on it? a. Windows 10 Pro b. Windows 10 Starter c. Windows 7 Professional to Windows 8.1 to Windows 10 d. Windows 10 Home

Windows 10 Home

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. ​ Which of the following is required for the user to successfully sign in to the Windows domain? a. SSID, authentication and encryption settings b. User name and password supplied by the ISP c. Windows domain user name and password d. A valid connection to a DHCP server on the LAN

Windows domain user name and password

William's supervisor wants to create a test lab at the company in order to test Windows 10 updates. He has instructed William to create a virtual lab. William decides to use Hyper-V as the hypervisor for the virtual machines. When William tries to use Hyper-V, he realizes that it is not installed. What will William use to install Hyper-V in Windows 10? a. Windows features b. Microsoft website c. Windows Store d. Windows installation disk

Windows features

If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be? a. Windows.old b. Windows c. system32 d. Program Files

Windows.old

Match the protocol or encryption name with the feature. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. d. TKIP No longer considered secure because the key used for encryption doesn't change. a. WEP Typically uses AES for encryption. c. WPA2 Current encryption algorithm used today. e. AES Typically uses TKIP for encryption. b. WPA

d. TKIP a. WEP c. WPA2 e. AES b. WPA

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. ​ Which Microsoft command-line command should Henry use to check whether he can connect to the server? a. ping b. ipconfig c. netstat d. ifconfig

ping


Ensembles d'études connexes

Concepts of DC Final Exam Review

View Set

Quiz Chapter 14 - Brain Cranial Nerves

View Set

Chapter 11 Business Policy Final

View Set

Intro to Supply Chain Quizzes 9-12

View Set

American Red Cross BLS Lesson 3 Pre-Assessment

View Set

SECOND SEMESTER COORDINATED SCIENCE MULTIPLE CHOICE

View Set

Nursing: Semester 1 Lecture Exam 6

View Set

Python Data Structures / Algorithms

View Set