220-902 Crucial Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

3) Which component should be properly recycled rather than thrown away?

A) RAM B) Toner Cartridges C) Surge Compressor D) Thermal paste B) Toner Cartridges

3) What is the name of a system component designed for monitoring security and maintenance related items in Windows 7/8/8.1?

A) Action Center B) Windows Update C) Windows Security Center D) Security and Maintenance D) Security and Maintenance

1) A user has called the help desk where you work stating they cannot find a file on their PC. After asking a few basic questions you have determined they are using Mac OSX. Which standard OSX application can help them locate their file?

A) Alfred B) Searcher C) Spotlight D) Find my Mac C) Spotlight

15) What should be done first prior to replacing an IDE hard disk drive in a workstation?

A) Power off the computer B) Open the case C) Check the BIOS settings D) Change the jumpers on the old and new HDD A) Power off the computer

9) A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

A) "Are you able to sign on?" B) "Does the PC turn on?" C) "Can you get to the Internet?" D) "Do you have a laptop or desktop?" B) "Does the PC turn on?"

20) What is the maximum amount of partitions for a basic disk using GUID Partition Table (GPT) partition style with a Windows operating system?

A) 4 B) 16 C) 64 D) 128 D) 128

14) An unauthorized user observing system security procedures is known as:

A) A Worm B) Phishing C) Shoulder Surfing D) Spyware C) Shoulder Surfing

16) Which DISKPART.EXE command can be used for managing the size of a disk volume?

A) ADD B) CONVERT C) SHRINK D) COMPACT C) SHRINK

13) While using Windows Vista, what utility would you use to monitor and change security settings for internet explorer?

A) Action Center B) Windows Update C) Windows Security Center D) Security and Maintenance C) Windows Security Center

1) Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?

A) All file permissions must be reassigned B) All of the file permissions are lost C) The file owner is preserved D) The file name becomes case insensitive B) All of the file permissions are lost

8) Your employer is concerned about zero-day attacks to obtain their intellectual property, what security feature helps mitigate such an attack.

A) Anti-virus B) Windows Update C) Strong BIOS/UEFI Passwords D) Firewalls D) Firewalls

11) Which of the Windows Task Manager tabs in Windows 8 includes the information about the network resources usage under Networking tab in previous releases of the Microsoft OS?

A) Applications B) Processes C) Performance D) Services C) Performance

11) You are ordering external HDDs for use in your office, they are likely to be used for storing sensitive information such as PII and intellectual property. What is a good way to ensure the confidentiality of these external HDDs?

A) BIOS/UEFI Password B) Full disk encryption C) Ensure NTFS is used D) Ensure EXT3 is used B) Full disk encryption

5) What type of policy would allow Stacy to use her iPad during meetings for email, taking notes, and accessing the company's intranet?

A) BYOD B) Man-in-the-middle (MITM) C) Embedded system D) ICloud A) BYOD

11) You are a desktop technician for a graphic design company. The company issues Apple computers running OSX 10.9 to all employees. Recently you have been asked to find a solution that will allow employees to use Windows applications on their computers. Which of the following is a potential solution?

A) Boot Camp B) VSphere C) Disk Util D) IBoot A) Boot Camp

4) A malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?

A) Brute Force Attack B) Dictionary Attack C) Zero Day Attack D) Spoofing B) Dictionary Attack

19) What is the file system would typically be designed to be used for optical media?

A) CDFS B) FAT32 C) NTFS D) ExFAT A) CDFS

10) A framework providing access to a collection of tools that can be used by administrators and advanced users to manage networks, computers, services, and other system components in Windows is known as:

A) CMD B) MSCONFIG C) MMC D) MSTSC C) MMC

2) When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file?

A) Cat B) Vi C) Ifconfig D) Notepad B) Vi

14) Which of the following technologies allows a PC to boot an operating system from a separate network location?

A) PXE B) Serial (Network Cable) C) POE D) SATA A) PXE

9) Your employer has recently began investigating an employee for using a computer to host and share illegal materials. You have been asked to keep track of the computer's hard drive until it is turned over to the proper authorities. What term best defines this situation?

A) Chain of Custody B) Material Supervision C) Digital Provenance D) Data Possession Control (DPC) A) Chain of Custody

1) A user has contacted you with a computer problem and cannot provide much information on what happened. The user seems like this may be their first time using a computer. Your first action in responding to the issue should be:

A) Check the Event Viewer. B) Observe the user's actions while using the PC. C) Restart the PC in safe mode and tell the user to report if the issue repeats. D) Fall apart and cry. A) Check the Event Viewer.

19) You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue?

A) Check the networks firewall for unauthorized entries B) Reinstall the user's email client C) Change the user's account password D) Install a more expensive spam filter C) Change the user's account password

1) While working as a desktop administrator you frequently install the same image of Windows 7 on employee workstations and are careful to always select the same options. Which tool can help automate this process?

A) Clean install B) Unattended install C) MSCONFIG Startup D) General Folder options B) Unattended install

2) A user is attempting to access a business resource through Internet Explorer and are unable to load the page correctly. The page is loading oddly with assets in places from previous versions. You have checked with other users of the resource and they are not experiencing an issue. You should:

A) Clear the browser cache. B) Report it as a bug to the developer. C) Clear browser cookies. D) Update the browser. A) Clear the browser cache.

4) Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system?

A) Cron B) Service C) Task scheduler D) Daemon A) Cron

5) An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue?

A) DNS B) Firewall C) Wireless connectivity D) Proxy server C) Wireless connectivity

16) Which subject can be found in an MSDS?

A) DRM & Licensing B) Patching & OS Updates C) Health & Hazard Information D) Security best practices C) Health & Hazard Information

2) An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?

A) Disable DHCP B) Change the channel C) Enable MAC filtering D) Disable SSID broadcast C) Enable MAC filtering

12) You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change?

A) Display Settings > Resolution B) Display Settings > Color depth C) Folder Options > View options D) System > Display Size A) Display Settings > Resolution

14) What is step 3 in the trouble shooting theory?

A) Document findings B) Verify full functionality C) Test the theory to determine the cause D) Consider corporate policies C) Test the theory to determine the cause

9) An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?

A) Domain B) Ad-hoc C) Workgroup D) Token ring A) Domain

18) A user calls and explains that they were visiting a website and received a pop-up on their computer alerting about a virus infection. The pop-up included a alarm sound and flashing colors. The alert prompted them to download an anti-virus tool to clean their computer. What should you recommend?

A) Download and scan the computer with the anti-virus tool B) Carefully close the browser and do your own anti-malware scan C) Boot to Safe Mode and remove the virus D) Check the system recovery options B) Carefully close the browser and do your own anti-malware scan

10) A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

A) Enable PATA in the BIOS B) Select load driver C) Press F8 when prompted D) Hit the refresh button to force a re-detect B) Select load driver

12) Mike has brought his personal laptop running Windows 7 from home for use on the office network, which utilizes Active Directory. He is unable to access company resources, to include the sharedrive, intranet (SharePoint), and printer. He states "these are automatic for my work machine and Sarah's personal laptop." What is something you can do that would get Mike access to these resources?

A) Ensure that Mike's computer is in the company Workgroup B) This is against the company's BYOD policy, notify Mike's manager C) Join Mike's computer to the domain D) Run Windows Update on Mike's computer C) Join Mike's computer to the domain

11) You are installing Windows Server 2008 R2 onto a new company file server that uses a RAID card. You have verified that all cabling is correctly seated, but Windows is not recognizing any storage mediums for installation. Which of the following will most likely correct the issue?

A) Ensure the Windows server supports PXE Boot/Installation B) Wait a few moments, then press refresh to force Windows to detect drives C) Enable PATA in the BIOS D) Use the correct RAID driver D) Use the correct RAID driver

2) You are a desktop technician for a public school district. Your supervisor has asked you to write a script that will configure the wireless adapters on student's Linux based laptops to connect only to authorized access point. Assuming the access point's MAC Address is 00:0D:9D:C6:38:2D, which command will help you achieve this?

A) Ethtools -lock 00:0D:9D:C6:38:2D B) Ifconfig eth0:0 00:0D:9D:C6:38:2D C) Iptables /netfilter auth-only 00:0D:9D:C6:38:2D D) Iwconfig ap 00:0D:9D:C6:38:2D D) Iwconfig ap 00:0D:9D:C6:38:2D

9) What is the name of a GUI-based file and folder manager application in Mac OSX operating systems?

A) Explorer B) Gnome C) Nautilus D) Finder D) Finder

8) Which of the following Windows commands can identify and repair corrupted information and other hard drive issues?

A) FIXDSK B) DSKREP C) CHKDSK D) None of the above C) CHKDSK

14) A Microsoft Windows system utility designed to improve file access speed by consolidating data stored on a disk or drive is called

A) FORMAT B) DEFRAG C) CHKDSK D) DISKPART B) DEFRAG

9) Social engineering makes use primarily of which of the following techniques, to bypass common corporate security barriers?

A) Grayware installation B) Worm transmission C) Human interaction D) Malware installation C) Human interaction

19) Stan, the new HR manager, wants everyone in his department to have access to create and delete accounts to streamline the process for getting new hires setup in the system. Why is this not a good idea?

A) HR employees are not usually on the Access Control List (ACL) B) This could allow HR employees to by-pass privacy filters, though it isn't that big of a threat since they are HR C) This could enable tailgating D) This does not keep with the principle of least privilege D) This does not keep with the principle of least privilege

1) Determine which of these options is a technology used by CPU's to segregate blocks of memory for exclusive use by an application:

A) Harvard Architecture B) NXBit C) PXE D) Ivy Bridge B) NXBit

5) When is it acceptable to a IT business to make copies of customer's confidential data?

A) If the on-site tech determines it necessary B) It is never acceptable to copy customer data C) If the content is public information D) With the customer's permission, for back up purposes D) With the customer's permission, for back up purposes

12) After installing Windows 10 on a Laptop PC alongside an existing Red Hat Linux installation you receive a message stating that the GRUB file is missing when you try to boot the PC. Which of the following is the best option?

A) Ignore the error and boot into Windows 10 for the first time B) Rebuild the GRUB using a Red Hat Disc C) Upgrade to GRUB for Windows to allow both Windows and Linux to operate D) Reinstall Windows 10, selecting allow multiboot under advanced installation options B) Rebuild the GRUB using a Red Hat Disc

3) Your surpervisor asks you to come up with ideas for increasing the physical security in a computer lab used for sensitive projects, which of the following would NOT be an acceptable suggestion?

A) Installing a cypher lock on the door B) Using data encryption software such as BitLocker C) Setting up a video camera to monitor the entrance/exit to the lab D) Requiring a smart card to access the systems B) Using data encryption software such as BitLocker

12) What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

A) LoJack B) Encrypting File System (EFS) C) New Technology File System (NTFS) D) BitLocker D) BitLocker

15) When you run the CHKDSK utility with the /F switch, which of the following will occur?

A) Locates errors B) Fixes errors on the disk C) Displays cleanup messages D) Displays the full path and name of every file on the disk B) Fixes errors on the disk

18) Which Windows tool can prevent programs from automatically opening upon start up on the Windows 7 Operating System?

A) MSCONFIG B) CHKDSK C) DXDIAG D) DEVMGMT.MSC A) MSCONFIG

11) You are having trouble with several drivers on your system and want to uninstall them, but can't do it while Windows 8 is running normally. What tool will allow you to boot into Safe Mode?

A) MSCONFIG B) GRUB C) REGEDIT D) BIOS/UEFI A) MSCONFIG

17) The ability to replace computer system components without causing interruption or needing to restart the system is known as:

A) Multitasking B) Hardware acceleration C) Cold plugging D) Hot swapping D) Hot swapping

8) Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

A) NSLOOKUP B) NET C) NBTSTAT D) NETSTAT B) NET

13) You are formatting a new USB drive to be used between several systems running different operating systems (Windows, OSX, Linux). What is the best format to use for the USB drive?

A) NTFS B) HFS+ C) FAT32 D) AES-128 C) FAT32

6) Which of the following Windows command line tools will provide a computer's network configuration information?

A) Netstat B) Ipconfig C) Ping D) Tracert B) Ipconfig

17) A technician is accessing a Windows PC via SSH. Which command can the technician use to create a new directory on the PC?

A) New B) PUSHD C) MD D) CD C) MD

7) You show up to work and there is a powered-on laptop on your desk, you co-worker instructs you to make a backup of the user files on the system since the system has been having problems booting. During the process you discover child pornography on the machine, what do you immediately do?

A) Notify law enforcement B) Make a copy of the entire drive for Law Enforcement C) Alert your manager D) Power down the machine by removing the battery/power source A) Notify law enforcement

6) In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the local computer is labeled as what?

A) Offline B) Foreign C) Disconnected D) Online B) Foreign

14) Which of these tools provides a a solution that allows a user to have their calendar on both their smart phone, desktop, and be accessible through a web portal (such as outlook web access) all in real time?

A) POP3 B) Tethering C) Cloud synchronization D) VPN C) Cloud synchronization

10) Which Windows 7 tool will allow a system administrator to change the default install folder for applications?

A) REGSRV32 B) REGEDIT C) REGEX D) MSCONFIG B) REGEDIT

10) Recently the company you work for began investigating the possibility of replacing their payroll system with a cloud based service provided by a third party company. Which type of service is this?

A) RaaS B) PaaS C) IaaS D) SaaS D) SaaS

8) A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform next?

A) Re-establish a new theory or escalate B) Establish a plan of action to resolve the problem C) Document findings, actions, and outcomes D) Implement preventative measures A) Re-establish a new theory or escalate

20) You recently connected a new Windows 8 machine to your company's network with Active Directory, but it is not displaying the proper company logon screen, legal banner, or wall paper. What tool is best suited for correcting this problem.

A) Regedit B) Msconfig C) Gpupdate D) Chkdsk C) Gpupdate

16) You need to download and install a package using the apt-get command on an Ubuntu environment. After running the command you receive an error stating you do not have permissions to perform this action. What should you do next?

A) Right click the terminal and select Run as Administrator B) Prepend sudo to your command C) Fast swap to root D) Switch to the administrative user account B) Prepend sudo to your command

13) Which of the following security threats is BEST mitigated through proper user training?

A) Rootkits B) A Worm C) Social Engineering D) Browser Adware C) Social Engineering

17) You are passed a trouble ticket about an issue involving a Windows 7 system that should allow remote connections. The previous tech said the RDP service is not set to start automatically. How do you fix this?

A) Run "DXDIAG" to enable remote connections through Direct Connect B) Run "SERVICES.MSC" and change the Startup Type for each Remote Desktop service to "Auto" C) Open port 3389 in Windows Firewall D) Add the RDP gateway to the proper adapter under Network Connections in the Control Panel B) Run "SERVICES.MSC" and change the Startup Type for each Remote Desktop service to "Auto"

4) In a (Windows) command prompt you type "cd C:\Users\msmith", the output is "Access is denied." How can you overcome this issue

A) Run "chkdsk" to see if there are issues with the file system B) Use "chmod a+r C:\Users\msmith" to give all users read rights to the folder C) Use the "dir" command instead of cd to force access to the directory D) Run cmd.exe as an Administrator D) Run cmd.exe as an Administrator

3) Amanda, a user, has a laptop running Windows 7 Ultimate. She has asked the IT Department to update her laptop to run Windows 10 Pro. Which of the following should be done first?

A) Run the Windows 10 Update Software B) Purchase a valid Windows 10 Pro License C) Reformat the laptop with NTFS10 D) Verify the laptop can support Windows 10 Pro requirements D) Verify the laptop can support Windows 10 Pro requirements

7) Choose the option that is a command-line command that can be used to copy one or more files from one location to another.

A) SFC B) COPY C) MOVE D) PUSHD B) COPY

20) Which of the following terms describes a folder's permissions defaulting to match the permissions of it's parent's folder?

A) SSO B) Inheritance C) Permission Propagation D) Provisioning B) Inheritance

5) Which of the following will allow a Windows OS to boot with only the essentials like basic drivers, required programs and default settings?

A) Safe Mode B) Standby Mode C) System Restore Mode D) Guest Mode A) Safe Mode

7) You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again?

A) Setup safe mode on his computer B) Change his file permissions C) Enforce a short password expiration D) Provide relevant user training D) Provide relevant user training

1) The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

A) Shredding B) Phishing C) Spamming D) Tailgaiting D) Tailgaiting

17) Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM?

A) Sleep B) Hibernation C) Green D) Power saver A) Sleep

7) Of which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?

A) Sleep B) Wake on Lan C) Hibernation D) Stand By C) Hibernation

10) Your employer wants you to recommend a cloud service that will allow the IT department to deploy web applications without having to configure physical equipment or operating systems. What type of service is he talking about?

A) Software as a Service (SaaS) B) Platform as a Service (PaaS) C) Infrastructure as a Service (IaaS) D) ICloud B) Platform as a Service (PaaS)

7) Which of the following is the best definition for open source software?

A) Software whose code is not available B) Software whose code is available to the public C) Software whose code is certified by a third party reviewer D) None of the above B) Software whose code is available to the public

19) What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis?

A) Standard format B) Overwrite C) DEFRAG D) Disk recovery B) Overwrite

18) A user calls you and asks to reset his password, you confirm that it is actually the user on the phone, and he says his username is bobsmith, you are in a Linux environment. What is the appropriate command for resetting his password?

A) Sudo passwd bobsmith B) Chown bobsmith C) Su bobsmith D) Sudo pwd bobsmith [password] A) Sudo passwd bobsmith

10) You have been instructed to configure a database server running Windows Server 2008 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this?

A) System Configuration B) Task Scheduler C) Task Manager D) Performance Monitor D) Performance Monitor

6) Which of the following should be regularly performed to prevent data loss in the event of data corruption or drive failure?

A) System Restore B) Scheduled Backups C) Factory Reset D) Memory Diagnostics B) Scheduled Backups

2) Which of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?

A) TASKKILL B) SHUTDOWN C) DEL D) ERASE A) TASKKILL

6) What tool can be used to check if anyone else is logged into a Windows-based computer?

A) Task Manager B) Type "who" into the CLI/command prompt C) MSINFO32 D) Local Users and Group A) Task Manager

8) A system utility available in the Windows operating system that allows to roll back system files and settings to an earlier point in time is known as:

A) Task Manager B) Windows Easy Transfer C) Computer Management D) System Restore D) System Restore

8) You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources?

A) Task manager B) Services C) MSCONFIG D) System Monitor D) System Monitor

15) You have just configured permissions for a set of folders on an NTFS disk, the folders also have another set of share permissions. When a user connects to one of these folders through a network share, which of the following is true?

A) The most restrictive permissions from both NTFS and Share will apply B) The least restrictive permissions from both NTFS and Share will apply C) Only Share permissions will apply when accessing through a share folder D) Only NTFS permissions will apply when accessing through a shared NTFS folder A) The most restrictive permissions from both NTFS and Share will apply

1) Which tab in the Windows System Configuration utility contains the Diagnostic startup option?

A) Tools B) General C) Services D) Startup B) General

9) The Security tab in Microsoft Internet Explorer allows the user to impose restrictions on web content allowed in the IE web browser.

A) True B) False A) True

2) Windows Memory Diagnostic Tool cannot be run inside Windows and requires computer restart (the utility is launched during reboot before loading the operating system).

A) True B) False B) False

20) You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

A) UAC B) Sudo C) Windows Defender D) NTFS A) UAC

4) An operating system installation that saves all personal system settings, file locations, and applications from the older OS version is referred to as:

A) Upgrade B) Forced Installation C) Image deployment D) Clean install A) Upgrade

3) A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?

A) Users and Groups B) Local Security Policy C) Performance Monitor D) MSCONFIG B) Local Security Policy

16) You have just installed several updates for a Windows 7 system, prior to reaching the login screen the system immediately reboots. How would you try to access the system via its installed OS?

A) Utilize a live-boot CD/USB B) Boot into DEFRAG mode to clean up fragments of the outdated OS C) Press F8 at startup and try booting into Safe Mode D) Check to ensure that the boot priorities are set in the BIOS. C) Press F8 at startup and try booting into Safe Mode

13) Employee workstations are configured to only boot from the internal disk. You are tasked with verifying that this security configuration cannot be changed. What option will help ensure the default boot device cannot be changed?

A) Utilize data encryption B) Setup a BIOS/UEFI password C) Disable admin accounts D) Only allow software from trusted sources B) Setup a BIOS/UEFI password

7) Which of the following is a command line tool that will translate between a domain name and an IP Address?

A) VERIFY B) IPCONFIG C) TRACERT D) NSLOOKUP D) NSLOOKUP

4) Which of the following passwords is the MOST secure according to industry best practices?

A) VeryStrongPassword B) SimpleAnswer1234 C) E@sy2Rememb3r D) Thisisthecorrectanswer1 C) E@sy2Rememb3r

15) Which term refers to a logically separate portion of a single physical hard drive?

A) Virtual Volume B) Partition C) Virtual Drive D) Stateful Drive B) Partition

18) An online Microsoft software distribution platform for games and apps is known as

A) Windows Store B) Microsoft Store C) App Store D) Windows Marketplace B) Microsoft Store

5) What version of Microsoft Windows Vista does not have the Windows Aero as a default?

A) Windows Vista Home Basic B) Windows Vista Home Premium C) Windows Vista Business D) Windows Vista Enterprise A) Windows Vista Home Basic

12) Which of the following is true about the difference between a worm and a virus?

A) Worms are written into assembly while viruses are written with scripting languages. B) Viruses hide in the boot record while worms hide within the file system. C) Worms can self propagate without attaching themselves to a host program while a virus cannot. D) Viruses disable the antivirus update service while worms kill the antivirus process. C) Worms can self propagate without attaching themselves to a host program while a virus cannot.

4) Which of the following is the default package manager for the Ubuntu Linux distribution?

A) Yum B) Apt C) Wget D) Gzip B) Apt


संबंधित स्टडी सेट्स

Business Data Communications Quizzes

View Set

FEDERAL REGULATION OF MEDICATION

View Set

Lab 34 lab book reading quiz:Cleaning Up a Hazardous Drug Spill

View Set

Chapter 1 Anatomy and Physiology

View Set