Myers' + CrucialExams + ExamCompass Tests Missed

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

False You should refrain from using a vacuum for the purposes of cleaning computer components, as they can generate static electricity that can destroy sensitive electronics. Compressed air is the often used to remove dust in the place of a vacuum.

True or false: The best tool for cleaning a dusty desktop PC case is a vacuum. A) True B) False

Clear the SSL cache In order to get rid of that certificate, she must clear the SSL cache. Incorrect Answers:A firewall cannot be configured that way. Confirming the certificate will not make it go away. There is no option to rebuild an SSL cache.

Uhura has just accepted an SSL certificate, but she's not comfortable about the source and now wishes to make it "go away." What should she do? Right-click on the certificate in question and select "Confirm" Configure her firewall to block all incoming SSL certificates Clear the SSL cache Rebuild her SSL cache

boot into safe mode

What do you usually have to do to read the ntbtlog.txt file

Overwrite When data is deleted or a disk is formatted the location of the data is tagged as empty and available for use but is not actually physically removed from the disk. This means after deleting it is still possible to read the data. Overwriting is a method that deletes the data and overwrites the physical location with random information to ensure it can never be recovered.

What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis? A) Standard format B) Overwrite C) DEFRAG D) Disk recovery

sigverif

What is the command prompt to inspect all the device drivers and verify which drivers are signed and unsigned?

2048 GB. Which, normally would be written out as 2 TB. But I wanted to see if you could move your decimal point around. Did you know that even though Windows won't let you CREATE a FAT32 partition over 32 GB, you can still make one with another partitioning tool and then just load up Windows and it will recognize it just fine? Incorrect Answers:1024 GB (1 TB) is not the maximum.32768 MB (32 GB) is the maximum FAT32 partition you can create when using a Windows partitioning tool such as Disk Management.4096 MB (4 GB) is the maximum size a file can be using the FAT32 file system.

What is the maximum size a partition can be using the FAT32 file system?

Guest account

What is the name of a Windows account that enables users to have temporary access to a computer without the capability to install software or hardware, or change settings called? A) Guest account B) Temporary account C) Standard account D) Managed user account

Action Center In Windows 7, 8 and 8.1 it is called Action Center. In Windows 10 it was renamed Security and Maintenance

What is the name of a system component designed for monitoring security and maintenance related items in Windows 7/8/8.1? A) Action Center B) Windows Update C) Windows Security Center D) Security and Maintenance

Clean installation A clean installation will clean the partition, and provide a fresh installation on the system.

What is the type of installation on a Windows system that will wipe all the contents of that partition? A) Quick format B) Clean installation C) Remote network installation D) Repair installation

Windows\Temp C:\Windows\Temp is the special holding area for temp files. Incorrect Answers:All of the other locations don't exist.

What location on your Windows 7 system will hold all the temp files left behind by applications? Windows\Temp Windows\System32\Temp Temporary Users\Temp

Event Viewer Event Viewer uses these three log files to record tracked events. Incorrect Answers:Disk Administrator is an tool from older versions of Windows and does not contain these logs.Computer Management contains an Event Viewer snap-in, but does not itself contain the logs.System Information is for viewing important system details.

What utility displays Application, Security, and System log files? Computer Management System Information Disk Administrator Event Viewer

Paging files The paging files are pretty much always being used by the system, so the defrag utility will never defragment them. Other files would be both Master File Tables, the one at the beginning of the disk and the one in the middle. Incorrect Answers:Documents, Music, and any cool utilities in the System32 folder will all get the same treatment under defrag.

When a technician runs the defrag utility, what types of files would be excluded from the process? System32 files Document files Paging files Music files

Vi Vi is the only option available that is a Linux text editor. Other common Linux text editors are Vim and Nano. Cat will display the contents of the file but not allow you to edit it, ifconfig will show you the interface (e.g., wireless lan, ethernet) settings or allow you to temporarily change the settings (but not permanently), and notepad is a Windows-based text editor.

When diagnosing a network issue on a Linux machine (without a GUI) you find that the network settings in /etc/network/interfaces (a text-based config file) are not correct. What is an appropriate tool for editing this file? A) Cat B) Vi C) Ifconfig D) Notepad

Default password Correct Answer:Changing the default password will prevent others from getting into your router and messing around. Default passwords are well-documented and provide basically no security. Incorrect Answers:You'll probably want to change your SSID, but change the router password first!Changing radio power levels or DHCP settings has no effect on security.

When securing a new wireless router, which of the following should be changed first? DHCP settings Default SSID Radio power levels Default password

Fixes errors on the disk

When you run the CHKDSK utility with the /F switch, which of the following will occur? A) Locates errors B) Fixes errors on the disk C) Displays cleanup messages D) Displays the full path and name of every file on the disk

Administrative Tools folder in Control Panel

Where can you find a shortcut icon to the Windows Memory Diagnostic Tool while using Microsoft Windows 7? A) Hardware and Sound menu in Control Panel B) Administrative Tools folder in Control Panel C) Performance Information and Tools menu D) System menu

Event Viewer

Where to delete error log files when they become full

Device Manager

Where would you navigate to revert to a known working driver, after the updated driver has failed? A) Device Manager B) Windows Update menu C) Programs and Features menu D) Task Manager

SHRINK

Which DISKPART.EXE command can be used for managing the size of a disk volume? A) ADD B) CONVERT C) SHRINK D) COMPACT

Windows 8/8.1 Windows 8 and later Windows 10 both come with multi-monitor task-bar support in the OS. The task bar in Windows is the GUI component typically at the bottom of the screen that shows the Windows start menu button, shortcuts, open programs & system tray.

Which Microsoft Windows version supports the use of the task bar on multiple monitors without the use of additional programs? A) Windows XP B) Windows Vista C) Windows 7 D) Windows 8/8.1

REGEDIT REGEDIT is a Windows tool that allows administrators to change in-depth configuration options found in the Windows Registry. REGSRV32 is used for registering DLLs and ActiveX controls. REGEX is short for regular expressions and MSCONFIG is for configuring startup options in Windows.

Which Windows 7 tool will allow a system administrator to change the default install folder for applications? A) REGSRV32 B) REGEDIT C) REGEX D) MSCONFIG

Performance

Which of the Windows Task Manager tabs in Windows 8 includes the information about the network resources usage under Networking tab in previous releases of the Microsoft OS? A) Applications B) Processes C) Performance D) Services

DEVMGMT.MSC

Which of the command-line commands in Microsoft Windows launches the Device Manager tool? A) MSCONFIG.EXE B) DEVMGMT.MSC C) COMPMGMT.MSC D) APPWIZ.CPL

Programs and Features The Programs and Features applet is used to uninstall applications in Windows 7 and Vista. Incorrect Answers:The Folder Options window is used to change the way Windows displays folders.Add/Remove Programs controlls uninstalling applications in Windows XP.Administrative Tools is a collection of utilities for maintaining and configuring Windows.

Which of the following Control Panel utilities would be best to use to uninstall a Windows 7 application? Folder Options Add/Remove Programs Administrative Tools Programs and Features

Hibernation Hibernation mode will save the contents of the RAM to non-volatile memory for the duration of the powered down state. Sleep mode however, draws minimal power to keep the RAM from clearing.

Which of the following Windows options will use the least amount of power? A) Standby B) Sleep C) Hibernation D) Suspend

Virtual machines can have resources added or removed from them at any time, without requiring a reboot Virtual machines can have resources allocated to them from the host without requiring that the virtual machine be powered down. This depends on the virtualization platform and guest OS specifically but in general you can "hot add" memory and CPU resources to virtual machines.

Which of the following best describes a statement that reflects the nature of a virtual machine? A) Virtual machines can have resources added or removed from them at any time, without requiring a reboot B) There is a limit of one virtual machine per host C) A physical machine can be virtualized, but a virtual machine cannot be converted to physical D) Virtual machines can only be created in Windows environments

ATTRIB The ATTRIB command is used to change attributes such as Read-only, Archive, System, Hidden. (RASH!) Incorrect Answers:LABEL is used to label your volume. It's the thing that automatically happens when you format a volume.EDIT is the most basic text editor that reaches back to the glory days of DOS.PERMISSION just doesn't exist at all.

Which of the following commands would you use if you need to turn a file that is read-only into a file that can be modified? ATTRIB PERMISSION EDIT LABEL

Command Prompt / winsrv.msc

Which of the following is NOT a way to stop a service in Vista? Right-click Computer / Manage / Services and Applications / Services Control Panel / Administrative Tools / Services Command Prompt / winsrv.msc Command Prompt / Net stop

Apt APT (Advanced Packaging Tool) is the default package manager for the Ubuntu Linux distribution. A package manager is a system used to download, install, update and remove software applications.

Which of the following is the default package manager for the Ubuntu Linux distribution? A) Yum B) Apt C) Wget D) Gzip

All of the file permissions are lost Unfortunately the FAT32 file system does not allow for file and folder permissions like those that are commonly found on modern file systems, such as NTFS.

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions? A) All file permissions must be reassigned B) All of the file permissions are lost C) The file owner is preserved D) The file name becomes case insensitive

Safe mode Safe Mode, as it's name implies, can allow a Windows OS to safely BOOT even when a malicious software, invalid driver, or other issue is causing a system failure.

Which of the following will allow a Windows OS to boot with only the essentials like basic drivers, required programs and default settings? A) Safe Mode B) Standby Mode C) System Restore Mode D) Guest Mode

Sleep The Sleep power management option saves the computer state in RAM and powering off uneeded components until the computer awakes. Hibernate is similar but saves system state to the hard disk, which saves more power but is slower to resume when waking.

Which option is a Windows power management mode that draws a small amount of power on resume by saving system state in RAM? A) Sleep B) Hibernation C) Green D) Power saver

System Protection System Restore settings are found in the System Protection tab of the System Properties applet window. System Restore can be used to undo system changes by reverting a computer to a previous restore point. This is helpful if a newly installed application is causing issues (e.g. a buggy driver) or unwanted system configuration changes have been made (e.g. incorrect Windows Registry changes).

Which tab of the System Properties Windows applet provides access to the System Restore settings? A) Advanced B) Performance C) System Protection D) Environment Variables

Cron Cron is a time-based scheduling service on Linux operating systems. The Windows equivalent is task scheduler. A service and a daemon could also achieve this but will require an entire application to be developed, compiled and installed onto the host OS.

Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system? A) Cron B) Service C) Task scheduler D) Daemon

Windows Security Center Windows Vista uses the Windows Security Center. This is where you adjust your firewall settings, update settings, and internet explorer security settings.

While using Windows Vista, what utility would you use to monitor and change security settings for internet explorer? A) Action Center B) Windows Update C) Windows Security Center D) Security and Maintenance

ntbtlog.txt file

Windows writes the results of boot logging into what/where

Iwconfig ap 00:0D:9D:C6:38:2D IWCONFIG is a Linux command line tool for configuring wireless settings. IWCONFIG can be used to change settings like authorized access points, signal strength, wireless channel, and what SSID to connect to. IP Address, subnet mask and DNS servers are still configured via IFCONFIG.

You are a desktop technician for a public school district. Your supervisor has asked you to write a script that will configure the wireless adapters on student's Linux based laptops to connect only to authorized access point. Assuming the access point's MAC Address is 00:0D:9D:C6:38:2D, which command will help you achieve this? A) Ethtools -lock 00:0D:9D:C6:38:2D B) Ifconfig eth0:0 00:0D:9D:C6:38:2D C) Iptables /netfilter auth-only 00:0D:9D:C6:38:2D D) Iwconfig ap 00:0D:9D:C6:38:2D

Change the user's account password Changing the account password will most likely solve the issue, but better preventatives should be put in place as soon as possible. Spam filters typically ignore local emails, which is why this is not the correct answer.

You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue? A) Check the networks firewall for unauthorized entries B) Reinstall the user's email client C) Change the user's account password D) Install a more expensive spam filter

When the air conditioner and humidifier run simultaneously they cause a power drop. When the air conditioner and humidifier run simultaneously they cause a power drop. You need to put your server on its own circuit to prevent these power drops from happening. Incorrect Answers:A humidifier coming on shouldn't cause a surge. That's the job of a lightning storm.The humidifier is in this room to add humidity in dry environments. They are used to prevent ESD, not cause it.WiFi won't interfere with your network server.

You are a technician and you receive a call from a local business that reports that their server is rebooting at random times. After looking over their equipment you notice that the server is plugged into a surge supressor which is then plugged into the nearest wall outlet. After further inspection, you notice that there is also WiFi equipment, a portable humidifier, and a small window mounted air conditioner in the room. The server logs show no errors causing the reboots. What is MOST likely causing these random reboots? There is interference between the WiFi equipment and the server. The humidifier is creating too much humidity causing ESD. When the humidifier comes on, it creates a surge, causing a reboot. When the air conditioner and humidifier run simultaneously they cause a power drop.

Robocopy Robocopy is the best option for copying files in this case. Robocopy has functionality to tolerate connection failure and still resume copying.

You are copying several very large files to a remote server that experiences intermittent connectivity issues. Choose the tool that would be best used for this task. A) Robocopy B) Copy C) Xcopy D) CD

IIS IIS or Internet Information Services is the Windows term for the Web Server role. While, you may be tempted to choose Network Load Balancing (NLB) as the correct answer, please note that teamed NICs can operate without the NLB service implemented.

You are deploying a web server in a Windows environment and are tasked with ensuring that internal clients can access the resources hosted on the server via an internet browser. Firewall ports have been opened for 80, 443, 20, 21 and 23. Your server is running Windows Server 2012 R2 and it is configured with teamed NICs. Which service is most likely needed on this server? A) NLB B) VDI C) IIS D) NPS

Use the correct RAID driver Many RAID cards require a vendor specific driver to function with Windows. In order to install Windows, you first need to provide it with the proper RAID driver.

You are installing Windows Server 2008 R2 onto a new company file server that uses a RAID card. You have verified that all cabling is correctly seated, but Windows is not recognizing any storage mediums for installation. Which of the following will most likely correct the issue? A) Ensure the Windows server supports PXE Boot/Installation B) Wait a few moments, then press refresh to force Windows to detect drives C) Enable PATA in the BIOS D) Use the correct RAID driver

System Monitor The System Monitor in Ubuntu Linux is similar to Task Manager in Windows operating systems. System Monitor will show allocated resources and running applications.

You are trying to identify which running application is causing a Ubuntu Linux server to run slowly. Which tool will identify running applications and their allocated resources? A) Task manager B) Services C) MSCONFIG D) System Monitor

Replace the motherboard and RAM module before deployment. In a business environment the safest course of action is to replace the motherboard and RAM module. This reduces the risk that a user will experience a client failure due to damaged hardware.

You are working on a PC that will be deployed in the office. You've forgotten to ground yourself by utilizing an ESD strap, an ESD mat or by touching bare metal on the PC case. While installing a RAM module you feel a static shock and a pop in the case. What is the best course of action to proceed? A) Swap the PC with the one on the new guy's desk. B) Utilize a new RAM module. C) Run a memory testing application to ensure that the module works. D) Replace the motherboard and RAM module before deployment.

It features a new Task Bar that enables you to pin items to it lock a dock

You are working with a customer and want to tell them all the new features of Windows 7 so they'll upgrade from Windows Vista. What is one thing you could tell them about? It comes with the all-new Aero interface It has a Sidebar, which enables you to install Gadgets It features a new Task Bar that enables you to pin items to it lock a dock It has a feature called UAC, which prevents programs from running unless given specific permission

Import the disk When a disk is listed as foreign in Disk Management, it means that you have recently installed a dynamic disk into your computer and it needs to be imported. Incorrect Answers:You can't convert the disk to a dynamic disk because it already is one.Converting the disk to a basic disk will destroy any data on the disk.You still have to import the disk before you format it. And if you were to format it, you would lose the data you have on the disk.

You are working within Disk Management in Windows and notice one of your drives is listed as foreign. What must you do to use the disk? (Choose the BEST answer.) Convert it to a basic disk Import the disk Format the disk Convert it to a dynamic disk

Administrative Tools menu in Windows Control Panel

You can use the Windows Task Scheduler to schedule updates while everyone is out of the office, or during the weekend. Where would you navigate to find the Windows Task Scheduler? A) Ease of Access Center B) Programs and Features menu in Windows Control Panel C) Windows Command Prompt D) Administrative Tools menu in Windows Control Panel

Disable automatic Windows Update. All of your best laid efforts in controlling the patching process will be for naught if you leave automatic Windows Update on! Disabling this will allow for you to control when patches are released to clients and enable you to test patches in your representative sample of clients in the organization prior to overall roll-out.

You have been placed in charge of client patch management for your organization. I am so, so sorry for you. As part of your new responsibility you have been charged with developing a new patching process. Assume that patching has been best effort in the past and that any existing processes will be discarded. Automatic Windows Update patching is enabled in your office. Choose the best first step to developing a patching process: A) Identify hardware commonalities for all systems. B) Disable automatic Windows Update. C) Select a group of clients that will receive patches before the rest of the organization. D) Begin a test round of patching.

Dependencies Based on the prompt for this question, the most likely cause is a dependency missing. This most likely means that a requirement for another service being active is not set. You should attempt to ensure that all dependencies are correctly enabled.

You have been tasked with determining why a service fails to start in a server test environment. There are numerous services required for the application to function, but a single service is failing to start upon boot. This service also happens to be the last service that is supposed to start. A delayed start is not required, nor is a manual start and the service is enabled. You can manually start the service and it will function normally until the next system reboot. The service is run under "System". Knowing these things you open up the "Services" application and check: A) Dependencies B) Recovery options C) Service restart timer D) Start parameters

The most restrictive permissions from both NTFS and Share will apply When accessing through a network share both NTFS and share permissions will apply. When accessing a file or folder directly only NTFS permissions will apply. In either case the principle of least privilege will apply and the most restrictive permissions will always take priority.

You have just configured permissions for a set of folders on an NTFS disk, the folders also have another set of share permissions. When a user connects to one of these folders through a network share, which of the following is true? A) The most restrictive permissions from both NTFS and Share will apply B) The least restrictive permissions from both NTFS and Share will apply C) Only Share permissions will apply when accessing through a share folder D) Only NTFS permissions will apply when accessing through a shared NTFS folder

Gpupdate "gpupdate" will pull all of the group policy settings from the Domain Controller, which can set uniform legal banners, backgrounds, and security settings for all of the company's systems. "regedit" is for editing the registry, while you can set these options through the registry it would be very tedious and not recommended. "msconfig" is a tool for editing startup, boot, and service options; it is not appropriate for this problem. "chkdsk" is for checking disk/file system integrity.

You recently connected a new Windows 8 machine to your company's network with Active Directory, but it is not displaying the proper company logon screen, legal banner, or wall paper. What tool is best suited for correcting this problem. A) Regedit B) Msconfig C) Gpupdate D) Chkdsk

Notify law enforcement Notifying Law Enforcement (LE) is the safe thing to do, then do not touch anything else on the machine. Making a copy of the drive could disturb forensic artifacts and metadata that would be useful to LE. Alerting management is a big risk, you don't know who the computer belongs to and if they may not report it. Powering the machine off is a big no-no, especially if the system already had problems starting or if encryption is involved.

You show up to work and there is a powered-on laptop on your desk, you co-worker instructs you to make a backup of the user files on the system since the system has been having problems booting. During the process you discover child pornography on the machine, what do you immediately do? A) Notify law enforcement B) Make a copy of the entire drive for Law Enforcement C) Alert your manager D) Power down the machine by removing the battery/power source

Provide relevant user training No level of security can protect against an inexperienced user. The best option is to provide relevant user training to ensure they are not being socially engineered into providing their network credentials.

You work in the IT Department for a medium sized company. A non-technical user consistently has their credentials compromised. You have investigated and found no evidence of viruses or other malicious software. What is the best option to prevent this from happening again? A) Setup safe mode on his computer B) Change his file permissions C) Enforce a short password expiration D) Provide relevant user training

Firewalls Zero-day exploits (ZDE) are very difficult to defend against since they exploit unpatched vulnerabilities. Firewalls (port blocking, and ACLs) do not typically rely on vulnerability patching to enhance security posture, thus it is the correct answer. Windows Update will not necessarily help against ZDEs as patches are not available yet. Anti-virus (AV) also suffers from solutions not being available, though AV vendors may push out patches quicker than OS vendors. Advanced attackers also work to avoid AV. BIOS/UEFI passwords do not really impact ZDEs.

Your employer is concerned about zero-day attacks to obtain their intellectual property, what security feature helps mitigate such an attack. A) Anti-virus B) Windows Update C) Strong BIOS/UEFI Passwords D) Firewalls

view/edit NTFS permissions

cacls is designed to _________?

TLS (Transport Layer Security)

protocol that allows for privacy between a server and a client

MMC Microsoft Management Console (MMC) is where you can manage all aspects of a computer network, including monitoring tools and driver checks.

A framework providing access to a collection of tools that can be used by administrators and advanced users to manage networks, computers, services, and other system components in Windows is known as: A) CMD B) MSCONFIG C) MMC D) MSTSC

Select load driver Often when installing Windows onto an external RAID array, a driver is required for Windows to detect the hard drives.

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives? A) Enable PATA in the BIOS B) Select load driver C) Press F8 when prompted D) Hit the refresh button to force a re-detect

"Does the PC turn on?" As a support technician you should always assume that a user has no knowledge of how computers and networks function. With this, it is always best to begin troubleshooting with the most basic questions to determine the issue.

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information? A) "Are you able to sign on?" B) "Does the PC turn on?" C) "Can you get to the Internet?" D) "Do you have a laptop or desktop?"

Patch testing before rollout Virtual machines can be used to test OS or software patches before rolling them out company-wide. That way, if the patches introduce any problems, there's no harm done. Incorrect Answers:You need as much RAM as you can get in a virtualization workstation.Virtual machines aren't used to configure other computers.

A virtual machine running locally would be best utilized in which of the following situation? On a PC with minimal RAM Thick client configuration Patch testing before rollout Gaming workstation configuration

SITF Scheduling Implementing Testing Fallback

Acronym for patch management? Then name them.

Malware infection Malware infection is a generic term used for intrusive software. Incorrect Answers:Virus is incorrect. A virus tends to corrupt or destroy data, not send e-mail.Man in the middle attacks are designed to collect data, not send e-mail.Phishing attacks are designed to collect data, not send e-mail.

An administrator disables a user's email account due to high volumes of emails being sent in a few hours. Which of the following types of attack has the user experienced? Man-in-the-middle attack Phishing attack Virus infection Malware infection

Microsoft Store

An online Microsoft software distribution platform for games and apps is known as A) Windows Store B) Microsoft Store C) App Store D) Windows Marketplace

It measures the velocity of the device The definition of an accelerometer is a device that measures proper acceleration (speed, velocity). These devices are built-in to many of our mobile devices, including smart phones and tablets. We also see accelerometers in cars to monitor when a crash has occurred so that 911 can be called. We also see accelerometers in your Nintendo Wii controllers so you can play games! Incorrect Answers:An accelerometer will not give your device longer batter life or increase the speed of your CPU.It also does not tilt the screen on your iPad. The accelerometer measures and detects the tilt in your screen, iOS then performs a function to tilt the screen for you. Yes, it's a mean answer, but I'm looking for a definition of an accelerometer, not the effect of one.

How would you define an accelerometer? Increases the speed of the CPU It tilts the screen when I rotate my iPad Gives the device a longer battery life It measures the velocity of the device

Privacy

When using Internet Explorer, what is the tab where you can manage pop-ups? A) Security B) Programs C) Privacy D) General

netstat

command that shows a list of all active tcp and udp connections being made to your PC at a given moment

LABEL

command to label your volume

-a

command used with PING to resolve an IP address to a host name

Quarantine the computer DLL not found errors should never be remediated by downloading the missing DLL. A missing DLL can be a symptom of a greater issue, but more pressingly DLL download sites can deploy malware via the downloads or open security loopholes on your PC. You should quarantine the PC, verifying that there has been no intrusion or compromise of the system before proceeding with investigating the missing DLL's root cause.

A client has received a DLL not found error and has reported the issue to you. The client has also informed you that they have downloaded the the missing DLL file from the internet and believes they have resolved the issue. What is the first action should you take to regarding this situation? A) No action needed, the missing DLL has been restored B) Re-image the PC to ensure no other DLL files are missing C) Verify that the correct DLL was downloaded D) Quarantine the computer

Drive wipe Drive wipe is the correct answer. Without wiping the drives, access to much of the data is easily recovered with free utilities found on the internet. Incorrect Answers:Chkdsk only checks for bad sectors on the drive, and repairs upon request. Degauss will destroy the drives completely, and they cannot be used again.Quick format will remove the data, however, it leaves the data open to recover with tools available freely.

A company is upgrading several hard drives to SSDs. The technician is to securely repurpose the old hard drives for use for other company systems. Which of the following procedures will prepare the hard drive for later use and ensure the data on the drive is not easily accessible? Drive wipe Degauss Chkdsk Quick format

Proxy settings Some viruses change a computer's proxy settings to use a proxy server controlled by the virus' creator. Incorrect Answers:A computer's browsing history won't have any affect on the ability to browse the Web.It's unlikely that a virus would change a computer's firewall settings to be more restrictive. If anything, you would expect a virus to turn off the firewall.Changed user privileges wouldn't prevent Web browsing.

A customer reports that after a technician cleaned up a rogue anti-virus program, the customer cannot browse the Web. Which of the following should the technician check to resolve the situation? Firewall settings User privileges Proxy settings Browsing history

MD

A technician is accessing a Windows PC via SSH. Which command can the technician use to create a new directory on the PC? A) New B) PUSHD C) MD D) CD

It will depend on the time when the account was last synced If it's been a while since the last sync, it will take longer to download the increased amount of e-mail. Incorrect Answers:The other answers will not affect the sync time for e-mail

A technician is reconfiguring a mobile e-mail client for offline mode. Which of the following describes the expected time it will take to synchronize the account with the e-mail server? It will depend on the time when the account was last synced It will depend on the POP settings of the email server It will depend on the SMTP settings of the email server There is no offline mode for email

Establish a plan of action After you've figured out the problem, it's time to figure out what you're going to do about it. Incorrect Answers:Documentation comes last.Inform the user after you've fixed the problem.Reporting to a supervisor isn't part of the troubleshooting process. Only do it if you need to escalate a problem you can't otherwise solve.

A technician is working on an issue and has identified the problem and worked out the cause. Which of the following would most likely be the next step the technician should make? Inform the user Document the cause and solution Report to the supervisor Establish a plan of action

Server and domain The technician needs to know the neighbor's work e-mail server and work domain name. Incorrect Answers:You don't need to know IP address info, domain info, or DNS info to set this up.

A technician needs to configure her neighbor's iPad. The neighbor wants to access his work e-mail. The technician requires some information from her neighbor's work IT department. Which of the following information does the technician need? Server and gateway Server and domain IP address and domain IP address and DNS

Standard format A standard format will erase the drive so that it can be cleanly overwritten. Incorrect Answers:A low-level format formats the disk at the surface level, and is a bit overkill for simply reinstalling a hard drive.A disk shredder completely destroys a hard drive. You're not installing anything on a shredded drive.A degaussing tool will permanently ruin a hard drive.

A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data? Low-level format Standard format Degaussing tool Shredder

Change the SSID's broadcast name. Add the intruding device to a blocked access list. It is best to block the device from your access list, but you can also prevent the connection by changing the SSID. Changing the SSID will also cause the intruder's system to lose the connection, but you will need to be certain the intruder does not connect to the new SSID. Incorrect Answers:Using the hot spot to access the intruder's device will not prevent them for the accessing your device.Turning off the hotspot will immedately stop the intruder, however, it also prevents your access.Utilizing a WiFi analyzer to identify the intruder will not prevent the unauthorized access.

A user is connected to his personal mobile hotspot device at a library for internet access. He notices the display shows two connections, instead of just one. Which of the following actions will prevent only unauthorized access to the device immediately? (Select TWO). Turn off the hotspot, and try later to see if the intruder has left. Change the SSID's broadcast name. Utilize a WiFi analyzer to identify the intruding device. Add the intruding device to a blocked access list.

Screen orientation lock is on.

A user is reporting that their phone is not adjusting its screen correctly based on orientation when viewing web pages. What is the most likely cause? A) Accelerometer failure. B) Screen orientation lock is on. C) Rotation is not supported by web browsers. D) Complete and total absence of gravity.

If the heat sink has come loose, the CPU will gradually build up heat until the it overheats and shuts off. You'd also hear the heatsink clunking around inside the case, letting you know that something's loose in there! Incorrect Answers:A bad CMOS battery would just result in the CMOS settings resetting to their default values whenever the PC was restarted.An unseated memory module wouldn't cause a PC to randomly shut down.A PC with a disconnected hard drive wouldn't shut down; you just wouldn't be able to access the hard drive in Windows.

A user reports that her desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the most likely explanation for the PC shutting down? A memory module has become unseated The CMOS battery is bad The heat sink retaining clip has broken loose The hard drive cable has become unseated

Establish a theory of probable cause Check to see what caused this random color phenomenom by establishing a theory. Incorrect Answers:You've already identified the problem... random colors, remember? You don't want to implement a solution yet, because you don't know what caused it (is it a software or hardware issue?) And finally, you can't document anything just yet. You'll handle that part later in the troubleshooting process.

A user's video card is starting to show random colors on the screen. Before replacing the card, which of the following troubleshooting steps should you do? Document your findings Establish a theory of probable cause Identify the problem

When identifying the problem When identifying the problem is the best time to do some back ups. Before making any changes to the system, you should always back it up. Incorrect:When you establishing a theory, testing your theory, or implementing a plan of action, you are more likely to be doing some significant changes to their computer. Back up before any of that!

According to the CompTIA A+ troubleshooting methodology, at what point during the troubleshooting process should you back up the computer? When identifying the problem When testing the theory to determine cause When establishing a plan of action to resolve the problem and implementing the solution When establishing a theory of probably cause

All computers must be on the same network. Domains allow for users to authenticate even if they are on different networks. Workgroups require that all users be on the same network.

All but one of the answers below are true of domain setups. The incorrect answer refers to a workgroup setup. Identify the incorrect answer. A) All computers must be on the same network. B) A user can use their account credentials on any computer. C) Security and permissions are managed by an administrator. D) There can be thousands of computers as members.

Wireless connectivity Remember the question says LEAST LIKELY. The questions states that internal web servers work but external ones do not. If wireless were the issue nothing would work at all. The issue is more likely to be related to external DNS, a firewall or an issue with the proxy used to connect outside the local network.

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue? A) DNS B) Firewall C) Wireless connectivity D) Proxy server

Domain Only a domain will give you a centralized, controlled network and allow for file servers, print servers, and network shares. These are possible in a workgroup, but will not provide the network control that a business would require.

An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation? A) Domain B) Ad-hoc C) Workgroup D) Token ring

Defragment the hard drive Disk fragmentation happens to a hard drive over time as you save, change, or delete files. Disk defragmentation is the process of consolidating fragmented data on a hard drive, so it will work more efficiently. Incorrect Answers:File paging manages your computer's memory usage.Virtualization allows you to utilize your system hardware to create multiple operating sytem images.UEFI replaces your BIOS and enables new hardware technology support on your motherboard.

An older computer has recently been upgraded to Windows 8.1. Since the upgrade, the computer is running unusually slow. The hardware does not meet the Microsoft requirements for the OS, and tested good. Which of the following is the MOST likely solution? Utilize virtualization Switch the BIOS to UEFI Enable file paging Defragment the hard drive

Hijack A browser hijack causes a browser to go to sites that it didn't intend. Incorrect Answers:A trojan is a type of malware that pretends to be a legitimate piece of software.A worm is a piece of malware that replicates through a network.A keylogger keeps track of the keys that a user presses in an attempt to steal sensitive information.

Browser redirection is caused by which of the following types of viruses? Worm Keylogger Hijack Trojan

NXBit No-eXecute (NX) bit is a technology featured in most modern processors that allows the CPU to segregate memory for use by a single application. The memory cannot be accessed by another application which helps to protect memory against malicious software.

Determine which of these options is a technology used by CPU's to segregate blocks of memory for exclusive use by an application: A) Harvard Architecture B) NXBit C) PXE D) Ivy Bridge

Hold SHIFT, then press DELETE Hold [Shift] down, then press [Delete] on any file you want. It won't go to the Recycle Bin. It's buh-bye gone! Incorrect Answers:Holding [Ctrl] won't do anything. Any answer involving the [Backspace] key won't have an effect, either.

I have a bunch of files on my PC and I want to delete them. And when I say delete them, I don't even want them going to the Recycle Bin. How can I do that in Windows? Hold CTRL, then press DELETE Hold SHIFT, then press DELETE Press the BACKSPACE key Hold CAPS LOCK, then press BACKSPACE

Foreign Windows Disk Management (WDM) will flag the new disk as foreign. This helps to recognize when new disks are added to a system.

In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the local computer is labeled as what? A) Offline B) Foreign C) Disconnected D) Online

System Restore The key fact here is that the application worked in the past but doesn't work now. Given the choices you have it's safe to assume that John possibly installed another program that created a problem with PowerPoint and that his best fix to this problem would be to restore the system to a time that PowerPoint was working. Incorrect:Last Known Good is a fine answer, but not the best. Last Known Good is used when you have a driver or registry problem that prevents Windows from starting up.Safe mode and Safe mode with networking are good answers as well, but with no drivers loaded in safe mode, it may be hard to troubleshoot this application-based problem.

John worked on his PowerPoint presentation yesterday, but today the program won't run. What Windows tool or option should he try to get PowerPoint working again? Safe mode with networking System Restore Safe mode Last Known Good Configuration

Disabled whenever possible. Local users should not be utilized whenever possible. Domain environments should authenticate users via the domain controller whenever possible. This eliminates numerous security vulnerabilities, such as controlling access to the PC if it is stolen and ensuring deactivated users cannot access a PC with non-domain credentials.

Local users on a server or desktop computer, in a domain environment, should be: A) Disabled whenever possible. B) Granted additional rights. C) Used exclusively. D) Updated often.

When you have a driver or registry problem that prevents Windows from starting up.

Main difference of Last Known Good Configuration ..as opposed to Safe Mode?

When you encounter no drivers loaded.

Main difference of Safe Mode ..as opposed to Last Known Good Configuration?

1.5x your system RAM

Minimum page file size for Windows 7?

In Control Panel, select Appearance and Personalization / Desktop Gadgets Microsoft integrated gadgets into the desktop in Windows 7. To add gadgets, go to Control Panel, select Appearance and Personalization | Desktop Gadgets. You can also right-click the desktop and select Gadgets. Double-click a gadget to add it to your desktop.

Sarah upgraded from Windows Vista to Windows 7 on her laptop. After enjoying the enhanced performance and new interface for a few days, she realized what was missing: the Windows Sidebar with its friendly clock and weather gadgets. How can she add gadgets to her Windows 7 computer?

UPS An uninterruptable power supply enables your computer to keep working even when the power goes down. You wouldn't want to run off a UPS for very long, but it at least provides you with the opportunity to save your work before shutting down. Incorrect Answers:HVAC stands for heating, ventilation, and air conditioning. This won't help you out in a brownout.A surge suppressor doesn't help when the power sags, but when the power, you know, surges.A power strip just splits one outlet into many. Not what you need, exactly.

The year is 2000. You've just taken a job in San Francisco, and you're moving to an area under constant threat of brownouts. What device should you take with you to protect against these power sags? Power strip Surge suppressor HVAC system UPS

Performance monitor The Windows Performance Monitor is used to check the state of resource usage and should be used as part of the process of verifying that additional resources are required.

There have been reports of a Windows server system running slowly and a member of the application support team has suggested adding more CPU and memory resources to the virtual machine. Before doing this you should check the _________ utility. A) Performance monitor B) Component services C) Device manager D) Windows memory diagnostics

False The Principle of Least Privilege states that users should have no more access than necessary to do their job. Administrators should have their administrative rights segregated from their user accounts by implementing a separate account for administrative actions.

True or False: Administrators should have administrative rights granted to their user account. A) True B) False

False Backups and snapshots are different methods of attaining data redundancy. A snapshot is an "image" of a server at a point in time, stored locally to the virtual host. This is important to note, as a backup is stored off of the host. While they both accomplish similar tasks, snapshots are typically used to revert changes made to a virtual machine when attempting new configurations. Backups are intended to preserve information stored on a server or database for future restoration if needed.

True or false: Backups and snapshots can be used interchangeably to ensure data redundancy. A) True B) False

False Brownouts, or temporary power drops in voltage, are as dangerous to systems as blackouts. Any interruption of voltage to a computer can cause damage or loss of data.

True or false: Brownouts are less dangerous to systems and hardware than blackouts. A) True B) False


संबंधित स्टडी सेट्स

PSY 2 PT. 2 Chapter 24, 27, 23, 28

View Set

amoeba sisters biology chapter 9

View Set

HESI Case Study Preeclampsia Ashley Cash

View Set

The gettysburg address and definition

View Set