Operating Systems - Chapter Quiz 11 - 21

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

William is planning to install Windows 10 on his computer. He has read online about the advantages of using GPT over MBR and has decided to use GPT. What factors should William check to see if he can use GPT partitioning? (Select all that apply.) 64-bit version of Windows 10 UEFI mode enabled SSD hard drive Secure boot enabled

-64-bit version of Windows 10 -UEFI mode enabled

Avery wants to do a clean installation of Windows 10 on his laptop. The problem is that Avery's laptop does not have a DVD optical disk to use to install Windows 10. There is not a recovery partition because Avery deleted it to use the space for data. What can Avery use to install Windows 10? (Select all that apply.) -Install the OS over a network. -Avery will not be able to do a clean install and should try an in-place upgrade. -Use a USB flash drive. Install on another computer and move the hard drive.

-Install the OS over a network -Use a USB flash drive.

A technician is troubleshooting a Windows 10 computer that starts an application each time the computer is booted. When accessing the Startup tab in System Configuration, the technician finds that no startup applications are listed. What best describes the reason no startup applications are listed? (Select TWO.) Windows 10 does not list startup applications in System Configuration. Windows 10 uses the Startup section in Task Manager to manage startup items. The technician is signed into the wrong user account when checking the Startup tab in System Configuration. Windows 10 uses the Boot tab in System Configuration to manage startup items. The technician needs to reboot the computer and retry accessing the Startup tab in System Configuration.

-Windows 10 does not list startup applications in System Configuration. -Windows 10 uses the Startup section in Task Manager to manage startup items.

Which script file extension indicates a Windows batch file? .vbs .bat .sh .ps1

.bat

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA? AES RADIUS TACACS TKI

AES (Advanced Encryption Standard) provides faster and more secure encryption than TKIP.

A technician is configuring a Windows computer to boot from a MBR HDD. What statuses must be set for the OS to boot? Extended Primary Active Logical

Active An MBR drive requires one and only one partition to be marked or set as active in order for the OS to boot. The BIOS/UEFI looks for an active partition when searching for an operating system to load.

A user is experiencing sluggish performance on their Windows 10 computer. The technician assigned to the trouble ticket determines the HDD is low on available free space, which is causing an error message saying that virtual memory is low. What steps can the technician perform to resolve the issue? Add a second HDD to the system and move the pagefile.sys file to the second drive. Uncheck "Automatically manage paging file size for all drives." Check "Automatically manage paging file size for all drives." Disable virtual memory and delete the pagefile.sys file.

Add a second HDD to the system and move the pagefile.sys file to the second drive.

After starting his new position, Brandon was provided with a Mac laptop to complete his work. Brandon needs to set up his cloud storage, also known as iCloud, so that he may synchronize his content to other OS devices. In the settings, where can Brandon find and set up iCloud? Network Printers & Scanners Apple ID Sharing

Apple ID

A user calls into Service Desk about their MacBook. Unsure where to locate the sleep option, they ask Leslie for assistance. Where can Leslie bring up that option? Safe Mode Apple Menu App Store Login Items

Apple Menu

Karen is working with a customer who is having an issue with their computer. Karen is talking to the customer over the phone and says, "The UEFI is not recognizing the RAM during POST, and I need you to reset the DIMMs to see if the computer issue is resolved". What could Karen have done differently to help her customer understand the problem with the computer? -Maintained a positive attitude. -Avoided jargon. -Actively listened to the customer. -Avoided distractions.

Avoided jargon

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later? -Provides a method for assigning rights to Guests who require Administrator access. -Allows members to take ownership of files and folders. -Backward compatibility for legacy operating systems and applications. -Members have limited privileges and are given a temporary profile.

Backward compatibility for legacy operating systems and applications.

Sheila is an IT analyst who must recommend updates to her company's software environment. Which organizational documentation would specify the processes Sheila will follow to adopt a new software application at her company? Business process documents Flowchart Organizational chart Pseudo-code

Business process documents

Cathy is on her way to a customer service call to repair a broken computer when she gets a flat tire. She changes the tire and immediately gets back on road but arrives 20 minutes late for the appointment. She apologies to the customer and thinks everything is okay, until later when her supervisor calls her into his office and says that the customer called and said Cathy fixed the problem, but that they were disappointed she was late. What could Cathy have done differently to avoid disappointing the customer? -Paid more attention to the customer when talking to them about the problem. -Not been distracted with her smartphone while working on the problem. -Called her supervisor to let them know she would be late. -Called ahead to the customer and let them know the situation.

Called ahead to the customer and let them know the situation.

Prior to launching an upgrade to the accounting software, you need to clean the %temp% folder on 73 Windows computers. The system administrator asked you to automate the process by using a PowerShell script already written for this purpose. While browsing the available files on the network, you notice several files that could potentially perform this task. What files will you use? CleanTempDir.sh CleanTempDir.py CleanTempDir.ps1 CleanTempDir.js

CleanTempDir.ps1

A technician is scanning a Windows computer using the System File Checker (SFC) utility from the command prompt. The results of the scan indicate that SFC was unable to repair the corruption that it found in the Windows system files. What utilities should the technician run next to attempt to repair the damaged or missing Windows system files? DISM taskkill regedit chkdsk

DISM

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. What feature would you configure on the SOHO router to accomplish this? Port forwarding Demilitarized zone Quality of service MAC filtering

Demilitarized zone

Which Mac feature is used to access Trash, switch between running apps, and launch apps? Finder Terminal Dock Key Chain

Dock

A technician needs to extend a volume across multiple HDDs for the additional space requirements. What would be a part of the configuration? Primary partition Logical drive Dynamic disk Basic disk

Dynamic disk Volumes that are extended across two or more drives (called spanning) require dynamic disks.

It is important to ensure that all software used on an organization's devices is regulated. Your group has been tasked with identifying and logging all software on the company's devices. Which of the following is defined as a right to use or copy software and is a legally binding contract between the user and software owner? Digital rights management Open-source license EULA Copyright

EULA

Jeff's company works with medical information. He has hired you as a consultant to check whether the company is doing everything possible to secure its data. During your first discussion, Jeff explains that he has implemented password security and encryption and had purchased a new firewall. You ask to see the company's server, and he takes you to a closet in the middle of the building, where he opens an unlocked door. The room also has a variety of supplies that a cleaning crew uses at night. What advice would you give Jeff about the security of the company's data? Ensure the physical security of the company's data. Prevent network penetration. Make sure the password security policy is set up. Reconsider the type of encryption he is using.

Ensure the physical security of the company's data.

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process? Sign into Bluetooth. Test the connection. Enter the pin code. Discover the device.

Enter the pin code

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. What is often configured as a required step for a user each time she attempts to use the VPN connection? -Enter the same username and password used on the corporate network. -Select the encryption and authentication methods in Connection Properties. -Call the help desk at the corporate office to obtain a random VPN password. -Configure the laptop to a static IP address on the corporate LAN subnet.

Enter the same username and password used on the corporate network.

Dylan is working on a computer with Windows 10 installed. During the troubleshooting phase, his client came several times to see how things were proceeding, and each time Dylan assured them that things were going well. Dylan discovered the problem, but while testing his theory he realized the problem is more complicated than he thought it would be and resolving it will take more time than he had told his customer it would take. What should Dylan do about this new complication? Hide it from the customer. Just keep working and wait for the customer to come in again. Document the new finding and move on to fix the problem. Explain that the problem is more complicated than he thought it would be.

Explain that the problem is more complicated than he thought it would be.

A Windows 10 user wants a simple method for restoring a data file using File Explorer in the event they accidentally delete an earlier saved version of the same file. What backup method will best meet the requirement of the user? System Restore Backup and Restore File History System image backup

File History

A user is requesting a disaster recovery solution that will protect their user data from loss in the event of a catastrophic disaster. What would best provide the user with the requested protection? (Select TWO.) File-level backup Cloud storage service Disk-to-disk backup on second internal drive Local, on-site storage backup Critical application backup

File-level backup Cloud storage service

Samuel is assisting an internal user with one of their corporate applications. It is currently not responding to any actions, nor can the user close it using the button in the top left corner. Samuel knows there is a method to forcibly close the app. What can Samuel use to take this action? Force Quit Apple Menu macOS Recovery Disk Utility

Force Quit

Frank is helping an internal employee set up their new MacBook. While setting up their security settings, Frank suggests that the employee set up their Touch ID through the biometric scanner found in their track pad. What action is this considered? Mission Control Apple ID Printers & Scanners Gestures

Gestures

Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer. What type of security is your company using? Biometric lock Hard token Soft token Smart card

Hard token

Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones? VPN Bluetooth POP3 IMAP

IMAP

Jamie is installing Windows 10 Pro on a client's computer that already has Windows 7 Professional installed. The client wants Jamie to keep all the programs and files stored in Windows 7 if possible. What type of upgrade should Jamie perform? Clean install Custom installation In-place upgrade Multi-boot

In-place upgrade

What is the command that sends a signal to a particular process to end itself in an orderly way? Distro Kill End-config Grep

Kill

An important part of support and being able to solve various IT problems that arise is having an understanding of where the information that you are looking for can be found. A collection of articles with text, images, and video which give in-depth information on a topic is referred to as which of the following? Blog News site Knowledge base Ticketing system

Knowledge base

Daniel is working as a service desk technician and is asked by an internal employee for further assistance with a corporate app. To locate the app, Daniel uses a gesture by pinching with three fingers and his thumb on the trackpad to bring up all the applications installed on the MacBook and can find the corporate app. What is the process for bringing up all the downloaded apps? First Aid iCloud Launchpad Safe Mode

Launchpad

The IT group for your organization has been asked to make some updates to the OS options that are available for the company. Which OS is known to be secure and extremely stable that does not take up much space on the hard drive? macOS Chrome Linux Windows

Linux

What Windows features or tools provides a method of changing the policies that apply only to a local computer's security settings, such as Lock Screen timeout and failed logon restrictions? Windows Firewall User Account Management Local Security Policy Local Users and Groups

Local Security Policy

Working with user permissions is an important component of most organizational activities. The ability for users to easily and quickly access the tools, documents and information is a critical component of keeping employees efficient and active. Which policies are those that are a subset of policies the local device or user? Group policy Network topology diagram Local group policy Local security policy

Local group policy Contains a subset of policies in the group policy and only to the local OS or local user.

Frank is currently working on a computer. Somehow the video drivers have become corrupt or someone has tampered with the display settings. The display is too large for the current monitor and half the desktop is missing. What option on the Startup Settings screen will allow Frank to repair this issue? Safe Mode with Networking Disable driver signature enforcement Low-resolution video Debugging tool

Low-resolution video

Sarah has started her position as a Service Desk Advisor and has been provided with a new mobile device. Sarah must set up her corporate email account and a few other applications. What is the process she can set up her secure corporate data and apps? SDK Emulator Mobile Device Management (MDM) Baseband Update

MDM

A Mac user wants to manually update macOS. Where should the user expect to find macOS updates available for manual update? Manual macOS updates are located using Time Machine. A manual update of macOS is not possible. Manual macOS updates are accessible via the App Store. Manual macOS updates are usually accessed in System Preferences.

Manual macOS updates are usually accessed in System Preferences.

Michael has installed the company's timekeeping application on Jessica's computer. When Jessica logs in to the computer, she tries to run the timekeeping application, but it does not seem to work. When Michael logs in to the timekeeping application on her computer, it works fine. What could be the issue with the application? Michael installed the application only for his user account. The application has a runtime error. Michael installed the application in the wrong location. Jessica has administrator privileges that do not allow her to run the program.

Michael installed the application only for his user account.

A technician is performing Windows preventative maintenance tasks on all computers in the organization. They want a way to create a custom console containing only the tools they regularly launch and then distribute this custom console to each computer. What Windows tools will allow the technicians to configure a custom console? perfmon.msc mdsched.exe mmc.exe eventvwr.msc

Microsoft Management Console (mmc.exe)

Tina is interested in setting up the ability to make payments with her phone, also known as tap and-pay. What wireless technology is used for tap-and-pay? Wi-Fi NFC Bluetooth IR

NFC (near field communication)

Marian is assisting a user with connecting to the Active Directory (AD). The user requires a specific account in order to be able to use and connect to the directory database. What would the user need as their domain level accounts on the corporate network? Network ID Azure Active Directory (Azure AD or AAD) Local Account VPN

Network ID

Larry has begun a new position with an organization and wants to understand their environment better to be more effective in his role. What type of document would show the organization and pattern in which devices are connected on the company's network? Data flow diagram Organizational chart Network topology diagram Flowchart

Network topology diagram

Jonathon has discovered that his Windows 10 laptop will no longer boot. Although Jonathon backed up the system, he has discovered that he does not have the Windows 10 setup media and wants to restore the laptop to factory defaults. What type of installation should Jonathon try? OEM recovery partition Windows 10 repair upgrade Windows 10 Fresh Start Upgrade installation

OEM recovery partition

Roger's company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex. What can Roger change in Windows to require more complex passwords? Group Policy Password Policy Access control list Organizational unit

Password Policy

There are many scripting tools out there for use in creating applications. You have been asked to select an environment for creating and executing your scripts. What would be a good choice for writing and executing scripts? Dreamweaver Word PowerShell Notepad

PowerShell

Jessica is concerned about the security of her work laptop. She travels a lot on airplanes and likes to work during the flights. She always feels like people are looking over her shoulder while she works on the laptop and might see the data on the screen. What type of security can Jessica implement to help with this issue? Privacy screen Biometric locks Laptop lock Encrypting files

Privacy screen

A Windows user in your organization would like to permanently allow pop-ups on certain websites while browsing the web. Which Internet Options tab will you direct the user to in order to make this change? Privacy tab Connections tab General tab Security tab

Privacy tab

Derek wants to upgrade his computer from Windows 7 to Windows 10. He wants to install a 64-bit version of Windows 10. The CPU is a Core i3 1.2 GHz processor. He currently has 1GB of RAM and a 50GB hard drive. The video card is newer and supports DirectX 11 or later. What will Derek need to upgrade in order to install the Windows 10 64-bit edition? Hard drive Video card CPU RAM

RAM To support the 64-bit version of Windows 10, Derek's computer will need at least 2GB of RAM.

Samantha is working on a client's laptop that is receiving the BSOD shown below. The specific error is THREAD STUCK IN DEVICE DRIVER_M. Samantha has discovered that the issue is with the device driver for the Wireless Network card. What should Samantha do to fix this error? Update Windows. Roll back the device driver. Disable the Wireless Network Interface card. Reinstall Windows.

Roll back the device driver.

The IT team has been tasked with identifying problematic tools and applications that are not serving the organizational needs well. What type of plan is used to revert back to the original state after a failed change implementation? End-user acceptance plan Change document Rollback plan Risk analysis

Rollback plan

A technician added a new, second hard drive in a Windows system and verified that BIOS/UEFI recognized the drive. What is the correct order of steps, using Disk Management, to prepare the drive for use assuming the technician will be creating a single volume? Select the disk to initialize, select a partitioning style for the selected disk, create the volume, format the volume. Select a partitioning style for the selected disk, create the volume, select the disk to initialize, format the volume. Create the volume, select the disk to initialize, format the volume, select a partitioning style for the selected disk. Create the volume, select a partitioning style for the selected disk, select the disk to initialize, format the volume.

Select the disk to initialize, select a partitioning style for the selected disk, create the volume, format the volume.

George is concerned that when his children use the family computer at home, they might seek out or be exposed to content on the Internet that they are not mature enough to handle. He asks you if there is any way to block certain types of content that is inappropriate for children. What is your best advice to George? Use port forwarding. Enable a network that utilizes 802.11n Wi-Fi. Disable IP filtering using a firewall. Set up content filtering using a blacklist.

Set up content filtering using a blacklist.

Kwami is currently working on a project for their presentation tomorrow. They are looking for some previously created files to include in the presentation. Unfortunately, Kwami is unable to remember where the files were saved and stored. What can be used to search for the missing files? System Preferences Apple menu Mission Control Spotlight

Spotlight

Danielle is assisting a client who is having issues with their MacBook. They tell Danielle that their machine shut down while they were working and they aren't sure why. They tell Danielle that they have tried to restart it more than ten times but that they just can't get it to "turn on." Of the following options, which should Danielle do first when the client brings their MacBook to her office to fix? Run Disk Utility on the laptop. Reinstall macOS Monterey. Start the machine in Safe Mode. Restore using Time Machine.

Start the machine in Safe Mode.

Sara is working on a computer for a client who has not backed up important data. The client's computer will not boot properly to Windows. The computer has failed three times and now has automatically launched diagnostic and repair procedures. Currently, Sara is viewing the Advanced Options screen for Windows 8.1. What option should Sara select as the least invasive way to repair the Windows startup problem on her computer? Startup Repair Command Prompt System Restore System Image Recovery

Startup Repair

A technician mistakenly uninstalled an application that is crucial for the productivity of the user. Which utility will allow the technicians to correct the issue? Component Services Computer Management System Restore System Configuration

System Restore Windows creates periodic restore points that will allow the technician to easily revert back to a restore point that was created before the technician uninstalled the application

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder? Enable permission inheritance so the new permissions are inherited from the parent folder. Delete the folder and re-create it. Then assign the new permissions. Take ownership of the folder and then change permissions. Disable permission inheritance and explicitly assign the new permissions.

Take ownership of the folder and then change permissions.

A Windows user would like an application to run every Friday at 5 p.m. Which tool will help the user configure the application to run automatically? Task Manager DxDiag Task Scheduler MSConfig

Task Scheduler

Frank is traveling for work and has discovered that he forgot an important file. The good news is the file is in cloud storage. Unfortunately, Frank's laptop cannot connect to the airport's Wi-Fi. How can Frank download this important file? Disable the firewall on the laptop. Tether his laptop to his smartphone. Use a VPN to connect to cloud storage. Use airplane mode.

Tether his laptop to his smartphone.

Jeff is installing a new application at work. Based on documentation and reviews from other customers, he thinks that the new application has security vulnerabilities. However, his supervisor still wants him to install the application. What should Jeff recommend to his supervisor about the new application? -That it should be run only in a secure virtual machine on company computers. -That access to the application should be limited to only certain personnel. -That the program should be run only with administrative privilege. -That the program should be run only on computers with network access.

That it should be run only in a secure virtual machine on company computers.

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied? The file will lose all permissions. The file will inherit the permissions of the destination. The file cannot be copied from NTFS to FAT32. The file will retain its permissions.

The file will lose all permissions. FAT32 volumes do not support NTFS permissions.

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share. What best describes this situation? -The firewall on the server is disabled. -The firewall on the user's computer is disabled. -The principle of least privilege was not followed. -The user bypassed the security of the file server.

The principle of least privilege

Lea, a support technician, is configuring a new wireless access point using a web browser. After securing the WAP using WPA2-PSK with AES encryption, the wireless connection she was using during configuration was dropped. Numerous attempts to refresh the browser have failed with a "page not found" error, and the WAP's setup screen will not display. What should the technician have done to prevent this issue? The technician should have used WPA-TKIP for the wireless configuration. The technician should have enabled QoS on both the wired and wireless networks. The technician should have added the MAC address of her NIC to the list of denied devices. The technician should have been configuring the WAP using a cabled connection.

The technician should have been configuring the WAP using a cabled connection.

A technician is troubleshooting a Windows computer experiencing slow startup. What steps should the technician take first to determine whether the startup processes are responsible for the slow startup? The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot. The technician should back up user data and reinstall Windows and all applications. The technician should disable all scheduled tasks in Task Scheduler and reboot the system. The technician should permanently disable all startup processes in System Configuration.

The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.

A user is attempting to launch a Windows utility from a command prompt but is receiving a message stating the user must be an administrator in order to use the utility. What best explains the reason the user is receiving the message? The user is running a Windows Home edition and not a professional edition. The utility needs to be launched from the GUI. The user must run the command using an elevated command prompt. The user is signed into Windows as a standard user.

The user must run the command using an elevated command prompt.

A disk in Windows Disk Management is displaying a volume status of "Unallocated". What is the reason for this status? The volume is marked unallocated because it has not yet been partitioned. The disk is dynamic and has been corrupted or is unavailable. The volume is formatted with a file system, and the file system is working without errors. The volume is marked unallocated because it has not yet been formatted.

The volume is marked unallocated because it has not yet been partitioned.

You are mapping a network drive on a Windows computer and click the Browse button on the Map Network Drive window in order to navigate to the host to select the folder you want to map. The host computer with the shared folder is not displaying in the browser window. You verify that the computer can ping the host and that the shared drive is properly configured on the host. How can you map the network drive when the host cannot be found via browsing? -Choose a different drive letter for the mapped drive. -Verify that the computer from which you are mapping the drive is connected to the network. -Type the path to the host computer in the Folder textbox. -Select the check box to connect using different credentials.

Type the path to the host computer in the Folder textbox.

Kaylen recently purchased a new laptop computer. When he tried to set up the computer, the setup failed. Kaylen rebooted the computer and received an Invalid Boot Disk error message. Where can Kaylen go to make sure the hard drive is communicating with the computer? NTbtlog.txt UEFI Windows System information Event Viewer

UEFI

Plans and updates are regularly made at your organization to help to ensure that when a new cyber-attack or vulnerability appears, it can quickly and easily be dealt with. Which type of practice is used to protect a system against malware? Process planning Pseudocode Updates Flowchart

Updates

Jerry has a new customer who wants to know the difference between using a restart in Windows and using the power switch to turn their computer off and on again. What should Jerry explain to his new customer? -Using the power switch requires the computer to do a hard boot. -Restarting in Windows performs initial steps to test hardware in UEFI/BIOS. -There is no difference between a restart and using the power switch. -Using the power switch takes less time than doing a restart.

Using the power switch requires the computer to do a hard boot.

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal? SSH IMEI POP3 VPN

VPN

Joe works for a company that has a traveling sales force. The company has asked Joe to research a way for the sales force to have real-time information on the availability of its salable products. The company has an intranet application that allows it to see up-to-the minute information. The company does not want to make this information public. What should Joe recommend? Access control list MDM policies VPN Firewall

VPN (virtual private network)

Some of an organization's devices have been running much slower than normal. Your group has been tasked with identifying the problem with these devices, and you suspect malware. What type of malware is a program that replicates by attaching itself to other programs? Worm Trojan Virus Spyware

Virus

Jackson received an error message indicating that his hard drives are almost full. While doing the disk cleanup, Jackson noticed a large file named Windows.old. He is not sure what the file is used for and calls you to find out if it is safe to delete this file. What should you ask Jackson before determining whether he can delete the file safely? -What is the size of the file? -Does his computer have an OEM recovery partition? -Where is the file located? -When was the last Windows update performed?

When was the last Windows update performed?

One of Eric's clients has called him about a problem they are having booting their computer. When they try to boot, they receive the error message, "Missing operating system." Eric asked them to make sure no USB drives or disks were in the optical drive on their computer. The client claimed that no devices were connected. What file is missing from the client's computer? NTbtlog.txt Winload.exe Ntoskrnl.exe Smss.exe

Winload.exe

A Linux technician wants to set the permissions for a file to allow all users read-only access. All existing permissions for group members and owner should remain untouched. Which command should the technician use if the file is located in the current working directory and the filename is test.txt? chown 644 test.txt chmod 644 test.txt chmod o+r test.txt chown o+r test.txt

chmod o+r test.txt The chmod command is used to change the permissions of a file or directory. In this example, the "o" represents "others," the "+r" represents add the permission read-only, and test.txt is the name of the file whose permissions are being changed.

What is the current Linux file system used to hold the operating system? NTFS APFS ext4 ext3

ext4(fourth extended file system).

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet? OneDrive iCloud Google Yahoo

iCloud

Maggie's customer is having an issue with a wireless connection. Maggie is on the phone with the customer and wants to know if they are receiving an IP address and a DNS address from the DHCP server. Maggie also would like to know the MAC address of the wireless NIC card so she can check for MAC filtering on the router. What command in Windows should Maggie tell her customer to use at Microsoft's command prompt? ifconfig ifconfig /displaydns ipconfig ipconfig /displaydns ifconfig /all ipconfig /all

ipconfig /all

Which of the following are closed-source, proprietary operating systems? osUNIX openSUSE Linux macOS Monterey Ubuntu Linux

macOS Monterey

Ian wants to see information about his computer, including the amount of RAM installed, a list of startup programs, and the directory where the Windows operating system is installed. What should he type in the Run dialog box in Windows 10 to get this information? msinfo32.exe cptrmgr.exe sysinfo32.exe msconfig.exe

msinfo32.exe

A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. What commands will the technician most likely use to locate the offending process? dd vi ps kill

ps

A technician is working on a Linux computer from the terminal and needs to determine the current directory she is working in. Which command will display the information the technician is looking for? cd ps pwd passwd

pwd

Which Windows command would you use to copy a directory and all its contents? xcopy /e xcopy /s xcopy /c xcopy /d

xcopy /e


Set pelajaran terkait

Physical Science: Extension I Quiz

View Set

8.2 Review - Accepting or Rejecting Special Orders

View Set

Present Simple vs. Present Continuous

View Set

Apush 3.1 Check Your Understanding

View Set

Exam 2 Chapters 4, 10, 11, 17 & 18 Questions

View Set

BIO 264 Module 12 Special Senses, Smell & Taste

View Set

Pharmacology Agents to control blood sugar glucose levels

View Set