Polaris Composite Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A computer technician is installing a RAID. If the RAID uses striping with parity, which RAID level is the technician using?

5

Which port number is used by Virtual Network Computing (VNC) to provide remote screen sharing between devices?

5900

A computer technician is installing a RAID. If the RAID uses striping with double parity, which RAID level is the technician using?

6

Why is a full format more beneficial than a quick format when preparing for a clean OS installation?

A full format will delete files from the disk while analyzing the disk drive for errors.

When attempting to improve system performance for Linux computers with a limited amount of memory, why is increasing the size of the swap file system not considered the best solution?

A swap file system uses hard disk space to store inactive RAM content.

What determines the level of support that a call center technician will provide to an individual customer?

All customers receive the same level of support by the call center.

A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem?

An application is using a resource that has become unavailable.

A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting?

DNS

A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove stubborn malware?

Enter Safe Mode and do a system restore.

Which term describes a partition scheme that takes a portion of disk space of 512 bytes long and that contains the boot loader?

FAT32

A technician has connected a new internal hard drive to a Windows 10 PC. What must be done in order for Windows 10 to use the new hard drive?

Initialize the new hard drive.

Which statement describes a feature of SDRAM?

It can process overlapping instructions in parallel.

What is an accurate description of asymmetric encryption technology?

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.

What service does PRINT$ provide?

It provides a network share for accessing shared printers.

What is a characteristic of DDR SDRAM?

It transfers data twice per clock cycle compared to once per clock cycle for SDRAM.

Match the memory type to the feature. (Not all options are used.)

It's connector has 288 pins and has advanced error correction features -> DDR4 SDRAM It's connector has 184 pins and is able to support two writes and two reads per CPU clock cycle. -> DDR SDRAM It's connector has 240 pins and consumes 1.5 Volts of power. -> DDR3 SDRAM It's connector has 240 pins and consumes 1.8 Volts of power. -> DDR2 SDRAM

Which three features can be configured in the BIOS settings to secure a computer? (Choose three.)

MAC filtering drive encryption passwords

Which standard provides a bridge between laptop hardware and the operating system and a way for technicians to configure power management schemes to get the best performance?

PCIe

A technician wishes to prepare the computers in the network for disaster recovery. The network consists of a variety of desktops and laptops from different vendors. All the computers are running either a 32-bit version of Windows 10 Pro or a 64-bit version of Windows 10 Pro. How would the technician prepare the recovery media?

Prepare individual recovery discs for all the computers.

What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)

Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure. Access the BIOS and change the boot order options.

A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

RDP uses an encrypted session. RDP connects on TCP port 22.

Which memory module used to hold instructions for booting a PC and loading the OS, but is still used on adapters even though the memory contents cannot be changed?

ROM

Which feature is included with macOS and provides the ability for a remote user to view and change files, folders, and applications on the local computer?

Remote Assistance

What ACPI power state describes when the computer is on and the CPU is running?

S0

What ACPI power state describes when the CPU and RAM are still receiving power but unused devices are powered down?

S1

What ACPI power state describes when the CPU is off, but the RAM is refreshed?

S2

What ACPI power state describes when the CPU is off and the RAM is set to a slow refresh rate, often called suspend mode?

S3

What ACPI power state describes when the CPU and RAM are off and the contents of RAM have been saved to a temporary file on the hard drive?

S4

What ACPI power state describes when the computer is off?

S5

What is the difference between a scripting language and a compiled language?

Scripting languages need to be converted into executable code using a compiler, while compiled languages are interpreted as they are executed.

A company is looking for a next-generation firewall that provides VPN functionality, IDS/IPS functionality, and DoS/DDoS protection. Which device would be best suited for this task?

TPM

An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products. The IT technician should have requested permission from a supervisor to send the customer emails.

A user reports that a Windows 10 PC displays the error message "Invalid Boot Disk" during the boot process. The IT technician attempts to boot the computer and finds that the error message occurs immediately after the POST. What could be the possible cause?

The MBR/GPT is corrupted.

A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this?

The SID of the original PC is not cleared when creating the image with DISM.

A customer brings in a laptop with a touch screen that is not working correctly. The touch screen either does not respond at all or provides unusual or inaccurate responses. What is a possible cause for such behavior?

The digitizer is faulty.

Which condition is required when planning to install Windows on a GPT disk?

The maximum partition size cannot exceed 2 TB.

The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)

USB stick TPM

An organization has purchased a custom application for the sales staff that can only be installed on a 64-bit Windows operating system. Each member of the sales staff has a Windows 8.1 32-bit PC. What must the IT department do in order to install and run the application on the sales staff computers?

Upgrade the 32-bit Windows 8.1 to 64-bit Windows 10.

Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)

VMware ESX/ESXi Oracle VM VirtualBox

A user is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?

There are no more steps, the boot process is complete.

A technician is booting a laptop that has Windows 10 installed with 2 GB RAM. The boot process is currently working on the following step: NTOSKRNL.EXE starts the login file called WINLOGON.EXE. What is the next step that will happen in the boot process?

WINLOGON.EXE displays the Windows Welcome screen.

A technician wishes to perform a customized unattended network installation of Windows 10 on a PC. The requirements include the installation of specific applications and device drivers through the use of an answer file. What would the technician use to create the answer file?

Windows SIM

Which term describes a file system for optical disk media?

active partition

Which change management process component is concerned with the business processes that are affected by changes?

approval

Which two laptop components are considered replaceable by the customer. (Choose two.)

battery RAM

A user wants to synchronize some apps, movies, music, and ebooks between mobile devices. What are the two types of connections used to synchronize this type of data? (Choose two.)

cellular Wi-Fi

What are three pieces of information a level one technician should gather from a customer? (Choose three.)

description of the problem details of any recent changes to the computer output from diagnostic software

Which area of concern falls under the operations and planning category in IT documentation?

end-user manual for hardware and software

Which term describes a file system that supports a partition size up to 16 exabytes?

extended partition

Which term describes a partition that supports up to 23 logical drives?

extended partition

Which term describes a type of storage device that supports a partition to be extended into adjacent unallocated space as long as it is contiguous?

formatting

Which three components are used to assign file and directory permissions in Linux systems? (Choose three.)

group owner all users

A customer has requested that a PC be built that will support eSATA. Which component should be checked to be sure that this feature is supported?

hard disk

What three values must be added to the IPv4 properties of a NIC in order for a computer to have basic connectivity with the network? (Choose three.)

subnet mask DHCP server address default gateway

What skill is essential for a level one technician to have?

the ability to gather relevant information from the customer and pass it to the level two technician so it can be entered into the work order

When a PC is being assembled, what component is connected to the motherboard with a SATA cable?

the optical drive

What are two security risks associated with sharing printers in a corporate environment? (Choose two.)

user authentication document viewing in the print queue

A computer technician is installing a RAID. If the RAID uses striping, which RAID level is the technician using?

0

A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device?

0607:1234:aa10:ba01

A computer technician is installing a RAID. If the RAID uses mirroring, which RAID level is the technician using?

1

A computer technician is installing a RAID. If the RAID uses mirroring and striping, which RAID level is the technician using?

10

Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?

virus

In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)

when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data


संबंधित स्टडी सेट्स

World Geography A: Unit 5 - Primavera

View Set

Assessment Screening for Drugs and Alcohol

View Set

Alternating current and Transformers

View Set

Ch. 15 study guide, The secondary assessment

View Set

Chapter 21 Mosby's Review Medical Emergencies

View Set