Genesys Works Chapter 2-5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which two items are used in asymmetric encryption? (Choose two.)

1) A public key 2) A private key

A user reports to a technician that his computer freezes without any error messages. What are two probable causes? (Choose two.)

1) An update has corrupted the operating system. 2) The power supply is failing.

What can a user do to reconnect a laptop to a functioning wireless network after a laptop has been moved and the connection has been lost?

Change the orientation of the laptop.

What protocol is used to dynamically assign IP addresses to hosts on the network?

DHCP

What protocol is used to translate Internet domain and host names to IP addresses?

DSN

Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

Disconnect the host from the network.

Which key sequence may be used to control whether the content of the screen will be presented on a built-in display or on an external display?

Fn + <display>

Which two internal expansion slots in laptops are commonly used to install wireless adapter cards? (Choose two)

Mini-PCIe 2) PCI Express Micro

A user needs to connect a Bluetooth device to a laptop. Which type of cable is needed to accomplish this?

None. Bluetooth connections are wireless.

A technician notices that a laptop display appears stretched and pixelated. What is a probable cause of this?

The display properties are incorrectly set.

What would be a reason for a computer user to use the Task Manager Performance tab?

To check the CPU usage of the PC

Which of these programs is an example of a Type 2 hypervisor?

Virtual PC

What is the term for the ability of a computer to run multiple applications at the same time?

multitasking

A technician is having difficulty resolving what appears to be a Windows 7 problem. Previously documented known solutions did not work and neither Device Manager nor Event Viewer provided useful information. Which two actions should the technician try next? (Choose two.)

1) Check any manuals that relate to the hardware and software. 2) Check the Internet for possible solutions.

A technician is troubleshooting a computer that has lost connectivity to the network. After data is gathered from the customer, which two tasks should the technician complete next? (Choose two.)

1) Check that the NIC link light is lit. 2) Verify that the computer has a valid IP address.

What are two typical physical security precautions that a business can take to protect its computers and systems? (Choose two.)

1) Disable the autorun feature in the operating system. 2) Implement biometric authentication.

It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

1) Disable the autorun feature in the operating system. 2) Set virus protection software to scan removable media when data is accessed.

Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? (Choose two.)

1) Disk Cleanup 2) Disk Defragmenter

A technician has been asked to decide which laptop components should be cleaned on a monthly basis as part of a maintenance routine. What are two examples of components that should be included? (Choose two)

1) Exterior case 2) Keyboard

What are two advantages of the NTFS file system compared with FAT32? (Choose two.)

1) NTFS supports larger files. 2) NTFS provides more security features.

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

1) Ports 2) Protocols

A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.)

1) Switch 2) Wireless access point 3) Router

What are two features of the active partition of a hard drive? (Choose two.)

1) The active partition must be a primary partition. 2) The operating system uses the active partition to boot the system.

Which three factors are reasons for a company to choose a client/server model for a network instead of peer-to-peer? (Choose three.)

1) The company network requires secure access to confidential information. 2) The users need a central database to store inventory and sales information. 3) The data gathered by the employees is critical and should be backed up on a regular basis.

Which two statements are true about restore points? (Choose two.)

1) They contain information about the system and registry settings that are used by the Windows operating system. 2) They are useful to restore the computer to an earlier time when the system worked properly.

Which two characteristics describe a worm? (Choose two.)

1) Travels to new computers without any intervention or knowledge of the user 2) Is self-replicating

What are two functions of an operating system? (Choose two.)

1) Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack.

Which three questions should be addressed by organizations developing a security policy? (Choose three.)

1) What is to be done in the case of a security breach? 2) What assets require protection? 3) What are the possible threats to the assets of the organization?

In the power management settings, which two devices can be set to turn off to conserve battery power? (Choose two)

1) display 2) hard disk drive

To clean laptops, which two products are recommended? (Choose two)

1) mild cleaning solution 2) cotton swabs

How much RAM can theoretically be addressed by a 64-bit operating system?

128 Gb or more

What is the maximum segment length that is specified by the 100BASE-TX (Fast Ethernet) standard?

328 ft (100 m)

A technician is attempting to create multiple partitions on a hard disk. What is the maximum number of primary partitions allowed per hard drive?

4

A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom?

A process is using most of the CPU resources.

An administrator tries to configure Power Options within Windows, but is unable to do so. What is the possible cause?

ACPI has not been enabled in the BIOS.

Which Windows 7 feature allows a user to view the contents of the desktop by moving the mouse to the right edge of the taskbar?

Aero Peek

This Windows 7 tool can encrypt the entire hard drive volume.

BitLocker

Which technology is most often used to connect devices to a PAN?

Bluetooth

When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if the preference is for the most common type of cabling that is used on networks?

Category 5e

Which technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?

Cellular

Some home networking equipment (such as a wireless router) come programmed with a default username. What is a best practice if you were to purchase this type of equipment?

Change both the default username and password.

A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers do. The original computers performed much faster with applications that required the transfer of data over the network. What should the company technicians do?

Check if the network interface cards in the refurbished computers are limited to 10 Mb/s.

A technician has installed a wireless Ethernet card in a Windows 7 laptop. Where would the technician configure a new wireless connection?

Control Panel > Networking and Sharing Center > Set up a new connection or network

What command would allow a technician to receive help with the command-line options that are used to view the files in a certain directory?

DIR /?

Which technology requires customers to be within a particular range of the service provider facility in order to be provided the maximum bandwidth for Internet access?

DSL

What is the final task for a technician after troubleshooting a laptop?

Document the problem and the solution.

All users working with a particular Windows 7 computer are able to install unauthorized software. In addition to educating the users about correct security behavior, which action should also be performed to prevent this from happening?

Enable UAC on the computer.

A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

Ensure the security policy is being enforced.

Which two security precautions will help protect a workplace against social engineering? (Choose two.)

Ensuring that each use of an access card allows access to only one user at the time 2) Registering and escorting all visitors to the premises

Which term is used to describe any device on a network that can send and receive information?

Host

A device has an address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What type of address is this?

IPv6 address

What is the first step in the process of troubleshooting a laptop?

Identify the problem.

A Windows computer locks with a stop error during startup then automatically reboots. The rebooting is making it difficult to see any error messages. What can be done so that the error messages can be viewed?

In Safe Mode use the Advanced Startup Options menu to disable the auto restart function.

Which statement describes the physical topology for a LAN?

It defines how hosts and network devices connect to the LAN.

Which statement describes the Airplane Mode feature found on most mobile devices?

It turns off cellular, Wi-Fi, and Bluetooth radios on the device.

Which type of network spans a single building or campus and provides services and applications to people within a common organizational structure?

LAN

Which statement is true about laptops?

Most of the internal components that are designed for laptops cannot be used for desktops.

Which term best describes the process of breaking a program into smaller parts that can be loaded as needed by the operating system?

Multithreading

The MAC address on a PC is usually located where?

On the NIC card

What does a malware detection program look for when running a scan?

Patterns in the programming code of the software on a computer

Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed?

Performance Monitor

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

Phishing

A technician is trying to remove a SODIMM module from a laptop. What is the correct way to do this?

Press outward on the clips that hold the sides of the SODIMM.

A Windows XP system is unable to boot properly. What is the procedure to use to boot this system into Safe Mode?

Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode.

When a user makes changes to the settings of a Windows system, where are these changes stored?

Registry

What benefit is provided by a computer data network?

Resource Sharing

An application update causes the computer to function improperly. Which Windows function could be used to roll the operating system back to a previous state?

Restore point

Which network determines best path based on the destination IP address that is contained in the packet?

Router

A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS without losing user data. Which course of action should be taken to upgrade the file system to NTFS?

Run the CONVERT.EXE utility to convert the file system to NTFS.

A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly after the upgrade. What can the user do to fix this problem?

Run the programs in Compatibility Mode.

Which type of RAM modules are designed for the space limitations of laptops?

SODIMMs

A technician has installed a new video driver on a Windows XP computer and now the monitor shows distorted images. The technician needs to install a different video driver that is available on a network server. What startup mode should the technician use to access the driver on the network?

Safe Mode with Networking

A technician has loaded an incorrect video driver on a Windows 7 computer. How can the technician revert to a previous driver?

Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver.

What is the name given to the programming-code patterns of viruses?

Signatures

You want to dispose of a 2.5 terabyte hard drive that contains confidential financial information. What is the recommended procedure to achieve this?

Smash the platters with a hammer.

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

Social engineering

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

Switch

Which statement describes the S4 ACPI power state?

The CPU and RAM are off. The contents of RAM have been saved to a temporary file on the hard disk.

Which of the following best describes the default gateway of a host on a LAN?

The IP address of the closest router to the host

A technician is troubleshooting a PC. The display shows an "Invalid Boot Disk" error after the POST. What is a probable cause?

The MBR is corrupted.

A company purchases several inexpensive wireless NICs. After installing the NICs, the company finds that users cannot connect to the 2.4 GHz wireless network. What is a possible cause of the problem?

The NICs are designed for the 802.11a standard.

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?

The PC default gateway address is missing or incorrect.

A user has reported that a computer web browser will not display the correct home page even if the default page is reset. What is the likely cause of this problem?

The computer has been infected with spyware

What would be the result of having a corrupt Master Boot Record?

The operating system will fail to start.

A technician wishes to update the NIC driver for a computer. What is the best location for finding new drivers for the NIC?

The website for the manufacturer of the NIC

What is the primary goal of a DoS attack?

To prevent the target server from being able to handle additional requests

Which physical security technology can hold user authentication information, include software license protection, provide encryption, and provide hardware and software authentication that is specific to the host system?

Trusted Platform Module (TPM)

A computer is suffering from poor performance after an upgrade from Windows XP to Windows Vista. Which action could improve the performance?

Turn off Aero.

A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student discovers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address?

Unreachable DHCP server

A computer with the Windows 7 operating system fails to boot when the system is powered on. The technician suspects that the operating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality?

Use a system image that was created prior to the failure to restore the system.

What is the next step in the troubleshooting process after a solution has been implemented on a laptop?

Verify the solution

A company has four sites: headquarters and three branch offices across the country. What type of network describes the connections between the cities?

WAN

What is the most effective way of securing wireless traffic?

WPA2

Which question is an open ended question that could be used when helping a customer troubleshoot a Windows problem?

What programs have you installed recently?

Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

What symptoms are you experiencing?

Which command can be used from the Windows command prompt to copy all files and directories from one location to another?

XCOPY

Refer to the exhibit. Which expression best describes the pattern that is shown?

a Quick Response code, which may represent a link to a download or web site

Which partition is used by the Windows operating system to boot the computer?

active

Which component or components would be interchangeable between a laptop and a desktop PC? (Choose one)

peripheral devices

What is the purpose of the Microsoft System Preparation (Sysprep) tool?

to enable the same operating system to be installed and configured on multiple computers


संबंधित स्टडी सेट्स

Foundations Chapter 45 Nutrition 2

View Set

Cortisol and chronic stress explanation

View Set

Chapter 8:Shapes of Distributions

View Set

AP art history unit 3: renaissance and baroque

View Set

APUSH Test: Period 3-8 Review Questions

View Set