ITSC 1405 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What Performance counter tracks the percentage of time the hard drive is in use? Avg. Disk Queue Length % Disk Time Disk Buffer Length Max Disk Queue Length

% Disk Time

Linux utilizes what two different wildcard characters at the command line? and | * ?

* ?

A custom view filter in Event Viewer can be saved to a file using what extension? .evf .evlog .evs .evtx

.evtx

Which of the following file extensions are hidden just after Windows is installed? Choose all that apply. .exe .xlsx .com .txt

.exe .com .txt

Text files that are called initialization files often utilize what two file name extensions? .init .ini .inf .start

.ini .inf

A disc image, as defined by the International Organization for Standardization, uses what file extension? .iso .img .disc .cd

.iso

In order to ensure that a Mac has no startup items, what two directories should you check for items? /etc /Library/StartupItems ~/.startup /System/Library/StartupItems

/Library/StartupItems /System/Library/StartupItems

What option, when passed to the shutdown command, will restart the local computer? /h -h /s /r

/r

On Linux, where are the commands required for system administration stored? /bin /usr /opt /sbin

/sbin

How much storage does a dynamic disk require for the disk management database? 1 MB 10 GB 5 MB 50 MB

1 MB

How much drive space should be available for each virtual machine on a system? 5 GB 10 GB 20 GB 50 GB

20 GB

The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives? 1GB 1TB 2TB 2PB

2TB

After installation, how many days do you have to activate Windows 7? 7 30 45 60

30

What port is utilized by the Remote Desktop service? 22 23 3389 1729

3389

What is the maximum amount of memory supported by a 32-bit Windows operating system? 1GB 4GB 16GB 64GB

4GB

On a magnetic drive, what is the most common sector size? 512 bytes 512 KB 16 KB 4 KB

512 bytes

What type of OS should you install for best performance when you have enough RAM? 8 bit 16 bit 32 bit 64 bit

64 bit

If you need to redirect the output from a command, what symbol should you use? | * > ?

>

A tool that lists errors and issues that need attention

Action Center

Which Windows utility program lists errors and issues that need attention? -Action Center -Control Panel -System Information Windows -Network and Sharing Center

Action Center

What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.) Activates the HAL starts critical services Loads system registry hive Starts the Session Manager

Activates the HAL starts critical services Starts the Session Manager

Under the Control Panel, what console contains Print Management, Computer Management, and Event Viewer? Windows Firewall System Administrative Tools Admin Page

Administrative Tools

What is the name for the 3D user interface provided by Windows 7 and Vista? Glass Aero Air Shield

Aero

What operating system is based on open source code? Android Blackberry Windows Phone iOS

Android

When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in? Administrators Guests Backup Operators Anonymous users

Anonymous users

What are the two most popular web server applications? Nginx Tomcat Apache IIS

Apache IIS

To which group does Windows give access to folders that you create which are not part of your user profile? Power Users Guests Authenticated Users Anonymous Users

Authenticated Users

Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? Control Panel BIOS setup Device Manager Computer

BIOS setup

Using what Windows 7 utility allows you to create a backup schedule that can include any folder on the hard drive and the system image? Automated System Backup Complete PC Recovery Automated System Recovery Backup and Restore

Backup and Restore

Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup? Event Viewer Boot Logging Safe Mode with Networking Windows Boot Manager

Boot Logging

Where is the Windows system registry hive? C:\Windows\reg C:\Windows\settings\config C:\Windows\etc\hive C:\Windows\System32\Config

C:\Windows\System32\Config

Registry files, if deleted, can be restored from those saved in what folder? C:\Windows\System32\WinBackup C:\Windows\System32\Config\RegBack C:\Windows\System32\Config\Hive C:\Windows\RegBack

C:\Windows\System32\Config\RegBack

In order to ensure drive health, what command should you use to search for and repair file system errors? Defrag Chkdsk Analyze Optimize

Chkdsk

searches for bad sectors on a volume and recovers the data from them if possible

Chkdsk utility

Which products are considered to be hypervisors? Client Hyper-V Virtual PC VirtualBox VMVisor

Client Hyper-V Virtual PC VirtualBox

A window that consolidates several Windows administrative tools that you can use to manage the local PC or other computers on the network

Computer Management

What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete

Ctrl+Alt+Delete

If you enter a command and want to terminate its execution before it is finished, what key press should you use? Ctrl+C Ctrl+V Ctrl+B Ctrl+X

Ctrl+C

During the Windows 8.1 installation, what option must be selected in order to perform a clean install? -Custom: Install Windows only (advanced) -upgrade to Windows 8.1 -Clean Install (advanced) -Fresh Install (advanced)

Custom: Install Windows only (advanced)

What command should you use to rearrange parts of files on the drive so they are contiguous? Optimize Analyze Defrag Chkdsk

Defrag

You can use what utility to convert two or more basic disks to dynamic disks? Disk Management Windows Management System Management Disk Config

Disk Management

What types of events are logged by Windows and can be viewed using the Event Viewer? (Choose all that apply). Scheduled Error Warning Information

Error Warning Information

What error messages indicate that the MBR sector is damaged, or the active partition is corrupt or missing? (Choose all that apply.) No boot device found Error loading operating system Missing operating system Invalid partition table

Error loading operating system Missing operating system Invalid partition table

When troubleshooting a device or service that has failed to start, what utility may have information regarding the cause? Microsoft Management Console Event Viewer Performance Monitor Resource Monitor

Event Viewer

Where can a user find out more information about a hardware or network failure that occurred on that particular PC? -Event Viewer -Performance Information and Tools -Task Scheduler -Resource Monitor

Event Viewer

a Windows tool useful for troubleshooting hardware or network failures, OS error messages, failed services and more.

Event Viewer

What utilities can be accessed using the Computer Management window? (Choose all that apply). Task Manager Event Viewer Performance Monitor System Configuration

Event Viewer Performance Monitor

What two applications are an example of a mail server and a mail client application, respectively? Exchange Maverick Outlook Firefox

Exchange Outlook

The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence? F4 F8 F10 F12

F8

What file systems supported by Windows can be used for volumes and drives that don't hold the Windows installation? (Choose all that apply.) FAT64 FAT32 exFAT NTFS

FAT32 exFAT NTFS

A computer must have a DVD drive in order to install Windows 8. True or False

False

A hard drive can only have one single root directory. True or False

False

A service is a program that runs in the foreground and is visible on the taskbar. True or False

False

After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False

False

As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. True or False

False

If you make a mistake that makes the problem worse, it's best to hide the problem until you can resolve it or until you have left the customer site. True or False

False

LILO is the most commonly installed boot loader by the Linux operating system. True or False

False

Most Microsoft patches and device drivers can be applied to a 32-bit installation and also a 64-bit installation. True or False

False

On Linux, the root user's home directory is /home/root. True or False

False

On a peer-to-peer network, authentication is the responsibility of the domain. True or False

False

On the IE General tab you can block cookies. True or False

False

Once you feel like you have resolved a problem, politely tell the customer the job is finished, and go on your way. True or False

False

Programs on Mac that launch at startup are called login items. True or False

False

The Windows 8 interface is known as the Aero interface. True or False

False

The Windows shell is responsible for interacting with hardware. True or False

False

The chkdsk command will not fix anything on the drive unless the drive is unlocked. True or False

False

The price for Windows 7 is the same regardless of the edition and type of license you purchase. True or False

False

There is no option for networking access when using Safe Mode. True or False

False

To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional. True or False

False

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or False

False

Windows Disk Cleanup is the utility to use whenever you want to defragment your hard drive. True or False

False

You do not have to be logged on as an administrator in order to use tools found in Computer Management. True or False

False

What Linux distribution is considered a cutting-edge distribution? Debian Fedora Red Hat Enterprise Linux Ubuntu

Fedora

What status indicators apply only to dynamic disks? (Choose all that apply.) Foreign drive Unallocated Healthy (At Risk) Active

Foreign drive Healthy (At Risk)

What two methods are available for Windows to use to partition a drive? UEFI GPT EFT MBR

GPT MBR

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group? Administrators group Backup Operators group Power Users group Guests group

Guests group

a component of the kernel which makes up the layer closest to the hardware

HAL

What registry key stores information that determines which application is opened when a user double-clicks a file? HKEY_CLASSES_ROOT HKEY_USERS HKEY_CURRENT_USER HKEY_LOCAL_MACHINE

HKEY_CLASSES_ROOT

When a user logs into Windows, what registry key is created? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_USERS HKEY_CURRENT_USER

HKEY_CURRENT_USER

What registry key is considered to be the most important key, containing hardware, software, and security data? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_CLASSES_ROOT HKEY_USERS

HKEY_LOCAL_MACHINE

What dynamic link library handles low-level hardware details? Ntoskrnl.exe Smss.exe Hal.dll Winlogon.exe

Hal.dll

When all users on a network require the same access to all resources, what type of network model should you use? Domain Homegroup Workgroup Guestgroup

Homegroup

Which of the following is used to uniquely identify a computer on a network? network ID ARP address IP address serial number

IP address

What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock

KeePass LastPass Dashlane

In Windows 7, what startup option can be used to restore the registry settings from the previous login? Last Known Good Configuration System Restore Debugging Mode Safe Recovery

Last Known Good Configuration

What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software

LoJack

What Windows process is responsible for authenticating users? Lsass.exe Smss.exe Csrss.exe Ntoskrnl.exe

Lsass.exe

What command creates a subdirectory under a directory? RD MD CD AD

MD

Windows 10 features what new web browser, which is designed to replace Internet Explorer? Microsoft Spartan Microsoft Slim Microsoft Edge Microsoft Plus

Microsoft Edge

Using what utility allows you to build your own customized console windows? -Microsoft Management Console -Microsoft Manager Console -Microsoft Management Components -Microsoft Manager Controls

Microsoft Management Console

Swiping up with three fingers on Mac OS X launches what? Dashboard Mission Control Spotlight System Preferences

Mission Control

What type of permission should you set to control access to files and folders by local and network users? -sharing on FAT32 volumes only -NTFS on NTFS volumes only -NTFS on exFAT or NTFS volumes -sharing on NTFS or exFAT volumes

NTFS on NTFS volumes only

A utility that can be used to solve a failed network connection

Network and Sharing center

Which of the following text error messages can indicate that BIOS could not find a hard drive? (Choose all that apply). Drive not recognized No boot device available Hard drive not found A disk read error occurred

No boot device available Hard drive not found

What is the file name given to the Windows kernel? kern.sys Ntoskrnl.exe Hal.dll Winkernel.exe

Ntoskrnl.exe

A Microsoft online storage service

OneDrive

What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect? SMTP PNRP SNMP LDAP

PNRP

a hidden file stored in the root directory of drive C

Pagefile.sys

What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time? Event Viewer Reliability Monitor Performance Monitor Resource Monitor

Performance Monitor

What Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes? Applications Services Processes Performance

Processes

What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.) Full control Read execute Write

Read Write

a database designed with a treelike structure that contains configuration information for Windows, users, software applications, and installed hardware devices

Registry

If you need to see information about problems and errors that have happened over time, what utility should you use? Performance Monitor Resource Monitor Reliability Monitor Services Console

Reliability Monitor

What two methods can be used to access items in the Quick Launch menu? -Right click the Start button, select an item from the Quick Launch menu -Right click the taskbar, select Quick Launch, select an item -Press Win+X on the keyboard to access the Quick Launch menu from anywhere -Press CTRL+X on the keyboard to access the Quick Luanch menu from anywhere

Right click the Start button, select an item from the Quick Launch menu Press Win+X on the keyboard to access the Quick Launch menu from anywhere

Within the Properties box of a service in the Services console, what is NOT a valid startup type for a service? Automatic (Delayed Start) Scheduled Manual Automatic

Scheduled

A program that runs in the background and is called on by other programs to perform a background task

Service

What Windows utility is used to control the Windows and third-party services installed on a system? Microsoft Management Console Event Viewer System Configuration Utility Services console

Services console

What program is used to start the part of the Win32 subsystem that displays graphics? Winlogon.exe Ntoskrnl.exe Smss.exe Lsass.exe

Smss.exe

What tabs found in the Windows Task Manager dialog box? (Choose all that apply). Applications Startup Processes Performance

Startup Processes Performance

What is responsible for getting a system up and going and finding an OS to load? Windows Boot Loader Startup BIOS Setup BIOS BootMgr

Startup BIOS

What Windows utility can be used to find out what processes are launched at startup? Task Manager Microsoft Management Console System Configuration Computer Management

System Configuration

Restore points are created at regular intervals and just before you install software or hardware by what utility? System Activation System Protection System Restoration System Prevention

System Protection

lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity, and user activity

Task Manager

can be set to launch a task or program at a future time, including at startup

Task Scheduler

What is the name of the OS X built-in backup utility? iBackup Time Machine Backup Utility Cloner

Time Machine

A Windows 7 system repair disc can be created using the Backup and Restore utility. True or False

True

A hard boot takes more time than a soft boot. True or False

True

A root certificate is the original certificate issued by the CA. True or False

True

Defragmenting is not recommended for solid-state hard drives. True or False

True

Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as other types of errors. True or False

True

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network. True or False

True

In Windows, there are two types of user accounts: an administrator account and a standard account. True or False

True

Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False

True

The Advanced Boot Options menu appears when a user presses F8 as Windows is loading. True or False

True

The Android OS for mobile devices is based on Linux. True or False

True

The GUID Partition Table (GPT) method for partitioning a drive allows up to 128 partitions. True or False

True

The Home editions of Windows 7 do not include the Local Security Policy or Print Management. True or False

True

The OEM version of Windows 7 can only be installed on a new PC for resale. True or False

True

The Windows desktop is itself a folder. True or False

True

The default value of the security level in IE is Medium-high. True or False

True

There is no undo feature in the Registry Editor. True or False

True

Using Group Policy, you can set security policies to help secure a workstation. True or False

True

Using Windows 7 Backup and Restore, you can back up the volume on which Windows is installed. True or False

True

VMs running under a Type 1 hypervisor are isolated from each other. True or False

True

When a partition is formatted with a file system and assigned a drive letter it is called a volume. True or False

True

Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. True or False

True

Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for a variety of other tasks, so it's important to delete unneeded files occasionally. True or False

True

You should take ownership of a customer's problem as if it is your own problem. True or False

True

What dialog box in Windows appears each time a user attempts to perform an action that can be done only with administrative privileges? -User Account Confirmation -User Account Control -User Access Control -User Access Confirmation

User Account Control

If you want to be able to power up a computer remotely, what feature should you use? QoS RDP RemoteApp Wake-on LAN

Wake-on LAN

What Windows 7 64-bit version editions could be installed on a computer that has 16 GB of RAM? (Choose all that apply.) Windows 7 Professional Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

Windows 7 Professional Windows 7 Home Premium

What versions of Windows 8.1 are valid in-place upgrade paths for a computer that has Windows 7 Starter edition on it? (Choose all that apply.) Windows 8.1 Windows 8.1 Pro Windows 8.1 Enterprise Windows 8.1 Ultimate

Windows 8.1 Windows 8.1 Pro

What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS? MBR program Session Manager program Windows Boot Loader Windows Boot Manager

Windows Boot Manager

What software in Windows 8 serves as built-in antivirus software? Windows Firewall BitLocker Windows AnitMalware Windows Defender

Windows Defender

a utility to copy user data and settings from one computer to another

Windows Easy Transfer

When a technician needs to start an image deployment, what version of Windows will be run on the target computer? Windows 7 Starter Windows 8 Starter Windows PE Windows XP

Windows PE

uses a flash drive or secure digital (SD) memory card to boost hard drive performance

Windows ReadyBoost

If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be? system32 Windows Windows.old Program Files (Saved)

Windows.old

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path? \\sharedfolder\server \server\sharedfolder \\server\sharedfolder /sharedfolder/server

\\server\sharedfolder

If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS

a TPM chip on the motherboard

What statement about user accounts and groups is NOT true? -a user account can belong to only one group at a time -by default, standard users accounts belong to the Users group -Guest group has limited rights on the system -Backup Operators group can restore any files regardless of the group's permissions to those files

a user account can belong to only one group at a time

What partition is the bootable partition that startup BIOS turns to when searching for an operating system to start up on an MBR partitioned drive? extended partition startup partition active partition volume

active partition

Which of the following are valid types of user accounts in Windows? visitor administrator standard temporary

administrator standard

Regarding the use of Group Policy, what statement is NOT accurate? -policies can be applied to a computer -all policies are applied before the logon screen appears -Group Policy is available in Windows Professional edition -you can set the QoS level for an application using Group Policy

all policies are applied before the logon screen appears

What should you do when you have a customer that is frequently complaining about your company, products, or services? -explain how the customer is being inappropriate and end the conversation -inform the customer that you agree and will make suggestions to management -allow the customer to vent for a while and apologize as necessary -if the complaint is not in your area of expertise, explain how it is not your problem and ask to move on

allow the customer to vent for a while and apologize as necessary

When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS

an encrypted file moved to an unencrypted folder remains encrypted

used during an unattended installation

answer file

What is another name for several small utility programs that are found in the Control Panel? downloads system processes categories applets

applets

an extra copy of a data or software file that you can use if the original file becomes damaged or destroyed

backup

What should be done before any changes are made to a system that is experiencing a problem? Examine the system Backup data Establish a Theory Test your Theory

backup data

can be partitioned and formatted as a stand-alone hard drive

basic disk

contains a list of OS commands that are executed as a group

batch file

When working with co-workers and supervisors, which of the following is a good practice? -if you have a problem with a co-worker, first discuss it with other co-workers -if you need to give bad news or criticism, use email the lessen the blow -be professional by putting business matters over personal matters -never tell your boss you can't take on a new project, even if it's beyond your skills

be professional by putting business matters over personal matters

When working with a computer illiterate user over the phone, what is NOT a good practice? -frequently ask the customer to tell you what is displayed on the screen -don't ask the customer to perform a task that might destroy data -before proceeding with the call, tell the customer to put someone else on the line -provide step-by-step mouse and keyboard instructions

before proceeding with the call, tell the customer to put someone else on the line

What should be done if a system cannot boot from the hard drive? -reinstall Windows -boot from the Windows setup DVD -run System File checker -replace the hard drive

boot from the Windows setup DVD

If using a dual or multiboot configuration, what screen appears during the boot sequence? OS select BIOS screen boot loader menu Multi-Windows Login screen Secure Boot OS page

boot loader menu

What command can be used to scan for Windows installations not stored in the BCD? bootrec /scanOS bootrec /fixmbr bootrec /fixboot bcdedit

bootrec /scanOS

What command can be used to repair a dual boot system? bootsect bootrec bcdedit bootrep

bootsect

Which of the following is NOT true about Remote Desktop? -the client can be running any version of Windows 7 -by default all users can access Remote Desktop -Windows firewall can block Remote Desktop connections -you can start the remote desktop client using the mstsc command

by default all users can access Remote Desktop

What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'

by default, accounts with a blank password cannot logon remotely

What is a typical use of a Type 2 hypervisor? (Choose all that apply.) -by developers to test applications -as honeypots to lure hackers -for VDI deployment -cloud computing

by developers to test applications as honeypots to lure hackers

What is the main advantage of using a thick client? -reduced cost of the machine -can be used for purposes other than server-side virtualization -a tablet can serve as a thick client

can be used for purposes other than server-side virtualization

Regarding the Performance Monitor utility, which statements are accurate? (Choose all that apply.) can monitor in real time can save data in logs keeps a log of errors helps to identify bottlenecks

can monitor in real time can save data in logs helps to identify bottlenecks

What command lets you view the contents of a file? cat view open rm

cat

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list

chain of custody

A directory that is housed inside another a directory

child directories

What command can be used to check for file system errors? System Restore MSconfig sfc /scannow chkdsk /r

chkdsk /r

What two commands are used to change the permissions and ownership of a file or directory in Linux? chmod cacls usermod chown

chmod chown

In order to remove any partition or volume information from a selected disk, what diskpart command should be used? format select partition clean create partition primary

clean

What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed? clean install dual boot in-place upgrade standard

clean install

What is another name for a file allocation unit? sector cluster segment fragment

cluster

What keypress sequence is used to open the Force Quit window on a Mac? ctrl+alt+delete command+option+delete ctrl+option+delete command+option+esc

command+option+esc

If you have an overly confident user on the phone, what is a good practice? -compliment the user's knowledge, insight, and experience -keep the conversation moving to place the user at a disadvantage -point out the customer's mistakes to shake their confidence -use technical jargon the matches or exceeds the customer's use of jargon

compliment the user's knowledge, insight, and experience

Creates a folder with a .zip extension

compressed folder

What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM

computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM

What are three possible reasons for an application error that should be considered at step 3 of the application troubleshooting process? (Choose all that apply.) back ups may be bad consider data corruption application settings may be wrong application may be corrupted

consider data corruption application settings may be wrong application may be corrupted

What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order

copyright

In order to break out of a command or process on a terminal, what keys should you press? ctrl+alt+del ctrl+space alt+del ctrl+c

ctrl+c

What command can be used to copy and convert files, directories, partitions, and even entire DVDs or hard drives? copy cp dd cat

dd

rearranges files on the drive into as few segments as possible

defragmenting

What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter

degausser

The initial screen that is displayed when an OS has a GUI interface loaded

desktop

Small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device

device drivers

What task can't be performed from the IE General tab? change the home page disable file downloads delete browsing history manage the IE cache

disable file downloads

What command can be used to remove partitions and convert a drive to GPT? fdisk bootrec diskpart gptconv

diskpart

What command that can be used to manage hard drives, partitions, and volumes? wpeinit bootrec bdcedit diskpart

diskpart

What is the last step in the six step troubleshooting method covered in this chapter? plan the fix resolve the problem document verify and prevent

document

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create? dual cross controlled selective

dual

If a game or desktop publishing app that relies heavily on graphics is not performing well or giving errors, what command can you run to view DirectX information? dxtshoot.exe gpudiag.exe dxdiag.exe video.exe

dxdiag.exe

can span more than one hard drive

dynamic volumes

What might be required to set up a virtual machine such that hardware is virtualized and presented to the VM, including such devices as a virtual processor, memory, motherboard, hard drive, optical drive, keyboard, mouse, monitor, and other components or peripherals? external motherboard PCI virtual expansion cards dummy system emulator

emulator

What are two valid steps in the six step troubleshooting method discussed in this chapter? boot to Safe Mode establish a theory document outcomes reinstall Windows

establish a theory document outcomes

What are some useful rules to use when troubleshooting? (Choose all that apply). establish your priorities become a researcher never suspect the user make no assumptions

establish your priorities become a researcher make no assumptions

The Windows kernel includes what two main components? background services executive services HAL shell

executive services HAL

What is the fourth partition on a hard drive called? extended partition master boot record volume primary partition

extended partition

What part of the path to a file indicates how the file is organized or formatted? subdirectory filename root directory file extension

file extension

What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi? filename file extension file version file type

file extension

the overall structure an OS uses to name, store, and organize files on a drive

file system

the overall structure an OS uses to name, store, and organize files on a volume

file system

a mini-app that provides information such as the time, date, news headlines, or weather.

gadget

What is the name of the interface that uses graphics as compared to a command-driven interface? text menu-based common user graphical user

graphical user

The power saving state that saves all work to the hard drive and powers down the system is known by what term? sleep mode suspend mode save mode hibernation

hibernation

What command can be used to take full access of a file? takeown attrib perms icacls

icacls

When utilizing both share and NTFS permissions, what statement is inaccurate? -if both permissions are used, the least restrictive permission between the two applies -if NTFS permissions conflict between a user and group the least restrictive permission applies -when you copy a file, the file takes on the permissions of the destination folder -inherited permissions pass from parent folder to child file or folder

if both permissions are used, the least restrictive permission between the two applies

What should you do after a problem has been resolved at an on-site service call? -if you restored data, tell the user all their data is fully restored -hand the customer the bill and tell him to have a nice day -tell the customer that if they contracted for preventative maintenance, these problems won't happen -if you changed anything since the last boot, reboot one more time

if you changed anything since the last boot, reboot one more time

When attempting to solve application errors, what does the first step involve? (Choose all that apply.) -interview the user and back up data -ask the user to reproduce the problem while you watch -try a reboot -check the Action Center

interview the user and back up data ask the user to reproduce the problem while you watch try a reboot

What is a typical symptom that might indicate the MBR record is damaged? loud clicking noise invalid partition table error RAID not found error message invalid boot disk erorr

invalid partition table error

What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access

it is disabled by default

The core of the OS that is responsible for interacting with hardware

kernel

What occurs when Linux encounters an error from which it cannot recover? BSOD page fault segmentation fault kernel panic

kernel panic

In Windows 7, a collection of folders can be organized into conveniently accessed shortcuts known by what term? directory library root directory setting

library

What is a good practice when working with a customer on site? -if a customer has a document on the screen, it's okay to read it -limit use of your cell phone to work-related calls -since you are there to help, it's okay to use the customer's phone for important calls -inform the user that if you have to leave while they make a phone call, they will have to pay more

limit use of your cell phone to work-related calls

A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term? live CD repair disk boot CD supplemental OS

live CD

Apps that offer continuous real-time updates on the Windows 8 modern interface are referred to by what term? live tiles stream apps fast tiles webapps

live tiles

Volumes within an extended partition are known by what term? extended volumes extra volumes logical drives logical expansions

logical drives

What type of storage drive contains spinning platters? optical hard drive solid-state drives floppy hard drives magnetic hard disk drives

magnetic hard disk drives

Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates

malware signatures

When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle

man-in-the-middle

What command will open the Memory Diagnostics utility? memdiag.exe mdsched.exe ramcheck.exe memfix.exe

mdsched.exe

You can quickly identify a problem with memory or eliminate memory as the source of a problem by using what tool? Last Known Good Configuration Event Viewer Device Manager Memory Diagnostics

memory diagnostics

a volume that can be accessed by way of a folder on another volume so that the folder has more available space

mounted drive

What two tools can be used to disable a service and to give a list of all currently running services, respectively? compmgmt.msc regsvr32.exe msconfig taskmgr.exe

msconfig taskmgr.exe

What application can be used to set Windows 8 to boot into Safe Mode while still in Windows? msconfig.exe sfc.exe services.msc rstrui.exe

msconfig.exe

If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed, what utility should you open? Task Manager msinfo32.exe Event Viewer msconfig.exe

msinfo32.exe

What command can be used to launch the System Information window? msinfo32.exe sysinfo.exe info32.exe msconfig.exe

msinfo32.exe

What command launches the Remote Desktop client for Windows? rdp rdesktop vnc mstsc

mstsc

Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric

multifactor

Found on the left side of the Windows Explorer or Computer window

navigation pane

What file holds the preferences and settings of the currently signed-in user? ntprofile.dat ntuser.dat profile.ini userconfig.ini

ntuser.dat

How often does Windows 7/Vista automatically defragment a hard drive? once a week once a day once a month once an hour

once a week

What type of software is used to control a computer? application operating system interface routine ROM routine

operating system

What piece of equipment is NOT a tool that would be considered appropriate equipment for on-site visits? oscilloscope flashlight multimeter ESD strap

oscilloscope

What type of network does not have centralized control, such as one in a small office or home office? client server network star topology peer-to-peer (P2P) hub network

peer-to-peer (P2P)

What command below is used to test network connections by sending a request packet to a host? ps ifconfig ping df

ping

What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep

press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer

When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data? -private data for each user should be kept in their C:\Users folder -all users have access to the folders in the C:\Users folder -C:\Users\Public should only be used by the Guess account -only Administrators and Guest have access to C:\Users\Public

private data for each user should be kept in their C:\Users folder

Which of the following involves assigning a problem to those higher in the support chain? ticket logging problem escalation responsibility passing issue resolution

problem escalation

What important information is needed if you are installing an OEM version of Windows 7? installation code receipt of purchase OEM license product key

product key

What kind of a computer intercepts requests that a browser makes of a server and can cache received content? DNS server VPN server proxy server Web server

proxy server

a server automatically installs a new image or OS upgrade to a computer when a user is not likely to be sitting at it

push automation

CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle

ransomware

For some brand-name computers, the hard drive contains a partition that can be used to reinstall Windows. What is the name for this partition? reinstall partition recovery partition restore partition rebuild partition

recovery partition

What command will unregister a component when run? unreg.exe /a del.exe com+ regsvr32.exe /u service /c

regsvr32.exe /u

What task can't be performed by using Task Manager? end a proces end process tree restart a process start a process

restart a process

What is a snapshot of the system settings and configuration called? rollback point restore unit rollback unit restore point

restore point

snapshots of the system and include Windows system files that have changed

restore points

What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice

retina fingerprint voice

What statement about controlling access to folders and files is accurate? -permissions refer to the tasks an account is allowed to do in the system -account configuration should keep in mind the principle of highest privilege -rights are assigned to accounts -in Windows, accounts have no rights assignments until you configure them

rights are assigned to accounts

What user account is known as the system administrator or super user account? root sysadmin admin super

root

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm

rootkit

The System Restore utility can be started from command line using what executable? msconfig.exe sfc.exe services.msc rstrui.exe

rstrui.exe

What commands are used by the USMT software? (Choose all that apply.) imagecopy scanstate loadstate imagestate

scanstate loadstate

What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender Bootlocker

secure boot

What type of virtualization should you deploy to provide a Virtual Desktop Infrastructure? server-side client-side fat-client type-2

server-side

A major update release on Windows is referred to by what term? system release update pack security release service pack

service pack

What console can be used to enable, disable, start, or stop a service? msconfig services.msc devmanage.msc taskmgr

services.msc

What is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started? kernel device driver setup UEFI/BIOS system drive

setup UEFI/BIOS

If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files? chkdsk /scannow sfc /scannow sfc /r chkdsk /r

sfc /scannow

What should be entered at a command prompt in order to scan all system files? msinfo32 /verify systeminfo /sysfiles sfc /scannow chkdsk /r

sfc /scannow

the portion of an OS that relates to the user and to applications

shell

A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering

shoulder surfing

Apps that offer continuous real-time updates on the Windows 8 modern interface are referred to by what term? Aero App multitasking side-by-side apps app tiling

side-by-side apps

What term is used to describe the unused space at the end of the last cluster? zero slack void null

slack

What two terms describe a power saving mode in windows that saves the current running state including open files to memory and then shuts down, while keeping memory powered? hibernation mode sleep mode half-awake mode suspend mode

sleep mode suspend mode

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM

smart card

What is the term given to the individual tools in a console? consoles add-ins snap-ins views

snap-ins

What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows startup process? F8 spacebar F5 Enter

spacebar

a copy of an entire hard drive that includes the Windows OS, drivers, and applications that are standard to all the computers that might use that copy

standard image

What terms refer to directories that exist under the root directory? subdirectories child directories folders containers

subdirectories child directories folders

When using Mac OS X, what gesture can be used to show the Launchpad? secondary click pinch swipe slide

swipe

contains instructions for running essential hardware devices before an operating system is started

system BIOS

In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system is stored, respectively? primary partition logical partition system partition boot partition

system partition boot partition

What GUI element is usually on the right side of the taskbar and displays open services? status tray display area system tray identification area

system tray

What is another name for the notification area in Windows? system tray taskbar Control Panel Start Menu

system tray

Can give you a quick look at what hardware and software is installed

system window

You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking

tailgating

What part of the Windows display shows information about open programs and provides quick access to others? Aero Snap taskbar notification area properties

taskbar

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard

the BIOS

What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device

the device has been jailbroken

When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure

the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols

When using Group Policy to configure QoS, what options are available? (Choose all that apply.) -the priority is a number from 0 to 63 -outbound traffic can be throttled -you must choose a specific application to apply the policy -you can choose the protocol (either IP or ICMP) for the policy

the priority is a number from 0 to 63 outbound traffic can be throttled

What events can occur during BootMgr's role in startup? (Choose all that apply.) -POST is performed -MBR program searches for partition table -the settings in the BCD are read -Dual-boot menu is displayed

the settings in the BCD are read Dual-boot menu is displayed

What statement regarding Type 1 hypervisors is accurate? -they are typically used on desktops and laptops -the VirtualBox software is an example -they are called bare-metal hypervisors -they install as an application

they are called bare-metal hypervisors

If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used? thick provisioning thin provisioning explicit zeroing implicit zeroing

thin provisioning

What is defined as a record of a call for help with a computer problem? token tracker online help database expert system ticket

ticket

What is a valid reason for wanting to configure a proxy server in Internet Explorer? -to increase the security of the connection -to connect to secured websites on a corporate network VPN -to improve website performance -to surf anonymously

to connect to secured websites on a corporate network VPN

an installation that does not require a technician to respond to prompts by the setup program

unattended installation

What are two methods that can be used to free up disk space on a hard drive? -Format the hard drive -Delete the Windows/System directory -Uninstall software you no longer use -Use drive compression

uninstall software you no longer use use drive compression

What can you do if you suspect an application requires more privileges than the currently logged-on account? -run the application from the command line using the /highpriority parameter -use the Run as administrator shortcut menu option -double-click the application icon while holding down the Home key -download a 64-bit version of the application and try it again

use the Run as administrator shortcut menu option

Shell subsystems that have only a limited access to system information and can access hardware only through other OS services are operating in what mode? process mode elevated privilege mode user mode kernel mode

user mode

a command that provides encryption options and hard link management within USMT

usmtutils

What is it called when software is used to simulate the hardware of a physical computer? dual boot Windows XP mode virtual machine compatibility mode

virtual machine

software that simulates the hardware of a physical computer

virtual machine

What is Pagefile.sys used for in Windows? system file storage to store E-books video RAM virtual memory

virtual memory

used to enhance the amount of RAM in a system

virtual memory

What is the name for a partition that has been formatted and assigned a drive letter? partition root volume container

volume

Which of the following are true about NTFS permissions? (Choose all that apply.) -inherited permissions override explicit permissions -when a subfolder is created, it is assigned the permissions of its parent folder -it is not possible to change the owner of a file -if NTFS permissions conflict locally, the more liberal permission applies

when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies

What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI? winload.exe winresume.exe winwake.efi winresume.efi

winresume.exe winresume.efi

What command can be issued within Windows RE to enable networking? ifconfig start netconf load wpeinit netsh if up

wpeinit

What terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server? (Choose all that apply.) thick client zero client dumb terminal ultra-thin client

zero client dumb terminal ultra-thin client


Set pelajaran terkait

Chapter 1: The Management Process Today

View Set