A+ 1002

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Thomas has been given a company iPad that will be used for storing private data and photos of clients. He needs to protect the integrity of the data on this device. What should he do? (Choose two.) A. Turn on Find My iPhone in Settings. B. Turn off Siri C. Turn on Touch ID and Passcode. D. Enable WPA 2

Turn on Find My iPhone in Settings. Turn on Touch ID and Passcode.

You'd like to upgrade your computer from Windows 7 to Windows 8.1. Which of the following utilities can test your computer for its upgrade compatibility to this new operating system version? A. Windows Upgrade Wizard B. Upgrade Evaluation Tool C. Upgrade Assistant D. System Upgrade Recommendation E. Windows Upgrader

Upgrade Assistant

Which switch of the Robocopy command will copy subdirectories but skip empty ones? A. DCOPY: T B./S C./B D./E

/E

Which of these would be an example of an APIPA address? A. 192.168.10.10 B. 169.254.192.168 C. 172.20.169.254 D. 10.77.2.22 E. 127.0.0.1

169.254.192.168

What is the minimum memory requirement for the 64-bit version of Windows 8.1 Pro? A. 1 GB B. 2 GB C. 4 GB D. 8 GB E. 16 GB

2 GB

Which of the following is a common refresh rate for laptop computers?

60Hz

Which of these Windows 7 functions contain a consolidated view of alerts, an overview of OS features, and a color coded status display? A. Action Center B. Event Viewer C. Security Center D. Device Manager

A. Action Center

Which of the following features are included with all editions of Windows 8.1? A. Integrated anti-virus and anti-malware B. Support for BitLocker C. Group Policy support D. Support for joining Windows Domains E. Integrated EFS file encryption

Integrated anti-virus and anti-malware

Which of these commands would remove a directory called \FILES ? A. ED \FILES B. RD \FILES C. FORMAT \FILES D. MD \FILES E. ?\FILES

RD \FILES

What should you expect when dealing with coaxial cable? A. RS-232 B. RG-59 C. RJ-45 D. RJ-11

RG-59

Which of the following is the best solution for repairing a hard drive when a computer displays an "NTLDR is missing error" upon booting? A. Recovery Console with the bootcfg /rebuild command B. Recovery Console with the fixboot command C. Recovery Console with the chkdsk command D. Recovery Console with the fixmbr command

Recovery Console with the fixboot command

Before donating an unwanted Windows 8.1 computer, it's a good idea to perform a: A. Restore B. Reset C. Refresh D. Recovery

Reset

Which of these programs would be the best choice for mirroring all of the files in a directory tree? A. copy B. robocopy C. sfc D. xcopy

Robocopy (robust copy) is a very functional file copy utility for Windows

What is the recommended way to "defragment" SSDs? A.Manually rearrange files on the disk B.Run a traditional disk defragmenter C.Run TRIM commands D.Benchmark the disk's performance

Run TRIM commands

Which of the following would be the best way to control applications that run exclusively in the background? A. REGEDIT B. SERVICES.MSC C. MSTSC D. DXDIAG E. MSINFO32

SERVICES.MSC

After Gerald upgraded his OS to Windows 7 Professional, some of his programs from Windows XP won't load properly. What should Gerald do to remediate the issue? A. Set up Windows XP Mode. B. Restore a system restore point. C. Re-install the programs. D. Roll back the drivers.

Set up Windows XP Mode.

Which of the following can be used to associate file extensions with an application? A. attrib.exe B. assoc.exe C. Shift+right-click and choose Open With D. Tools@@→ Folder Options@@→Associate tab

Shift+right-click and choose Open With

Mike receives a phone call from a man named Gregory claiming to be from tech support. Gregory knows Mike's name and that he has Windows 10 Enterprise installed on his workstation. Gregory instructs Mike to open Event Viewer and look at some event log entries to highlight the effects of a virus on Mike's workstation. Gregory also asks Mike for his login ID and password so that he can fix the virus situation on Mike's workstation. What type of security threat is this an example of?

Social engineering

Which option below is characterized as using personalized details in an attempt at obtaining information? A. Whaling B. Spear phishing C. Spoofing D. Impersonation

Spear phishing

Brian is keeps getting an error when his Windows 7 PC boots. When you troubleshoot the problem, you discover that the PC is attempting to start a program that has been removed from the computer. You decide to prevent the error from occurring by disabling the application in the System Configuration utility Which tab should you access?

Startup

The _____________ Windows features allows you to group separate physical disk drives together and manage them as a pool. A.Disk Management B.Dynamic Disk C.Storage Spaces D.Diskpart

Storage Spaces

Charles is interested in observing the real-time global memory usage of his PC. What should he use? A. Event Log B. Device Manager C. Performance Monitor D. Task Manager

Task Manager

You are working with a folder on a drive that has used Windows NTFS compression. You notice that when you move files to other folders, the files do not always remain compressed. What is the most likely cause of this issue? A. The destination folder does not have compressions set B. The copy process will always decompress files C. The destination folder is on a different drive and does not have compression set D. Right-click the printer in the Printers folder and choose the Sharing command

The destination folder is on a different drive and does not have compression set

Recovery Console command to scan for OS installations and rebuild info into boot.ini file.

bootcfg /rebuild

Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection? A. DSL B. ISDN C. Cable D. FIber

c. Cable

Which command should be used to change directory in Ubuntu? A. cd B. grep C. ls D. ps

cd

Recovery Console command to check integrity of the disk.

chkdsk

You'd like to check your hard drive for problems. Which chkdsk option will examine every sector of the disk and attempt to correct any bad sectors? A. chkdsk /r B. chkdsk /e C. chkdsk /f D. chkdsk /s

chkdsk /r

Check your hard drive for problems with the file system and for bad sectors.

chkdsk.exe Check Disk

Which command should be used to change permissions on a file in Ubuntu? A. chmod B. su/sudo C. ifconfig/iwconfig D. chown

chmod

Which command should be used to change ownership of a file in Ubuntu? A. chmod B. su/sudo C. ifconfig/iwconfig D. chown

chown

Which command should be used to copy files and directories in Ubuntu? A.dd B. mv C. ls D. cp

cp

Which command should be used to create a hard drive image in Ubuntu? A.dd B. mv C. ls D. cp

dd

Used from the command line, or graphically through the Microsoft Management Console (MMC) and dfrg.msc.

defrag.exe Disk Defragmenter

Logging component of the operating system; the central location for all logging activity.

eventvwr.msc Event Viewer

Recovery Console command to rewrite the master boot record of the hard drive.

fixmbr

Evaluate the resultant policy results and list all GPOs which apply to the current computer or user.

gpresult.exe Group Policy Results

Re-process Active Directory (AD) Group Policy Objects (GPO) on the computer.

gpupdate.exe Group Policy Update

Which command should be used to find a pattern of text within a file or group of files in Ubuntu? A. cd B. grep C. ls D. ps

grep

Display basic TCP/IP configuration, such as IP address, subnet mask, and default gateway.

ipconfig

Display TCP/IP settings, including your Media Access Control (MAC) address, domain name system (DNS) server, and lease information.

ipconfig /all

Which command should be used to list file and directory contents in Ubuntu? A.dd B. mv C. ls D. cp

ls

When working with Windows Disk Management, you see that one of your disks is identified as "resynching." What is the most likely reason for this status type? A. A drive in a RAID 1 array has failed B. A replacement drive was added to a RAID 5 array C. A drive in a RAID 5 array has failed D. A replacement drive was added to a RAID 1 array

A replacement drive was added to a RAID 1 array

You've just updated a device driver, but you've run into a problem with the new version of the driver. Which Windows feature would be the best choice for reverting to the previous configuration? A. System Restore B. Volume Shadow Copy C. Windows Backup D. Compatibility Mode E. Windows Easy Transfer

A. System Restore

Which of these would be a valid upgrade path from Windows 7 Home Premium? Pick two. A. Windows 7 Professional B. Windows 7 Home Basic C. Windows 7 Starter D. Windows 7 Enterprise E. Windows 7 Ultimate

A. Windows 7 Professional and E. Windows 7 Ultimate

Which of the following would best describe PowerShell? A. Manage the power usage of the computer and monitor B. Automate system administration function C. Monitor the power consumption of your computer D. View your home or business power usage E. Display memory and CPU utilization on the Windows desktop

Automate system administration function

Which of these commands would you use to delete a folder from your hard drive? A. CD B. RD C. MD D. FD

B. RD

Which option below is considered 2FA? A. Username, password, and PIN B. RSA token and Password C. ID card and Key D. All of the above

B. RSA token and Password

Eric has called the help desk to report a slow running workstation. A desktop support technician is sent out to investigate. The technician performs a reboot of the thick client and receives a S.M.A.R.T. error message. Which action below should the technician perform FIRST? A. Backup the hard drive B. Run diskpart C. Run chkdsk D. Reformat the hard drive

Backup the hard drive

Which of the following would you not expect to find in the Windows 8.1 Charm bar? A. Search B. Share C. Logout D. Devices E. Settings F. Start

C. Logout

Which of these would be a common function from the Computer Management console? A. Restore the master boot record B. Change a local user's password C. Modify the BIOS device boot sequence D. Add a Windows Firewall rule E. Update the Windows operating system file

Change a local user's password

You are seeing streaks of toner across your papers when you are printing things using your office's laser printer. What is the MOST likely cause of this problem? A. Change the feed rate of the paper B. Clean the printer's transfer roller C. Increase the temperature of the fuser element D. Replace the toner cartridge in the printer

Clean the printer's transfer roller

Which of these applications would be the best choice to provide device COM+ management, access to the Event Viewer, and management of Windows Services? A. Computer Management B. Data Sources C. Component Services D. System Configuration

Component Services

Which of these utilities would be the best choice for managing COM+ apps? A. Component Services B. Computer Management C. Command Prompt D. Computer Registry

Component Services (The Windows Component Services utility is designed to help you support the distributed Component Object Model applications. In the Component Services utility, you'll find Component Service configurations, integrated Event Viewer, and access to Windows Services management.)

Which of these utilities consolidate the Task Scheduler, Event Viewer, Performance, Device Manager, and other administrative tools into a single "pane of glass?" A. System Configuration B. Computer Management C. Local Security Policy D. Windows Services

Computer Management

Frankie just bought a new Wi-Fi-enabled Nest Thermostat for his condo. He asked you to install the device, but he's worried about a hacker breaking into since it's an IoT device. What is the BEST thing you can do to alleviate Frankie's concerns? (Select two answers.) A. Upgrade the firmware of the router B. Configure WEP C. Disable wireless connectivity to the thermostat D. Configure 2FA E. Configure WPA2 F. Configure a DMZ

Configure WPA2, Configure a DMZ

You have discovered that hackers are gaining access to your wireless network. After researching, you discover that the hackers are using war driving. You need to protect against this type of attack. What should you do? (Choose all that apply.) A. Configure the network to use WPA authenticated access. B. Change channel selection to Auto C. Change the default Service Set Identifier. D. Disable SSID broadcast.

Configure the network to use WPA authenticated access. Change the default Service Set Identifier.

You are attempting to research the cause and solution of an issue that is plaguing several users at your company. What source is not normally considered to be a source of research for troubleshooting? A. Corporate policy manual B. Vendor manuals C. Service documentation D. Vendor knowledge base

Corporate policy manual

Which of these features are NOT exclusive to dynamic disk storage? A. Spanning of multiple disks to create a single large volume B. Splitting of files across multiple physical disks (striping) C. Duplicating of files across multiple physical disks (mirroring) D. Creation of both primary and extended partitions

Creation of both primary and extended partitions

Which of the following commands could be used to improve the read and write performance of a hard drive volume? A. DISKCACHE B. DEFRAG C. SSD D. DISKSPEED E. WINDISK

DEFRAG

You've recently purchased a used hard drive for your desktop computer. After installing the drive, you notice that the drive has not been erased and it already has an existing partition. Which of these Windows utilities can be used to examine the details of the disk and its partitions? A. Disk Management B. CHKDSK C. Device Manager D. Event Viewer

Disk Management

You are reviewing a set of customer complaints against one of your support staff. Which of the following items is related to the protecting customer confidentiality? A.Offer different repair options B.Follow up with customer at a later date to verify satisfaction C.Do not discloses experiences at customer sites D.Avoid dismissing customer problems

Do not discloses experiences at customer sites

What kind of Windows disk would allow you to create a single large volume by combining separate physical drives? A. Basic Disk B. Advanced Disk C. Dynamic Disk D. Enhanced Disk

Dynamic Disk (A Windows Dynamic Disks supports spanning multiple drives to create a large volume, disk striping, redundant mirroring, and other enhanced features.)

Disks in Linux systems are ordinarily formatted with which file system? A.CDFS B.EXT4 C.NTFS D.FAT32

EXT4

A user's smartphone is overheating. Which of the following is the most likely cause? A. Damaged battery B. Proper ventilation C. Virus D. Damage to the CPU E. Faulty GPS program

Faulty GPS program

Which of option below most likely require you to use Performance Monitor? A. Generate the details of a BSOD that occurred this afternoon B. Run a comprehensive system memory diagnostic C. Determine which applications launch during the Windows startup process D. Generate a report on memory utilization

Generate a report on memory utilization

Sharon is building a network attached storage (NAS) device that will be used exclusively as a file server for her SOHO network. Which of the following should she install to BEST meet her needs? (Select 2 answers) A. Gigabit NIC B. FastEthernet NIC C. RAID 5 D. 1 TB SSD E. RAID 0

Gigabit NIC, RAID 5

Which of these would most likely not be tested during POST? A. Video card B. USB ports C. Hard drive read access times D. Random Access Memory

Hard drive read access times

The Disk Management utility lists a disk as "Foreign." Which of the following statements best describes how to make the disk usable? A. Convert the disk to dynamic. B. Convert the disk to basic. C. Import the disk. D. Set the disk to active.

Import the disk.

Mike is having trouble with his laptop. He's unable to access in-office network files while working from home. Which option below is the MOST likely cause of the issue? A. Inactive VPN B. Untrusted software C. MDM policies D. Outdated antivirus

Inactive VPN

What should you do prior to the upgrading a Windows 7 Home Premium computer to Windows 8 Home Premium?

Install the latest service pack.

Your company 's network has 33 computers that are directly connected to two switches using CAT 5e cables. The two switches are interconnected using a fiber cable with MTRJ connectors on the end of the cables. All 33 computers and the 2 switches are located within the same office building. Which of the following types of networks would best describe this network configuration?

LAN

Which of these would require a stand-alone Windows user to select a different password each time it is changed? A. Windows Scheduler B. Windows Firewall C. Local Security Policy D. Task Manager E. Windows System Configuration

Local Security Policy

In which of these situations would you be most likely to use DISKPART? A. Check for logical and physical errors on a storage device B. Recover a deleted file from flash drive C. Manage the partitions of a storage device D. Perform a secure wipe of all drive contents

Manage the partitions of a storage device (The DISKPART is the command line tool that has replaced the FDISK command found in previous Windows versions.)

Which command will list the currently existing shares? A. Dir B. Net Use C. Netstat D. Ipconfig /all

Net Use

Which command will list the currently existing shares? A. Ipconfig /all B. Net Use C. Netstat D. Dir

Net Use

Which of these would best describe a network location set to Public? A. You can see all of the devices on the networ B. Your computer is managed by the Active Directory domain C. All of the devices on the network can see you D. Network discovery is turned off E. You can join an available HomeGroup

Network discovery is turned off (When Windows 7 is set to a Public network location, discovery is disable and other devices are not able to see you on the network.)

Which of these technologies allows an application to use a database without any specific knowledge of the database engine? A. COM+ B. Access C. ODBC D. SQL E. dBASE

ODBC (Open Database Connectivity) allows application developers to create and access information in a database without requiring any specific knowledge of the database service in use.

What Windows technology is the primary focus of the Windows Data Sources utility? A. Active Directory B. ODBC C. COM+ D. DLL

ODBC (Windows Open Database Connectivity is a common framework for interfacing applications with data in databases. The Windows Data Sources utility provides a central facility for managing database drivers and connectivity.)

Kevin wants to restore a Windows machine to how it was when the PC when he purchased it new from Amazon. What should he do to achieve this goal? A. Press F8 during POST, and select Advanced Boot, Repair Your Computer, and System Image Recovery. B. Press F8 during POST and select Advanced Boot, Repair Your Computer, and System Restore C. Use the format command. D. Use the Disk Management program

Press F8 during POST, and select Advanced Boot, Repair Your Computer, and System Image Recovery.

Which command should be used to work with Advanced Packing Tool and install apps in Ubuntu? A. dd B. mv C. apt-get D. cd

apt-get

Which of these would be the best way to upgrade a 32-bit Windows 7 Professional system to a 64-bit version of Windows 7 Professional? A. Windows Anytime Upgrade B. In-place upgrade using the x64 installation media C. Windows Easy Transfer D. Windows Upgrade Advisor from the x64 installation media E. In-place upgrade using the x86 installation media

Windows Easy Transfer

Which of these operating systems can be upgraded directly to Windows 7 Professional with an in-place upgrade? A. Windows XP Professional B. Windows Vista Business C. Windows Vista Enterprise D. Windows XP Professional (x64)

Windows Vista Business

On your Windows Vista computer, you notice that your hard drive access light is constantly blinking, even when your computer is idle. Which of the following is the most likely cause of this constant drive access? A. The hard drive is constantly retrying a bad sector on the hard drive B. The computer is configured to constantly check the hard drive performance C. The hard drive throughput can't keep up with the data requests D. Windows Vista is indexing the files on your hard drive

Windows Vista is indexing the files on your hard drive

Which of these operating systems can be upgraded in-place to Windows Vista Business? A. Windows XP Home B. Windows XP Professional x64 C. Windows 2000 D. Windows XP Media Center

Windows XP Home

You would like to connect to an administrative share on Server1 so that you can copy some files up to the server. Which address would you use to reference an administrative share? A. \\server1\c B. \\server1\data C.\\data\server1 D.\\server1\c$

\\server1\c$

Which path template should you use for mapping a network drive? A. \\shareservername B. \\passwordshare C. \\server\share D. \\share\server

\\server\share

Reconfigure the boot process for troubleshooting and diagnosing the boot process.

msconfig.exe System Configuration Tool

View hardware and configuration information for your computer.

msinfo32.exe System Information

Which command should be used to move or rename a file in Ubuntu? A.dd B. mv C. ls D. cp

mv

Which command should be used to change the passwords of user accounts in Ubuntu? A. pwd B. su/sudo C. passwd D. chown

passwd

View detailed performance information, reports

perfmon.exe Performance Console

Which command should be used to provide a list of current processes running in Ubuntu? A. cd B. grep C. ls D. ps

ps

Which command should be used to display working directory or currently in use directory in Ubuntu? A. pwd B. su/sudo C. passwd D. chown

pwd

Which command should be used to exit the editor w/o changes, to keep changes discard changes in Ubuntu? A. pwd B. vi C. q/wq/q! D. chown

q/wq/q!

Make changes to Registry values; can be used to make selective backups. Prior to Windows XP, there were two editors: regedit.exe and regedt32.exe.

regedit.exe Registry Editor

Verifies that system files have not been modified; or, if they have, replaces them with the original. It works with the hidden C:\windows\system32\dllcache directory and the original operating system CD.

sfc.exe System File Checker

Terminate a running application or service on a computer.

taskkill.exe Task Kill

Display a list of running applications or services on a computer.

tasklist.exe Task List

See running programs and services, terminate problems, and view rudimentary performance information about the system.

taskmgr.exe Task Manager


Set pelajaran terkait

Mental Health - Exam 3 study guide

View Set

Strict Liability and Product Liability

View Set

Chapter 22: The Neurologic System

View Set

OB Exam 3 Practice Questions from Saunders NCLEX Review

View Set

business ownership and registration

View Set

Module 2: Network Components, Types, and Connections

View Set

Module 2 Chapter 2: Licensing Law Regulation

View Set

Natural Disasters Final Exam Review

View Set