902

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software?

NAC

Which of the answers listed below refers to a Unix command for copying files and directories?

cp

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

Backdoor

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

dd

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers)

DIR ( Your answer) DIR *.* ( Missed)

Which of the answers listed below refers to a Linux command that allows for assuming the identity of a different system user and executing commands with security privileges of that user account?

su

A Linux command that allows for modifying security privileges in order to be able to execute a single command that requires root access permissions is called:

sudo

Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.

False

"Kernel panic" is a term used to describe stop errors in: (Select all that apply)

Linux ( Your answer) Android ( Missed) Mac OS ( Missed)

Which of the following answers refers to the MS Windows client application for Remote Desktop Services?

MSTSC ( Your answer)

A command-line command in Linux used for deleting files and directories is known as:

rm

The following Windows command-line command can be used to display a list of domains, computers, or shared resources available on a specific computer.

NET VIEW ( Missed)

Which of the files listed below are required to start Windows XP? (Select 3 answers)

NTLDR NTDETECT.COM ( Missed) BOOT.INI ( Your answer)

The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures.

True

Which of the following commands exit(s) the command interpreter in Windows? (Select 2 answers)

TASKKILL /IM CMD.EXE ( Missed) EXIT

Which of the following command-line commands in Windows displays a list of currently running processes on the local computer or on a remote computer?

TASKLIST

Automatic boot to Windows Recovery Environment (WinRE) in Windows 8/8.1 requires the system to fail the boot process three times.

True ( Missed)

Which of the following might be the cause of slow computer system performance? (Select all that apply)

Unpatched OS ( Missed) Malware presence ( Your answer) OS power management options ( Missed) File fragmentation ( Missed) Disk thrashing ( Your answer)

Which of the terms listed below refers to an environmental control system?

HVAC

Which other command-line command besides REGEDIT can be used to launch registry editor in Windows?

REGEDT32 ( Missed)

What is the name of a Windows tool that can be used for troubleshooting problems related to Dynamic-Link Libraries (DLLs) and ActiveX controls?

REGSVR32

Which of the solutions/software tools listed below would be of use when troubleshooting a missing system GUI in MS Windows? (Select all that apply)

Safe mode video driver update ( Missed) System File Checker (SFC.EXE) ( Missed) VGA mode ( Missed)

The SFC utility in Windows:

Scans for and restores corrupted system files ( Missed)

Which of the following solutions would be of help in troubleshooting the "NTLDR is missing" error message displayed during system boot? (Select all that apply)

Startup Repair utility ( Missed) Disconnecting any external drives ( Your answer) Adjusting the boot sequence in CMOS setup utility ( Missed)

Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply)

System Restore ( Missed) Driver rollback ( Your answer) Malware removal ( Your answer) Startup Repair utility ( Missed)

Which of the following solutions would be the easiest while troubleshooting a Windows blue screen?

System restart ( Missed)

Which SHUTDOWN command switch in Windows Command Prompt forces full system shutdown and restart of the Windows host?

r

Which of the following switches puts the PING command in a loop (ping the specified host until stopped)?

-t ( Missed)

Which of the following wildcard characters can be used as a substitute for a single character in a file or directory name?

?

Which of the answers listed below refers to a package management system most often used on Debian and Debian-based Linux distributions?

APT ( Missed)

According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed:

After implementing the solution ( Missed)

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply)

Batteries ( Your answer) CRTs Toner cartridges ( Your answer)

In Windows Vista and newer releases of the Microsoft operating system the BOOT.INI file is replaced by:

Boot Configuration Data (BCD) file ( Missed)

A type of software that manages the startup sequence of an operating system is known as:

Boot loader ( Missed)

BOOTREC.EXE is a WinRE tool (available in Windows Vista and later releases of the Microsoft OS) used for troubleshooting: (Select 3 answers)

Boot sector errors ( Missed) Master Boot Record (MBR) errors ( Your answer) Boot Configuration Data (BCD) store errors ( Your answer)

Common troubleshooting steps related to Windows services that fail to start include: (Select 2 answers)

Checking for warnings and errors in Windows Logs and Application and Services Logs log spaces in the Event Viewer (EVENTVWR) ( Your answer) Starting the service manually in the Services applet (SERVICES.MSC) ( Missed)

Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed during system boot? (Select 2 answers)

Corrupt NTLDR file ( Your answer) The system is trying to boot from a non-bootable drive ( Missed)

Which of the Control Panel applets in Windows 7/8/8.1 provides access to a system tool used for troubleshooting mismatched file associations?

Default Programs ( Missed)

NETSTAT is a command-line utility which can be used for:

Displaying active TCP/IP connections ( Missed)

A type of agreement granting a user the right to use software application in a manner determined by the software vendor is known as:

EULA end user license agreement

Which of the following answers list(s) example(s) of boot loader software used in Linux operating systems? (Select all that apply)

GRUB ( Missed) LILO ( Your answer)

Which of the actions listed below enables access to the Automatic Repair utility during next system boot in Windows 8/8.1? (Select best answer)

Holding the Shift key and left-clicking on the power options button (Shut down/Restart) while in Windows ( Missed)

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:

MSDS manage material safety datasheets

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Malware

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

PII personally identiable information

Which of the following commands allows for editing Windows registry from the Command Prompt?

REG ( Missed)

Which of the following system utilities in Windows provides access to a database containing system configuration information?

REGEDIT ( Missed)

In computer security, a situation in which an unauthorized person is able to view another user's display or keyboard to learn their password or other confidential information is known as:

Shoulder surfing ( Missed)

Which of the Linux command-line commands listed below is used for directory traversal?

cd

A command-line command in Linux that allows to search files for lines containing a match to a given pattern is called:

grep (global regular expression print)

Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select all that apply)

help [command name] ( Your answer) [command name] /? ( Missed)

What is the name of a Linux command used for renaming files and directories?

mv

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

pwd (Print work directory)

Which of the answers listed below refers to a command used for invoking a text editor in Unix-like operating systems?

vi ( Missed)

Which of the wildcard characters listed below can be used as a substitute for any string of characters in a file or directory name?

* ( Missed)

Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all volumes?

/C ( Your answer)

Which parameter of the RD command in Windows allows for the deletion of an entire directory tree? (the specified directory and all its subdirectories, including all files)

/S ( Missed)

Which parameter of the System File Checker utility in Microsoft Windows combines scanning the integrity of all protected system files with restoration of corrupted files?

/SCANNOW ( Missed)

An essential Windows XP startup file containing a list of installed OSs as well as information on the location of the operating system files is called:

BOOT.INI ( Missed)

A boot loader application used in Windows XP is called:

BOOTMGR ( Your answer)

Startup files required to launch Windows Vista/7/8/8.1 include: (Select 3 answers)

BOOTMGR (Windows Boot Manager) ( Missed) BCD (Boot Configuration Data) ( Missed) WINLOAD.EXE ( Your answer)

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following BOOTREC options should be used by a technician for manual CLI troubleshooting of this error?

BOOTREC /RebuildBcd ( Missed)

Windows Recovery Environment (Windows RE) offers a set of tools and utilities to troubleshoot Windows startup issues. Which of the following commands launches a tool for manual troubleshooting of problems related to master boot record (MBR), boot sector, and Boot Configuration Data (BCD) store in Windows RE Command Prompt?

BOOTREC.EXE ( Missed)

An MS Windows stop error is informally referred to as:

BSoD

Which of the following commands in Windows change(s) the current directory to the root directory? (Select all that apply)

CD\ ( Missed) CHDIR\ ( Missed)

The following command clears the Command Prompt window screen in Windows

CLS ( Missed)

Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that apply)

CRTs ( Missed) Power supplies ( Your answer) Inverters Laser printers ( Missed)

What is the function of the Linux chmod command?

Changes file access permissions ( Missed)

If an application written for an earlier version of MS Windows doesn't run correctly the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab ( Missed)

Which of the key combinations listed below allows to stop the execution of the current command run in Windows Command Prompt?

Ctrl+C ( Missed)

A type of control access technology providing protection against copyright infringement is called:

DRM ( Missed) digital rights management

Which of the following sequence of steps in Windows Device Manager (DEVMGMT.MSC) allows for reverting back to the previously installed driver when a device fails after driver update?

Double-click the device type to view devices in that category -> Right-click on the device and select Properties -> On the Driver tab, click the Roll Back Driver button ( Missed)

Which of the hardware-related solutions listed below can be used in troubleshooting failed system boot process? (Select 2 answers)

Drive cable/connector check ( Missed) Hard drive replacement ( Missed)

The "help [command name]" syntax in Windows shell can be used for displaying help information related to any command-line tool available in Windows, including utilities that fall into the category of network command-line tools (e.g. PING, IPCONFIG, NETSTAT, and others).

False

Which of the following could cause slow performance of a hard drive? (Select 3 answers)

File fragmentation ( Missed) Disk thrashing ( Your answer) Insufficient amount of RAM ( Missed)

Which of the following command-line commands are used in Windows to create a directory or subdirectory? (Select all that apply)

MD MKDIR

A framework providing access to a collection of tools that can be used by administrators and advanced users to manage networks, computers, services, and other system components in Windows is known as:

MMC ( Missed) microsoft management tool

Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers)

MSCONFIG settings ( Missed) Corrupt device driver ( Your answer)

What is the name of a Linux utility used for managing software packages on Red Hat and Red Hat-based Linux distributions?

Yum ( Missed)

Which of the following answers refers to a Linux command-line command used for configuring network interface parameters specific to the wireless communication?

iwconfig ( Missed)


Set pelajaran terkait

Ch. 4 Magma, Igneous Rocks & Intrusive Activity

View Set

Ch 1, 2, 3, 5, 6, 7, 15 Quiz and Mid-Term for Real Estate Mortgage Lending

View Set

Political Examples of Self Government

View Set