IT Essentials Ch 10-14

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

True or False? The registry is a database that only contains information about the device drivers on a computer.

False

SSO

Single sign-on. Authentication method which allows users to log in once to access all system resources versus requiring them to log in each time they need to access an individual one

A customer uses Internet Explorer and Microsoft Edge as browsers on the computer. The customer asks the technician how to configure the computer to detect and filter phishing websites, to analyze websites for suspicious items, and to check downloads against a list of known malicious files and sites. Which web security feature should the technician demonstrate? ActiveX Filter AutoPlay Firewall SmartScreen Filter

SmartScreen Filter Explanation: In Internet Explorer, use the Tools option to enable. In Microsoft Edge, use the three dotted icon to select Settings > View advanced settings to turn the Help protect me from malicious sites and downloads with Windows Defender SmartScreen option on.

Safe Mode with Command Prompt

Starts Windows and loads the command prompt instead of the GUI.

A user has deleted all the files from a directory and wants to remove the empty directory. What is the best Windows command to select to do the job? rd DISM sfc tasklist history

rd

What command is used to open a text editor in a linux system? grep ifconfig ls vim

vim Explanation: The vim command is used to open a text editor; ls displays files within a directory; grep searches for strings of characters within a file; and ifconfig displays information about the network interface card.

Whic model does Apple use to provide iOS apps to customers? iCloud Xcode sandbox walled garden

walled garden Explanation: Apple uses a walled garden model for the iOS apps. The apps must be submitted to and approved by Apple before they are released to users.

Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack? zero-day SYN flood DDoS DNS poisoning

zero-day

A Linux PC user notices that the PC freezes on startup and exhibits kernel panic where there is a stop screen. What is a possible cause for the issue? LILO has been deleted. GRUB has been corrupted. A driver has become corrupted. Deja Dup has been turned off in the system

A driver has become corrupted. Explanation: When a driver in a Linux system has been corrupted or a piece of hardware is failing, the system will freeze on startup and exhibits kernel panic where there is a stop screen.

type of disk that allows for creating a volume that spans more than one disk

Dynamic disk

19. Which two rules pertain to the general daily activities of employees in a call center environment? (Choose two.) -If a technician takes a call from a customer the technician does not like, the technician should pass the call to another technician. -The technician should be sure to treat all customers equally. -If a customer complains about another technician, the technician who is taking the call should agree with opinion of the customer. -The technician should adjust the work chair to a height that is high enough so that wrists angle downwards toward the keyboard. -The technician should contact the customer if the technician is going to be late for a follow-up appointment.

-The technician should be sure to treat all customers equally. -The technician should contact the customer if the technician is going to be late for a follow-up appointment. Explanation: There are rules that call centers generally use to cover the daily activities of their employees. These rules are designed to ensure that there is always adequate coverage for incoming calls, and that the customer is not unduly inconvenienced when working with the call center employees. A high rate of customer satisfaction is always a primary goal of any call center.

12. What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.) -spending time explaining what caused the problem -putting the customer on hold or transferring the call -apologizing for any inconvenience caused to the customer -sympathizing with the customer letting the customer explain the problem without interruption

-spending time explaining what caused the problem -putting the customer on hold or transferring the call Explanation: When dealing with an angry customer a technician can help the customer focus on the problem by: Letting the customer explain the problem without interruption Sympathizing with the customer Apologizing for inconvenience

27. What is a reason to escalate a problem from a level one technician to a level two technician? -when the equipment needs to be rebooted -when drivers, applications, or operating systems need to be installed -when the screen resolution of a customer PC needs to be adjusted -when a peripheral device needs to be replaced

-when drivers, applications, or operating systems need to be installed Explanation: A technician should always follow company policies for problem escalation, but in general a problem should be escalated to a level two technician anytime it involves an advanced procedure that could cause serious damage to user equipment, data loss, or cause a widespread outage. Also, if the technician does not have the necessary skills or tools to troubleshoot an issue effectively, the issue should be escalated to a level two technician.

3. A programmer used an operator to compare values within a program and the resulting logical data type was "false". Which test condition would have provided the result of "false"? 8 != 8 4 >= 1 6<=6 3 == 3

8 != 8 Explanation: == represents equal != represents not equal < represents less than > represents greater than <=represents less than or equal to >= represents greater than or equal to

What would cause a Microsoft Windows update to fail? The wired or wireless NIC was disabled. The computer has a virus. The computer has had its security breached. A required prior update was not installed.

A required prior update was not installed. Explanation: Two things commonly cause a Windows update to fail: 1. A required older update was not installed. 2. There was a problem with the downloaded update.

Multiprocessing

Ability to support two or more CPUs

A Windows 8 computer locks up with a stop error during startup and then automatically reboots. The automatic restart setting is making it difficult to see any error messages. What can be done so that the error messages can be viewed?

Access the Advanced Startup options menu before the OS loads to disable the auto restart function. The error messages are difficult to read so the best solution is to first try to disable the auto restart function by accessing the Advanced Startup menu before the OS loads. Then the error messages can be read and further action taken to resolve the rebooting problem.

What is the result of doing a factory reset on a mobile device? he operating system will be updated with the most recent updates and patches. All user data and settings will be deleted. The operating system will be deleted and all user data is transferred to the Cloud. A complete backup of the device is done and all viruses and malware are removed.

All user data and settings will be deleted. Explanation: After a factor reset, a mobile device is left in the same state that it was when it left the factory. The operating system software would not be altered but all user data, settings, and third party applications would be deleted. Backups should be done prior to a factory reset. Updates or patches to the operating system could be done before or after the factory reset.

An instructor is discussing facts about different mobile device operating software. The instructor states: "this OS uses the system bar, displayed at the bottom of every screen to navigate apps and screens." To which OS does this relate: iOS, Android or both?

Android

Android apps run primarily based on privileges enabled by the user. Sometimes an Android app requires extra privileges to access system components. How do Android apps run to accomplish both situations? Android apps run in a sandbox. Android apps run in a guest mode. Android apps run in a walled garden. Android apps run through a proxy service.

Android apps run in a sandbox. Explanation: Android apps run in a sandbox and have only the privileges enabled by the user. If an app needs to obtain permissions, a prompt will appear and the user can grant permissions through settings.

2Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.) PowerShell VBScript C# Java Python

C# Java Explanation: Compiled languages like C, C++, C#, and Java need to be converted into executable code using a compiler.

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system? Check for the latest OS patches and updates. Document the problem and the procedures performed to solve it. Talk with the user to determine the cause of the problem. Gather information from a number of sources to clearly identify the problem.

Check for the latest OS patches and updates. Explanation: After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.

An IT support person calls the help desk with the following situation. "I added a new PC to my LAN. I can ping other devices on my LAN but not any remote devices." What advice should the help desk agent give to the caller? Check the IP address configuration on the new PC, because the default gateway may be incorrect. Use Task Manager to release system resources from the unresponsive application. Use Device Manager to look for any driver issues or problems. Check the RAID controller, because it may need to be replaced.

Check the IP address configuration on the new PC, because the default gateway may be incorrect.

A technician calls the help desk with the following situation. "I am trying to save a file to my RAID drive but my system cannot find it." What advice should the help desk agent give to the caller? Check the RAID controller, because it may need to be replaced. Use Task Manager to release system resources from the unresponsive application. Use Device Manager to look for any driver issues or problems. Check the IP address configuration on the new PC, because the default gateway may be incorrect.

Check the RAID controller, because it may need to be replaced.

CDFS

Compact Disc File System created pecifically for optical disk media

A manager calls the help desk with the following situation. "I need to use an application that is not supported by Windows on my PC." What advice should the help desk agent give to the caller? Create a virtual machine with an OS that supports the application. Set the file permissions to read and execute. Check the permissions for this file. If using Windows, set the idle timeout and screen lock.

Create a virtual machine with an OS that supports the application.

2. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.) -Set virus protection software to scan removable media when data is accessed. -Configure the Windows Firewall to block the ports that are used by viruses. -Disable the autorun feature in the operating system. -Repair, delete, or quarantine the infected files. -Enable the TPM in the CMOS settings

Disable the autorun feature in the operating system. Set virus protection software to scan removable media when data is accessed. Explanation: Windows Firewall filters data from the network not from removable flash drives. The TPM is used for hardware authentication of users and devices, not malware protection. Repairing, deleting, or quarantining infected files will remove a current virus infection but not prevent future infections.

6. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host? Disconnect the host from the network. Log on to the host as a different user. Disable ActiveX and Silverlight on the host. Install rogue antivirus software on the host.

Disconnect the host from the network. Explanation: If a host infected with malware is causing a denial of service attack by flooding the network with traffic, disconnecting the host from the network can stop the attack. ActiveX and Silverlight are both examples of web software designed to provide interactive experiences on web pages. A rogue antivirus is a type of attack where the malware appears to be an antivirus telling the users that their system is infected. If a system is infected with malware, it is unlikely that logging on as a different user would prevent the malware from continuing the denial of service attack.

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?​ BitLocker EFS TPM Windows Update

EFS Explanation: Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data.

An IT support person calls the help desk with the following situation. "I need to add a new printer but I can't see it on the list of available printers." What advice should the help desk agent give to the caller? Enter the IP address or browse for it on the network. Use Task Manager to release system resources from the unresponsive application. Use Device Manager to look for any driver issues or problems. Check the RAID controller, because it may need to be replaced

Enter the IP address or browse for it on the network.

FAT32

File Allocation Table, 32 bit Supports partition sizes up to 2TB. (Used by Windows XP and earlier OS versions.)

A manager calls the help desk with the following situation. "Many employees leave their desks for extended periods of time with their PCs still logged in and unlocked." What advice should the help desk agent give to the caller? If using Windows, set the idle timeout and screen lock. Create a virtual machine with an OS that supports the application. Check the permissions for this file. Set the file permissions to read and execute

If using Windows, set the idle timeout and screen lock.

Which operation in Windows 10 is limited to users with Administrator privileges only?

Install software programs. Administrator accounts have complete control over a computer. Standard user accounts have limited control over a computer. They can run applications, but cannot install programs. A standard user account can change system settings but only settings that do not affect other user accounts.

What is a purpose of the boot manager program? -It manages antivirus signature files, encryption keys, and certificates when a device boots. -It automates the POST and checks the disk for bad sectors during a boot. -It checks the validity of hardware and software on the device after a factory reset. -It allows the user to select the OS to use to boot the device. -It allows the user to determine which apps are automatically opened during the boot process.

It allows the user to select the OS to use to boot the device. Explanation: Many devices have multiple operating systems installed in different partitions. When a device boots, the boot manager asks the user to select the OS to use. The boot manager then directs the BIOS to the correct partition so that the device can continue to boot by using the selected OS.

Which statement describes a primary partition?

It is a physical section of a hard disk. It can contain an operating system to boot the system and cannot be subdivided.

Which statement accurately describes the GUID partition table?

It is commonly used in computers with UEFI firmware. The GUID partition table, also referred to as GPT, expands on the limitations of the MBR and is commonly used in systems with UEFI firmware.

Which statement is a feature of the Windows 8 operating system?

It supports a touch screen interface. One of the features introduced with the Windows 8 operating system was the support for a touch screen interface to allow use on phones and tablets.

A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation? Limit the login times. Use Event View to document the times logged in and out of the computer. Use Device Manager to limit access to the computer. Enable power on passwords in the BIOS

Limit the login times. Explanation: The technician can limit the time logins can occur on a computer. Using Event Viewer to determine the login times is an action that does not prevent the users from logging into the computer. Power on BIOS passwords are not usually configured for a specific time. Device Manager is used to view settings and operation of devices, not users.

Last Known Good Configuration

Loads the configuration settings that were used the last time that Windows started successfully. It does this by accessing a copy of the registry that is created for this purpose.

A technician is configuring rights and permissions in Windows 7. Which tool will the technician use? Device Manager Local Security Policy Local Users and Groups Resource Monitor

Local Users and Groups Explanation: Within the Local Users and Groups tool, a technician can create users, create groups, and assign rights and permissions.

MBR

Master Boot Record. An area on a hard disk in its first sector. When the BIOS boots a system, it looks at the MBR for instructions and information on how to boot the disk and load the operating system. Some malware tries to hide here.

A file called new_resume has the following file permissions: rw-r-x--x. What two facts can be determined from these permissions? The user has full access to the file. Members of the group have read and execute access to the file. Other people have read and execute access to the file. Group members are able to modify the file. The user is able to read and modify the file. Other people have no access to the file.

Members of the group have read and execute access to the file. The user is able to read and modify the file. Explanation: Read, write, and execute permissions are assigned to each file. The permissions are listed in groups of three. The first group of three permissions references users, the second references group members, and the third references others. The first position of each of the three permissions is the R or read permission, the second is the W or write permission, and the third is the X or execute permission. If any position has a dash, the associated group does not have permission for that category. In this case, the user hasread and write access (rw-). Group members haveread and execute access (r-x). Other people haveexecute only access (-x).

3 Desktop OS

Microsoft Windows Apple macOS Linux

Which file system is used to access files over a network?

NFS NFS (Network File System) is used to access files on other computers across a network. Windows operating systems support several file systems. FAT, NTFS, and CDFS are used to access files stored on drives installed in the computer.

Which file sharing mechanism is included with Microsoft Windows 10 to provide simple file sharing via Wi-Fi and Bluetooth? AirDrop Nearby Sharing Homegroup NFC Workgroup

Nearby Sharing Nearby Sharing is included in Microsoft Windows 10 to provide simple file sharing with the ability to share content with a nearby device using both Wi-Fi and Bluetooth.

15. An administrator is re-imaging a large number of Mac OS X machines. What built-in tool or command can be used to remotely boot the computers? mstsc Netboot Time Machine Finder

Netboot

NFS

Network File System NFS is a network-based file system, that allows file access over the network. From the user's standpoint, there is no difference between accessing a file stored locally or on another computer on the network. NFS is an open standard which allows anyone to implement it.

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer? -Reboot the computer after closing the web browser. -Operate the web browser in private browser mode. -Use only an encrypted connection to access websites. -Move any downloaded files to the recycle bin.

Operate the web browser in private browser mode. Explanation: When a computer user browses the web in private mode, the following occurs:Cookies are disabled. Temporary Internet files are removed after closing the window. Browsing history is removed after closing the window.

Primary partition contains what?

Operating system files. It cannot be subdivided into smaller sections.

10. A hard drive used by an administrative assistant in a Federal Reserve Bank is replaced with a new larger capacity drive. The technician brings the old drive into the technical office and is asked for the drive so it can be used in a different computer. How should the technician handle this situation? -Deny the request and require a certificate of destruction. -Use a degausser before turning the drive over to the second technician. -Perform a drive wipe before turning the drive over to the second technician. -Turn the drive over to the second technician with a request to format the drive first as exFAT and then as NTFS.

Perform a drive wipe before turning the drive over to the second technician. Explanation: Drives can be recycled or repurposed as long as best practices are adhered to. Drive wiping software can be used to overwrite existing data multiple times so that the original data cannot be read.

A PC technician has been asked by a supervisor to recommend a security solution for phishing. Which security technique should the technician recommend? Provide security awareness training. Use a mantrap. Use Windows Safe Mode. Implement dual authentication.

Provide security awareness training.

5. A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network? Telnet client Windows Remote Desktop client Windows Remote Assistance client SSH client

SSH client Explanation: The Windows administrator should use Secure Shell (SSH) TCP port 22. SSH allows the administrator to connect remotely and securely to the Linux workstation in order to safely authenticate and then perform updates on the workstation.

A location of the OS that keeps code isolated from other resources and other code.

Sandbox in mobile devices

A manager calls the help desk with the following situation. "I need to be able to view and download files but not delete them." What advice should the help desk agent give to the caller? Set the file permissions to read and execute. Create a virtual machine with an OS that supports the application. Check the permissions for this file. If using Windows, set the idle timeout and screen lock.

Set the file permissions to read and execute.

A technician is attempting to securely configure a Linux web server on the public-facing side of the firewall. What port type and number are most likely required to be open on the firewall to allow this traffic through? UDP port 23 TCP port 23 TCP port 22 UDP port 22 TCP port 3389 UDP port 3389

TCP port 22 Explanation: Secure Shell (SSH) is a secure remote service that encrypts the entire session. The port number for SSH is TCP port 22.

A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable? NTFS SSL TPM EFS

TPM Explanation: A Trusted Platform Module (TPM) is a motherboard chip used to store security information such as encryption keys, security certificates, and passwords. It is required to be enabled before implementing BitLocker.

Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.) -The passcode must be disabled. -The GPS locator must be enabled. -Sandboxing must be enabled. -The device must be powered on. -The device must be connected to a network. -Navigation Bar

The device must be powered on. The device must be connected to a network Explanation: Successful mobile device remote security measures require the device to be powered on and connected to a network. The device passcode and GPS status do not affect the operation of remote security measures. Mobile devices run apps within a sandbox by default.

A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems? The file system is corrupted. The laptop is infected by a virus. The display driver is corrupted. The file system has been encrypted.

The laptop is infected by a virus. Explanation: Problems of system files being renamed and file permissions being changed without user knowledge are most likely caused by a virus. File system corruption would make the directory and files inaccessible. A corrupted display driver would prevent the laptop from displaying at all or it would display only VGA resolution.

9. A user complains about not being able to modify a shared remote file. The technician investigates the issue and notices that both NTFS and share permissions have been assigned to the shared folder and file. What is the effective permission when this security technique has been applied? All remote access is blocked. The share and NTFS permissions will be added. The most restrictive share or NTFS permission will be applied. Only the original owner can modify the file either locally or from a remote location.

The most restrictive share or NTFS permission will be applied Explanation: If a shared folder has been given the full control NTFS permission and the read share permission, the effective permission will be the most restrictive one which is read in this case.

3. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.) -The user interface can be extensively customized. -The operating system can be fine-tuned to improve the speed of the device. -The root directory of the device is blocked. -The operation of the carrier cellular network may be affected. -A custom OS may reduce sandboxing features.​

The operating system can be fine-tuned to improve the speed of the device. The user interface can be extensively customized.

What is the purpose of signature files used to secure mobile devices and operating systems? -They contain a record of historical and pending firmware and software updates. -They contain a list of all user passwords. -They contain a log of digital certificates and encryption keys associated with the user. -They contain sample code from known viruses and malware that is used by security software to identify malicious software.

They contain sample code from known viruses and malware that is used by security software to identify malicious software. Explanation: Antivirus and antimalware software compare the contents of a disk with sample virus and malware code included in signature files. If a comparison is found, the user can be notified and the virus can be isolated or removed.

Which statement describes dynamic disks in a PC that is running Windows 10 Pro?

They have the ability to create volumes that span across more than one disk. A dynamic disk has the ability to create volumes that span across more than one disk. The size of the partitions can be changed after they have been set, even if the unallocated space is noncontiguous. However, the partition size cannot be reduced without loss of data.

A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible? adware phishing spyware Trojan

Trojan Explanation: Trojans can enable unauthorized remote access, provide the attacker with data, corrupt or delete files, use the computer as a source for other attacks, enable unauthorized services, and stop antimalware software.

True or False? Multitasking describes a computer operating system that is capable of running multiple applications at the same time.

True

A technician wishes to deploy Windows 10 Pro upgrade to a group of employee PCs on the network and ensure that the user state migrates successfully. Which tool would the technician use to do this?

USMT (User Migration State tool) is part of the Windows Assessment and Deployment Kit that can be used to streamline and simplify user state migration during large deployments of Windows operating systems.

A manager calls the help desk with the following situation. "What can be done to improve the printing performance of the departmental laser printer?" What advice should the help desk agent give to the caller? Upgrade the RAM in the printer. Use Task Manager to release system resources from the unresponsive application. Use Device Manager to look for any driver issues or problems. Check the RAID controller, because it may need to be replaced

Upgrade the RAM in the printer.

An IT support person calls the help desk with the following situation. "What can be done to improve the printing performance of the departmental laser printer?" What advice should the help desk agent give to the caller? Upgrade the RAM in the printer. Use Task Manager to release system resources from the unresponsive application. Use Device Manager to look for any driver issues or problems. Check the RAID controller, because it may need to be replaced

Upgrade the RAM in the printer.

A user wishes to view an ISO disk image file on a Windows 10 Pro PC. How can this be done?

Use File Explorer to locate the ISO file and mount the file using the Disk Image tools. An ISO image can be mounted in Windows 10. Use File Explorer, to locate the ISO file, then select the Manage menu under Disk Image tools, and then select Mount.

What is the most commonly used method to close an application that appears to be frozen on an OS X-based computer? Use Force Quit. Use Task Manager. Access the Status menu. Access the Notification Center.

Use Force Quit. Explanation: To use Force Quit, right-click on the application icon that is not responding from the Dock and close the application.

Which command line utility was developed by Microsoft to allow users to transfer files and settings to a new edition of Windows OS during an upgrade to Windows 10?

User State Migration Tool The User State Migration Tool (USMT) is a command line utility program developed by Microsoft that allows users to transfer files and settings between Windows PCs. Windows Easy Transfer is not available in Windows 10. PCmover Express is third party software. Windows Upgrade Assistant is used to prepare a computer for upgrading by checking for compatibility issues and downloading all necessary files to start the installation process.

7. The corporate security policy states that all remote connections use only secure tunnels for data communications. Which encryption technique secures data traveling across the public Internet as if it were traveling across the corporate LAN? MD5 VPN WEP WPA

VPN Explanation: A VPN (virtual private network) provides an encrypted tunnel for data communications across the Internet. WEP and WPA are wireless encryption protocols. MD5 is a data hashing algorithm.

5. What is the most effective way of securing wireless traffic? WPA2 SSID hiding WEP wireless MAC filtering

WPA2 Explanation: SSID and wireless MAC filtering are not encryption methods. WPA2 is more secure than WEP or WPA for encrypting traffic.

Which two statements characterize wireless network security? (Choose two.) -Wireless networks offer the same security features as wired networks offer. -Wireless guest mode provides open access to a protected LAN. -With SSID broadcast disabled, an attacker must know the SSID to connect. -Using the default IP address on an access point makes hacking easier. -An attacker needs physical access to at least one network device to launch an attack.

With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. Explanation: The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network.

Which two items are used in asymmetric encryption? (Choose two.) a token a DES key a private key a public key a TPM

a private key a public key Explanation: A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key.

A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend? antimalware SSL ping sweep IPS

antimalware

28. Which change management process component is concerned with the cost and resources necessary for implementation? assessment approval implementation identification

assessment Explanation: There are several change management process components that help changes, installations, and upgrades go more easily. The assessment component identifies the business processes that are affected and the costs and resources required.

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers? botnet rootkit spyware virus

botnet Explanation: A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data.

When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody? evidence tampering copying of copyrighted materials cyber crime identity theft

evidence tampering Explanation: A chain of custody created with accurate documentation can prevent evidence tampering so that the integrity of the evidence can be assured.

A retail store wants to secure laptops that are on display. The store manager also wants a record of which employees enter the backroom where inventory is kept. Which security option would work best for this situation? guards and log sheets security cameras and only the manager having access to the backroom cable locks and a token-based lock on the backroom a condition that laptops are viewed one at a time and only the owner has a key to the backroom

cable locks and a token-based lock on the backroom Explanation: Retail solutions have to be flexible for both customers and employees. Physical security products are available to provide a solution such as using cable locks to secure equipment and an electronic lock that records activity on a door.

Which two location data sources can locator apps use to determine the position of a mobile device? (Choose two.) cellular towers WiFi hotspots the sandbox remote lock an app source

cellular towers WiFi hotspots Explanation: In addition to GPS, mobile device locator apps can use cellular towers and WiFi hotspots to determine the position of a mobile device. The device sandbox, remote lock, or an app source (Play Store or iTunes) are other features and functions related to security and app downloading.

A Linux administrator wants to backup current files in a data directory and store them in a new directory on another disk. Which two commands would be needed? cd cp rm mv mkdir

cp mkdir Explanation: The mkdir command is used to create the new directory and the cp command is used to copy files from one directory to another.

20. What does a technician need in order to make changes to software installed on the computer of a customer? the authorization of a more senior technician customer authorization verification that the software is legal two witnesses

customer authorization Explanation: To make any changes to a computer, a technician needs authorization from the customer. The presence of either another technician or other witnesses does not entitle the technician to either install or modify software, even if it is legal.

22. During computer forensics investigations, which type of data is lost when power is removed from the computer? data that is stored on solid state drives data that is stored in RAM data that is stored on magnetic disk data that is stored to an external drive

data that is stored in RAM Explanation: Volatile data that is contained in cache, RAM, and CPU registers is lost when power is removed from the computer.

Which security technique or device wipes the data from a hard drive by being placed near the drive platter for at least 2 minutes? degaussing wand EFS low-level format biometric scanner erase scope

degaussing wand Explanation: A degaussing wand requires being placed over hard drive platters for a couple of minutes, whereas an electromagnetic degaussing device can wipe all data in seconds.

A user needs to manage the drives, disks, partitions, volumes, and virtual drives of a PC. What is the best Windows command to select to do the job? diskpart md rd del net user

diskpart

Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss? ext2 ext3 CDFS NFS

ext3 Explanation: The ext3 file system is considered a journaled file system that was designed to improve the existing ext2 file system. A journal, the main feature added to ext3, is a technique used to minimize the risk of file system corruption in the event of sudden power loss.

26. What is a typical task performed by a level one technician in a call center? -gathering information when a customer calls for help -solving the problem that might require opening up the computer case -using remote access software to troubleshoot the customer computer -picking up an escalated work order and calling the customer for further information

gathering information when a customer calls for help Explanation: The primary responsibility of a level one technician is to gather information from the customer. The level one technician needs to accurately enter all the information into the work order. When the problems are very simple to resolve, a level one technician can take care of these without escalating the work order. However, when a problem requires the expertise of a level two technician, the level one technician initiates an escalated work order so that a level two technician will be involved to solve the problem.

A user has been told by the systems administrator that the group policy settings for user workstations are modified. The user has been asked to synchronize the workstation with the new settings. What is the best Windows command to select to do the job? gpupdate rd del move cls

gpupdate

8. A user has reported SMART messages displayed on the computer screen several times over the past few weeks. Which computer part should the technician check first? -CPU -hard drive -motherboard -power supply -RAM

hard drive Explanation: Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T or SMART) is a feature built into hard drives to detect and report drive issues.

What are two ways that iOS differs from Android? -iOS uses an All Apps button whereas Android uses a Home button. -iOS has a physical Home button, but Android uses navigation icons. -In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app. -In iOS, apps can only appear on screens, whereas in Android, apps can appear on screens and in folders. -In iOS, folders are created by dragging one app on top of another app, but in Android folders must be created from the home screen menu.

iOS has a physical Home button, but Android uses navigation icons. In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app.

11. What are two benefits of using an ext4 partition instead of ext3? (Choose two.) compatibility with CDFS compatibility with NTFS decreased load time improved performance an increase in the number of supported devices increase in the size of supported files

improved performance increase in the size of supported files Explanation: Based on the ex3 file system, an ext4 partition includes extensions that improve performance and an increase in the of supported files. An ext4 partition also supports journaling, a file system feature that minimizes the risk of file system corruption if power is suddenly lost to the system.

A SOHO company has hired a technician to come in and configure and secure the computers. The technician has decided to configure a local security policy for the machines. Which setting would the technician use to ensure that the user did not make their password the same as their own user account name? enforce password history maximum password age minimum password length meet complexity requirements

meet complexity requirements Explanation: The Password must meet complexity requirements option requires that the user not make their own user account name or part of their user account name as their password. This option also requires that the password have at least three of the following: uppercase letter, lowercase letter, number, and symbol.

A user is reorganizing files within different directories to accommodate new projects and needs to relocate a file from one Windows directory to another one. What is the best Windows command to select to do the job? move tasklist DISM sfc history

move

A user sees an unfamiliar IP address in the web server log file and wants to verify the organization that owns the IP address. What is the best Windows command to select to do the job? nslookup DISM sfc tasklist regsrv32

nslookup

What are signatures as they relate to security threats? -a unique encryption code used by a known attacker -one or more code patterns within a specific type of malware -the beginning or end of a malware segment that has a specific cyclic redundancy check number -the checksum associated with each specific type of malware that is stored in a virus table

one or more code patterns within a specific type of malware Explanation: Antimalware software analyzes code patterns within malware to create signatures that are stored in virus definition tables. Antimalware signature files are constantly being updated because malware is constantly morphing into new strands.

1. Which two security precautions will help protect a workplace against social engineering? (Choose two.) -performing daily data backups -encrypting all sensitive data stored on the servers -registering and escorting all visitors to the premises -ensuring that all operating system and antivirus software is up to date -ensuring that each use of an access card allows access to only one user at the time

registering and escorting all visitors to the premises ensuring that each use of an access card allows access to only one user at the time Explanation: Encrypting data, keeping software up to date, and backing up data are all security precautions, but will not protect against unauthorized physical access to premises by people trying to gather information for malicious purposes.

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? acceptable use incident handling network maintenance remote access

remote access Explanation: The remote access policy section of a corporate security policy identifies how remote users can access a network and what is accessible via remote connectivity.

A user wants to copy a group of files from one Windows directory to another. What is the best Windows command to select to do the job? robocopy md rd del net use

robocopy

Which two methods are commonly used to remove the default restrictions and protections added to mobile operating systems? (Choose two.) rooting jailbreaking rootkit execution device update system backup

rooting jailbreaking Explanation: Mobile operating systems are usually protected by a number of software restrictions. Rooting and jailbreaking are two methods for removing restrictions and protections added to mobile operating systems. They are a means of circumventing the usual operation of the device operating system to gain superuser or root administrator permissions.

high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.) biometrics employee smart ID mantrap multifactor authentication security guard that checks IDs

security guard that checks IDs mantrap Explanation: A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area.

A user notices errors for some Windows operations and suspects that some system files might be corrupted. The user wants to scan and verify the integrity of all system files and replace corrupted files with correct versions. What is the best Windows command to select to do the job? sfc DISM shutdown tasklist path

sfc

8. What are two examples of personally identifiable information (PII)? (Choose two.) credit card number first name street address language preference IP address

street address credit card number Explanation: Personally identifiable information (PII) is any data that could potentially identify and track a specific individual. A credit card number and street address are the best examples of PII.

What is the definition of cyber law? -a single law defining criminal acts that are committed online -the collection of international, country, and local laws that affect computer security professionals -a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support -the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices

the collection of international, country, and local laws that affect computer security professionals Explanation: Cyber law describes the collection of international, regional, country, and state laws that affect computer security professionals.

What is the purpose of using the auto-brightness feature on a mobile device with an LCD screen? -to conserve battery power -to reduce the interference from sunlight -to prevent the burn-in effect on the screen -to display text messages with better contrast

to conserve battery power Explanation: The LCD screen for most mobile devices uses the most battery power. Lowering the brightness or using the auto-brightness feature helps conserve battery power.

What are two purposes of the passcode lock feature on mobile devices? (Choose two.) to help prevent theft of private information to prevent unauthorized use of the device to erase all personal data from the device to return the device to the default factory state to restore and re-synchronize the device to remotely lock the device if it is stolen

to help prevent theft of private information to prevent unauthorized use of the device Explanation: The passcode lock feature on mobile devices helps prevent theft of private information and places the device into a power saving state. Personal data will not usually be erased from some mobile devices unless the number of failed passcode login attempts exceeds a threshold. Remote lock allows the device to be locked from a remote location. A factory reset returns the device to the original operation state when the device was first purchased. Various applications such as email or cloud storage can provide synchronization capabilities to be able to restore and re-synchronize information such as user data, contacts, and email on a mobile device.y other device features and actions.

When would a PC repair person want to deploy the idle timeout feature? -when users are inserting media and running applications not sanctioned by the company -when users are leaving their desk but remaining logged on -when users are playing music CDs and leaving them playing even after the users have left for the day -when users are surfing the Internet and not doing their job

when users are leaving their desk but remaining logged on Explanation: The idle timeout and screen lock feature is a great security measure that protects the computer and data accessible through it if the user steps away from the desk for a specified period of time and forgets to lock the computer or log off.

Minimum CPU speed for a 64-bit Windows 10 computer.

1 GHz

Maximum RAM for a computer with a 32-bit architecture

4GB

What to do if a computer does not meet minimum requirements for an app.

Buy a new computer or upgrade on or more hardware components.

An administrator calls the help desk with the following situation. "I need to make changes to a file. I can open it but I am unable to make changes." What advice should the help desk agent give to the caller? Check the permissions for this file. Set the file permissions to read and execute. Create a virtual machine with an OS that supports the application. If using Windows, set the idle timeout and screen lock.

Check the permissions for this file.

Four basic functions of an OS

Control hardware access manage files and folders provide a user interface manage applications

An administrator calls the help desk with the following situation. "I need to use an application that is not supported by Windows on my PC." What advice should the help desk agent give to the caller? Create a virtual machine with an OS that supports the application. Set the file permissions to read and execute. Check the permissions for this file. If using Windows, set the idle timeout and screen lock.

Create a virtual machine with an OS that supports the application.

The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices? TACACS+ TKIP RADIUS WPA2-PSK

RADIUS RADIUS and TACACS+ both use a separate server that performs authentication on behalf of network devices. However, RADIUS is an open standard and provides greater compatibility.

A technician wishes to view all the processes that are running for the active user on a Windows 10 PC. What option must be selected on the Windows Task Manager in order to do this? Select the Startup tab. Show processes under the User tab. Select the Services tab. Select the Performance tab.

Show processes under the User tab. The Users tab in the task manager can be used to see all the processes that are running under the current active user.

A computer technician is attempting to modify settings in the Network Adapter > Properties > Advanced tab > Speed and Duplex. What is a possible effect (or impact) if this option is configured incorrectly? The network connection may experience issues. The NIC cannot be set to wake up with network activity. The NIC cannot be set to shutdown while the computer is idle. The NIC loses VLAN support

The network connection may experience issues. Network card properties are configured in the Advanced tab of the adapter properties window. The Advanced tab provides configuration of features such as Speed & Duplex, QoS, Wake-on LAN, and more.

Which three levels of RAID are supported by Windows 10 Pro? (Choose three.)

0,1,5 Windows 10 Pro supports RAID levels 0 (Spanned), 1 (Mirrored), and 5 (Stripping with Parity).

A user wishes to upgrade a PC to Windows 10 from a PC that is running a 32-bit version of Windows 7. Which two editions of Windows 10 will support this upgrade? (Choose two). 32-bit Windows Home 32-bit version of Windows 10 Pro 64-bit version of Windows 10 Pro 64-bit version of Windows Home 64-bit version of Windows 10 Enterprise

32-bit version of Windows 10 Pro 64-bit version of Windows 10 Pro Windows Home, Windows XP, and Windows Vista are not supported in the upgrade path to Windows 10. The 64-bit version of Windows 10 Enterprise cannot be downgraded to Windows 10.

Safe Mode

A diagnostic mode used to troubleshoot Windows and Windows startup issues. Functionality is limited as many device drivers are not loaded.

What are two default account types provided by Windows 10? (Choose two.) Guest Users Administrator Standard User DefaultAccount

Administrator Standard User

Which feature is included with both macOS and Apple iOS to establish a Wi-Fi direct connection between devices to simplify file transfer? Nearby sharing Workgroup Homegroup AirDrop

AirDrop AirDrop was included in both macOS and Apple iOS to provide simple file sharing via a Wi-Fi direct connection between devices.

A user reports that a PC is losing files, not opening some files, and is performing slowly. The technician suspects problems with the hard drive. What should be done to protect the data that is on the PC and to determine the source of the problem, without risking total drive failure? Run the format command, then replace the hard drive. Run chkdsk, then run format. Back up all important files, then replace the hard drive. Back up all important files, then run chkdsk. Run chkdsk, then back up all important files.

Back up all important files, then run chkdsk. Backing up important files is the first step in protecting existing data. After backing up, running chkdsk will allow the technician to determine if there are bad sectors on the hard drive, without losing any data.

A user installs a new sound card driver in a computer that is working properly. After the installation of the drivers for the new sound card, the computer fails to boot. Which quick fix can the user implement to return to the previous working state?

Boot to Last Known Good Configuration. The last known Good Configuration is a copy of the last registry that is saved on successful login. Care should be exercised never to log in when you suspect any system instability because once you log in successfully, the Last Known Good Configuration will be overwritten with the current one.

What are two types of computer user interface? (Choose two.) CLI PnP GUI OpenGL API

CLI GUI Two types of computer operating system user interfaces are CLI and GUI. CLI stands for command-line interface. In a command-line interface, a user enters commands at a prompt using a keyboard. The second type is the GUI, or graphical user interface. With this type of user interface, a user interacts with the operating system by working with icons and menus. A mouse, finger, or stylus can be used to interact with a GUI. PnP is the name of a process by which an OS assigns resources to different hardware components of a computer. The other answers are examples of Application Programming Interfaces, or APIs.

A technician has been asked to reinstall the OS on a computer that has a corrupted operating system. The technician inserts the installation media in the optical drive. What would be the most likely action the technician should perform next?

Change the boot sequence in the BIOS. Typically, once the operating system has been installed, the computer boots from the hard disk all the time. To boot from an optical drive, the boot sequence needs to be modified. Changing the BIOS password, flashing the BIOS, and changing the clock speed have no effect on loading installation files from the optical drive.

exFAT (FAT 64)

Created to address some of the limitations of FAT, FAT32, and NTFS when formatting USB flash drives, such as file size and directory size. One of the primary advantages of exFAT is that it can support files larger than 4GB.

A technician changes the length of the local user password to five characters using the Local Security Policy snap-in. The technician tries to create a password of "dave" for the local user account of "dave" but it fails because of the Windows 10 password complexity requirements. Which password would meet the requirements? Dave4 Dave$ D@ve4 dave$

D@ve4 Password complexity rules would dictate that the password must not use the username within the password, and must have a combination of six upper/lower case alpha-numeric and non-alpha-numeric characters.

A technician is troubleshooting a Windows 10 PC that will not do any windows updates automatically or manually. What option can be used to address this issue without loss of data or applications? Restart the windows update services Delete all the files in C:\Windows\SoftwareDistribution folder and restart the PC. Uninstall and reinstall the device using device manager Perform a repair of Windows using installation media

Delete all the files in C:\Windows\SoftwareDistribution folder and restart the PC.

A technician is troubleshooting a computer that has two monitors attached. The technician wants to disable one of them to see if that changes the symptoms exhibited. Which Windows tool would the technician use to disable the monitor? BIOS Device Manager Resource Monitor Task Manager

Device Manager An installed device can be disabled through Device Manager. To disable a device in Device Manager, expand the particular category, such as Monitors, right-click on the monitor, select the Disable Device option.

Which key, when pressed during the boot process, will allow the user to choose to start Windows in safe mode?

F8

Disk drive process that allows a technician to select a file system.

Formatting

GUID

Globally Unique Identifier A partition table scheme, more modern than the GPT

A user of a Windows 10 PC wants to automatically sync the user profile across various Windows 10 devices that the user owns. How can the user accomplish this? Have the user sign into all devices with the Microsoft account of the user. Ensure that the user is in the proper group so that the group policy will be applied. Use gpupdate to propagate the group policy to other devices. Make sure that OneDrive file sync is disabled

Have the user sign into all devices with the Microsoft account of the user. A Microsoft account is required to sync data between devices, to access OneDrive, and to work with parental controls of the Child account. It allows access to Microsoft cloud services and syncs desktop settings and profiles across multiple devices. For this to occur, all devices must be signed in with the same Microsoft account.

What is the default file system used during a fresh installation of Windows 7?

NTFS While Windows XP can use either FAT or NTFS, Vista and Windows 7 can only be installed on an NTFS partition.

NTFS

New Technology File System Supports partition sizes up to 6 exabytes. Incorporates file system security features and extended attributes.

Active partition

Partition used to store and boot an operating system. (only primary partitions can be marked active)

A technician wishes to prepare the computers in the network for disaster recovery. The network consists of a variety of desktops and laptops from different vendors. All the computers are running either a 32-bit version of Windows 10 Pro or a 64-bit version of Windows 10 Pro. How would the technician prepare the recovery media? Prepare one 64-bit recovery disc for all the computers. Prepare one 32-bit recovery disc for all the computers. Prepare individual recovery discs for all the computers. Prepare one image restore for all the computers

Prepare individual recovery discs for all the computers. All the PCs are from different vendors and thus have dissimilar hardware configurations. Furthermore, all the PCs have a variety of 32-bit Windows 10 and 64-bit Windows 10. Because the PCs have different versions of the OS and dissimilar hardware, you cannot use the same image on all the PCs . In order to use a single image, Sysprep must be used to strip out machine specific information like the SID, and all PCs must have the same hardware configuration and the same version of the Windows operating system.

A company is implementing a wireless network and using wireless devices as part of the corporate environment. Which two server-based authentication methods should the company consider in the wireless network design? (Choose two.) AES RADIUS TACACS TKIP WPA2-PSK

RADIUS TACACS RADIUS and TACACS require a server that would authenticate wired/wireless devices as well as users.

A technician wishes to create a dynamic volume on a Windows 10 PC that has two physical hard drives. The technician wants to achieve maximum write performance with data fault tolerance. What type of dynamic volume should be created to achieve this? RAID 2 RAID 6 RAID 1 RAID 5

RAID 1 volume Mirroring is a type of RAID (RAID 1) that uses two hard disks to protect a single disk against failure. Because data is written to both disks, it can be read from both disks, thus improving the read speed performance.

A technician notices that a program that is listed in the registry of a Windows computer is not found on that computer. What is a possible solution to the problem? Run fdisk /mbr from the command prompt. Reinstall the application. Then, run the uninstall program. Restore the boot.ini file from the installation media. Restore the ntdetect.com file from the installation media

Reinstall the application. Then, run the uninstall program. By installing the application again, the link in the registry should work. When you uninstall the application, the uninstall process should remove the registry entries.

A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications? Reset this PC. Restore using Sysprep. Restart the Windows Update services. Uninstall and reinstall the device using device manager.

Reset this PC.

A client installed a new driver for a device three weeks ago; however, this driver is causing the system to freeze occasionally and the client wishes to revert back to the old driver. What option can be used to address this issue without loss of data or applications? Reset this PC. Restart the Windows Update services. Restore using Sysprep. Uninstall and reinstall the device using device manager.

Reset this PC.

A technician is working on a Windows 10 PC that keeps freezing occasionally after a driver update. System restore has been turned off. What option can be used to address this issue without loss of data or applications? Reset this PC. Go back to the initial Windows build. Use Advanced Start-up. Perform a repair of Windows using Installation media

Reset this PC.

A user is trying to install a new application on a Windows 10 PC but the application fails to install fully. The user tries to uninstall the application but fails to uninstall it. What can the user do to remove the application from the PC without affecting existing applications and data? Use the Reset this PC option. Restore from a Windows image file. Roll back the last driver installed. Restore using a System Restore point

Restore using a System Restore point. System Restore is used to reset the system configuration to an earlier point in time and can be used to reverse changes made when installing an application or device driver.

A user in a corporate environment is reporting that a Windows computer used by part-time employees is running slowly after a Windows update. Which two actions should a technician take to help in this situation? (Choose two.) Run Disk Cleanup. Disable unneeded processes. Repartition the hard drive into smaller partitions. Use the System File Checker tool. Use the mstsc command.

Run Disk Cleanup. Disable unneeded processes. The Windows Disk Cleanup tool searches for files that might not be used or needed, such as .tmp files, that would free up drive space. Disabling unneeded processes closes applications and processes that are not currently being used, thus freeing up hard drive space and memory for faster performance.

A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files? ASR Fixboot Fixmbr Regedit SFC

SFC ASR is used to recover the operating system when it is totally corrupt and will not boot. Regedit is a registry editor whereas Fixmbr and Fixboot are command line utilities that can be used to repair corrupt boot records. SFC is used to check the integrity of any system files that may have been corrupted and repair them.

Safe Mode with Networking

Starts Windows in Safe Mode with networking support.

A technician is attempting to diagnose and rectify a common boot problem on a Windows 10 installation. Which Windows 10 advanced recovery option should the technician use? System Restore System Image Recovery Reset Startup Repair

Startup Repair The Windows Startup Repair option can be used once the system is in recovery mode to fix common boot issues. Common boot problems that can be addressed by Statup Repair are repairing the MBR, repairing the boot sector, and adding missing Windows installations to the Boot Configuration Database (BCD).

A technician is troubleshooting a Windows 10 PC that is taking a long time to start up. The technician needs to identify which user applications are causing the greatest delay in the startup of the PC. Which tool should the technician use? Performance Monitor System Configuration Resource Monitor Task Manager

Task Manager The Startup tab in the Task Manager can be used to examine which processes are loaded at startup and can be used to identify the application causing the startup delay.

A technician is troubleshooting a PC. The display shows an "Invalid Boot Disk" error after the POST. What is a probable cause? The MBR is corrupted. A process is using most of the CPU resources. The date and time have been changed in the BIOS and do not reflect the correct time and date. The PC does not have a floppy drive or the floppy drive is broken. The PC has a BIOS password

The MBR is corrupted. Possible causes for the error shown are: (1) Media that does not have an operating system is in a drive. (2) The boot order is not set correctly in the BIOS. (3) The hard drive is not detected or the jumpers are not set correctly. (4) The hard drive does not have an operating system installed. (5) The MBR is corrupted. (6) The computer has a boot sector virus. (7) The hard drive is failing.

A user calls the help desk and reports that the workstation, when powering up, displays error messages about an invalid system disk or invalid boot disk. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician checks the workstation and makes sure that the cable is firmly connected between the hard drive and the motherboard. What is another likely cause of the problem? The MBR/GPT is corrupted. The boot service fails to start. Some of the operating system files may be corrupted. A recently installed device driver is incompatible with the boot

The MBR/GPT is corrupted. These error messages indicate that the workstation cannot detect the hard drive as a bootable device. One possible cause is that the MBR/GPT on the hard drive is corrupted so that the workstation cannot locate a valid partition that holds the necessary codes to start booting.

A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this? The SID of the original PC is not cleared when creating the image with DISM. The technician used the wrong tool to create the image file. The network drivers were not added to the image file. The Sysprep utility should have been turned off prior to the creation of the image file.

The SID of the original PC is not cleared when creating the image with DISM. The technician must use Sysprep to clean up the local specific configuration, such as the SID, otherwise the cloned systems will not work properly.

When would the PXE option be used when repairing a PC?

The computer needs a replacement operating system. The Preboot eXecution Environment (PXE, but pronounced pixie) BIOS boot option is used to install an operating system from a remote network location.​

A technician is troubleshooting a Windows 7 laptop that takes significantly longer than expected when performing a file search. What is the possible cause? The file system is corrupt. The disk type is basic. The disk type is dynamic. The file permissions are not set. The index service is not running

The index service is not running. The Windows indexing service is used to speed up file searches. A slow search may be the result of either the index service not running or not indexing the correct location.

A computer technician is attempting to modify settings in the Network Adapter>Properties>Advanced tab >Speed and Duplex. What is a possible effect (or impact) if this option is configured incorrectly? The NIC cannot be set to wake up with network activity The NIC cannot be set to shutdown while the computer is idle The NIC loses VLAN support The network connection may experience issues.

The network connection may experience issues. Explanation: Network card properties are configured in the Advanced tab of the adapter properties window. The Advanced tab provides configuration of features such as Speed & Duplex, QoS, Wake-on LAN, and more.

A user is reporting that a file has been shared specifically with another user on the network, but the other user opens the file and is unable to save it once edited. What is the probable cause? The user shared the document with Read permissions. The user forgot to share the parent folder. The file has the Archive attribute enabled. The file has been deleted

The user shared the document with Read permissions. The permission setting should have been Change or Full Control. The Read permission does not allow edited files to be saved.

A user tries to install an application on a Windows 10 Pro PC but it fails. The user tries to uninstall the application but it fails to uninstall. What option can be used to address this issue without loss of data or applications? Use Restore Point. Use Advanced Start-up. Uninstall and reinstall the device using device manager. Restart the Windows Update services.

Use Restore Point.

A technician needs to capture the company user accounts, files, operating system settings, and application settings for migration into the new Windows 10 installation. What tool or utility would be the best choice for the user?

User State Migration Tool

USMT

User State Migration Tool (USMT) is a command line utility program developed by Microsoft that allows users who are comfortable with scripting languages to transfer files and settings between Windows PCs.

Which question is an open ended question that could be used when helping a customer troubleshoot a Windows problem? Can you boot the operating system? Have you changed your password recently? Do you get a login prompt when the computer boots? What programs have you installed recently?

What programs have you installed recently? Closed ended questions tend to have a yes/no response. Open ended questions leave more room for the customer to explain in more detail. Technicians should use open ended questions to help identify the problem.

Which operating system does not support Windows Easy Transfer to transfer information from one computer to another?

Windows 10 Windows Easy Transfer is not supported in Windows 10 and is replaced with PCmover Express.

Two operating systems that can be upgraded to Windows 10

Windows 7,8,or 8.1

A user is trying to share a printer attached to a Windows 10 PC but is unable to do so. What account should be used to do that? system local service network service administrator

administrator The administrator account must be used to share a local printer on a network.

A user is looking for a file but can not find it in the Document folder. The user wants to move to the Download directory to check there. What is the best Windows command to select to do the job? cd bootrec ipconfig diskpart help

cd

A user is experiencing issues with system startup and with failing to open some files. The user wants to determine the source of any hard drive issues. What is the best Windows command to select to do the job? chkdsk bootrec ipconfig diskpart cls

chkdsk

A user has an important file that is used in many projects and needs to move that file to a different Windows directory while maintaining it in the current location. What is the best Windows command to select to do the job? copy bootrec ipconfig diskpart history

copy

A user has just installed a new hard drive into the PC and needs to prepare it to store Windows files. What is the best Windows command to select to do the job? format bootrec ipconfig diskpart net user

format

A company has recently deployed Active Directory and now a workstation cannot connect to a network resource. A technician takes corrective action by modifying group policy settings. Which command should the technician use to make the workstation synchronize with the new settings? runas rstrui tasklist gpresult gpupdate

gpupdate The functions of the listed commands are as follows: runas - runs a program or tool with different permissions rstrui - starts the System Restore utility gpresult - displays group policy settings gpupdate - refreshes group policy settings tasklist - displays currently running applications

A user is trying to create a new Windows directory for storing files related to a new project. What is the best Windows command to select to do the job? md ping tracert nslookup help

md

What feature of an operating system allows it to support two or more CPUs?

multiprocessing Multiprocessing allows an operating system to use two or more CPUs. Support for two or more users is provided by the multiuser feature. Multitasking allows multiple applications to run at the same time. Multithreading allows different parts of the same program to run at the same time.

Which term best describes the process of breaking a program into smaller parts that can be loaded as needed by the operating system?

multithreading​ Thread is a small piece of a program in execution. Multi-processing is related to a system with more than one processor. Multi-user is related to a system that supports more than one user at the same time. Multi-task is a system that can perform more than one task at the same time.

A user suspects someone has hacked into the PC and wants to verify activity on the PC by displaying all active TCP connections to the PC. What is the best Windows command to select to do the job? netstat diskpart bootrec format regsrv32

netstat

What term is used to describe a logical drive that can be formatted to store data?

partition Hard disk drives are organized by several physical and logical structures. Partitions are logical portions of the disk that can be formatted to store data. Partitions consist of tracks, sectors, and clusters. Tracks are concentric rings on the disk surface. Tracks are divided into sectors and multiple sectors are combined logically to form clusters

File systems

provides the directory structure that organizes the user's operation system, application, configuration and data files.

Which component of a CPU architecture allows the CPU immediate access to data?

registers Registers are memory locations that are part of the architecture of a CPU. They provide a storage location for the logical functions performed on data.

A user has to shutdown several remote computers one at a time. What is the best Windows command to select to do the job? shutdown nslookup ping netstat recover

shutdown

A user wants to end one or more processes on a PC based on process ID or image name. What is the best Windows command to select to do the job? taskkill md rd del exit

taskkill

A technician is troubleshooting a Windows 10 PC with a frozen Internet Explorer window. Which command can the technician run, as an administrator at a command prompt, to terminate the Internet Explorer process that has hung? taskkill /fi iexplorer.exe taskkill /pid iexplorer.exe taskkill /f /im iexplorer.exe taskkill /f /im explorer.exe

taskkill /f /im iexplorer.exe The taskkill command can be used to end processes and services. The switch /im refers to the ImageName to end a task by PID or image name respectively. The switch /f terminates the process without any user notification. This is useful because it will terminate the hung process even if it is displaying a dialogue box.

A user needs to display a list of current processes running on a local or a remote computer. What is the best Windows command to select to do the job? tasklist diskpart bootrec format path

tasklist

What is a possible situation when it might be necessary to boot Windows 7 from a USB device, a CD, or a DVD?

to repair the system Disabling background services, deleting registry keys, and partitioning the hard drive do not require rebooting a PC. It might be necessary to boot a computer from a USB drive in order to repair the system in some situations.

A user is troubleshooting a connectivity issue from the PC to a web server and wants to see a list of the traffic stops between the PC and the web server. What is the best Windows command to select to do the job? tracert diskpart bootrec tasklist recover

tracert


संबंधित स्टडी सेट्स

Principles of Auditing-Ch 12-14, 16, 17, 18 Exam

View Set

Pediatrics- NUR 236: Dermatological/Skin Conditions

View Set

Management Final including Chapter 14

View Set

STIs chapter 71 infectious diseases

View Set

ITECH2304 Emerging Information Systems

View Set

Pharmacology - Chapter Forty-Five

View Set

Перевод с русского

View Set

Engaging Community Health (custom ATI)

View Set

Chapter 6 The Skeletal System Herbst

View Set