Chp 10-14 IT Application Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. ​ What will you recommend as an upgrade to RADIUS? a. AES b. WPA2 c. TACACS+ d. RADIUS+

Answers: a. AES b. WPA2 c. TACACS+ d. RADIUS+

Which of the following is not considered good customer service? (Select all that apply.) a. Follow up with the customer. b. Meet timelines, and if not possible, explain why. c. Disclose the experience on social media. d. Avoid distractions. e. Be on time. f. Meet expectations.

Answers: a. Follow up with the customer. b. Meet timelines, and if not possible, explain why. c. Disclose the experience on social media. d. Avoid distractions. e. Be on time. f. Meet expectations.

Which of the following Task Manager tabs on a Windows system is used to display the processes owned by each signed-in user? a. Processes b. Users c. App history d. Startup

Answers: a. Processes b. Users c. App history d. Startup

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company? a. Multifactor authentication b. Software tokens c. Digital certificate d. Access control list

Digital certificate

If your Internet home page has changed and a strange-looking search engine appears when you try to search the Internet, what type of attack are you experiencing? a. A redirect virus. b. A network worm c. A new browser add-on was installed. d. A new web browser was installed.

a. A redirect virus. b. A network worm c. A new browser add-on was installed. d. A new web browser was installed.

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before. What is the issue with the client's computer? a. Bad hard drive driver b. Corrupt hard drive c. Spam d. Computer virus

a. Bad hard drive driver b. Corrupt hard drive c. Spam d. Computer virus

Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred? a. Botnet b. Zero-day c. DDoS d. Spyware

a. Botnet b. Zero-day c. DDoS d. Spyware

An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed. Where do you go in the Windows operating system to view and delete root certificates? a. Certificate Manager b. Windows Defender c. Action Center d. Windows Security

a. Certificate Manager b. Windows Defender c. Action Center d. Windows Security

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router? a. Change default user name and password .b. Check radio power levels. c. Set encryption standard. d. Disable SSID.

a. Change default user name and password. b. Check radio power levels. c. Set encryption standard. d. Disable SSID.

Tracy has completed installing Windows 7 on a computer and is ready to install a printer. Tracy attaches the printer to the computer and a message pops up that a new device is being installed. When the process is done, she tries to locate the printer, but the printer is not available. What can Tracy do to use the printer? a. Check UEFI/BIOS to make sure printing is enabled. b. Install the driver from the manufacturer's website. c. Turn the printer off and on again. d. Check the printer cable.

a. Check UEFI/BIOS to make sure printing is enabled. b. Install the driver from the manufacturer's website. c. Turn the printer off and on again. d. Check the printer cable.

A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection. Which of the following describes the company's approach to computing resources? a. Cloud computing b. Thick client computing c. Internal shared resources d. Client-side virtualization

a. Cloud computing b. Thick client computing c. Internal shared resources d. Client-side virtualization

A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen. What display setting will the user adjust?a. Windows 10 Education a. color depth b. Resolution c. Multiple displays d. Refresh rate

a. Color depth b. Resolution c. Multiple displays d. Refresh rate

Jordan is talking with a client on the phone. Jordan's company recently completed updates on the client's system and something is not working properly. The client asks Jordan why the company is always doing updates. Jordan explain that updates help to secure computer systems. What specific vulnerability do updates help prevent? a. DDoS b. Man-in-the-middle c. Brute force d. Zero-day

a. DDoS b. Man-in-the-middle c. Brute force d. Zero-day

Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is very upset about the email issue. He is complaining about the email service and the IT department in general. What should Derek do to defuse the situation? a. Defend the IT department. b. Call the supervisor and ask for help with the customer. c. Hang up the phone. d. Let the customer vent and then restart the conversation.

a. Defend the IT department. b. Call the supervisor and ask for help with the customer. c. Hang up the phone. d. Let the customer vent and then restart the conversation.

A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have been tested and verified to be working properly. What step should be considered next to resolve this problem? a. Disable application startup. b. Restart services. c. Kill tasks. d. Update network settings.

a. Disable application startup. b. Restart services. c. Kill tasks. d. Update network settings.

A technician wants to use a hosted virtual machine to provide shared files and folders on the company LAN. Which of the following will provide the necessary network connection for the VM? a. Disable the physical NIC and enable the virtual NIC. b. Isolate the virtual NIC on its own network subnet. c. Disable the virtual NIC and enable the physical NIC. d. Connect the virtual NIC to the host's physical NIC.

a. Disable the physical NIC and enable the virtual NIC. b. Isolate the virtual NIC on its own network subnet. c. Disable the virtual NIC and enable the physical NIC. d. Connect the virtual NIC to the host's physical NIC.

Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy's supervisor has asked her to make sure this does not happen again. What is the first thing Tracy should do to prevent this problem from happening again? a. Email filtering b. MAC filtering c. User education d. Firewall

a. Email filtering b. MAC filtering c. User education d. Firewall

James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. What setting in the Startup Settings screen will enable James to see which driver might be failing and causing his computer not to boot? a. Enable Debugging b. Enable Boot Logging c. Enable Safe Mode with Command Prompt d. Enable Safe Mode

a. Enable Debugging b. Enable Boot Logging c. Enable Safe Mode with Command Prompt d. Enable Safe Mode

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers? a. Enable the Screen Sharing service in the Sharing window. b. Enable Remote Disc on both computers. c. Use a third-party remote access app that uses a browser. d. Disable encryption on both ends of the Screen Sharing session.

a. Enable the Screen Sharing service in the Sharing window. b. Enable Remote Disc on both computers. c. Use a third-party remote access app that uses a browser. d. Disable encryption on both ends of the Screen Sharing session.

Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software. What will you recommend to your supervisor? a. Enable the spam filter. b. Enable MAC filtering. c. Enable port forwarding. d. Enable the firewall.

a. Enable the spam filter. b. Enable MAC filtering. c. Enable port forwarding. d. Enable the firewall.

What step in the laser printing process is responsible for conditioning the imaging drum in preparation for receiving an electrical charge? a. Fusing b. Charging c. Transferring d. Cleaning

a. Fusing b. Charging c. Transferring d. Cleaning

Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied. What type of data was taken? a. GDPR b. PCI c. PII d. PHI

a. GDPR b. PCI c. PII d. PHI

Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in a workgroup. What is the easiest way for Sam to install the application on all the computers? a. Have multiple copies of the software on a DVD. b. Use a network share to share the installation files. c. Have a USB device for every computer. d. Go to the Windows Store and install the software on each computer.

a. Have multiple copies of the software on a DVD. b. Use a network share to share the installation files. c. Have a USB device for every computer. d. Go to the Windows Store and install the software on each computer.

Henry wants to build a computer that will allow him to run a hypervisor program. What does Henry not need on his computer? a. High-end video card b. High-end processor with multiple cores c. Hard drives with large storage capacity d. Maximum amount of RAM motherboard can accept

a. High-end video card b. High-end processor with multiple cores c. Hard drives with large storage capacity d. Maximum amount of RAM motherboard can accept

A customer is looking to replace three aging network servers that are not able to keep up with the growing demand of the company's users. The customer would also like to add three additional servers to provide on-site DNS, intranet, and file services. A technician is recommending a bare metal hypervisor as the best solution for this customer. Which of the following describes the recommended solution? a. Hosted hypervisor installed as an application. b. Type 2 hypervisor installed directly on server hardware. c. Type 2 hypervisor installed on a Windows or Linux host OS. d. Type 1 hypervisor installed directly on server hardware.

a. Hosted hypervisor installed as an application. b. Type 2 hypervisor installed directly on server hardware. c. Type 2 hypervisor installed on a Windows or Linux host OS. d. Type 1 hypervisor installed directly on server hardware.

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address? a. IP address b. Gateway c. Subnet mask d. DNS

a. IP address b. Gateway c. Subnet mask d. DNS

Kendra, a user, would like to share her serial printer that has no networking connectivity with the other users in her small office. Which of the following would be the best choice for providing this functionality with the least effort and cost to the user? a. Install an integrated print server. b. Enable print sharing on the computer. c. Enable print sharing on the printer. d. Update the current print drivers.

a. Install an integrated print server. b. Enable print sharing on the computer. c. Enable print sharing on the printer. d. Update the current print drivers.

A company is in the middle of an operating system update to Windows 10 from Windows XP, Windows 7, and Windows 8.x. The diverse nature of the update has made it imperative that the help desk techs have the ability to run several concurrent VMs. A few of the techs are experiencing frequent and extended periods of 100% CPU usage on their computers, and these spikes are limiting their ability to assist users in a timely manner. Which of the following is most likely causing this behavior? a. Insufficient number of physical processor cores. b. Disabled hardware-assisted virtualization. c. Dynamic allocation of RAM is disabled. d. One or more VHDs are running out of free disk space.

a. Insufficient number of physical processor cores. b. Disabled hardware-assisted virtualization. c. Dynamic allocation of RAM is disabled. d. One or more VHDs are running out of free disk space.

Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software. What can Sharon's company do to make sure a customer who purchases the program does not give it to someone else? a. Issue a license. b. Acquire a copyright. c. Obtain an EULA. d. Use DRM.

a. Issue a license. b. Acquire a copyright. c. Obtain an EULA. d. Use DRM.

Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers. What type of security do you recommend? a. Key fobs b. Biometric locks c. Smart cards d. Hardware tokens

a. Key fobs b. Biometric locks c. Smart cards d. Hardware tokens

A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a single pass of the printer. Furthermore, the client requests that the solution take the least amount of time and effort to maintain. Which of the following printer types should be recommended? a. Laser b. Inkjet c. Thermal transfer d. Impact

a. Laser b. Inkjet c. Thermal transfer d. Impact

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment? a. Line 4 b. Line 3 c. Line 1 d. Line 2 e. There are no comments in this file.

a. Line 4 b. Line 3 c. Line 1 d. Line 2 e. There are no comments in this file.

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company's new security called? a. Mantrap b. Security outpost c. Entry control roster d. Theft prevention

a. Mantrap b. Security outpost c. Entry control roster d. Theft prevention

William's supervisor wants to create a test lab at the company in order to test Windows 10 updates. He has instructed William to create a virtual lab. William decides to use Hyper-V as the hypervisor for the virtual machines. When William tries to use Hyper-V, he realizes that it is not installed. What will William use to install Hyper-V in Windows 10? a. Microsoft website b. Windows features c. Windows installation disk d. Windows Store

a. Microsoft website b. Windows features c. Windows installation disk d. Windows Store

A technician requires a file system on an internal 1.5 TB Windows 10 boot drive that supports file encryption, disk quotas, and security features such as file and folder permissions. Which of the following will support these requirements? a. NFS b. CDFS c. NTFS d. FAT32 e. exFAT

a. NFS b. CDFS c. NTFS d. FAT32 e. exFAT

A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician? a. NetBoot b. HFS+ c. Key Chain d. Swap partition

a. NetBoot

Which of the following is a cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to multiple customers based on each customer's usage demand? a. On-demand b. Resource pooling c. Measured service d. Rapid elasticity

a. On-demand b. Resource pooling c. Measured service d. Rapid elasticity

Lana has just taken a job as an IT professional in Europe and would like to get a head start on what to expect. What regulated data would you recommend that she research? a. PHI b. GDPR c. PCI d. PII

a. PHI b. GDPR c. PCI d. PII

Which of the following terms describes the software layer that is responsible for creating and running a VM on a host? a. Physical machine b. Virtual machine c. Intel VT d. Virtual hard disks e. Hypervisor

a. Physical machine b. Virtual machine c. Intel VT d. Virtual hard disks e. Hypervisor

The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questioning the user, the technician determines that no users can print to the printer, and the printer indicates it is "Offline." The technician instructs the user on how to place the printer in the "Online" mode, but print jobs are still not printing on the printer. Which of the following is the next step to take to resolve this issue? a. Power cycle the printer. b. Replace the printer cable. c. Replace the printer toner cartridge. d. Delete and re-create the printer share.

a. Power cycle the printer. b. Replace the printer cable. c. Replace the printer toner cartridge. d. Delete and re-create the printer share.

A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her fingers. Which of the following is the most likely problem? a. Primary corona b. Cleaning blade c. Inked ribbon d. Erasure lamps e. Fuser unit

a. Primary corona b. Cleaning blade c. Inked ribbon d. Erasure lamps e. Fuser unit

A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remote Assistance to view a very detailed and cryptic error message on the user's desktop. Each attempt the technician makes to connect to the remote computer results in a message stating the connection was refused. Which of the following protocol and port number combinations should be opened on the remote computer's firewall to allow this connection? a. RDP, port 3389 b. Telnet, port 23 c. SSH, port 22 d. DNS, port 53

a. RDP, port 3389 b. Telnet, port 23 c. SSH, port 22 d. DNS, port 53

When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked. What type of attack is he attempting? a. Rainbow table b. Phishing c. Zero-day d. Dictionary

a. Rainbow table b. Phishing c. Zero-day d. Dictionary

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update? a. Reinstall the security certificate. b. Reinstall Windows. c. Reinstall the network drivers. d. Remove malware.

a. Reinstall the security certificate. b. Reinstall Windows. c. Reinstall the network drivers. d. Remove malware.

Jenny is preparing to install Windows 10 on a system that has a version of Windows 8.1 installed. This version of Windows 8.1 runs slowly and crashes occasionally. The optical drive also does not work, so Jenny decides to use a flash drive to install Windows 10. Jenny wants to remove all the programs and data from the computer and start over with Windows 10. What type of installation should Jenny perform? a. Repair installation b. Custom installation c. Recovery installation d. In-place upgrade

a. Repair installation b. Custom installation c. Recovery installation d. In-place upgrade

Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach? a. Repair upgrade b. Network installation c. Custom installation d. In-place upgrade

a. Repair upgrade b. Network installation c. Custom installation d. In-place upgrade

A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use? a. Resource Monitor b. Services Console c. Print Management d. Task Manager

a. Resource Monitor b. Services Console c. Print Management d. Task Manager

A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all its apps were initially installed. Which backup type will be most useful in this scenario? a. Restore points b. System image backup c. System Restore d. File History backup

a. Restore points b. System image backup c. System Restore d. File History backup

Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect. What type of malware has Gwen discovered? a. Rootkit b. Trojan c. Worm d. Spyware

a. Rootkit b. Trojan c. Worm d. Spyware

A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger. Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize. What should Derek perform next on the client's computer? a. Run memory diagnostics. b. Refresh Windows. c. Download a CPU diagnostic program. d. Run a virus scan.

a. Run memory diagnostics. b. Refresh Windows. c. Download a CPU diagnostic program. d. Run a virus scan.

James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels? a. Server lock b. Cable lock c. USB lock d. Padlock

a. Server lock b. Cable lock c. USB lock d. Padlock

A company purchased a high-quality color laser printer to print color brochures and sales proposals. The printer is connected to a marketing PC via USB and is configured as a shared local printer for use by the sales and marketing teams. The manager is concerned about the cost of consumables for the printer and does not want users to unintentionally print to the printer. What can be done to ensure that only authorized users can send print jobs to the printer? a. Set security permissions for the marketing PC's signed-in user. b. Disable the local share on the marketing PC. c. Disable print spooling on the marketing PC. d. Enable user authentication on the printer share.

a. Set security permissions for the marketing PC's signed-in user. b. Disable the local share on the marketing PC. c. Disable print spooling on the marketing PC. d. Enable user authentication on the printer share.

In Windows 10, you can find this user-friendly interface to access numerous Windows settings? What is the name of this user-friendly interface? a. Settings app b. Administrative Tools c. Control Panel d. Computer Management console

a. Settings app b. Administrative Tools c. Control Panel d. Computer Management console

Samantha is having an issue with Windows crashing and believes that malicious software is causing it to crash. Samantha also has received application errors that have cause the applications to close. Which event log in the Event Viewer can Samantha inspect to see if malicious software is causing the Windows system to crash and the application errors, system errors, and other types of errors? a. Setup logs b. Security logs c. System logs d. Application

a. Setup logs b. Security logs c. System logs d. Application

Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees this screen. What has happened to Holly's computer? a. She has downloaded a rogue antivirus. b. She has received a spam message. c. Someone has hijacked her email. d. She has received a security alert message.

a. She has downloaded a rogue antivirus. b. She has received a spam message. c. Someone has hijacked her email. d. She has received a security alert message.

Which of the following must be performed prior to creating a spanned, striped, or mirrored volume on unallocated space in Windows? a. Shrink each disk volume to an equal size. b. Assign drive letters to each of the separate disks. c. Format the separate disks using the NTFS file system. d. Convert basic disks to dynamic disks.

a. Shrink each disk volume to an equal size. b. Assign drive letters to each of the separate disks. c. Format the separate disks using the NTFS file system. d. Convert basic disks to dynamic disks.

Which of the following is considered a security benefit when utilizing virtualization? a. Simulating a single operating system on multiple hardware platforms. b. Consolidating multiple OSs onto the same physical hardware. c. Isolating operating system when running multiple concurrent VMs. d. Allowing multiple applications to be installed on physical machines.

a. Simulating a single operating system on multiple hardware platforms. b. Consolidating multiple OSs onto the same physical hardware. c. Isolating operating system when running multiple concurrent VMs. d. Allowing multiple applications to be installed on physical machines.

Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in? a. Snapshots b. Gestures c. Finder d. Spotlight

a. Snapshots b. Gestures c. Finder d. Spotlight

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service? a. Startup b. Performance c. Details d. Processes

a. Startup b. Performance c. Details d. Processes

Which of the following are natively supported by the Windows, Mac, and Linux operating systems? a. Support for reading and writing to FAT32 partitions b. Support for reading and writing to ext4 volumes c. Support for reading and writing to NTFS partitions d. Support for reading and writing to APFS volumes

a. Support for reading and writing to FAT32 partitions b. Support for reading and writing to ext4 volumes c. Support for reading and writing to NTFS partitions d. Support for reading and writing to APFS volumes

Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan. Is Lance allowed to share the software with Susan? a. Susan would need to purchase the software from the company. b. Lance purchased the software for work and can share it with coworkers. c. The software was purchase by Lance with a site license and can be used by Susan. d. The software is open source, so Lance can share the software with Susan.

a. Susan would need to purchase the software from the company. b. Lance purchased the software for work and can share it with coworkers. c. The software was purchase by Lance with a site license and can be used by Susan. d. The software is open source, so Lance can share the software with Susan.

Which of the following technologies can provide an application to remote users without the need to install the application on the users' systems? a. Synchronization app b. Application virtualization c. Virtual network interface d. Infrastructure mode

a. Synchronization app b. Application virtualization c. Virtual network interface d. Infrastructure mode

Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time? a. System Configuration b. Performance Monitor c. Event Viewer d. Data Sources

a. System Configuration b. Performance Monitor c. Event Viewer d. Data Sources

During your service call at the residence of a customer, you discover you will need a part that you don't currently have. What should you do in this case? a. Tell the customer you need the part, do research on the part, and schedule a time to come back and fix the computer. b. Leave and get the part and come back. c. Explain the situation and give the customer options on how to order the part and when you will return to complete the repair. d. Tell the customer to purchase the part and call when she receives it.

a. Tell the customer you need the part, do research on the part, and schedule a time to come back and fix the computer. b. Leave and get the part and come back. c. Explain the situation and give the customer options on how to order the part and when you will return to complete the repair. d. Tell the customer to purchase the part and call when she receives it.

If you are working on a client's computer and you believe that you have found a violation of the AUP, what is your next step? a. Tell your coworkers what you found. b. Ask the user about the violation. c. Ignore the violation. d. Report the incident through the proper channels.

a. Tell your coworkers what you found. b. Ask the user about the violation. c. Ignore the violation. d. Report the incident through the proper channels.

A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally. Which of the following is the most likely reason for this issue? a. The application is corrupt or missing. b. The operating system or driver is causing the issue. c. The pagefile.sys file is missing or corrupt. d. Windows does not have a file association for the application.

a. The application is corrupt or missing. b. The operating system or driver is causing the issue. c. The pagefile.sys file is missing or corrupt. d. Windows does not have a file association for the application.

Danny received this email message today. What happened to Danny's computer? a. The data is being downloaded, and Danny should disconnect from the network. b. This is a real alert, and Danny should call the number provided. c. Danny's web browser has been hijacked by a virus. d. Danny has received a fake security alert pop-up.

a. The data is being downloaded, and Danny should disconnect from the network. b. This is a real alert, and Danny should call the number provided. c. Danny's web browser has been hijacked by a virus. d. Danny has received a fake security alert pop-up.

The laser printer in your accounting department is printing faded prints that are getting lighter over time. What is the most likely reason for the faded prints? a. The paper pickup rollers are worn. b. The printer is low on toner. c. The fuser is not reaching the correct temperature. d. The printer has foreign matter inside the printer.

a. The paper pickup rollers are worn. b. The printer is low on toner. c. The fuser is not reaching the correct temperature. d. The printer has foreign matter inside the printer.

A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, plenty of available free disk space, and a multicore processor. Which of the following is the most likely cause for this behavior? a. The user does not have a valid product license key. b. The motherboard does not support hardware-assisted virtualization. c. Windows 8.1 does not support Type 2 hypervisors. d. The system is incompatible with Type 1 hypervisors.

a. The user does not have a valid product license key. b. The motherboard does not support hardware-assisted virtualization. c. Windows 8.1 does not support Type 2 hypervisors. d. The system is incompatible with Type 1 hypervisors.

A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an as-needed basis. Which of the following Storage Spaces features describes this functionality without the need to also reconfigure the available space to users? a. Thin provisioning b. Parity c. Two-way mirror d. Three-way mirror e. Resiliency

a. Thin provisioning b. Parity c. Two-way mirror d. Three-way mirror e. Resiliency

Henry is sent to work with a customer at the company's satellite branch in another town. During his visit, he notices that most of the computer users are not following the corporate guidelines on password safety and are looking at their personal emails, which is not allowed for security reasons. What can Henry do about these corporate policy issues? a. Train the employees on why these issues are security concerns. b. Confront the employees about the issue. c. Wait until he returns to his office and inform his supervisor. d. Ignore the security problems.

a. Train the employees on why these issues are security concerns. b. Confront the employees about the issue. c. Wait until he returns to his office and inform his supervisor. d. Ignore the security problems.

Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program? a. Try to install in Windows PowerShell. b. Create a virtual machine and install the anti-malware program. c. Try to install in Safe Mode. d. Try to install in Windows RE.

a. Try to install in Windows PowerShell. b. Create a virtual machine and install the anti-malware program. c. Try to install in Safe Mode. d. Try to install in Windows RE.

Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed on her computer. Where can Wanda find this information quickly in Windows 10? a. UEFI/BIOS System information Applet b. System Applet c. Windows Information Applet d. System Information Applet

a. UEFI/BIOS System information Applet b. System Applet c. Windows Information Applet d. System Information Applet

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer. What should she do before she runs the anti-malware program? a. Update malware signatures. b. Install Windows updates. c. Update malware drivers. d. Update malware software.

a. Update malware signatures. b. Install Windows updates. c. Update malware drivers. d. Update malware software.

A company needs a way to convert 10 years of shipping records currently on paper into files that can be saved to its private cloud storage. Which of the following will be the best choice to accomplish this goal with the least amount of employee effort? a. Use a dedicated flatbed scanner that is connected to a workstation via USB 3.0. b. Use the flatbed scanner on a multifunction device connected to a workstation's USB port. c. Use a dedicated ADF scanner connected to either a workstation or the LAN. d. Use a dedicated, network-attached laser printer with a Gigabit Ethernet connection.

a. Use a dedicated flatbed scanner that is connected to a workstation via USB 3.0. b. Use the flatbed scanner on a multifunction device connected to a workstation's USB port. c. Use a dedicated ADF scanner connected to either a workstation or the LAN. d. Use a dedicated, network-attached laser printer with a Gigabit Ethernet connection.

A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt. Which of the following steps should the technician take next? a. Use the tasklist utility to locate the PID for the explorer.exe process. b. Use the taskkill utility to end the explorer.exe process. c. Use the taskkill utility to locate the PID for the explorer.exe process. d. Use the tasklist utility to end the explorer.exe process.

a. Use the tasklist utility to locate the PID for the explorer.exe process. b. Use the taskkill utility to end the explorer.exe process. c. Use the taskkill utility to locate the PID for the explorer.exe process. d. Use the tasklist utility to end the explorer.exe process.

Which of the following is a centrally hosted and managed desktop environment with the capability of spanning multiple offices across various countries in which each user's desktop instance is dynamically provisioned? a. VPN b. VDI c. IaaS d. SaaS

a. VPN b. VDI c. IaaS d. SaaS

A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the printer but fails to print from the computer. Which of the following steps should be taken next? a. Verify the printer is powered on. b. Verify the USB cable is attached. c. Check for low memory errors on the printer. d. Make sure printing paper is installed.

a. Verify the printer is powered on. b. Verify the USB cable is attached. c. Check for low memory errors on the printer. d. Make sure printing paper is installed.

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs. What type of malware is on your computer? a. Virus b. Ransomware c. Trojan d. Rootkit

a. Virus b. Ransomware c. Trojan d. Rootkit

Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to connect to the cloud and thus have security in case the laptops are stolen. What version of Windows 8.1 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop? a. Window 8.1 Core b. Windows 8.1 Enterprise c. Windows 8.1 Basic d. Windows 8.1 Pro

a. Window 8.1 Core b. Windows 8.1 Enterprise c. Windows 8.1 Basic d. Windows 8.1 Pro

Larry wants to upgrade to Windows 10. He will use his computer both at home and at work and will need to connect to his company's Wi-Fi network to share files over the network. Which version of Windows 10 would you recommend to Larry? a. Windows 10 Education b. Windows 10 Pro c. Windows 10 Starship Enterprise d. Windows 10 Home

a. Windows 10 Education b. Windows 10 Pro c. Windows 10 Starship Enterprise d. Windows 10 Home

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users? a. Windows 10 Enterprise b. Windows 7 Professional c. Linux d. Mac OS X

a. Windows 10 Enterprise b. Windows 7 Professional c. Linux d. Mac OS X

A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available. Which of the following is the most likely reason for this issue? a. Windows 10 does not use System Restore. b. File History is turned off. c. Windows 10 is corrupt. d. System Restore is turned off.

a. Windows 10 does not use System Restore. b. File History is turned off. c. Windows 10 is corrupt. d. System Restore is turned off.

Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues. What tool can Henry use to create a bootable flash drive in Windows 10? a. Windows ISO creator b. Windows DVD maker c. Windows Media Center d. Windows Media Creation tool

a. Windows ISO creator b. Windows DVD maker c. Windows Media Center d. Windows Media Creation tool

Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet. Where can Eric go to look up the device driver's filename to determine what device uses the device driver? a. Windows\System32\drivers folder b. Window\Drivers c. Windows\System\drivers folder d. Windows BCD

a. Windows\System32\drivers folder b. Window\Drivers c. Windows\System\drivers folder d. Windows BCD

A new printer has been added in your office and connected to a WAP for use by all users in the company. Which of the following best describes the method of connectivity for the new printer? a. Wireless infrastructure mode b. Wired Ethernet c. Wireless ad hoc mode d. Wireless Bluetooth

a. Wireless infrastructure mode b. Wired Ethernet c. Wireless ad hoc mode d. Wireless Bluetooth

hat is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; a. X = 1, the Do...Loop is not endless. b. X = 0, the Do...Loop is not endless. c. X = 0, the Do...Loop is endless. d. X = 1, the Do...Loop is endless.

a. X = 1, the Do...Loop is not endless. b. X = 0, the Do...Loop is not endless. c. X = 0, the Do...Loop is endless. d. X = 1, the Do...Loop is endless.

Which of the following creates an environment that behaves in a hardware-like manner to run software meant for other hardware? a. Zero client b. Virtualization c. Virtual desktop d. Emulator

a. Zero client b. Virtualization c. Virtual desktop d. Emulator

The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred? a. Zero-day b. Botnet c. DDoS d. Spyware

a. Zero-day b. Botnet c. DDoS d. Spyware

Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled. What kind of malware could be causing the issues on Frank's computer? a. Zombie b. Spyware c. Ransomware d. Rootkit

a. Zombie b. Spyware c. Ransomware d. Rootkit

A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function? a. apt-get b. ls c. grep d. cp e. rm

a. apt-get b. ls c. grep d. cp e. rm

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function? a. clear b. chown c. ps d. cd

a. clear b. chown c. ps d. cd

A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool? a. dxdiag.exe b. taskschd.msc c. mdsched.exe d. compmgmt.msc

a. dxdiag.exe b. taskschd.msc c. mdsched.exe d. compmgmt.msc

A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems? a. grep b. macOS Recovery c. Time Machine d. First Aid

a. grep b. macOS Recovery c. Time Machine d. First Aid

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft command-line command should Henry use to check whether he can connect to the server? a. ping b. ipconfig c. ifconfig d. netstat

a. ping b. ipconfig c. ifconfig d. netstat

Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem? a. smss.exe b. csrss.exe c. lsass.exe d. winload.efi

a. smss.exe b. csrss.exe c. lsass.exe d. winload.efi

What type of computer is recommended when you want to allow the server to do most of the computing but would like to connect to the server via a browser? a. zero client b. thin client c. virtual client d. thick client

a. zero client b. thin client c. virtual client d. thick client

Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network? a. Login script b. Access control list c. Digital Certificate d. Directory permissions

b. Access control list

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore? a. Enable System Protection. b. Back up the restore point. c. Disable System Protection. d. Run the antivirus software on a restore point.

c. Disable System Protection.

When working with customers, you should always try to keep a positive attitude. Why is it important to maintain a positive attitude when working with customers? a. Helps the customer feel confident you can fix the problem. b. Shows that you have the knowledge needed to fix the problem. c. Helps to establish a good customer relationship. d. Helps you to be more reliable.

c. Helps to establish a good customer relationship.


संबंधित स्टडी सेट्स

Anthropology Questions + Answers for Midterm #1

View Set

PREP U- CH. 12: Nursing Management During Pregnancy

View Set

Routing, Switching and Wireless Essentials (Final Study Set)

View Set

AP European History Mrs. San Juan Unit 2 (Chapter 13) Test

View Set