A+ 1002
Thomas has been given a company iPad that will be used for storing private data and photos of clients. He needs to protect the integrity of the data on this device. What should he do? (Choose two.) A. Turn on Find My iPhone in Settings. B. Turn off Siri C. Turn on Touch ID and Passcode. D. Enable WPA 2
Turn on Find My iPhone in Settings. Turn on Touch ID and Passcode.
You'd like to upgrade your computer from Windows 7 to Windows 8.1. Which of the following utilities can test your computer for its upgrade compatibility to this new operating system version? A. Windows Upgrade Wizard B. Upgrade Evaluation Tool C. Upgrade Assistant D. System Upgrade Recommendation E. Windows Upgrader
Upgrade Assistant
Which switch of the Robocopy command will copy subdirectories but skip empty ones? A. DCOPY: T B./S C./B D./E
/E
Which of these would be an example of an APIPA address? A. 192.168.10.10 B. 169.254.192.168 C. 172.20.169.254 D. 10.77.2.22 E. 127.0.0.1
169.254.192.168
What is the minimum memory requirement for the 64-bit version of Windows 8.1 Pro? A. 1 GB B. 2 GB C. 4 GB D. 8 GB E. 16 GB
2 GB
Which of the following is a common refresh rate for laptop computers?
60Hz
Which of these Windows 7 functions contain a consolidated view of alerts, an overview of OS features, and a color coded status display? A. Action Center B. Event Viewer C. Security Center D. Device Manager
A. Action Center
Which of the following features are included with all editions of Windows 8.1? A. Integrated anti-virus and anti-malware B. Support for BitLocker C. Group Policy support D. Support for joining Windows Domains E. Integrated EFS file encryption
Integrated anti-virus and anti-malware
Which of these commands would remove a directory called \FILES ? A. ED \FILES B. RD \FILES C. FORMAT \FILES D. MD \FILES E. ?\FILES
RD \FILES
What should you expect when dealing with coaxial cable? A. RS-232 B. RG-59 C. RJ-45 D. RJ-11
RG-59
Which of the following is the best solution for repairing a hard drive when a computer displays an "NTLDR is missing error" upon booting? A. Recovery Console with the bootcfg /rebuild command B. Recovery Console with the fixboot command C. Recovery Console with the chkdsk command D. Recovery Console with the fixmbr command
Recovery Console with the fixboot command
Before donating an unwanted Windows 8.1 computer, it's a good idea to perform a: A. Restore B. Reset C. Refresh D. Recovery
Reset
Which of these programs would be the best choice for mirroring all of the files in a directory tree? A. copy B. robocopy C. sfc D. xcopy
Robocopy (robust copy) is a very functional file copy utility for Windows
What is the recommended way to "defragment" SSDs? A.Manually rearrange files on the disk B.Run a traditional disk defragmenter C.Run TRIM commands D.Benchmark the disk's performance
Run TRIM commands
Which of the following would be the best way to control applications that run exclusively in the background? A. REGEDIT B. SERVICES.MSC C. MSTSC D. DXDIAG E. MSINFO32
SERVICES.MSC
After Gerald upgraded his OS to Windows 7 Professional, some of his programs from Windows XP won't load properly. What should Gerald do to remediate the issue? A. Set up Windows XP Mode. B. Restore a system restore point. C. Re-install the programs. D. Roll back the drivers.
Set up Windows XP Mode.
Which of the following can be used to associate file extensions with an application? A. attrib.exe B. assoc.exe C. Shift+right-click and choose Open With D. Tools@@→ Folder Options@@→Associate tab
Shift+right-click and choose Open With
Mike receives a phone call from a man named Gregory claiming to be from tech support. Gregory knows Mike's name and that he has Windows 10 Enterprise installed on his workstation. Gregory instructs Mike to open Event Viewer and look at some event log entries to highlight the effects of a virus on Mike's workstation. Gregory also asks Mike for his login ID and password so that he can fix the virus situation on Mike's workstation. What type of security threat is this an example of?
Social engineering
Which option below is characterized as using personalized details in an attempt at obtaining information? A. Whaling B. Spear phishing C. Spoofing D. Impersonation
Spear phishing
Brian is keeps getting an error when his Windows 7 PC boots. When you troubleshoot the problem, you discover that the PC is attempting to start a program that has been removed from the computer. You decide to prevent the error from occurring by disabling the application in the System Configuration utility Which tab should you access?
Startup
The _____________ Windows features allows you to group separate physical disk drives together and manage them as a pool. A.Disk Management B.Dynamic Disk C.Storage Spaces D.Diskpart
Storage Spaces
Charles is interested in observing the real-time global memory usage of his PC. What should he use? A. Event Log B. Device Manager C. Performance Monitor D. Task Manager
Task Manager
You are working with a folder on a drive that has used Windows NTFS compression. You notice that when you move files to other folders, the files do not always remain compressed. What is the most likely cause of this issue? A. The destination folder does not have compressions set B. The copy process will always decompress files C. The destination folder is on a different drive and does not have compression set D. Right-click the printer in the Printers folder and choose the Sharing command
The destination folder is on a different drive and does not have compression set
Recovery Console command to scan for OS installations and rebuild info into boot.ini file.
bootcfg /rebuild
Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection? A. DSL B. ISDN C. Cable D. FIber
c. Cable
Which command should be used to change directory in Ubuntu? A. cd B. grep C. ls D. ps
cd
Recovery Console command to check integrity of the disk.
chkdsk
You'd like to check your hard drive for problems. Which chkdsk option will examine every sector of the disk and attempt to correct any bad sectors? A. chkdsk /r B. chkdsk /e C. chkdsk /f D. chkdsk /s
chkdsk /r
Check your hard drive for problems with the file system and for bad sectors.
chkdsk.exe Check Disk
Which command should be used to change permissions on a file in Ubuntu? A. chmod B. su/sudo C. ifconfig/iwconfig D. chown
chmod
Which command should be used to change ownership of a file in Ubuntu? A. chmod B. su/sudo C. ifconfig/iwconfig D. chown
chown
Which command should be used to copy files and directories in Ubuntu? A.dd B. mv C. ls D. cp
cp
Which command should be used to create a hard drive image in Ubuntu? A.dd B. mv C. ls D. cp
dd
Used from the command line, or graphically through the Microsoft Management Console (MMC) and dfrg.msc.
defrag.exe Disk Defragmenter
Logging component of the operating system; the central location for all logging activity.
eventvwr.msc Event Viewer
Recovery Console command to rewrite the master boot record of the hard drive.
fixmbr
Evaluate the resultant policy results and list all GPOs which apply to the current computer or user.
gpresult.exe Group Policy Results
Re-process Active Directory (AD) Group Policy Objects (GPO) on the computer.
gpupdate.exe Group Policy Update
Which command should be used to find a pattern of text within a file or group of files in Ubuntu? A. cd B. grep C. ls D. ps
grep
Display basic TCP/IP configuration, such as IP address, subnet mask, and default gateway.
ipconfig
Display TCP/IP settings, including your Media Access Control (MAC) address, domain name system (DNS) server, and lease information.
ipconfig /all
Which command should be used to list file and directory contents in Ubuntu? A.dd B. mv C. ls D. cp
ls
When working with Windows Disk Management, you see that one of your disks is identified as "resynching." What is the most likely reason for this status type? A. A drive in a RAID 1 array has failed B. A replacement drive was added to a RAID 5 array C. A drive in a RAID 5 array has failed D. A replacement drive was added to a RAID 1 array
A replacement drive was added to a RAID 1 array
You've just updated a device driver, but you've run into a problem with the new version of the driver. Which Windows feature would be the best choice for reverting to the previous configuration? A. System Restore B. Volume Shadow Copy C. Windows Backup D. Compatibility Mode E. Windows Easy Transfer
A. System Restore
Which of these would be a valid upgrade path from Windows 7 Home Premium? Pick two. A. Windows 7 Professional B. Windows 7 Home Basic C. Windows 7 Starter D. Windows 7 Enterprise E. Windows 7 Ultimate
A. Windows 7 Professional and E. Windows 7 Ultimate
Which of the following would best describe PowerShell? A. Manage the power usage of the computer and monitor B. Automate system administration function C. Monitor the power consumption of your computer D. View your home or business power usage E. Display memory and CPU utilization on the Windows desktop
Automate system administration function
Which of these commands would you use to delete a folder from your hard drive? A. CD B. RD C. MD D. FD
B. RD
Which option below is considered 2FA? A. Username, password, and PIN B. RSA token and Password C. ID card and Key D. All of the above
B. RSA token and Password
Eric has called the help desk to report a slow running workstation. A desktop support technician is sent out to investigate. The technician performs a reboot of the thick client and receives a S.M.A.R.T. error message. Which action below should the technician perform FIRST? A. Backup the hard drive B. Run diskpart C. Run chkdsk D. Reformat the hard drive
Backup the hard drive
Which of the following would you not expect to find in the Windows 8.1 Charm bar? A. Search B. Share C. Logout D. Devices E. Settings F. Start
C. Logout
Which of these would be a common function from the Computer Management console? A. Restore the master boot record B. Change a local user's password C. Modify the BIOS device boot sequence D. Add a Windows Firewall rule E. Update the Windows operating system file
Change a local user's password
You are seeing streaks of toner across your papers when you are printing things using your office's laser printer. What is the MOST likely cause of this problem? A. Change the feed rate of the paper B. Clean the printer's transfer roller C. Increase the temperature of the fuser element D. Replace the toner cartridge in the printer
Clean the printer's transfer roller
Which of these applications would be the best choice to provide device COM+ management, access to the Event Viewer, and management of Windows Services? A. Computer Management B. Data Sources C. Component Services D. System Configuration
Component Services
Which of these utilities would be the best choice for managing COM+ apps? A. Component Services B. Computer Management C. Command Prompt D. Computer Registry
Component Services (The Windows Component Services utility is designed to help you support the distributed Component Object Model applications. In the Component Services utility, you'll find Component Service configurations, integrated Event Viewer, and access to Windows Services management.)
Which of these utilities consolidate the Task Scheduler, Event Viewer, Performance, Device Manager, and other administrative tools into a single "pane of glass?" A. System Configuration B. Computer Management C. Local Security Policy D. Windows Services
Computer Management
Frankie just bought a new Wi-Fi-enabled Nest Thermostat for his condo. He asked you to install the device, but he's worried about a hacker breaking into since it's an IoT device. What is the BEST thing you can do to alleviate Frankie's concerns? (Select two answers.) A. Upgrade the firmware of the router B. Configure WEP C. Disable wireless connectivity to the thermostat D. Configure 2FA E. Configure WPA2 F. Configure a DMZ
Configure WPA2, Configure a DMZ
You have discovered that hackers are gaining access to your wireless network. After researching, you discover that the hackers are using war driving. You need to protect against this type of attack. What should you do? (Choose all that apply.) A. Configure the network to use WPA authenticated access. B. Change channel selection to Auto C. Change the default Service Set Identifier. D. Disable SSID broadcast.
Configure the network to use WPA authenticated access. Change the default Service Set Identifier.
You are attempting to research the cause and solution of an issue that is plaguing several users at your company. What source is not normally considered to be a source of research for troubleshooting? A. Corporate policy manual B. Vendor manuals C. Service documentation D. Vendor knowledge base
Corporate policy manual
Which of these features are NOT exclusive to dynamic disk storage? A. Spanning of multiple disks to create a single large volume B. Splitting of files across multiple physical disks (striping) C. Duplicating of files across multiple physical disks (mirroring) D. Creation of both primary and extended partitions
Creation of both primary and extended partitions
Which of the following commands could be used to improve the read and write performance of a hard drive volume? A. DISKCACHE B. DEFRAG C. SSD D. DISKSPEED E. WINDISK
DEFRAG
You've recently purchased a used hard drive for your desktop computer. After installing the drive, you notice that the drive has not been erased and it already has an existing partition. Which of these Windows utilities can be used to examine the details of the disk and its partitions? A. Disk Management B. CHKDSK C. Device Manager D. Event Viewer
Disk Management
You are reviewing a set of customer complaints against one of your support staff. Which of the following items is related to the protecting customer confidentiality? A.Offer different repair options B.Follow up with customer at a later date to verify satisfaction C.Do not discloses experiences at customer sites D.Avoid dismissing customer problems
Do not discloses experiences at customer sites
What kind of Windows disk would allow you to create a single large volume by combining separate physical drives? A. Basic Disk B. Advanced Disk C. Dynamic Disk D. Enhanced Disk
Dynamic Disk (A Windows Dynamic Disks supports spanning multiple drives to create a large volume, disk striping, redundant mirroring, and other enhanced features.)
Disks in Linux systems are ordinarily formatted with which file system? A.CDFS B.EXT4 C.NTFS D.FAT32
EXT4
A user's smartphone is overheating. Which of the following is the most likely cause? A. Damaged battery B. Proper ventilation C. Virus D. Damage to the CPU E. Faulty GPS program
Faulty GPS program
Which of option below most likely require you to use Performance Monitor? A. Generate the details of a BSOD that occurred this afternoon B. Run a comprehensive system memory diagnostic C. Determine which applications launch during the Windows startup process D. Generate a report on memory utilization
Generate a report on memory utilization
Sharon is building a network attached storage (NAS) device that will be used exclusively as a file server for her SOHO network. Which of the following should she install to BEST meet her needs? (Select 2 answers) A. Gigabit NIC B. FastEthernet NIC C. RAID 5 D. 1 TB SSD E. RAID 0
Gigabit NIC, RAID 5
Which of these would most likely not be tested during POST? A. Video card B. USB ports C. Hard drive read access times D. Random Access Memory
Hard drive read access times
The Disk Management utility lists a disk as "Foreign." Which of the following statements best describes how to make the disk usable? A. Convert the disk to dynamic. B. Convert the disk to basic. C. Import the disk. D. Set the disk to active.
Import the disk.
Mike is having trouble with his laptop. He's unable to access in-office network files while working from home. Which option below is the MOST likely cause of the issue? A. Inactive VPN B. Untrusted software C. MDM policies D. Outdated antivirus
Inactive VPN
What should you do prior to the upgrading a Windows 7 Home Premium computer to Windows 8 Home Premium?
Install the latest service pack.
Your company 's network has 33 computers that are directly connected to two switches using CAT 5e cables. The two switches are interconnected using a fiber cable with MTRJ connectors on the end of the cables. All 33 computers and the 2 switches are located within the same office building. Which of the following types of networks would best describe this network configuration?
LAN
Which of these would require a stand-alone Windows user to select a different password each time it is changed? A. Windows Scheduler B. Windows Firewall C. Local Security Policy D. Task Manager E. Windows System Configuration
Local Security Policy
In which of these situations would you be most likely to use DISKPART? A. Check for logical and physical errors on a storage device B. Recover a deleted file from flash drive C. Manage the partitions of a storage device D. Perform a secure wipe of all drive contents
Manage the partitions of a storage device (The DISKPART is the command line tool that has replaced the FDISK command found in previous Windows versions.)
Which command will list the currently existing shares? A. Dir B. Net Use C. Netstat D. Ipconfig /all
Net Use
Which command will list the currently existing shares? A. Ipconfig /all B. Net Use C. Netstat D. Dir
Net Use
Which of these would best describe a network location set to Public? A. You can see all of the devices on the networ B. Your computer is managed by the Active Directory domain C. All of the devices on the network can see you D. Network discovery is turned off E. You can join an available HomeGroup
Network discovery is turned off (When Windows 7 is set to a Public network location, discovery is disable and other devices are not able to see you on the network.)
Which of these technologies allows an application to use a database without any specific knowledge of the database engine? A. COM+ B. Access C. ODBC D. SQL E. dBASE
ODBC (Open Database Connectivity) allows application developers to create and access information in a database without requiring any specific knowledge of the database service in use.
What Windows technology is the primary focus of the Windows Data Sources utility? A. Active Directory B. ODBC C. COM+ D. DLL
ODBC (Windows Open Database Connectivity is a common framework for interfacing applications with data in databases. The Windows Data Sources utility provides a central facility for managing database drivers and connectivity.)
Kevin wants to restore a Windows machine to how it was when the PC when he purchased it new from Amazon. What should he do to achieve this goal? A. Press F8 during POST, and select Advanced Boot, Repair Your Computer, and System Image Recovery. B. Press F8 during POST and select Advanced Boot, Repair Your Computer, and System Restore C. Use the format command. D. Use the Disk Management program
Press F8 during POST, and select Advanced Boot, Repair Your Computer, and System Image Recovery.
Which command should be used to work with Advanced Packing Tool and install apps in Ubuntu? A. dd B. mv C. apt-get D. cd
apt-get
Which of these would be the best way to upgrade a 32-bit Windows 7 Professional system to a 64-bit version of Windows 7 Professional? A. Windows Anytime Upgrade B. In-place upgrade using the x64 installation media C. Windows Easy Transfer D. Windows Upgrade Advisor from the x64 installation media E. In-place upgrade using the x86 installation media
Windows Easy Transfer
Which of these operating systems can be upgraded directly to Windows 7 Professional with an in-place upgrade? A. Windows XP Professional B. Windows Vista Business C. Windows Vista Enterprise D. Windows XP Professional (x64)
Windows Vista Business
On your Windows Vista computer, you notice that your hard drive access light is constantly blinking, even when your computer is idle. Which of the following is the most likely cause of this constant drive access? A. The hard drive is constantly retrying a bad sector on the hard drive B. The computer is configured to constantly check the hard drive performance C. The hard drive throughput can't keep up with the data requests D. Windows Vista is indexing the files on your hard drive
Windows Vista is indexing the files on your hard drive
Which of these operating systems can be upgraded in-place to Windows Vista Business? A. Windows XP Home B. Windows XP Professional x64 C. Windows 2000 D. Windows XP Media Center
Windows XP Home
You would like to connect to an administrative share on Server1 so that you can copy some files up to the server. Which address would you use to reference an administrative share? A. \\server1\c B. \\server1\data C.\\data\server1 D.\\server1\c$
\\server1\c$
Which path template should you use for mapping a network drive? A. \\shareservername B. \\passwordshare C. \\server\share D. \\share\server
\\server\share
Reconfigure the boot process for troubleshooting and diagnosing the boot process.
msconfig.exe System Configuration Tool
View hardware and configuration information for your computer.
msinfo32.exe System Information
Which command should be used to move or rename a file in Ubuntu? A.dd B. mv C. ls D. cp
mv
Which command should be used to change the passwords of user accounts in Ubuntu? A. pwd B. su/sudo C. passwd D. chown
passwd
View detailed performance information, reports
perfmon.exe Performance Console
Which command should be used to provide a list of current processes running in Ubuntu? A. cd B. grep C. ls D. ps
ps
Which command should be used to display working directory or currently in use directory in Ubuntu? A. pwd B. su/sudo C. passwd D. chown
pwd
Which command should be used to exit the editor w/o changes, to keep changes discard changes in Ubuntu? A. pwd B. vi C. q/wq/q! D. chown
q/wq/q!
Make changes to Registry values; can be used to make selective backups. Prior to Windows XP, there were two editors: regedit.exe and regedt32.exe.
regedit.exe Registry Editor
Verifies that system files have not been modified; or, if they have, replaces them with the original. It works with the hidden C:\windows\system32\dllcache directory and the original operating system CD.
sfc.exe System File Checker
Terminate a running application or service on a computer.
taskkill.exe Task Kill
Display a list of running applications or services on a computer.
tasklist.exe Task List
See running programs and services, terminate problems, and view rudimentary performance information about the system.
taskmgr.exe Task Manager