Ch 10-14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive?

4

Drag the statments on the left to the mobile OS that they describe on the right. (Not all targets are used.)

ANDROID The OS uses the launcher to define the format of home screens and the look and feel of the user interface. The OS has an All Apps navigation icon. Apps are represented by shortcuts on the home screens. IOS Deleting an app from the home screen deletes the app from the device. It is closed source software. the device has a physical home button.

An instructor is discussing facts about different mobile device operating software. The instructor states: "This OS can be used by programmers to operate devices like laptops, smart TVs, and e-book readers." To which OS does this relate: iOS, Android, or both?

Android

What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.)

Back up user data on a regular basis. Ensure that the operating system software and applications contain the latest updates.

An IT technician is troubleshooting a file error on an employee laptop. While working in the system files directory, the technician notices that the User Account Control (UAC) box appears requesting a password. What should the IT technician do next?

Call the employee and ask the employee to come to the IT department to enter the necessary credentials.

A technician is troubleshooting a Windows 10 computer that displays an "Invalid Boot Disk" error message. What should be the first action the technician should take to troubleshoot the issue?

Change the boot order in the UEFI/BIOS settings to select the drive that has the operating system installed as the first boot device.

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?

Confirm the issues and give detailed instructions to solve the problem.

What is the name of the Windows Phone 10 digital, or virtual, assistant?

Cortana

A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?

Determine whether the customer would prefer to receive the instructions in another form, such as emailed, illustrated written instructions.

Which two operations can help prevent a mobile device from being tracked without permission? (Choose two.)

Disable or remove apps that allow connections to the GPS. Turn off the GPS when not in use.

What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?

Disk Utility

Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.)

Document the reason the customer called and create a support ticket. Escalate the customer to a level two technician.

A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the internet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue?

Implement an Alternate Configuration IPv4 address on the laptop.

Which component uses the greatest amount of power on most mobile devices?

LCD screen

When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?

Least privilege

Match the scripting language with the script file name extension. (Not all options are used.)

Linux Shell Script (.sh) Windows Batch File (.bat) PowerShell (.ps1) Python (.py) JavaScript (.js)

What is the default file system used during a fresh installation of Windows 10?

NTFS

A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

NTOSKRNL.EXE starts the login file called WINLOGON.EXE.

A technician has just purchased a new Windows 10 PC and wants to transfer selected files, folders, profiles, and applications from the old Windows PC. What tool or utility does Microsoft recommend to do this?

PCmover Express

A technician is configuring a SOHO computer. The technician wants to create a local account that requires a password and wants a screen saver to appear if the person using the computer steps away for a period of time. Which two Windows Control Panels will the technician use to accomplish these tasks? (Choose two.)

Personalization User Accounts

A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications?

Reset this PC.

When a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.)

Run sfc/scannow in Safe Mode. Register the DLL file using the regsvr32 command.

A technician wants to split a large partition on a drive in a Windows 10 PC without loss of any data. How can this be accomplished?

Shrink the existing partition and create a new partition from the unallocated space.

A network administrator is tasked with deployment of Windows 10 Pro for a large number of new PCs in the company. The administrator uses a PC to perform a base installation together with standard company applications. The PC is tested to be fully functional. Which tool must the administrator use to remove all computer and user specific information before building a deployable image from the disk?

Sysprep.exe

What is the next troubleshooting step after a theory of probable cause has been established?

Test the theory to determine cause.

An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?

The BIOS boots the computer using the first drive that contains a valid boot sector.

Which statement is correct about installing a 32-bit operating system on a x64 architecture?

The OS will run correctly.

A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)

The computer has a virus. An update has corrupted the operating system.

A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.)

The display is set to a high level of brightness. An app is using too many resources. The device is roaming between call towers.

Which statement is true regarding mobile devices using the Wireless Wide Area Network (WWAN)?

They require an adapter to link to a cellular provider's network through the nearest base station or transmitter.

A technician has been notified of a problem on the network. After investigation, the technician determines that a specific internal company computer is launching an attack on other company computers. Which type of malware is being used?

Trojan

True or False? Multitasking describes a computer operating system that is capable of running multiple applications at the same time.

True

A user wants to display the contents of a text file in a command interpreter. Which administrative command-line tool or command can be used to address this?

Type

What is a recommended best practice for a technician who must perform tasks that require administrative access?

Use a standard account with limited permissions, and then use the Run as Administrator option to perform the task that requires elevated privileges.

Which tool is available to transfer user data and settings from an old Windows 10 PC to a new Windows 10 PC?

User State Migration tool OR Windows Easy Transfer?

Match remote access authentication methods to the description. (Not all options are used.)

Username/Password- Credentials are sent to the SSH server which are then verified against a local user database or sent to a centralized authentication server. Host-based Authentication- The SSH server generates a challenge with the public key of the client and the client must decrypt the challenge with the matching private key to complete the authentication. Public Key Authentication- The SSH server generates a challenge with the public key of the client and the user must enter a passphrase to access the matching private key which decrypts the challenge to complete the authentication.

A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?

antimalware

A company has a security policy that permits the reuse of wiped drives in other computers. The wiped drives are often used for additional storage or as a replacement drive. What are two methods that could be used to wipe data? (Choose two.)

degaussing equipment data wiping software

A technician has copied several commercial movies to a company server to be shared with colleagues. How would this behavior be classified?

ethically wrong and illegal

What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)​

not properly creating or maintaining sandboxing features. enabling app access to the root directory.

A technician is troubleshooting a Windows 10 PC. The PC has an application that displays an error message about a missing DLL. The technician has located the DLL file on the PC and wants to register it. Which command line tool can the technician use for the task?

regsvr32

What two roles or tasks are associated with level two technicians? (Choose two.)

remotely updating drivers and software on customer computers gathering diagnostic information from a customer computer

What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?

to repair the operating system

A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are two purposes of botnets? (Choose two.)

to transmit viruses or spam to computers on the same network to attack other computers


Set pelajaran terkait

Principles of Marketing Modules 4-6

View Set

HS&F: Chapter 1 - The Human Organism

View Set

Honors Bio Hunt semester 1 final

View Set

Business Finance Final: Conceptual

View Set

Chapter 36: Management of Patients with Musculoskeletal Disorders - ML3

View Set

CompTIA Linux+ Guide to Linux Certification aCh. 1 Review Questionst

View Set

Chapter 17 - Respiratory Emergencies

View Set