IT C.4 Certification Practice Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A company executive has just bought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select TWO.) A. App reviews and ratings will help you choose an effective anti-virus app. B. Android operating system updates are sufficient to protect against malware threats. C. Android mobile devices, like iOS devices, are not susceptible to malware threats. D. Any Android anti-virus app will be about as effective as any other. E. Anti-virus apps for Android have not been developed yet. F. Anti-virus apps are available for purchase from Android app stores.

A. App reviews and ratings will help you choose an effective anti-virus app. F. Anti-virus apps are available for purchase from Android app stores. Anti-virus apps are available for purchase from Android app stores, but many are not able to protect your Android device from more than 65% of the known malware threats. As you shop for an anti-virus app, be sure to refer to app reviews and ratings to help you choose an effective anti-virus app. Android devices can be infected by malware, so it is important to take steps to protect them.

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer.As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but you restrain from making any comments.At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer.A quick test determines that the device is now working.Which of the following professionalism principles is the technician failing to follow? (Select TWO). A. Avoiding being judgmental B. Argue with customers and/or be defensive C. Actively listening D. Talking to coworkers while interacting with customers

A. Avoiding being judgmental C. Actively listening In this scenario, the technician should have taken the time to actively listen to what the end user was saying instead of ignoring him and beginning to troubleshoot while he was still talking. The technician should have also been taking notes, which could then be helpful while troubleshooting.Even though nothing was said verbally, the technician should avoid being judgmental, even if only mentally.The technician did, however, avoid the distraction of answering the phone call and discussing anything with the calling coworker.

Which of the following are safe methods of lifting heavy objects? (Select TWO.) A. Bend your knees with your back straight. B. Use a lifting strap around the object and your neck. C. Pull up with your arms. D. Bend at the waist. E. Lift with your legs.

A. Bend your knees with your back straight. E. Lift with your legs. When lifting heavy objects, bend your knees, keep your back straight, and use your legs to lift objects. The other lifting methods listed may cause serious injury.

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is the MOST likely problem? A. Fuser rollers B. rint drum C. Secondary corona D. Primary corona

A. Fuser rollers Because the fuser rollers heat and press the entire paper, dirty fuser rollers are the most likely problem. The other components do not touch the paper directly.

You are building an HTPC (home theater PC) that will be connected to an HDTV. You want to be able to play Blu-ray movies on the HTPC. Which of the following features should your video card and HDTV MOST likely support? A. HDCP B. HDTV C. DirectX D. OpenGL

A. HDCP High-bandwidth digital content protection (HDCP) is a method for protecting digital media, such as Blu-ray movies, from being intercepted and copied. When playing protected content from a PC, the optical device, video card, and external display must all support HDCP. Both DirectX and OpenGL are API collections that are used to improve graphic, animation, and multimedia creations. HDTV is a high-definition signal used to broadcast digital TV signals.

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE). A. L2TP B. IPSec C. FTP D. PPTP E. RDP

A. L2TP B. IPSec D. PPTP A virtual private network (VPN) uses an encryption protocol (such as IPSec, PPTP, or L2TP) to establish a secure communication channel between two hosts, or between one site and another site. Data that passes through the unsecured network is encrypted and protected.The Remote Desktop Protocol (RDP) is used by Windows Terminal Services based applications, including Remote Desktop. FTP is used for transferring files and will not establish a secure connection.

You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report that they can't install the driver for the shared printer. Users running a 64-bit version of Windows do not have any problems.Which of the following actions will MOST likely fix this problem? (Select TWO). A. Manually install the correct driver on each computer that is having a problem. B. Move the printer to a computer running a 32-bit operating system and share the printer. C. On your computer, add the x86 drivers. D. Configure one computer running a 32-bit operating system with the correct driver. Share the network printer and have all 32-bit computers connect to that computer.E. Configure the printer to run in 32-bit emulation mode.

A. Manually install the correct driver on each computer that is having a problem. C. On your computer, add the x86 drivers. Each network host that wants to use the printer must have the correct printer driver installed. When you share a printer in Windows, the current printer driver is automatically delivered to clients that connect to the shared printer. If the client computers run a different version of Windows, you can add the necessary printer drivers to the printer object. Manually adding drivers to every client is also an option, but is not efficient, as the drivers can be delivered automatically when the computers connect to the shared printer. Sharing the printer on a 32-bit operating system would require adding the drivers for 64-bit clients. There's no such thing as 32-bit emulation mode on printers.

You have a network that uses a logical bus topology. How do messages travel through the network? A. Messages are broadcast to all devices connected to the network. B. Messages are sent to a central device, which then forwards the message to the destination device. C. Messages travel from one device to the next until they reach the destination device. D. Messages are sent directly to the correct destination device.

A. Messages are broadcast to all devices connected to the network. Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star (typically a hub) receives the message and forwards it on to all other devices.

For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. Which of the following is the BEST step the user can take to fix this problem? A. Reset to factory default B. Close all running apps C. Remove and replace the battery D. Perform a force stop

A. Reset to factory default Resetting to factory default will uninstall all apps and remove all data. This is the best option in this scenario. If the mobile phone does not respond to touchscreen input, there will be no way to close all running apps. Removing and replacing the battery is similar to a soft reset, which has not corrected the problem. If the mobile phone does not respond to touchscreen input, there is no way to perform a force stop.

Some software on Rachel's computer is telling her that her computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (the IT specialist) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the MOST likely cause of these warning messages? A. Rogue antivirus B. App scanner C. SPAM D. Hijacked email

A. Rogue antivirus Rogue antiviruses are programs maliciously added to a computer, which will then often display pop-up or warning messages that try to scare a user into purchasing fake products to clean their computers. SPAM is the type of unwanted and unsolicited email a user gets. Hijacked email is when someone deceptively takes over your legitimate email account, typically by guessing your password. App scanner is software that allows a mobile phone to scan documents.

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations.Which tools could you use to do this? (Select TWO.) A. Task Manager B. Device Manager C. Disk Management D. Services E. Performance Monitor

A. Task Manager E. Performance Monitor Use Performance Monitor to view statistics about the operation of your computer. Performance Monitor lets you choose the statistics you want to track in real time or create a log. You can also do this using Task Manager; however, you must manually add disk I/O parameters to be monitored.Use the Services console to manage system services. Use Device Manager to manage hardware devices. Use Disk Management to manage volumes and partitions.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you MOST likely to make to this organization to increase their security? (Select TWO). A. Train the receptionist to keep her iPad in a locked drawer when not in use. B. Replace the biometric locks with smart cards. C. Move the receptionist's desk into the secured area. D. Require users to use screensaver passwords E. Disable the network jacks in the reception area.

A. Train the receptionist to keep her iPad in a locked drawer when not in use. E. Disable the network jacks in the reception area. You should recommend the following: Disable the network jacks in the reception area. Having these jacks in an unsecured area allows anyone who comes into the building to connect to the company's network. Train the receptionist to keep her iPad in a locked drawer when not in use. Tablet devices are small and easily stolen if left unattended. The receptionist's desk should remain where it is currently located because it allows her to visually verify each employee as they access the secured area. Biometric locks are generally considered more secure than smart cards because cards can be easily stolen. Training users to lock their workstations is more secure than screensaver passwords, although this may be a good idea as a safeguard in case a user forgets.

You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software? (Select TWO). A. Train users to scan removable storage devices before copying files. B. Configure the software to automatically update its definition files. C. Disconnect all computers from the internet. D. Configure email servers to block all attachments. E. Require strong passwords in the local security policy. F. Configure all computers with a screen saver password.

A. Train users to scan removable storage devices before copying files. B. Configure the software to automatically update its definition files. Configuring the anti-malware software to automatically update its definition files and to scan removable storage devices before copying files will help protect systems from malicious software. Configuring email servers to block all attachments might prevent some viruses, but will also prevent users from receiving necessary files through email. Disconnecting all computers from the internet will impede a productive work environment. Requiring strong passwords and configuring all computers with a screen saver password are important aspects of a security policy, but they won't prevent the transfer of malicious software.

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in.Which of the following is the MOST likely cause of these messages? A. Unintended Wi-Fi connections B. Unauthorized location tracking C. Leaked personal files D. Weak or dropped cellular signal

A. Unintended Wi-Fi connectionsMany devices are configured to access any wireless connection based on signal strength by default. Secured Wi-Fi connections request additional information to log in. For better security, disable automation Wi-Fi connectivity on mobile devices.Cellular service does not require login information. A weak or dropped cell signal is not the cause of the messages.Leaked personal files can be the results of poor security. This is not a cause of these message.Unauthorized location tracking may present messages, but they are not likely to ask for additional log in information.

While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. Which of the following would allow the user to log on? A. Unlock the account B. Change the password for the account C. Have the user wait for the account to be unlocked automatically D. Enable the account

A. Unlock the account With the account lockout policy configured, an account will be locked (and cannot be used for logon) when a specified number of incorrect passwords are entered. You can unlock a locked account by editing the account properties in Local Users and Groups. Depending on the policy settings, locked accounts might be unlocked automatically after a period of time. However, to allow immediate access, manually unlock the account. A disabled account cannot be used for logon. Accounts are not disabled automatically, and enabling an account does not unlock it. Changing the password is not required because the user still remembers the correct password.

While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer. Which of the following is the BEST method for cleaning up the spilled toner? A. Use an anti-static micro-filtering vacuum. B. Wipe up most of the toner using a warm, wet cloth, and then vacuum. C. Scoop up large portions and then use a static cloth to wipe up the remaining toner. D. Use a household vacuum.

A. Use an anti-static micro-filtering vacuum. Excess toner should be removed from a laser printer with an anti-static and micro-filtering vacuum. A regular vacuum will build up an electrostatic charge from the toner, which could shock you, damage the printer, or damage your vacuum. Using any kind of liquid to clean up a toner spill could cause damage to the printer and may permanently adhere the toner to the printer. Although you should try to collect as much of the toner as possible using some type of scoop, doing this and wiping the spilled toner will not clean the printer thoroughly. If you do use a cloth, it should be a static-free cloth.

From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future? A. When I close the lid: Hibernate B. When I close the lid: Shut down C. When I close the lid: Standby D. When I close the lid: Sleep/Suspend

A. When I close the lid: Hibernate Hibernate saves the state of your computer to the hard disk and completely powers off your computer. When the devices resumes, the saved state is restored to RAM, and you can pick up where you left off. Sleep, suspend, and standby are all different terms that have been used for various versions of Windows. Regardless of which option is available for your version of Windows, when selected, these do not turn off your computer. Instead, they put the computer and all peripherals on a low power consumption mode. Since your battery is not very good and can only power your computer for a short time, these options run the risk of the computer losing power, resulting in the closure of your programs and files. Shut down will close all files and programs, and all power is terminated.

You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows. Which of the following are the BEST methods for installing Windows from the DVD? (Select TWO. Each choice is a complete solution.) A. While the computer is rebooting, press the boot menu function key. B. From the UEFI or BIOS firmware, change the boot order. C. While the computer is rebooting, press and hold the Windows + C. D. While the computer is rebooting, press and hold Ctrl + C. E. While the computer is rebooting, press the Ctrl + Alt + Del keys.

A. While the computer is rebooting, press the boot menu function key. B. From the UEFI or BIOS firmware, change the boot order. Since the computer did not recognize the DVD on restart, you will need to either change the boot order from within the computes UEFI or BIOS firmware settings, or you can press the boot menu key, which will allow you to boot from the DVD. The exact function key that can be pressed is determined by the computer's manufacturer. Examples include, F8, F12, F11, and F10. The other key combinations listed in the question will not allow you to boot to the DVD.

While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. A. You must reinstall any applications that were installed after the restore point was taken. B. You must restore your user data from backup. C. All files created or modified since the restore point was created must be restored from backup. D. The applications installed on the system were not affected when it was reverted to the restore point. E. Your user files were not affected when the system was reverted to the restore point.

A. You must reinstall any applications that were installed after the restore point was taken. E. Your user files were not affected when the system was reverted to the restore point. After reverting the system to a prior restore point in this scenario, the following facts are true:Your user files were not affected when the system was reverted to the restore point.You must reinstall any applications that were installed after the restore point was taken.On Windows 10, restore points contain snapshots of system files, registry settings, program files, and any other batch, script, or executable files. When you restore a system to a restore point, previous settings are restored, while subsequent changes are removed. For example, any applications installed after the restore point was created are no longer installed. However, user data is not affected when your revert to a restore point. Any changes made to user data after a restore point is created are retained if the restore point is restored.

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes? A. robocopy B. xcopy C. copy /robust D. copy

A. robocopy The robocopy command (short for Robust File Copy) is used to copy entire folder structures between volumes or across a network. The benefit of using robocopy is that all NTFS file permissions and attributes are maintained and interrupted transfers can be resumed. The copy command copies files from one location to another. The xcopy command copies files and directory trees, but does not maintain all NTFS file permissions and attributes.

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. Which of the following actions would MOST likely cix this problem? A. Put the battery in another notebook to verify that it is, in fact, the battery that is failing. B. Assume the battery is failing and replace it. C. Calibrate the battery to synchronize the power meter to the actual charge capacity of the battery. D. Configure the Power Scheme settings to minimize battery usage

B. Assume the battery is failing and replace it. Most notebook batteries only last 1-3 years. When they can't hold a charge for more than a few minutes, you can safely assume it's time to replace the battery.

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes.Which of the following actions would MOST likely cix this problem? A. Put the battery in another notebook to verify that it is, in fact, the battery that is failing. B. Assume the battery is failing and replace it. C. Configure the Power Scheme settings to minimize battery usage. D. Calibrate the battery to synchronize the power meter to the actual charge capacity of the battery.

B. Assume the battery is failing and replace it. Most notebook batteries only last 1-3 years. When they can't hold a charge for more than a few minutes, you can safely assume it's time to replace the battery.

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver. What should you do? A. Re-install Windows from the installation disc. B. Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager. C. Reboot the system and select Safe Mode. Edit the properties of the TV tuner driver in Device Manager and select Roll Back Driver. D. Boot the system from a Windows installation disc and select the Startup Repair option. E. Use the Reset This PC option in the Settings app.

B. Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager. You should disable the driver. Although you might be able to disable the driver without booting in Safe mode, booting in Safe mode is a good way to prevent drivers that could interfere with your task from being loaded. Resetting or reinstalling the operating system are drastic troubleshooting options. You should try simpler resolutions first before restoring to more aggressive options. Because the boot process is functioning, there is no indication that the boot sector or master boot record needs fixing using the Startup Repair.

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver.What should you do? A. Reboot the system and select Safe Mode. Edit the properties of the TV tuner driver in Device Manager and select Roll Back Driver. B. Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager. C. Use the Reset This PC option in the Settings app. D. Re-install Windows from the installation disc. E. Boot the system from a Windows installation disc and select the Startup Repair option.

B. Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager. You should disable the driver. Although you might be able to disable the driver without booting in Safe mode, booting in Safe mode is a good way to prevent drivers that could interfere with your task from being loaded.Resetting or reinstalling the operating system are drastic troubleshooting options. You should try simpler resolutions first before restoring to more aggressive options. Because the boot process is functioning, there is no indication that the boot sector or master boot record needs fixing using the Startup Repair.

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification.Which of the following actions should the technician take NEXT? A. Enable MAC filtering. B. Check for and apply firmware updates. C. Disable DHCP. D. Enable content filtering.

B. Check for and apply firmware updates. Manufactures often accompany a vulnerability notification with firmware updates to address the vulnerability. These updates should be applied immediately.Parental controls or content filters restrict or block specific web traffic based on keywords, URLs, or the time of day, but do not address network hacker vulnerabilities.Disabling DHCP will require static IP addresses, but does nothing to address network hacker vulnerabilities.MAC filtering can be used to limit connectivity to a list of MAC addresses, but does nothing to address network hacker vulnerabilities.

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take? (Select TWO). A. Blame your tardiness on heavy traffic. B. Contact the customer and apologize. C. Give a realistic timeframe for your arrival. D. Tell a joke to ease the situation. E. Explain why you are late.

B. Contact the customer and apologize. C. Give a realistic timeframe for your arrival. As a technician, if you are going to be late to an appointment, contact the customer, apologize for the inconvenience, and give a realistic timeframe for your arrival. Use professional and courteous language at all times.Avoid making jokes or commenting on issues unrelated to the purpose of your visit. Explaining why you are late may be courteous, but is typically trivial and not the best action to take. Blaming your tardiness on external factors does not help the situation.

A technician upgrades the hard drive on a computer in the accounting department and decides to donate the old drive to a local trade school.Which of the following is the BEST method to ensure that the accounting data can't be recovered? A. Standard format B. Drive wipe C. Degauss D. diskpart format

B. Drive wipe Drive wipe is a software-based method of overwriting the actual data that makes up files on the hard drive. The overwriting process is performed multiple times to remove the magnetic traces of previous data. The drive remains usable after a disk wipe.A standard format removes only the reference to files and does not remove the actual data that made up the files. Software tools can easily recover this data.Degaussing a disk removes the data, but also removes lower-level formatting making the disk unusable for the local trade school.Like a standard format, data from a disk that is repartitioned using diskpart can be recovered.

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder? A.Execute B. Full Control C. Write D. Read

B. Full Control A user must have the Full Control permission to set NTFS security permissions. Write permissions allow a user to change folder or file data and attributes. Modify permissions include all Read & Execute and Write actions and the ability to add or delete files. Read permissions allow a user to view folder details and attributes.

Why are plasma displays smaller than 32 inches not typically sold? A. Smaller than 32 inch displays tend to suffer more from image retention and screen burn-in. B. It would be too cost prohibitive to manufacture plasma screens under 32 inches. C. There are problems with proper gas ionization in the smaller cells. D. Plasma technology needs larger sizes for performance.

B. It would be too cost prohibitive to manufacture plasma screens under 32 inches. Plasma displays smaller than 32 inches are not sold because manufacturing them is not profitable.

Which utility allows you to choose Selective Startup in Windows? A. Event Viewer B. Msconfig (System Configuration) C. Regedit D. Msinfo32 E. Performance Monitor

B. Msconfig (System Configuration) Use Msconfig to configure how the system boots, including the Normal startup, Diagnostic startup, and Selective startup options. Event Viewer is used to access Windows system logs. Msinfo32 is used to view information about the hardware and software implemented in the system. Regedit is used to edit the Windows Registry. Performance monitor is used to track system performance.

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? A. Intranet B. Peer-to-peer C. Client/server D. Extranet

B. Peer-to-peer Access to shared resources are controlled separately on each computer in the peer-to-peer model (a Windows peer-to-peer network is called a workgroup). For example, each computer in a peer-to-peer network maintains its own set of user accounts.An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses internet technologies, but its resources are made available to external (but trusted) users. The client/server model places shared resources on a server. Resources are accessed by clients.

You're troubleshooting a computer that runs Windows 10. The operating system has halted and a blue screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue? A. Check the voltage levels on the DC side of the power supply. B. Search for the error in Microsoft's knowledge base or using an internet search engine. C. Update the BIOS. D. Uninstall the last application or system update that was installed. E. Remove all memory modules and replace them one at a time until the error reappears.

B. Search for the error in Microsoft's knowledge base or using an internet search engine. The first thing you should do when a Blue Screen of Death is displayed is identify the source of the error by searching for the error text message in Microsoft's knowledgebase or across the internet in general using a search engine such as Google. This will help you identify what is causing the problem so you can troubleshoot it.

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase the security of this system? (Select TWO. Each option is a complete solution.) A. Make user accounts members of the Administrators group. B. Secure the computer system to the desk with a cable lock. C. Assign each user a simple password so they won't be tempted to write it down. D. Install a privacy filter on the monitor. E. Enable the Guest account.

B. Secure the computer system to the desk with a cable lock. D. Install a privacy filter on the monitor. Because this system is used in close proximity to customers, you should install a privacy filter on the monitor. The privacy filter prevents customers from viewing sensitive information displayed on the monitor (such as usernames, passwords, and account numbers). You should also secure this system to the desk with a cable lock. Securing the computer to the desk prevents a malicious person from stealing the computer and all of the sensitive information it contains. Enabling the Guest user account would decrease the security of the system as would assigning simple passwords to user accounts and making all users members of the Administrators group.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes.When the file is copied, which of the following is true? A. None of the NTFS permissions or attributes are retained on the file. B. The R attribute is retained on the file. C. The attributes and NTFS permissions are retained on the file. D. Only the NTFS permissions are retained on the file. E. The R and Encryption attribute are retained on the file.

B. The R attribute is retained on the file. Only the Read-only (R) attribute is retained, and not the encryption attribute, nor the NTFS permissions.The FAT32 file system only supports the following attributes: R, H, S, and A. When you copy files from an NTFS partition to a FAT32 partition, attributes not available under FAT32 do not remain with the file. Moving NTFS files to a non-NTFS partition removes the permissions.

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. Which of the following is the BEST step to perform? A. Delete the partitions and re-create them as simple volumes. B. Upgrade the disk to a dynamic disk. C. Run the fixboot command to convert the partition type to GPT. D. Run the convert command.

B. Upgrade the disk to a dynamic disk. When you upgrade a basic disk to a dynamic disk, existing partitions are converted to simple volumes. You can convert the disk without deleting partitions or losing any data. Use the Convert command to change the file system from FAT32 to NTFS. The partition table type (either MBR or GPT) does not affect the partition or volume type.

You need to protect the user data on a Windows 10 system.Which tools could you use to do this? A. Previous Versions B. Windows 7 (Backup and Restore) C. Work Folders D. Storage Spaces E. File History

B. Windows 7 (Backup and Restore) E. File History You can protect user data on a Windows 10 system using the following tools:File History can be used to protect user data. All user profile files (such as documents, music, and videos) are automatically backed up at a regular interval to a second storage device in the system.Windows 7 (Backup and Restore) can be used to back up user data to backup media on a specified schedule.Previous Versions was used on Windows 7 to provide a similar function to File History on Windows 8.1 and later. Storage Spaces are used to aggregate storage space from multiple storage devices in the system. Work Folders are used to make files available on other devices, even when the main system is offline.

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system? A. msconfig B. format C. chkdsk D. convert E. fdisk

B. format Use the format command to format the drive with the FAT32 file system. Use the convert command to convert a drive formatted with FAT32 to NTFS. You can use the fdisk command with older versions of Windows to create partitions. Use the chkdsk command to check the disk for lost clusters or cross-linked files. Run msconfig to configure Windows startup options.

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. To troubleshoot the routers, which of the following TCP/IP utilities would be BEST to use? A. nbtstat B. tracert C. nslookup D. netstat

B. tracert tracert shows you the series of routers that are used between the source and destination computers. If a router is not functioning, tracert can help you find which router is not working by showing you the last router it was able to contact. netstat is a command line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. Use nbtstat to help troubleshoot NetBIOS name resolution problems. Use nslookup to find the IP addresses of a particular computer using DNS lookup.

After installation, you Windows 10 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this? (Select TWO. Each response is a complete solution.) A. w32tm /config /update B. w32tm /query /status C. net time /querysntp D. w32tm /query /source E. w32tm /debug

B. w32tm /query /status D. w32tm /query /source To view the time provider used by a domain-joined Windows workstation, you can use either of the following commands: w32tm /query /source w32tm /query /status The w32tm /config /update command notifies the time service that its configuration has been modified and that changes need to be applied. The w32tm /debug command is used to enable or disable the local Windows time service provider log. The net time /querysntp command was used in earlier versions of Windows to view time provider information, but is now deprecated and no longer works.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware.Which of the following actions would BEST prevent this scenario from occurring again? A. Create a scheduled task to run sfc.exe daily. B. Switch to a more reliable anti-malware software. C. Configure the software to automatically download the definition file updates as soon as they become available. D. Carefully review open firewall ports and close any unneeded ports.

C. Configure the software to automatically download the definition file updates as soon as they become available. Anti-malware software is most effective against new threats if it has the latest definition files installed. Instead of manually updating the signature files, you should configure the software to automatically download updated definition files as soon as they become available.Use sfc.exe to repair infected files after malware has caused the damage. Using different anti-malware software will not resolve the problem if you don't apply the latest definition files.

You want to use Hibernation on your Windows notebook. What does it need to have? A. A minimum of 1 GB of RAM B. UPS C. Enough free hard drive space D. A Pentium IV or better processor

C. Enough free hard drive space Hibernation saves everything in RAM to the hard drive. Therefore, you need at least as much free disk space as you have RAM. Hibernation does not depend on the processor capabilities or the amount of RAM. A UPS is used to supply power to a device if the regular AC power is interrupted.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? A. Create a virtual router with VRF technology. B. Route VM-to-VM traffic through a physical firewall and back to the virtual network. C. Implement a virtual firewall within the hypervisor. D. Define VLAN memberships on each VM.

C. Implement a virtual firewall within the hypervisor. Virtualized hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. By implementing a virtual firewall within the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows between virtual machines. While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient. A virtual router with VRF is used to create multiple networks from a single router interface. Configuring VLAN membership would not allow you to monitor and filter traffic.

You have recently had an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take? A. Create a restore point. B. Enable System Restore. C. Install all OS updates. D. Educate the user.

C. Install all OS updates. After an infected computer has been remediated successfully, the next step in the best practice procedures for malware removal states that you should ensure that all OS updates are installed and that regular virus scans are scheduled. Following that action, you should enable system restore, create a new restore point, and educate end users on better practices.

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer.Which of the following steps is the BEST course of action? A. Move the hard disk from the old computer to the new computer. Reinstall Windows10 using the hard disk from the old computer. B. Run Windows Easy Transfer on the Windows 7 computer and the new Windows 10 computer to transfer settings and data. Reinstall any applications. C. Manually install applications, copy data, and configure settings on the new computer. D. Remove the hard disk from the old computer and install it into the new computer. Add shortcuts to your old applications.

C. Manually install applications, copy data, and configure settings on the new computer. There are no built-in Windows tools to transfer applications, user data, and settings from Windows 7 to Windows 10. This has to be done manually or using third-party tools. You will then need to reinstall any applications on the new computer.Windows Easy Transfer is not compatible with Windows 10.Moving the hard disk will not reinstall the applications for Windows 10.Moving the hard disk from the old computer and reinstalling Windows onto the old hard disk will not keep installed applications.

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE). A. FTP B. RDP C. PPTP D. L2TP E. IPSec

C. PPTP D. L2TP E. IPSec A virtual private network (VPN) uses an encryption protocol (such as IPSec, PPTP, or L2TP) to establish a secure communication channel between two hosts, or between one site and another site. Data that passes through the unsecured network is encrypted and protected. The Remote Desktop Protocol (RDP) is used by Windows Terminal Services based applications, including Remote Desktop. FTP is used for transferring files and will not establish a secure connection.

You have discovered that a system on your network has been infected with a worm. Your top priority is to prevent the worm from spreading to other systems while you work on removing the worm.Which of the following is the BEST next step to take? A. Close the firewall ports that the worm uses. B. Run a system scan on other computers. C. Quarantine the computer. D. Update the anti-malware definition files on all computers.

C. Quarantine the computer. The best way to prevent a worm (or any other type of malicious code) from spreading is to quarantine the system. Quarantine places the computer in an isolated network or removes the computer from the network completely so that it cannot interact with other computers.Updating the definition files and scanning other computers makes sure the worm hasn't affected other systems. However, if the definition file does not identify the worm, it will have no effect on stopping its spread. Closing firewall ports might help, but is not as sure a method of protecting your system as quarantining the infected computer.

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space.Which of the following disk management operations will BEST prepare your hard disk for dual boot? A. Convert the disk from basic to dynamic. B. Convert the disk from physical partitions to logical partitions. C. Shrink the primary partition. D. Reformat the disk with the partitions needed for a dual boot system.

C. Shrink the primary partition. You can decrease the space used by primary partitions and logical drives by shrinking them into adjacent, contiguous space on the same disk. For example, if you discover that you need an additional partition but do not have additional disks, you can shrink the existing partition from the end of the volume to create new unallocated space that can then be used for a new partition.

You manage two computers with the following user accounts:Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does.Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not.You are working from Wrk2 and would like to access a shared folder on Wrk1.Which of the following credentials would BEST allow you to access the shared folder? A. Type 'Mary' for the username and leave the password blank. B. Type 'Julia' for the username and leave the password blank. C. Type 'Admin' for the username and specify the password. D. Type 'Mary' for the username and specify the password.

C. Type 'Admin' for the username and specify the password. Type Admin for the username and specify the password. To access a shared folder or use Remote Desktop for a workgroup computer, you must supply a username and password that matches a user account configured on the computer you are trying to access. For Wrk1, you would use either Mary or Admin for the user account name. You cannot use the Mary account to access Wrk1 over the network. When accessing shared folders or Remote Desktop on a network computer, the user account must have been configured with a password. User accounts with blank passwords cannot be used to gain network access to a computer.

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. Which of the following actions are the BEST choices? (Select TWO). A. Boot to advanced startup menu and select Last Known Good Configuration. B. Boot from the Windows installation media and select the Startup Repair option. C. Use Device Manager to roll back the video driver. D. Revert the system to a restore point prior to installing the video driver. E. Use Device Manager to disable the video driver.

C. Use Device Manager to roll back the video driver. D. Revert the system to a restore point prior to installing the video driver. To roll back to a previous driver, access Device Manager and then use the Roll Back Driver option available in the video driver's properties. You may need to boot the system into Safe Mode first if the problem is serious enough to make the display difficult to see. Alternatively, you could also revert the system to a prior restore point that was created before the problematic driver was installed. You should not disable the driver in this situation. The Last Known Good configuration boot option is only available on Windows 7 and earlier systems. Even if it were available, it would not work in this scenario because the system has been rebooted, and the user has logged in since the change was made. Running a startup repair would not correct a problem with an erratic video driver.

You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following steps will BEST protect the wireless network? (Select TWO. Each option is a complete solution.) A. Implement a WAP with a shorter range. B. Disable the spread-spectrum radio signal feature on the WAP. C. Use the WAP's configuration utility to reduce the radio signal strength. D. Configure the WAP to filter out unauthorized MAC addresses. E. Disable SSID broadcast on the WAP. F. Install a radio signal jammer at the perimeter of your organization's property.

C. Use the WAP's configuration utility to reduce the radio signal strength. D. Configure the WAP to filter out unauthorized MAC addresses. To increase the security of the wireless network, you can use the WAP's configuration utility to reduce the radio signal strength. This will reduce or even eliminate signal emanation outside of your building. You can also configure the WAP to filter out unauthorized MAC addresses. Enabling MAC address filtering denies access to unauthorized systems.

A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue? A. Anti-malware B. Wi-Fi analyzer C. Force stop D. App scanner

D. App scanner An app scanner can test a mobile app for security flaws. This is the best option in this scenario. Anti-malware can safeguard a mobile device from malware and ransomware, but typically doesn't check poorly written or poorly configured mobile apps for vulnerabilities. A Wi-Fi analyzer can provide signal strength and signal quality information. It can be used to detect unauthorized devices on a Wi-Fi network. It is not used to check mobile apps for security flaws. A force stop can be used to stop an application from running so that it can be uninstalled. It is not used to check mobile apps for security flaws.

You have decided to install a new Ethernet network adapter in your Windows 10 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST tool to get Windows to load properly? A. Boot from the Windows installation DVD and restore your computer back to a previous restore point. B. Boot to the computers BIOS/UEFI settings and uninstall the network driver. C. Boot from the Windows installation DVD and run Start-up Repair. D. Boot to Safe Mode and uninstall the network driver.

D. Boot to Safe Mode and uninstall the network driver. When a computer starts in Safe Mode, only the bare minimum background services that are very important to boot and run the Windows are initialized. From this mode, you can then find the driver that is causing problem and uninstall it. On some systems, booting to the BIOS/UEFI settings will let you boot to Safe Mode, but you cannot uninstall the driver causing your computer to crash from the BIOS/UEFI settings interface. The Start-up Repair option will scan your PC for problems like missing or damaged system files, but it won't let you uninstall the bad device driver, causing your computer to crash. System Restore lets you restore your computer back to a previous restore point. Although this would work, it will undo any other changes you may have made since the last restore point was created. Therefore, it is best to try boot to Safe Mode and uninstall the bad driver from there.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would BEST prevent this scenario from occurring again? A. Create a scheduled task to run sfc.exe daily. B. Carefully review open firewall ports and close any unneeded ports. C. Switch to a more reliable anti-malware software. D. Configure the software to automatically download the definition file updates as soon as they become available.

D. Configure the software to automatically download the definition file updates as soon as they become available. Anti-malware software is most effective against new threats if it has the latest definition files installed. Instead of manually updating the signature files, you should configure the software to automatically download updated definition files as soon as they become available. Use sfc.exe to repair infected files after malware has caused the damage. Using different anti-malware software will not resolve the problem if you don't apply the latest definition files.

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO). A. Man-in-the-middle attack B. Search engine results poisoning C. Dictionary attack D. Exploiting DHCP servers to deliver the IP address of poisoned DNS servers E. Changing the hosts file of a user's computer

D. Exploiting DHCP servers to deliver the IP address of poisoned DNS servers E. Changing the hosts file of a user's computer Pharming redirects one website's traffic to a bogus website designed to look like the real website. Once the user is there, the attacker tricks the user into supplying personal information, such as bank account and PIN numbers. Pharming works by resolving legitimate URLs to the IP address of malicious websites. This is typically done using one of the following techniques:Changing the hosts file of a user's computerPoisoning a DNS serverExploiting DHCP servers to deliver the IP address of malicious DNS servers in DHCP leasesSearch engine results poisoning is not typically associated with pharming attacks. A man-in-the-middle attack occurs when the attacker intercepts legitimate network traffic and then poses as one of the parties involved in the network communication. A dictionary attack is used to crack passwords by guessing the password from a list of likely words.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops? A. Clean install B. Recovery partition C. Upgrade D. Image deployment

D. Image deployment Since only two types of computers are being offered, using an image preloaded with the correct drivers, applications, and files is the quickest and easiest way to deploy Windows and any supplemental software (such as Microsoft Office). A recovery partition is used to restore a corrupt computer back to the state it was in at purchase. This option would not provide all the customizations needed for the company software. An upgrade is only used to migrate from an existing operating system to a newer operating system. Since these are new computers, an upgrade in not necessary or possible. A clean install is the process of installing Windows over the top of an existing operating system and, in the process, cleaning or erasing all of the existing data. This would require more time and would not install any of the supplemental software required.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:Ethernet adapter Local Area Connection:Connection-specific DNS Suffix . : mydomain.localDescription . . . . . . . : Broadcom network adapterPhysical Address. . . . . . : 00-AA-BB-CC-74-EFDHCP Enabled . . . . . . . : NoAutoconfiguration Enabled. . . : YesIPv4 Address . . . . . . . : 192.168.1.102(Preferred)Subnet Mask . . . . . . . : 255.255.255.0Default Gateway. . . . . . . . . : 192.168.2.1DNS Servers. . . . . . . . . . . : 192.168.2.20Which of the following is the MOST likely cause of the problem? A. Incorrect IP address B. Incorrect DNS server address C. Incorrect subnet mask D. Incorrect default gateway

D. Incorrect default gateway In this example, the default gateway address is incorrect. The default gateway address must be on the same subnet as the IP address for the host. The host address is on the 192.168.1.0/24 subnet, but the default gateway address is on the 192.168.2.0 subnet.

You have a network that uses a logical ring topology. How do messages travel through the network? A. Messages are sent to all devices connected to the network. B. Messages are sent to a central device, which then forwards the message to the destination device. C. Messages are sent directly to the destination device only. D. Messages travel from one device to the next until they reach the destination device.

D. Messages travel from one device to the next until they reach the destination device. In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network.

You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this? (Select TWO). A. Get 64-bit versions of all applications. B. Upgrade to a CPU with at least four cores. C. Perform an in-place upgrade. D. Perform a clean installation. E. Get 64-bit drivers for all hardware.

D. Perform a clean installation. E. Get 64-bit drivers for all hardware. When moving from a 32-bit operating system to a 64-bit operating system, you must perform a clean installation. An in-place upgrade is not possible. The 64-bit version of Windows requires 64-bit versions of all hardware drivers. You can, however, run 32-bit applications on a 64-bit processor with a 64-bit operating system. While the system will run better with a quad-core processor, it isn't required to complete the installation.

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe).Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware.Which of the following is the next BEST step that should be taken? A. Perform a scan using anti-malware software. B. Back up Vivian's critical files and perform a clean install of Windows. C. Disable System Restore. D. Quarantine Vivian's computer.

D. Quarantine Vivian's computer. When you suspect that a computer may be infected with malware, you should immediately quarantine the computer to prevent the propagation of the malware. After the computer is isolated, you can begin to remove the malware, starting by disabling System Restore, updating your anti-malware software, and then performing an anti-malware scan.Backing up an infected computer only saves the problem for future users.

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers.Which of the following best practices is the administrator following? A. Driver/firmware updates B. Scheduled disk maintenance C. Patch management D. Scheduled backups

D. Scheduled backups The Time Machine application on Mac OS computers and the tar command in Linux are used for backups.While Time Machine and tar can be used to restore disk files, scheduled disk maintenance is usually performed to maintain disk and filesystem integrity. Patch management involves updating operating systems and applications, not performing backups. Driver/firmware updates involves updating the middleware that interfaces with internal and external devices, not performing backups.

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file.Which of the following is MOST likely the reason that Ann can't update the file? A. Ann is not a member of the Administrators group. B. Joe is not a member of the Administrators group. C. The Modify and Write permissions for Joe were set to Deny on the destination folder. D. The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

D. The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder. When a file is copied in Windows, it's given the permissions granted in the destination folder, regardless of the permissions on the original file. When a file is moved, Windows attempts to keep the same permissions that the file had in the original folder. Most likely, the Modify and Write permissions for Ann were set to deny when the file was in Joe's Documents folder.If Ann was a member of the Administrators group, most likely, she would have been able to update the file. The permissions on the file are independent of whether or not Joe is a member of the Administrators group. If the Modify and Write permissions for Joe on the destination folder were set to Deny, Joe would not have been able to transfer the file.

For which type of device will you typically install the driver before you connect the device to your system? A. Firewire devices B. Plug-and-play devices C. Hot swappable devices D. USB devices

D. USB devices For USB devices, you will typically install the driver prior to connecting the device.

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away.What is the MOST likely problem? A. The photosensitive drum is wearing out. B. The fuser assembly is damaged. C. The paper is poor quality. D. corona wire is dirty.

D. corona wire is dirty. If a corona wire is dirty, it might not create a uniform charge. As a result, the toner might not be attracted correctly to the photosensitive drum or paper. A vertical stripe is a typical symptom of this problem. Be careful when cleaning a corona wire because they are delicate.

One of your customers has called you regarding some issues he is having with his graphics while gaming. After troubleshooting the issue over the phone for a time, you feel it would be helpful to get a detailed report of his system to see if the computer meets the minimum system requirements for the game he is playing.Which of the following is the BEST tool to create the desired report? A. defrag B. mstsc C. mdsched D. dxdiag

D. dxdiag The dxdiag tool is Microsoft's DirectX Diagnostic Tool (Dxdiag.exe). It can be used to view or troubleshoot DirectX-related issues regarding such things as your computer's display and sound devices. It also provides system information. After running this tool, if you know which area is causing a problem, you can click on the appropriate tab, such as Display 1, Sound 1, or Input. The dxdiag tool can be a valuable tool for determining things like hardware specifications and to help determine whether the video drivers are up to date or need to be updated. This tool also has the ability to create reports containing the system.The defrag tool lets you defragment your hard disk. The mstsc tool lets you connect to a remote PC. The mdsched tool is a memory diagnostic tool.

Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=43ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Which utility produced this output? A. nslookup B. ifconfig C. tracert D. ping

D. ping The output shown was produced by the ping utility. Specifically, the information output was created using the ping -t command. The -t switch causes packets to be sent to the remote host continuously until stopped manually. ping is a useful tool for testing connectivity between devices on a network. Using the -t switch with ping can be useful in determining whether the network is congested. As such, a condition will cause sporadic failures in the ping stream. tracert is similar to ping in that it tests connectivity between two hosts on the network. The difference is that tracert reports information on all intermediate devices between the host system and the target system. ping, on the other hand, does not report information on intermediate devices. nslookup is a tool provided on Linux, Unix, and Windows systems that allows manual name resolution requests to be made to a DNS server. This can be useful when troubleshooting name resolution problems. ifconfig is a tool used on Unix, Linux, and Macintosh systems to view the configuration of network interfaces, including TCP/IP network settings.

On a Linux system, what is the name of the directory where you will find a text file called devices that contains information about the devices that are configured on the system? A. /root B. /hwinfo C. /dev D. /sys E. /proc

E. /proc The /proc directory is actually dynamically created whenever you access it. /proc contains the devices file that lists all the hardware devices that are configured in the system. /proc also contains the cpuinfo file with information about the processor installed in the system and the dma file, which contains a list of DMA channel assignments.

You have purchased an LED monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution to 1440 x 900 with 32-bit color. The display on the screen seems to be pixilated.Which of the following solutions is MOST likely to fix this problem? A. Decrease the color depth to 24-bit. B. Replace the DVI-I cable with a DVI-A cable. C. Replace the DVI-D cable with a DVI-I cable. D. Change the screen resolution to 1600 X 1200. E. Change the screen resolution to the native resolution of the monitor.

E. Change the screen resolution to the native resolution of the monitor. LED and LCD monitors have a native display resolution. You should set the resolution of the video board to the native resolution of the monitor (whatever it might be). While it might be possible to set the resolution other than the native resolution, the images on the display will be distorted or pixelated.DVI-D and DVI-I cables are compatible; both carry digital output to the monitor. DVI-A cables are incompatible with DVI-D or DVI-I hardware because they use an analog signal. Changing the color depth increases the number of colors that the monitor displays.


Set pelajaran terkait

Chapter 60, Spinal Cord and Peripheral Nerve Problems

View Set

Biology Final Study Guide: Chp. 1, 15, 3, 4, 5, 6, 7, 8

View Set

Biology Chapter 11 (Gene Regulation)

View Set

Wk 3 - Practice: Public Finance [due Day 5]

View Set

Accounting Test 2 (Chapters 3-4)

View Set