Software Support A+

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What does the term x86 refer to?

32 bit processors

RDP port

3389

What port is utilized by the Remote Desktop service?

3389

Max transmission speed for bluetooth

3MBps

802.11ad

7GBps 60GHz 30 feet

Web server Http

80

the search app for Mac, can be configured to search the local computer, Wikipedia, iTunes, the Maps app, the web, and more

Spotlight

What signing option prevents installation of not signed drivers?

block

Whats does iwconfig show?

wireless interfaces

What Performance counter tracks the percentage of time the hard drive is in use? Avg. Disk Queue Length % Disk Time Disk Buffer Length Max Disk Queue Length

% Disk Time

What is the power good signal voltage?

+5v

what is a typical use of a Type 2 hypervisor?

- as honeypots to lure hackers - by developers to test applications

what two commands are used to change the permissions and ownership of a file directory in Linux

- chown - chmod

What parameter is used with the attrib command to remove the read-only permission?

-R

Batch File

.bat file extension that contains a list of OS commands that are executed as a group.

What three file formats are log files stored as?

.evt, .txt, and .csv

A custom view filter in Event Viewer can be saved to a file using what extension? .evf .evlog .evs .evtx

.evtx

How does one get rid of a proxy malware?

1. clear proxy settings 2. regedit currentuser\software\microsoft\windows\currentversion\internet settings

What is the steps to fix the "BOOTMGR is missing" error?

1. select adv options in troubleshoot 2. select auto repair

802.11ac

1.3GBps Below 6GHz 230 feet

Whats the default size of pagefile.sys?

1.5 times the amount of RAM?

What is the number of characters in a 40-bit WEP key?

10

10Base2

10 MBps Coax cable uses BNC connector 185 meters

CAT-5

10/100BaseT 100MHz Both two cable pairs seldom used today

CAT-6

10/100BaseT, Gigabit Ethernet Up to 250 MHz Both Less crosstalk because it has a plastic core that keeps the twisted pairs separated. CAT -6 and its variations are the most popular category used today.

CAT-5e

10/100BaseT, Gigabit Ethernet 250MHz Both Has four twisted pairs and heavy duty sheath to help reduce crosstalk.

100BaseFL, 100BaseFX

100MBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km

SMB over netBios

137, 138, and 139

IMAP email client port

143

FTP client port

20

Global address IPv6

2000::/3

FTP server port

21

SSH server port

22

Telnet port

23

SMTP email server port

25

How many characters are in a 104-bit WEP key?

26

The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives? 1GB 1TB 2TB 2PB

2TB

SLP and AFP

427

if you need to redirect the output from a command, what symbol should you use

>

Linux utilizes what two different wildcard characters at the command line

? and *

Standard Image

A copy of an entire hard drive that includes Windows 7, drives, and applications that are standard to all the computers that might use that copy.

Distribution Server

A file server holding Windows setup files used to install Windows on a computer networked to a server

Partitions

A hard drive can be divided into one or more______?

upgrade paths

A qualifying OS required by Microsoft in order to perform an in-place upgrade

Push Automation

A server automatically installs a new image or OS upgrade to a computer when a user is likely o not be sitting at it.

Network Discovery

A setting that allows this computer to see other computers on the network and vice versa

Homegroup

A type of peer to peer networks where each computer shares files, folders, and libraries, and printers with other computers in the group.

Active Directory

A windows server directory database and service that is used in managing a domain to allow for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, web sites, users and services.

What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.)

Activates the HAL Starts critical services Starts the Session Manager

Which partition is the bootable partition that startup BIOS turns to when searching for an operation system to start up?

Active partition

a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage

ActiveX control

What built-in tools can be used to clean up a computer?

Add/Remove, Defrag, disk cleanup

Which component may be considered a field replaceable unit (FRU)? (1pts) power supply hard drive LCD screen All of the above

All of the above

If a customer calls explaining their problem what should you do?

Allow them to finish and write down all the details

Zero-Touch high volume deployment

An installation strategy that does not require the user to start the process. Instead a server pushes the installation to a computer when a user is not likely to be sitting at it.

Which of the following is based on open source code?

Android

what operating system is based on open source code

Android

Which type of device is most likely to have a slot for an SD card?

Android smart phone

When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?

Anonymous users

What are three important things to consider about wireless networks?

Antenna placement, Antenna selection, and access point power

What are the two most popular web server applications?

Apache IIS

Boot Loader Menu

Appears and asks you to select an operating system when using a dual boot

Where is terminal on Mac?

Applications> Utilities> Terminal

5400, 7200, and 10,000 RPM

At what three speeds in revolutions per minute might the spindle inside a hard drive rotate?

What feature of a UPS protects from power surges/drops?

Automatic Voltage Regulation

To which group does Windows give access to folders that you create which are not part of your user profile?

Authenticated Users

You need to troubleshoot a driver issue. When Windows Vista is booting, you press F8 to enter the Advanced Boot Options menu. Which option is NOT an option listed in the menu?

Automated System Recovery

What two different types of firmware may be used on motherboards? BIOS CEFI UEFI CMOS

BIOS UEFI

Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? Control Panel BIOS setup Device Manager Computer

BIOS setup

An extra copy of a data or software file that you can use if the original file becomes damaged or destroyed.

Backup

Which component on a smart phone requires pairing with another device?

Bluetooth

A small Windows database structured the same as a registry file and contains configuration information about how Windows is started

Boot Configuration Data (BCD) store

Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?

Boot Logging

Several dual-processor configured computers have been purchased that have 1 GHz cpu, 2 GB RAM what editions of Vista could be installed on these specs?

Business and Ultimate

Where is the Windows system registry hive?

C:\Windows\System32\Config

Registry files, if deleted, can be restored from those saved in what folder?

C:\Windows\System32\Config\RegBack

Besides the PSU what has a high voltage rating?

Cathode ray tube (CRT) monitor

To make sue the drive is healthy, you need to search for and repair file system errors using the Windows ______ utility.

Chkdsk

What type of fire extinguisher should be used in a server room?

Class C

Which products are considered to be hypervisors? Client Hyper-V Virtual PC VirtualBox VMVisor

Client Hyper-V Virtual PC VirtualBox

What is another name for a file allocation unit?

Cluster

A window that consolidates several Windows administrative tools that you can use to manage the local PC or other computers on the network

Computer Management

motherboard BIOS

Contained on a chip on the motherboard and manages devices such as , keyboard, monitor, and hard drive.

System BIOS (basic input/output system)

Contains Instructions for running essential hardware devices before an operating system is started.

Where does one change format of date?

Control panel> click, lang, region> select region lang

Windows Easy Transfer (7) or Files and Setting transfer Wizard (xp)

Copy user data and setting from one computer to another.

Which of the following is NOT an internet appliance?

DNS

Rearranges files on the drive into as few segments as possible.

Defragmenting

A computer must have a DVD drive in order to install Windows 8. True or False

False

Whats two methods to prevent WiFi interference?

Deploy APs in different channels within frequency or decrease power level

What is true about using the chkdsk utility?

Detects and fixes file system errors on a windows disk.

Which Windows utility can be used to view and modify partitions on hard drives and to format drives?

Disk Management

You can use ______________ to convert two or more basic disks to dynamic disks.

Disk Management

What Mac tool will verify drive health?

Disk Utility's Verify Disk Functionality

Which of the following is the last step in the six step troubleshooting method covered in this chapter?

Document

Which Windows tool can be used to identify a driver that is causing a problem by putting stress on selected drivers, causing the problem driver to crash?

Driver Verifier

What guidelines need to be stressed when discussing phosphorus?

EPA, OSHA, MSDA

What acronym is another name for static electricity, which can damage chips and destroy motherboards? LCD ESD EMI CRT

ESD

How much disk space is required for hibernation?

Equal to amount of memory

Windows server 2011, Linux, Unix

Examples of network operating systems

The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence?

F8

Computers are very complex and have frequent problems so it is very rare that a problem is caused by an error made by the user.

FALSE

The six step troubleshooting program can only be applied to software problems.

FALSE

Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as other types of errors.

FALSe

Unique local address IPv6

FC00::/7

Link-local IPv6

FE80::/64

Multicast IPv6

FF00::/8

On the IE General tab you can block cookies.

False

what Linux distribution is considered a cutting-edge distribution

Fedora

Overall structure an OS uses to name, store, and organize file on a drive.

File system

What recovery console command is used to correct a corrupted Windows boot sector?

Fixboot

_____________ happens over time as Windows writes files, deletes files, and writes new file to you drive.

Fragmentation

What version of Win Vista syncs with network folders?

Home Premium

a component of the kernel which makes up the layer closest to the hardware

HAL

What must a user be allowed to share a screen with others via a terminal session?

Grant the user access to the session and to screen mode

What registry key stores information that determines which application is opened when a user double-clicks a file? HKEY_CLASSES_ROOT HKEY_USERS HKEY_CURRENT_USER HKEY_LOCAL_MACHINE

HKEY_CLASSES_ROOT

What registry key stores information about all users?

HKEY_USERS

When all users on a network require the same access to all resources, what type of network model should you use?

Homegroup

Four

How many hard drives are necessary to implement RAID 10?

Which of the following is used to uniquely identify a computer on a network? network ID ARP address IP address serial number

IP address

What isnt a option in Windows Vista advanced boot menu?

automated system recovery

Whats step 1 in troubleshooting

Identify problem

Custom Installation

In Windows 7 a clean installation is called______?

Workgroup

In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralized management or security.

Domain Controller

In a Windows domain where is the centralized database kept?

You need to access a shared folder named research$. What fact is true about this shared folder?

It is hidden

You need to upgrade a Windows Vista Home Premium computer to Windows 7 Home Premium. What should you do prior to the upgrade?

Install the latest service pack.

Image Deployment

Installing a standard image on another computer. Always results in a clean install.

What is a typical symptom that might indicate the MBR record is damaged?

Invalid partition table error

What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software

LoJack

What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock

KeePass LastPass Dashlane

In Windows 7, what startup option can be used to restore the registry settings from the previous login?

Last Known Good Configuration

Domain

Logical group of networked computers that share a centralized directory database of user account information and security.

The __ command creates a subdirectory under a directory.

MD

What type of hard drive contains spinning platters?

Magnetic hard disk drives

What is the file name given to the Windows kernel?

Ntoskrnl.exe

What is in jeopardy when shutting down a computer incorrectly alot?

registry

How often does Windows 7/Vista automatically defragment a hard drive?

Once a Week

Explorer

Once a virtual machine wizard is complete the new virtual machine is listed in the __________ window

What two applications are an example of a mail server and a mail client application, respectively?

Outlook Exchange

File System

Overall structure an OS uses to name, store, and organize files on a volume.

What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?

PNRP

What cloud service provides hardware and software necessary for app dev?

PaaS

What cloud service provides hardware and software necessary for application development?

PaaS

A hidden file stored in the root directory of drive C:

Pagefile.sys

What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time? Event Viewer Reliability Monitor Performance Monitor Resource Monitor

Performance Monitor

Virtual PC, VirtualBox, VMware,

Popular virtual machine programs

a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP

Power Users

Device Manager

Primary Windows tool for managing hardware

Dial-up connects to what jack?

RJ-11

What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)

Read Write

The error BOOTMGR is missing is displayed, how would one repair the boot?

Recovery env> repair> Troubleshoot> Advanced options> automatic repair

High-touch with retail media or image disc

Requires a technician physically sitting at a machine and installing Windows on a PC

A program that runs in the background and is called on by other programs to perform a background task

Service

What can be performed at Internet Properties box in connections tab?

Set up new Internet, Dial-up, VPN, and LAN

Windows Upgrade Advisor

Simplest way to find out if a system can be upgraded to windows 7 is to download, install, and run the ______?

Device Drivers

Small Programs stored on the hard drive that tell the computer how to communicate with a specific hardware device.

What Windows process is responsible for authenticating users?

Smss.exe

What program is used to start the part of the Win32 subsystem that displays graphics?

Smss.exe

Microsoft Assessment and Planning (MAP) Toolkit

Software that can be used by a system administrator from a network location to query hundreds of computers in a single scan to determine if a computer qualifies for a Windows upgrade.

Global Account

Sometimes called a Domain User account or network account, used at that domain level, created by an administrator and stored in the SAM

Startup BIOS

Starts the computer and finds a boot device that contains an operating system.

What Windows utility can be used to find out what processes are launched at startup? Task Manager Microsoft Management Console System Configuration Computer Management

System Configuration

_____________ restores the system to its condition at the time a snapshot was taken of the system settings and configuration.

System Restore

lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity, and user activity

Task Manager

can be set to launch a task or program at a future time, including at startup

Task Scheduler

Active Directory

The directory database used by Windows Server to control resources on a network

When copying a file encrypted with EFS what happens when the file is copied to a volume that doesnt have EFS enabled?

The original remains encrypted new isnt encrypted

What events can occur during BootMgr's role in startup? (Choose all that apply.)

The settings in the BCD are read Dual-boot menu is displayed

What app is used to backup and restore data on a IOS device?

Time Machine

what is the name of the OS X built-in backup utility?

Time Machine

A Windows 7 system repair disc can be created using the Backup and Restore utility.

True

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

True

Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False

True

The Advanced Boot Options menu appears when a user presses F8 as Windows is loading.

True

The Android OS is based on Linux.

True

The GUID Partition Table (GPT) method for partitioning a drive allows up to 128 partitions. True or False

True

The Home editions of Windows 7 do not include the Local Security Policy or Print Management. True or False

True

There is no undo feature in the Registry Editor. True or False

True

Using Group Policy, you can set security policies to help secure a workstation. True or False

True

When a partition is formatted with a file system and assigned a drive letter it is called a volume. True or False

True

Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. True or False

True

the Android OS for mobile devices is based on Linux

True

What type of cable does Dial-up use?

Twisted-pair cabling

Which characteristic distinguishes IEEE 1394 from USB 2.0? USB supports hot swapping IEEE 1394 supports hot swapping USB supports more devices on a single bus IEEE 1394 supports more devices on a single bus

USB supports more devices on a single bus

You are trying to upgrade a Vista with service pack 2 computer, what edition of Windows 7 can it upgrade to?

Ultimate and Home Premium

What editions of Windows 7 are required to install a Language Interface pack?

Ultimate or Enterprise

What versions of Windows 7 can run XP mode?

Ultimate, Enterprise, and Professional

IP Adress

Uniquely identifies a computer on a network

Whats true regarding unsigned drivers?

Unsigned drivers can cause instability and security issues

What does a blue I indicate in device manager?

Use Automatic Settings is not enabled for this device

What wireless protocol provides maximum security?

WPA

What wireless security protocol provides most security?

WPA

Answer File

Used during an unattended installation

setup BIOS

Used to change motherboard settings

Lite-touch, high volume deployment

Uses a deployment server on the network to serve up the installation after a technician starts the process

Used to enhance the amount of RAM in a system.

Virtual Memory

What is Pagefile.sys used for in Windows?

Virtual Memory

What windows operating systems support dynamic disks?

Vista Ultimate, Vista Enterprise, Windows 7, 8, 10

What versions of windows is ready boost available?

Vista and onward

configuring a computer so that it will respond to network activity when the computer is in a sleep state

Wake on LAN

bootrec /rebuildBCD

What command can you use to rebuild the BCD

1.5 Gb/sec, 3 Gb/sec, 6 Gb/sec

What is the transfer speed for SATA I? SATA II? SATA III?

Solid state drives, magnetic drives, and hybrid drives

What three types of technologies are used inside hard drives?

In UEFI/BIOS setup

When implementing RAID on a motherboard, where do you enable the feature?

In biometrics, what is a false positive?

When someone is not suppose to have access to a system but is given access

RAID 1

Which RAID level mirrors one hard drive with a second drive so that the same data is written to both drives?

RAID 5

Which RAID level stripes data across multiple drives to improve performance and also provides fault tolerance?

B & C

Which features are available in Windows 7 Home Premium? A. backup to network b. Scheduled backups c.windows media center d. join a domain

Public Network

Which network location option means the Network Discovery is turned off and you cannot join a homegroup or domain.

MicroSD, also the same size as MicroSDHC and MicroSDXC

Which type of flash memory card is currently the smallest type of card?

Windows 7 profesional

Which windows 7 edition is intended for Business users and allows purchase of multiple site licenses.

100BaseT purpose Transmit +/-

White/green, green White/orange, orange

100BaseT purpose Receive +/-

White/orange, white/green orange, green

in-place upgrade

Windows installation that is launched from the desktop and the installation caries ahead user settings and applications.

If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be? system32 Windows Windows.old Program Files (Saved)

Windows.old

What command is used to install the recovery console?

[drive letter]:\i386\winnt32.exe /cmdcons

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

\\server\sharedfolder

What cli utility alters the action of a command?

a switch

What statement about user accounts and groups is NOT true?

a user account can belong to only one group at a time

What detects horizontal movement but not tilt on a phone?

accelerometer

What must you do before using a new iPad or iPod touch?

activate it

What does bootcamp allow on Mac?

allows for multiboot environment creation?

When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS

an encrypted file moved to an unencrypted folder remains encrypted

stands for Bourne Again Shell

bash shell

100BaseT purpose Gigabit ethernet

blue, white/blue, white/brown, and brown

What should be done if a system cannot boot from the hard drive?

boot from Windows setup DVD

Which of the following is true of a Type 1 hypervisor?

called bare-metal hypervisor

what is the main advantage of using a thick client?

can be used for purposes other than server-side virtualization

Regarding the Performance Monitor utility, which statements are accurate? (Choose all that apply.) can monitor in real time can save data in logs keeps a log of errors helps to identify bottlenecks

can monitor in real time can save data in logs helps to identify bottlenecks

a personal computer that provides multiple virtual environments for applications

client-side virtualization

what command lets you view the contents of a file

cat

Which setting can be configured via the BIOS screen? Windows driver status set desktop bakcground screen saver timeout value change the boot sequence

change the boot sequence

an image of the entire partition on which an operating system is installed

clone

Restarts the computer by turning off the power or by pressing the Reset button

cold boot

What two types of backups should be used for the quickest method and least amount of space?

combo of normal and incremental

What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order

copyright

Whats best method to protect cables from damage?

cover cables with protective material

What devices could be paired over bluetooth? docking station credit card readers memory/micro SD card headsets speakers game pads

credit card readers headsets speakers game pads

in order to break out of a command or process on a terminal, what keys should you press?

ctrl + c

When upgrading from cellphone to smart phone what should be considered?

data plans screen size apps

What should a technician do to troubleshoot a program using the least amount of effort?

determine root cause

What causes a IRQL_NOT_LESS_OR_EQUAL message?

device driver

What task can't be performed from the IE General tab?

disable file downloads

A command to manage hard drives, partitions, and volumes.

diskpart

What command can be used to manage hard drives, partitions, and volumes?

diskpart

What command can be used to remove partitions and convert a drive to GPT? fdisk bootrec diskpart gptconv

diskpart

whats step 6 in troubleshooting

document findings

What does a green ? mean in device manager?

driver installed but not all functionality enabled

a collection of data that is copied to a backup media

dump

What feature on android would secure the data?

encryption

whats step 4 in troubleshooting

establish plan of action

What command searches for files?

find

What command is used to format a hdd?

format

What should be done if you receive a personal call?

ignore it

What should the default permission position be?

implicit deny

What factors create ESD?

improper grounding, moving machines, moving people, and less than 40% humidity

The core of the OS that is responsible for interacting with hardware

kernel

What causes UNEXPECTED_KERNEL_MODE_TRAP?

memory

What can REGSVR32 be used for?

missing dll files

A Vista computer has 512 MB of RAM on two HDDs, the computer stops running good after a couple hours, what should the user do?

move the paging file to the other HDD

If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed, what utility should you open? Task Manager msinfo32.exe Event Viewer msconfig.exe

msinfo32.exe

What command launches the Remote Desktop client for Windows?

mstsc

What diagnoses problems with NetBIOS name resolution?

nbtstat

What is the fastest method to start spooler service on a computer?

net start spooler

Whats the command to create a user?

net user [username] /add

What backup type should be used to reduce amount of drives and tapes used?

normal and differential backup

What verifies entries on a DNS server?

nslookup

What file holds the preferences and settings of the currently signed-in user? ntprofile.dat ntuser.dat profile.ini userconfig.ini

ntuser.dat

Regarding the use of Group Policy, what statement is NOT accurate?

policies can be applied to a computer

Where should you install security updates on a server that's hosting virtual machines?

on the virtual machines and the hypervisor

Three categories of UPS

on-line, line interactive, and standby

T568B

orange uses pins 1 and 2 and green uses pins 3 and 6 and blue uses pins 4 and 5 and brown uses 7 and 8

When using Group Policy to configure QoS, what options are available? (Choose all that apply.)

outbound traffic can be throttled the priority is a number from 0 and 63

What causes KERNEL_DATA_INPAGE_ERROR?

paging file

How would one ensure no unauthorized user is on a WPA access point?

periodical site surveys

PAN

personal devices communicating in short range

What cant be claimed from a lot of old parts?

phosphorus from a CRT monitor with a broken screen

What is the second step in opening the case of a working computer? (1pts) power down the system and unplug it back up important data open the case cover press and hold down the power button for a moment

power down the system and unplug it

a remote application running on a server is controlled by a local computer

presentation virtualization

Why would tethering internet from phone to devices be good practice?

prevent data leaking

What important information is needed if you are installing an OEM version of Windows 7? installation code receipt of purchase OEM license product key

product key

Data is sent using UDP method some collisions occur what will happen as a result?

protocol will drop the lost packets the application will transmit the packets

What server role makes connections on behalf of the user?

proxy

What kind of a computer intercepts requests that a browser makes of a server and can cache received content?

proxy server

What type of mobile synchronization must be physically started?

pull synchronization

punchdown tool

punch indiv wires into RJ-45 jacks

a server automatically installs a new image or OS upgrade to a computer when a user is not likely to be sitting at it

push automation

What should you do first if a memory card slot is not functioning?

reboot

For some brand-name computers, the hard drive contains a partition that can be used to reinstall Windows. What is the name for this partition? reinstall partition recovery partition restore partition rebuild partition

recovery partition

What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice

retina fingerprint voice

what user account is known as the system administrator or super user account

root

What linux command will start a new screen?

screen

What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender Bootlocker

secure boot

A major update release on Windows is referred to by what term? system release update pack security release service pack

service pack

Whats required to upgrade a Vista Premium to 7 Premium?

service pack 1 and 2

What is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started? kernel device driver setup UEFI/BIOS system drive

setup UEFI/BIOS

What is used to create a answer file?

setupmgr.exe

What sfc command scans all protected files every time the computer starts?

sfc /scanboot

If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?

sfc /scannow

What should be entered at a command prompt in order to scan all system files

sfc /scannow

What feature in window 7 allows for windows to be arranged side by side?

snap

What is the term given to the individual tools in a console? consoles add-ins snap-ins views

snap-ins

To restart a PC without turning off the power

soft boot

What uses cookies to report user data?

spyware

a copy of an entire hard drive that includes the Windows OS, drivers, and applications that are standard to all the computers that might use that copy

standard image

What feature turns off power-consuming components ie hdd, and monitor?

standby mode

What should you do with a angry customer?

stay calm

Whats the first step when a angry customer calls?

stay calm

What is another name for a blue screen error which occurs when processes running in kernel mode encounter a problem ad Windows must stop the system

stop error

What is another name for a blue screen error which occurs when processes running in kernel mode encounter a problem ad Windows must stop the system?

stop error

What type of password can be used to block access from BIOS/UEFI only?

supervisor password

What is a IDS?

system responsible for detecting unauthorized access/attacks

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking

tailgating

What tool should be used to setup a scheduled restore point creation?

task scheduler

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard

the BIOS

What has occurred if you see the message "Chassis Intruded! System has halted." the next time you start your computer? -the disk has failed -Windows has not been activated -the case has been opened -the keyboard has been unplugged

the case has been opened

What does a triangle with a black ! in it mean?

the device has a problem but is still working

What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device

the device has been jailbroken

When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure

the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols

What is a valid reason for wanting to configure a proxy server in Internet Explorer?

to connect to secured websites on a corporate network VPN

What's the main purpose in keeping track of all backups?

to ensure proper disposal of information

Why should all unused features be disabled in a web browser?

to provide most security

Which touch technology does finger movement control screen scroll?

touch flow

What are the two most common malware?

trojan and viruses

Vas running under a Type 1 hypervisor are isolated from each other

true

What can be done to not allow personal info to be given through browser on internet explorer?

turn on smartscreen filter

toner probe

two-part kit used to find cables in walls of buildings

A computer is upgraded to dual-core processor, the user complains the computer didn't increase in speed, what would fully ensure that the application fully utilizes the dual-core processor?

upgrade the application to support multithreading

What should be done first when display isnt showing on a laptop?

use fn key to toggle internal video adapter

How does one access system recovery on Win 7 computer?

use install disc

Which of the following can you do if you suspect an application requires more privileges than the currently logged-on account?

use run as administrator short cut menu option

RG-59

used for TV

Shell subsystems that have only a limited access to system information and can access hardware only through other OS services are operating in what mode? process mode elevated privilege mode user mode kernel mode

user mode

Whats the best way to provide authentication for a small business?

usernames and strong passwords

Which of the following are true about NTFS permissions? (Choose all that apply.)

when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies

What tabs found in the Windows Task Manager dialog box? (Choose all that apply). Applications Startup Processes Performance

Startup Processes Performance

What is responsible for getting a system up and going and finding an OS to load?

Startup BIOS

What types of events are logged by Windows and can be viewed using the Event Viewer? (Choose all that apply). Scheduled Error Warning Information

Error Warning Information

What is a recommended file system format for Windows XP, Vista, and 7 that increases security, performance, and reliability features?

NTFS

When utilizing both share and NTFS permissions, what statement is inaccurate?

when you copy a file, the file takes on the permissions of the destination folder

What is a possible remedy if your system hangs at odd times or during the boot? install new CMOS RAM remove the TPM chip flash the BIOS format the hard disk

flash the BIOS

What should be done if files that violate the acceptable use policy exist on a computer?

follow procedures that are in the acceptable use agreement

What command should be used to erase all info, test disk, ensure sector reliability, mark bad sectors, and create internal address table?

format

What disk maintenance utility is not found in the Tools tab of the properties menu?

format

Law enforcement agencies sometimes use what type of data to reconstruct a person's travels? accelerometer tethering geotracking geospotting

geotracking

Whats not a security measure for mobile devices?

geotracking

a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used

gpedit.msc

T568A

green pair connect to pins 1 and 2 whilst the orange is connected to pins 3 and 6 and blue is on pins 4 and 5 and brown uses 7 and 8

DSL (Digital Sub Line)

group of broadband technologies that covers a wide range of speeds. DSL uses ordinary copper phone lines and a range of frequencies

How should you communicate with a foreign speaking person?

hand gestures/visual aids

Where is MBR stored

hard disk

What is the most likely cause of an improper shutdown or system lockup?

hardware issue

What is a hardware requirement for Hyper-V?

hardware-assisted virtualization

What question will verify if a virus is on a computer or not?

have you opened a email attachment lately

software that is installed on a computer and used to manage virtual machines

hypervisor

What log should be looked at for login events?

security log

Which type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?

server-side

what type of virtualization should you deploy to provide a Virtual Desktop Infrastructure

server-side

What process is it when data is uploaded to desktop computer?

synchronization

What command can be used to prepare a image for duplication?

sysprep

contains instructions for running essential hardware devices before an operating system is started

system BIOS

Who should be informed of a short in the server room?

system administrator

a device dedicated to timing activities on the motherboard system clock

system clock

what terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server

ultra-thin client, zero client, dumb terminal

Space on the disk is marked as ___________ if it has not yet been partitioned.

unallocated

an installation that does not require a technician to respond to prompts by the setup program

unattended installation

What should be done to kill a program you clicked to open on linux?

use the xkill command

RG-6

used for TV uses F connector

straight-through cable

used to connect a computer to a switch or other network device

crossover cable

used to connect two like devices such as hub to hub or computer to computer

After installation, how many days do you have to activate Windows 7? 7 30 45 60

30

a group that can back up and restore any files on a Windows system regardless of access permissions to these files

Backup Operators

Besides backing up user data or system files, you can also back up the entire volume on which Windows 7 is installed using________________.

Backup and Restore

Searches for bad sectors on a volume and recovers the data from them if possible.

Chkdsk Utility

Which Windows tool allows an administrator to decrypt a file that is not available because the user account that encrypted the file is no longer accessible?

Cipher

a database designed with a treelike structure that contains configuration information for Windows, users, software applications, and installed hardware devices

Registry

If you need to see information about problems and errors that have happened over time, what utility should you use? Performance Monitor Resource Monitor Reliability Monitor Services Console

Reliability Monitor

gives a user access to a Windows desktop from anywhere on the Internet

Remote Desktop Connection

What configuration change should be done to harden the OS immediately after installation?

Rename Admin and disable Guest

What Windows utility is used to control the Windows and third-party services installed on a system? Microsoft Management Console Event Viewer System Configuration Utility Services console

Services console

Use the ______ command to rearrange parts of files on the drive so they are contiguous.

Defrag

There is no option for networking access when using Safe Mode.

False

To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.

False

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.

False

You do not have to be logged on as an administrator in order to use tools found in Computer Management. True or False

False

You usually install an OS on a mobile device using a USB device or SD-card.

False

What editions of Windows 7 can create a Windows 7 Homegroup?

Windows 7 Home Premium, Ultimate, Pro, or Enterprise

What editions of Windows can enable Windows XP mode?

Windows 7 Pro, Home, Ultimate

A volume that can be accessed by way of a folder on another volume so that the folder has more available space.

Mounted drive

Whats Dr. Watson?

application debugger included with Windows

What log should be looked at for program events?

application log

What should not be allowed on a virtualization host?

browsing the internet

A Windows 7/Vista command option that repairs the boot sector of the system partition.

fixboot

What be used to lengthen battery time on a iPhone?

low power mode

A disc image, as defined by the International Organization for Standardization, uses what file extension? .iso .img .disc .cd

.iso

What symbol is used to add a switch to any cli utility/function?

/

What chkdsk switch fixes disk errors?

/F

Which switch in the chkdsk program directs chkdsk to skip checks that compare directories?

/I

What chkdsk switch locates bad sectors and recovers readable information?

/R

What boot.ini option forces video to a driver that is compatible with all gpus?

/basevideo

What switch tells chkdsk to skip checks that detect cycles in directory structure?

/c

on Linux, where are the commands required for system administration stored

/sbin

What boot.ini switch displays device driver names whilst being loaded?

/sos

What switch on the defrag command shows both analysis and defrag reports?

/v

what switch of chkdsk forces the volume to dismount first?

/x

Unassigned address IPv6

0::0

Loopback address IPv6

0::1 or ::1

A dynamic disk requires __MB of storage for the disk management database.

1

Whats the minimum system requirements for windows 7 32 bit?

1 GHz cpu 1 GB ram 16 GB HDD space DirectX 9

Whats the minimum system requirements for Aero?

1 GHz processor 1 GB RAM 128 MB video RAM DirectX 9

in order to ensure that a Mac has no startup items, what two directories should you check for items?

1. /Library/StartupItems 2. /System/Library/StartupItems

CAT-6a

10/100BaseT, Gigabit Ethernet, 10Gig Ethernet Up to 500 MHz Both Doubles the frequency of CAT -6. CAT -6a is sometimes unofficially called CAT -6e.

CAT-7

10/100BaseT, Gigabit Ethernet, 10Gig Ethernet Up to 600 MHz Individual pair shield and overall cable shield Shielding almost completely eliminates crosstalk and improves noise reduction. Expected to have a longer life expectancy than previous twisted-pair categories.

100BaseT

100MBps Twisted pair (UTP or STP) RJ-45 connector 100 meters

CAT-3

10BaseT 16MHz Unshielded Used for phone lines

1000BaseX

10GBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km

10GBaseT

10GBps Twisted pair (UTP or STP) RJ-45 connector 100 meters

10Base5

10MBps Coaxial with AUI 15-pin D-shaped 500 meters

10BaseF,10BaseFL

10MBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km

10BaseT

10MBps Twisted pair (UTP or STP) RJ-45 connector 100 meters

Operating range for Bluetooth 2.0

10meters

POP3 email client port

110

What are the dimensions of a ATX motherboard?

12 inches wide 9.6 inches deep

Whats the maximum amount of volts a PSU can output?

12 volts

For optimal performance, how much free space does Windows need on a hard drive?

15%

What is not a minimum requirement for Windows 7 Pro 64-bit?

16 GB HDD space

1000BaseFX

1GBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km

1000BaseT

1GBps Twisted pair (UTP or STP) RJ-45 connector 100 meters

What's not a minimum system requirement for a Windows 7 Pro x86 computer?

2 GB RAM

how much drive space should be available for each virtual machine on a system

20 GB

HTTPS port

443

SMB over TCP/IP port

445

What is the maximum amount of USB devices that can be daisy chained?

5

DNS server port

53

AFP

548

802.11g

54MBps 2.4GHz 150ft

How many characters are in a 256 bit WEP key?

58

802.11n

600MBps 2.4 & 5 GHz 230 feet

What type of OS should you install for best performance when you have enough RAM? 8 bit 16 bit 32 bit 64 bit

64 bit

What is the 6th best practice with Mac and Linux?

Antivirus/Anti-malware updates

What type of update ensures that the 3G and GSM information is updated?

Baseband

What type of update, updates GSM and 3G on phones?

Baseband update

You need to ensure that the GSM and 3G phone information for you android phone is updated. what type of update wold you perform?

Baseband update

Can be partitioned and formatted as a standalone drive.

Basic Disk

Where do today's computers store almost all motherboard configuration data? BIOS ROM CMOS RAM DIMM RAM Solid State Disk

CMOS RAM

User State Migration Tool

Command line tool that only works when a computer is a member of a Windows domain. Helps migrate user files and preferences between computers.

How should you configure the Task Scheduler service to ensure that the service starts?

Configure the service to log on with the local system account

A user is locally connected to a printer on his Windows Vista computer. The printer is disconnected from the computer and connected to the local network. You need to change the port for the printer on the user's Windows Vista computer. How could you change the port settings?

Control panel > Printer (hardware and software) > right click printer > properties > ports tab

What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete

Ctrl+Alt+Delete

If you enter a command and want to terminate its execution before it is finished, you can press __________ to do so.

Ctrl+Break

During the Windows 8.1 installation, what option must be selected in order to perform a clean install? -Custom: Install Windows only (advanced) -upgrade to Windows 8.1 -Clean Install (advanced) -Fresh Install (advanced)

Custom: Install Windows only (advanced)

What command allows for freeing up disk space by removing all system restore points except the most recent?

Disk cleanup

What is the 5th best practice with Mac and Linux?

Driver/Firmware updates

Can span more than one hard drive.

Dynamic Volumes

For a GPT hard drive, the bootable partition used to boot the OS and contains the boot manager program for the OS

EFI System Parition (ESP)

When troubleshooting a device or service that has failed to start, what utility may have information regarding the cause? Microsoft Management Console Event Viewer Performance Monitor Resource Monitor

Event Viewer

Where can a user find out more information about a hardware or network failure that occurred on that particular PC? -Event Viewer -Performance Information and Tools -Task Scheduler -Resource Monitor

Event Viewer

a Windows tool useful for troubleshooting hardware or network failures, OS error messages, failed services and more.

Event Viewer

What utilities can be accessed using the Computer Management window? (Choose all that apply). Task Manager Event Viewer Performance Monitor System Configuration

Event Viewer Performance Monitor

What can view a application log?

Event viewer

After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False

False

As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.

False

LILO is the most commonly installed boot loader by the Linux operating system

False

On a peer-to-peer network, authentication is the responsibility of the domain. True or False

False

The Windows shell is responsible for interacting with hardware. True or False

False

The price for Windows 7 is the same regardless of the edition and type of license you purchase. True or False

False

functions similar to File Explorer in Windows, used to find and access Mac's files and applications

Finder

What is a incorrect statement regarding android?

GPS requires the help of cell towers to obtain a location

What two methods are available for Windows to use to partition a drive? UEFI GPT EFT MBR

GPT MBR

What should be done after reassembling a laptop, but before installing the battery or AC adapter? (1pts) Remove the keyboard so that you can test proper voltage on the motherboard once the battery and/or AC adapter are reconnected. Gently shake the laptop to ensure nothing is loose inside of the case Press the power button to drain any electricity in the system Attack ESD strap alligator clip to a different grounding source

Gently shake the laptop to ensure nothing is loose inside of the case

Compatibity mode

Group of settings that can be applied to older drivers or applications that might cause them to work in Windows 7

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

Guests group

When a user logs into Windows, what registry key is created? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_USERS HKEY_CURRENT_USER

HKEY_CURRENT_USER

What registry key is considered to be the most important key, containing hardware, software, and security data? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_CLASSES_ROOT HKEY_USERS

HKEY_LOCAL_MACHINE

What dynamic link library handles low-level hardware details?

Hal.dll

Which of the following text error messages can indicate that BIOS could not find a hard drive? (Choose all that apply).

Hard drive not found No boot device found

7 pins, 15 pins

How many pins does a SATA internal data cable have? How many pins does a SATA power cable have?

What step involves reproducing the error?

Information gathering

While servicing a printer issue a user asks you to install a application, the application isn't listed in approved software list. What should you do?

Instruct user that they must obtain installation approval and a licensed copy of the software.

Registry settings and device drivers that were in effect when the computer was last logged into successfully

Last Known Good Configuration

What are the two different methods for partitioning hard drives? -Extended Partitioning Scheme (EPS) -Master Boot Record (MBR) -Standard Partition Layout (SPL) -GUID Partition Table (GPT)

Master Boot Record (MBR) GUID Partition Table (GPT)

Windows 10 features what new web browser, which is designed to replace Internet Explorer?

Microsoft Edge

Using what utility allows you to build your own customized console windows? -Microsoft Management Console -Microsoft Manager Console -Microsoft Management Components -Microsoft Manager Controls

Microsoft Management Console

Windows Preinstallation Environment/ Windows PE

Minimum operating system used to start the installation

What error messages indicate that the MBR sector is damaged, or the active partition is corrupt or missing? (Choose all that apply.)

Missing operating system Invalid partition table Error loading operating system

swiping up with three fingers on Mac OS X launches what

Mission Control

A__________ is a volume that can be accessed by way of a folder on another volume so that the folder has more available space.

Mounted Disk

What type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only

a method to control access to a folder or file and can apply to local users and network users

NTFS permissions

Which of the following common blue screen errors means the hard drive is most likely corrupted?

NTFS_FILE_SYSTEM

Home network

Network Discovery is turned on and you can join a homegroup.

Work Network

Network Discovery is turned on, you can join a domain, but you cannot join a homegroup

What diagnostic software is used by several manufacturers, and can run tests on keyboards, video, speakers, touchpad, optical drives, wireless LANs, motherboard, processor, ports, hard drive, and memory? (1pts) PC-Fixit PC-Doctor WinScan DiagNow

PC-Doctor

A self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices

POST (power-on self test)

What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system is launched? POST card ROM module BIOS memory CMOS firmware

POST card

What cellphone update is automatic?

PRI update

What updates cell towers near phone?

PRL update

What should you configure on an iOS device if you want your data erased after ten failed logon attempts?

Passcode Lock

Drive imaging or Disc Cloning

Process of copying an entire hard drive to another bootable media device.

What Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes? Applications Services Processes Performance

Processes

Within the Properties box of a service in the Services console, what is NOT a valid startup type for a service? Automatic (Delayed Start) Scheduled Manual Automatic

Scheduled

What is the 1st best practice with Mac and Linux?

Scheduled backups

What is the 2nd best practice with Mac and Linux?

Scheduled disk maintenance

what command below is used to test network connections by sending a request packet to a host

ping

_______________ creates restore points at regular intervals and just before you install software or hardware.

System Protection

What is the 3rd best practice with Mac and Linux?

System updates/App store

True

T or F: An upgrade from Windows Vista to 7 carries applications and settings forward.

True

T or F: The OEM version of Windows can only be installed on a new PC for resale.

False

T or F: The price for Windows 7 is the same regardless of the edition and license purchased.

What must your motherboard have to use BitLocker Encryption in Windows 7 which will ensure that your hard drive cannot be used in another computer? TPM chip CMOS RAM BIOS password Encrypted USB port

TPM chip

When removing screws while working on a laptop, what should be done with the screws? (1pts) They should be stored or labeled They should be disposed of They should be left inside the case of the laptop They should be painted to indicate where they go

They should be stored or labeled

If a ground strap is unavailable, what should be done to dissipate any ESD before working on a laptop? (1pts) Touch a non-painted metallic surface on the laptop Wash your hands Touch any part of the laptop Move around prior to touching the device

Touch a non-painted metallic surface on the laptop

A hard boot takes more time than a soft boot.

True

A root certificate is the original certificate issued by the CA. True or False

True

The OEM version of Windows 7 can only be installed on a new PC for resale. True or False

True

The default value of the security level in IE is Medium-high.

True

If you want to be able to power up a computer remotely, what feature should you use?

Wake-on LAN

The chkdsk command

What command-prompt command do you use to determine if a drive has bad sectors?

SD, SDHC

What two SD standards utilize the FAT file system?

DVD-RAM, BD-RE

What two optical disc drive standards allow for rewritable discs?

DVD-R DL, DVD+R DL

What two optical disc drive standards support writing discs with a total capacity of 8.5GB?

UDF

What type of file system is used by Blu-ray discs?

exFAT

What type of file system is used by SDXC memory cards?

Volume

When a partition is formatted with a file and assigned a letter drive it is called _______?

Which of the following statements regarding working inside a laptop computer is true? (1pts) When upgrading a laptop, you should use components that are the same brand as the laptop, or use only recommended components. If an internal component needs replacing, you should always replace the component rather than disable it. Repairing a laptop is always more cost effective than buying a new one. The LCD screen of a laptop is never considered to be a field replaceable unit.

When upgrading a laptop, you should use components that are the same brand as the laptop, or use only recommended components.

When is it okay to touch the inside of a computer that is turned on? (1pts) When using a multimeter to measure voltage output When a qualified electrician is present When disassembling the computer When reassembling the computer

When using a multimeter to measure voltage output

As you work at the command prompt, you can use ________ characters in a filename to say that the command applies to a group of files or to abbreviate a filename if you do not know the entire name.

Wild card

Programs and Features Window

Window listing the programs installed on a computer where you can uninstall, change, or repair the programs.

What Windows 7 64-bit version editions could be installed on a computer that has 16 GB of RAM? (Choose all that apply.) Windows 7 Professional Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

Windows 7 Professional Windows 7 Home Premium

What editions of Vista with service pack 2 of windows 7 could it upgrade to?

Windows 7 Ultimate and Home

What tool should be used when upgrading ensuring the components in a system is compatible when upgrading from Vista to 7?

Windows 7 Upgrade Advisor

On what operating systems is the snap function available?

Windows 7 and up

What versions of Windows 8.1 are valid in-place upgrade paths for a computer that has Windows 7 Starter edition on it? (Choose all that apply.) Windows 8.1 Windows 8.1 Pro Windows 8.1 Enterprise Windows 8.1 Ultimate

Windows 8.1 Windows 8.1 Pro

What operating systems support multilingual support?

Windows 8.1, 8, Ultimate, and Vista Ultimate

What Windows tool helps analyze security state of a organization?

Windows Baseline Security Analyzer

What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS?

Windows Boot Manager

In Windows 8/7/Vista, the program responsible for loading Windows.

Windows Boot Manager (BootMgr)

Which Windows tool monitors activity and alerts you if a running program appears to be malicious or damaging the system?

Windows Defender

a utility to copy user data and settings from one computer to another

Windows Easy Transfer

What should be used to find a computers base score?

Windows Experience Index

When a technician needs to start an image deployment, what version of Windows will be run on the target computer? Windows 7 Starter Windows 8 Starter Windows PE Windows XP

Windows PE

uses a flash drive or secure digital (SD) memory card to boost hard drive performance

Windows ReadyBoost

A lean operating system that can be used to troubleshoot problems when Windows refuses to start

Windows Recovery Environment (RE)

What Microsoft operating system first used UAC?

Windows Vista

What edition of windows vista can support 1GHZ and 2GB of RAM?

Windows Vista Ultimate and Business

Windows XP Mode

Windows XP environment installed in Windows 7 that can be used to support older applications.

Four

Windows can handle up to_____ partitions on a drive.

client/server

Windows domain is a type of ____/_____ netowrk

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS

a TPM chip on the motherboard

What is a rootkit?

a collection of programs that grants a hacker administrative access to a computer or network

What occurs if a application attempts to use a portion of memory that is already used or isn't valid?

a general protection fault (GPF)

What statement about an FRU is true? -they are not necessary for the computer's operation -all types can be easily disposed of in any trash can -it's easily repaired by a support technician -a support technician should know how to replace one

a support technician should know how to replace one

Whats the best way to ensure something has most updated drivers?

accept option to download drivers and new packages

What is a structured form of listening and responding to a speaker?

active listening

What informs the BIOS that a partition or volume is a valid system partition?

active parition

A red x is displayed on WiFi adapter what does this mean?

adapter is disabled

A computer is running slow and a 150 GB drive is only installed on the computer what should be done?

add identical and config for RAID-0

What is the requirements to have Windows XP mode on 7?

additional 1 GB RAM and 15 GB HDD space

Pointer movement is very erratic on a laptop what should be done?

adjust touchpad sensitivity

the folders that are shared by default on a network domain that administrator accounts can access

administrative shares

Whats step 2 in troubleshooting

analyze the problem

What does hand geometry do?

analyzes length and width of hand

used during an unattended installation

answer file

What steps can be taken to prevent ESD?

anti-static band and proper grounding

What should be done if you cannot understand a person's problem while they are explaining it?

ask for clarification

What should be done if asked to perform a task outside of job scope?

ask supervisor

Which type of communication assists you to prevent being taken advantage of by others?

assertive communication

Why type of communication creates a win-win situation for both parties?

assertive communication

What should be done before any changes are made to a system that is experiencing a problem?

back up data

contains a list of OS commands that are executed as a group

batch file

Which statement is NOT a good practice when working inside a computer case? (1pts) be sure to hold expansion cards by the edge connectors don't touch a microchip with a magnetized screwdriver remove loose jewelry don't touch the inside of a computer that is turned on

be sure to hold expansion cards by the edge connectors

A computer keeps getting bsod what is the first step to fix?

boot from last good config

What should be tried whenever a system is caught in an endless cycle of restarts?

boot in safe mode

If using a dual or multiboot configuration, what screen appears during the boot sequence? OS select BIOS screen boot loader menu Multi-Windows Login screen Secure Boot OS page

boot loader menu

What does a blue screen error mean on windows boot?

boot process failure

What file is required for users to be able to select which operating systems to load?

boot.ini

What command can be used to edit the boot.ini file?

bootcfg.exe

What replace NTLDR file?

bootmgr

What replaces NTLDR in Windows Vista?

bootmgr

What command can be used to scan for Windows installations not stored in the BCD?

bootrec /scanOS

What command can be used to repair a dual boot system?

bootsect

What type of attack uses drones to send spam email?

botnet attack

cable internet

broadband technology that uses cable TV lines and is always connected

If theirs a leak in the server room who should be called first?

building services

Which of the following is NOT true about Remote Desktop?

by default all users can access Remote Desktop

What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'

by default, accounts with a blank password cannot logon remotely

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list

chain of custody

What command is used to display the status of a disk in a current drive?

chkdsk

What command changes the log file size?

chkdsk /l[:size]

What command can be used to check for file system errors?

chkdsk /r

MAN

city or campus internet

In order to remove any partition or volume information from a selected disk, what diskpart command should be used?

clean

What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed? clean install dual boot in-place upgrade standard

clean install

What should be done in internet explorer when the error "SSL certificates are no longer valid"

clear SSL state in internet explorer

what keypress sequence is used to open the Force Quit window on a Mac

command + option + esc

What command can compare the contents of two files?

comp

What command can display or alter compression on a NTFS partition?

compact

What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM

computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM

What would case the following errors: Non-system disk or disk error Replace and strike key when ready

computer has a non-system boot-able disk inserted into floppy drive

Preboot eXecution Environment/ PXE

contained in the BIOS code on the motherboard. It searches for a server on the network to provide a bootable operating system.

Where should one go to change the format of the date?

control panel> clock, lang, and region> region and lang

what command can be used to copy and convert files, directories, partitions, and even entire DVDs or hard drives

dd

What command displays the help information for defrag?

defrag -?

What command should be used to scan only drive D:\ for defragments?

defrag D: -A

What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter

degausser

What windows utility helps diagnose hardware-related problems?

device manager

bridge

device that is between two segments of a network and manages the network traffic

What attack best describes one involve passwords and encryption?

dictionary attacks

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create? dual cross controlled selective

dual

If a game or desktop publishing app that relies heavily on graphics is not performing well or giving errors, what command can you run to view DirectX information? dxtshoot.exe gpudiag.exe dxdiag.exe video.exe

dxdiag.exe

what might be required to set up a virtual machine such that hardware is virtualized and presented to the VM, including such devices as a virtual processor, memory, motherboard, hard drive, optical drive, keyboard, mouse, monitor, and other components or peripherals

emulator

How to ensure probe requests arent sent by a laptop?

ensure connect when network not broadcasting is cleared

What is the first step when a fire starts?

evacuate the building

whats step 5 in troubleshooting

evaluate the results

What would be used to delete system logs?

event viewer

The Windows kernel includes what two main components? background services executive services HAL shell

executive services HAL

What is the fourth partition on a hard drive called?

extended partition

programs on Mac that launch at startup are called login items

false

the overall structure an OS uses to name, store, and organize files on a volume

file system

Programs and data that are stored on a motherboard are referred to by what term? firmware package blob instruction set

firmware

What would happen if a phone playing music was brought into a sauna but then stopped playing music soon after?

iPhone overheated

What command can be used to take full access of a file? takeown attrib perms icacls

icacls

permissions assigned by Windows that are attained from a parent object

inherited permissions

What should one install to protect computer from a power surge?

install a UPS

What should be done prior to upgrading to a windows 7 from vista?

install latest service pack

How to properly ensure that a computer receives a new ip address?

ipconfig /release ipconfig /renew

What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access

it is disabled by default

What does "plenum" rating tell about the cable?

it will not produce toxic gas when burnt

How would one protect cables in server room and avoid cables from cluttering floor?

keep cables organized off floor and away from walkways

what occurs when Linux encounters an error from which it cannot recover

kernel panic

What are two names for the database that holds digital signatures provided by OS manufacturers, such as Microsoft and Red Hat? key-exchange Key key-enrollment Key key-registration Key key-authority Key

key-exchange Key key-enrollment Key

WAN

large geographical wireless network

What are two main components of a high voltage probe?

large needle and gauge

What saves the registry on each login?

last known good configuration

a bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term

live CD

What does the D:\MYDOCS\FILECHK.* /S command do?

locates all files in MYDOCS with the name FILECHK

What type of partition cannot be the active one?

logical

A member has lost their phone it had remote wipe and passcode locks, what should be done?

login to iCloud and remote wipe the device

What is not a Windows 8 charm?

logoff

As a technician who frequently observes electrostatic discharge damage, you have become concerned about the presence of contributing factors in your work area. Which environmental condition is most likely to cause ESD?

low humidity

What most likely is to harm the data on a SATA hdd and backup tapes?

magnets

Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates

malware signatures

When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle

man-in-the-middle

What should be referred to whilst explaining the strengths with a technology?

manual

You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the ____ tool.

memory diagnostics

Which tool should be the first one to use when a blue screen error has occurred?

microsoft website

Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric

multifactor

What general-purpose tool can measure characteristics of electricity in a variety of devices? loopback plug POST card multimeter cable tester

multimeter

Whats the easiest security for mobile devices?

passcode locks

What is the 4th best practice with Mac and Linux?

patch mangement

What windows command line tool launches performance monitor?

perfmon

when using Mac OS X, what gesture can be used to show the Launchpad

pinch

What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep

press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer

Which of the following represents a method for accessing the BIOS setup program? -boot Windows and go to Control Panel -set a motherboard jumper and start the computer -press a key or combination of keys during the BIOS POST -boot to the BIOS setup floppy disk

press a key or combination of keys during the BIOS POST

When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?

private data for each user should be kept in their C:\Users folder

CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle

ransomware

What does the mstsc command do?

remotes into a computer

A computer boots as usual but the screen remains black what should be done?

replace monitor

Why would one use SFC?

repopulates the dllcache folder

If you want to be able to wear gloves while using a smart phone, which screen technology will work?

resistive touch screen

Whats the term for sharing cloud services with multiple subs?

resource pooling

What task can't be performed by using Task Manager? end a proces end process tree restart a process start a process

restart a process

What can fix a driver issue when last known good config doesnt work?

restart into safemode, perform driver rollback

A snapshot of the system settings and configuration is called a ____________.

restore point

Snapshots of the system and include windows system files that have changed.

restore points

How would a program be ran with higher permissions?

right-click and run as admin, right-click cmd> run as admin> enter command for program> right-click>properties>compat tab> run as admin

What statement about controlling access to folders and files is accurate?

rights are assigned to accounts

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm

rootkit

SOHO typically comes with many functions which can be:

router, switch, WAP, firewall, and Ftp server

Which statement is incorrect about routers?

routing occurs at OSI layer 4 (transport)

What kind of shoe sole should be in a technicians shoes?

rubber soles

What is the purpose of fsck command on linux?

runs a logical filesystem check

What command is used to check the directory structure in old versions of windows?

scandisk

What commands are used by the USMT software? (Choose all that apply.) imagecopy scanstate loadstate imagestate

scanstate loadstate

What SFC command scans all system files once when you restart?

sfc /scanonce

a method to control access to a shared folder and can be assigned to NTFS or FAT volumes

share permissions

the portion of an OS that relates to the user and to applications

shell

A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering

shoulder surfing

A user was hacked at a coffee shop what attack most likely happened?

shoulder surfing

What attack involves examining someones computer to steal info?

shoulder surfing

What should be done first if a exposed electric wire is found?

shutdown electricity

How does one send a encrypted email?

signing in with a encrypted signature

What cli command verifies all drivers are signed?

sigverif

LAN

small local area network

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM

smart card

What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows startup process?

spacebar

What should you do if you want to be able locate your laptop in the event of loss or theft and give it a command through the Internet to lock it or delete data? -set a BIOS No Access password -subscribe to LoJack for Laptops -enable a GPS module in the BIOS -install a high-power WiFi card

subscribe to LoJack for Laptops

What two different passwords can be set to lock down a computer from unauthorized access? supervisor password e-mail password screen saver password user password

supervisor password user password

What does ctl+alt+t open on linux?

terminal

whats step 3 in troubleshooting

test theory

What are two different ways by which a laptop could utilize the cellular network connection of a mobile device? proxy store and forward tethering hotspot

tethering hotspot

What type of files can the edit.com command edit?

text

What does "a device in system.ini cannot be found" mean?

there are issues with some settings in system.ini configuration file

what statement regarding Type 1 hypervisors is accurate

they are called bare-metal hypervisors

a computer that has an operating system, but has little computing power and might only need to support a browser used to communicate with the server

thin client

Whats a IV attack?

using a initialization vector to crack a WEP secret key

a command that provides encryption options and hard link management within USMT

usmtutils

What should you inform a user about the difference between VGA and DVI?

vga and dvi travel at different speeds vga are analog whilst dvi carry both digital and analog

a text editor that works in command mode or insert mode

vi editor

What is it called when software is used to simulate the hardware of a physical computer? dual boot Windows XP mode virtual machine compatibility mode

virtual machine

software that simulates the hardware of a physical computer

virtual machine

when one physical machine hosts multiple activities that are normally done on multiple machines virtualization

virtualization

What is the name for a partition that has been formatted and assigned a drive letter? partition root volume container

volume

What message displays when one is installing a unsigned driver?

warn

What precaution should be taken in a era that might have ESD?

wear rubber-soled shoes

Product Key

what important info is needed when installing an OEM version of Windows 7

In biometrics, what is a false negative?

when someone is suppose to have access but is erroneously denied

Whats the requirement for a computer to be a member of a windows 7 homegroup?

windows 7

What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI?

winresume.efi winresume.exe

What does ifconfig show?

wired interfaces

WLAN

wireless LAN

What command can be issued within Windows RE to enable networking?

wpeinit


Ensembles d'études connexes

AP Review Key Concepts - Period 2 A (1648-1815)

View Set

From Monalisa to Modernism - Artworks

View Set

Organizational Behavior: Chapter 5

View Set

Hypothesis Testing Assignment and Quiz 90%

View Set

Y3 Ethics, Law, PPD and Clin Comms

View Set

Chapter 3: medication administration & nursing process

View Set

Life: (#1, 60%) — Policy riders, Provisions, Options, and Exclusions

View Set

Security+ SY0-601: Network Security Design & Implementation

View Set