UDEMY2TESTS TO REVIEW
What is the minimum amount of graphics card memory required for Aero?
128MB
One of your clients has deleted a critical system file from the Windows boot partition, and now the operating system won't start. Which of these options provides you with the best method to replace the files? A. Windows Recovery Environment B. Safe Mode C. Automated System Recovery D. Last Known Good Configuration
A
Which of the following should be the first step after a fresh installation of Windows 7? A. Install all required applications B. Perform an upgrade of storage and/or RAM C. Install security patches D. Pair with any Bluetooth devices E. Perform a full system backup
A
Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes when the user returns back to the office? A. Sync Center B. Windows Aero C. Windows Defender D. HomeGroup
A
Your boss wants to implement BitLocker on yet a second laptop for traveling purposes. Which of the following should be performed before implementing BitLocker? A. Enable TPM in the BIOS/UEFI. B. Disable UAC. C. Defrag the hard drive. D. Convert the file system to NTFS.
A
Which of these Windows 7 functions contain a consolidated view of alerts, an overview of OS features, and a color coded status display? A. Action Center B. Event Viewer C. Security Center D. Device Manager
A In Windows 7 and 8/8.1, all of the scattered alerts and information features have been consolidated into the Control Panel's Action Center.
Which of the following are organized inside the Registry's root keys? (Select two.) A. Subkeys B. Subfolders C. Values D. Objects
A, C
Which of the following procedures best describes how to open the Command Prompt as an administrator (known as elevated mode) in Windows 7/Vista? (Select all that apply.) A. Click Start > All Programs > Accessories; then right-click Command Prompt and select Run as Administrator. B. Click Start > All Programs > Accessories; then right-click Command Prompt and select Run in elevated mode. C. Click Start and type cmd in the search field, and instead of pressing Enter, press Ctrl+Shift+Enter. D. Click Start and type cmd in Run prompt, and instead of pressing Enter, press Ctrl+Shift+Enter.
A, C
Which of the following file attributes are turned on by default for system files on a Windows 8.1 workstation? (Choose two.) Hidden Archive System Read-only
A, C. System files are critical to the operating system working properly and should not be changed or deleted. By default, the Hidden and System attributes are set. Some are also set to Read-only, but not all. For example, the virtual memory file (pagefile.sys) is a system file but is not Read-only.
You want to protect mobile device users on your network from potentially leaked files or data. Which of the following should you do to help reduce this risk? (Choose two.) Disable network autoconnect. Enforce data transmission over-limits. Enable device encryption. Install mobile firewalls.
A, C. When authorized users access devices through unintended connections or unauthorized users access absconded devices, they can access the data on the device. Disable autoconnect to avoid unintended connections, and encrypt data on devices to help protect the data on them in the event they are stolen.
Which of the following statements best describes how to restart the Print Spooler service? (Select the two best answers.) A. Enter net stop spooler and then net start spooler in the command line. B. Enter net stop print spooler and then net start print spooler in the command line. C. Go to Computer Management > Services and restart the Print Spooler service. D. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service.
A, D
Your iPad is experiencing slow performance. What are the best two options to increase performance speed? (Choose two.) Close open apps. Perform a reset to the factory default. Increase the RAM. Perform a soft reset.
A, D. Slow performance is often related to RAM. Look for any apps that are running and can be closed, or perform a soft reset to try to free up memory. Resetting to the factory default will delete all data on the device. You can't upgrade the RAM in an iPad.
You installed a new anti-malware software package on a Windows 8.1 workstation. Now the system does not seem to run normally. It's very slow and seems to hang often, and the anti-malware program will not open. You want to roll the system back to a previous configuration to see whether that removes the problem. Where do you do this? System Restore Backup and Restore Windows RE Event Viewer
A. A restore point is a copy, or snapshot, of your system configuration at a given point in time. It's like a backup of your configuration but not your data. Snapshots are created within Windows from the System Restore program. If Windows will not load, Safe Mode can be used to run rstrui.exe, which will open a version of System Restore so you can use a snapshot.
Which of these features is included with Windows 7 Home Premium? A. Internet Information Services web server B. Ability to join a Windows Domain C. Full-disk encryption with BitLocker D. Remove Desktop service E. Support for 192 GB of RAM
A. Although some of the more advanced Windows 7 features aren't part of the Home Premium version, Microsoft's IIS web server software is included and can be installed from the Windows 7 Control Panel under Programs / Windows Features.
Sarah upgraded from Windows Vista to Windows 7 on her laptop. After enjoying the enhanced performance and new interface for a few days, she realized what was missing: the Windows Sidebar with its friendly clock and weather gadgets. How can she add gadgets to her Windows 7 computer? In Control Panel, select Appearance and Personalization | Desktop Gadgets. Right-click on the desktop, select Properties | Add Gadget. Right-click on the desktop, select Personalization | Aero Themes | Gadgets. In Control Panel, select Appearance and Personalization | Windows Sidebar Properties.
A. Correct:Microsoft integrated gadgets into the desktop in Windows 7. To add gadgets, go to Control Panel, select Appearance and Personalization | Desktop Gadgets. You can also right-click the desktop and select Gadgets. Double-click a gadget to add it to your desktop.Incorrect:Both of the right-click options mislead. The right-click option is Personalization, not Properties, in Windows 7. You won't find gadgets in the theme options. The path to the Windows Sidebar Properties applies to Windows Vista, not Windows 7.
The GUI fails to load on a Windows 8.1 workstation. The Windows logo appears during boot and then disappears, and the workstation appears to hang. What should you do to resolve the issue? Boot to the installation DVD, open System Recovery Options, and choose Startup Repair. Boot to Safe Mode, open System Recovery Options, and choose Startup Repair. Boot to the installation DVD, open a command prompt, and type Startup Repair. Boot to the installation DVD, open SFC, and choose Startup Repair.
A. Fixing this issue is just like fixing a missing operating system or missing system files. Using the installation DVD (you may have to set the BIOS to use the DVD drive as your primary boot device) or the Windows Repair CD, go to System Recovery Options and choose Startup Repair.
A Linux user on your network has received an error message during boot that GRUB is missing, as well as an error number. What can you do to solve this problem? Boot to the Linux installation CD or DVD, enter Linux rescue mode, and re-create the MBR. Boot to the Linux installation CD or DVD, and reinstall Linux. Boot to the Linux installation CD or DVD, enter Linux rescue mode, and mount the hard drive. Boot to the Linux installation CD or DVD, enter Linux rescue mode, and overwrite the contents of the GRUB file.
A. In Linux, there are two common boot loaders used. LILO (LInux LOader) is the older one but has been replaced by GRUB (GRand Unified Bootloader) in most instances. The most likely cause of a GRUB/LILO error is a missing or corrupt master boot record (MBR). The method to fix it depends on the version of Linux you are running, but generally speaking, you need to boot to the Linux installation CD/DVD, go into Linux rescue mode, and re-create the MBR.
When booting a Windows 8.1 workstation, a user receives an error message about a missing DLL file. However, Windows still loads. Which utility should you use to attempt to fix the issue? SFC Recovery Console REGSVR32 REGEDIT
A. Numerous dynamic link library (DLL) files are required to boot, but usually the lack of corruption of one of them produces a noncritical error. Within the Windows toolkit, the best utility to use to tackle this problem is the System File Checker (SFC)
A user with an Android phone reports that it isn't properly detecting where she touches the virtual keyboard—it seems to be a bit off. What should she do to resolve the issue? Recalibrate the screen. Turn the phone off and back on again. Perform a reset to factory specifications. Purchase a new device.
A. Some mobile devices give you the option to improve the ability of the computer to recognize how you personally actuate the sensors. For example, many phones allow you to recalibrate (or retrain) the onscreen touch keyboard. That would be the first thing to try in this situation.
A customer has accidentally deleted some operating system files from the root of his hard drive, and he's brought the system to you. The system will not boot. Which of the following would be the best way to investigate the extent of the damage? A. Use the Windows Recovery Command Prompt B. Launch Safe Mode C. Use "Last Known Good Configuration" D. Use Automated System Recovery
A. The Windows Recovery Command Prompt allows you to boot the system into shell, allowing you to list files on the hard drive, rename files, start and stop services, and copy replacement operating system files from external installation media.
You need to start a new shell on a Linux workstation, with root permissions. Which command should you use to do this? su sudo vi dd
A. The su command (switch user, substitute user, or super user) is used to start another shell on a Linux computer. Without specifying the username, it's assumed you are trying to start a shell with superuser (or root) authority.
You want to grant a user the ability to make changes to files and run programs located in an NTFS folder. However, you do not want him to be able to delete files in the folder. Which level of access should you allow him? Read & Execute, and Write Modify Full Control Write
A. The user needs at least Read & Execute access to be able to run programs, and Write will allow him to make changes to files. Neither will allow him to delete files. Modify and Full Control will allow everything he needs as well, but Modify allows him to delete files (or the folder), and Full Control also gives him the ability to take ownership and assign permissions to others.
Your MacBook Pro appears to be unresponsive, and the cursor has changed to a rotating pinwheel. What should you do next? Force a reboot of the system. Wait for the problem to clear and then resume working. Open Apple Diagnostics to see what the problem is. Reboot the Mac into Safe Mode.
A. When a Mac cursor turns into a pinwheel and stays there, the system will not respond. Opening Apple Diagnostics won't work. You need to force a reboot of the system. There is no need to boot into Safe Mode yet; see whether the problem goes away first.
You are installing Windows 8.1 on a new workstation. Before you format the drive with NTFS, your manager tells you to perform a full format. Which of the following statements best describes what a full format does? Remove files from the partition, create a new file allocation table, and scan the hard disk for bad sectors. Remove files from the partition and create a new file allocation table. Create a new file allocation table and scan the hard disk for bad sectors. Delete the partition, re-create the partition, create a new file allocation table, and scan the hard disk for bad sectors.
A. When formatting a hard drive, you can usually choose between a quick format or a full format. With a quick format, a new file table is created on the hard disk, but files are not fully overwritten or erased from the disk. A full format removes old files, creates a new file allocation table, and scans the hard drive for bad sectors. The scan is what takes so long.
A Windows Vista workstation has started exhibiting slow system performance. Where can you go in Windows to find tools to help you troubleshoot this problem? Control Panel ➣ Performance Information and Tools Control Panel ➣ System Tools Control Panel ➣ Device Manager Control Panel ➣ Configuration and Settings
A. Windows Vista and Windows 7 have a Performance Information and Tools applet in the Control Panel. Once in there, click Advanced Tools to see a list of different tools that can help you monitor system performance. A lot of these tools are also located elsewhere, such as Event Viewer, Task Manager, Performance Monitor, Defrag, and others.
A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures is the BEST to prevent damaging the new part? Always use an anti-static mat. Ground the computer and remove jewelry. Handle the new card by the edges only. Use ESD strap on the new card during handling.
Always use an anti-static mat. Correct Answer:Always use an anti-static mat. Electrostatic discharge (ESD) is the release of static electricity, and can be damaging to any electronic devices. It is always best practice to use anti-static mat and anti-static wrist straps.Incorrect Answers:Grounding the computer and removing jewelry is good procedure, but we need the BEST.Handling the new card by the edges is good, but again we need the BEST.Use ESD strap on the new card during handling is incorrect. You need an anti-static mat to be the BEST.
What process should you follow in Windows 8.1 to edit system configuration files? A. Run the editor as Administrator B. Start Windows 8.1 in Safe Mode C. Run the Windows Startup Repair utility D. Modify the files in System Information E. Make the changes in the Windows Registry Editor
Answer: A. Run the editor as Administrator During normal use, all user processes run normally without any special permissions. To perform a procedure that required elevated rights and permissions, you need to select the option to run the application as Administrator.
The first day on the job, Jill received a spreadsheet that listed approved software for users and clear instructions not to allow any unapproved software. What kind of policy must she follow? A. Classification B. Compliance C. Group D. Security
B
The theft of personal information is a widespread problem for network security professionals. What's the most common method for tricking a user into divulging their personal account details? A. Spam B. Phishing C. Social engineering D. Spyware E. Trojan horse
B
Tom has a 200 GB hard drive partition (known as C:) on a Windows Vista computer. He has 20 GB free space on the partition. Which of the following statements best describes how he can defrag the partition? A. He can run the Disk Defragmenter in Computer Management. B. He can run defrag.exe -f in the command-line. C. He can run defrag.exe -v in the command-line. D. He can run defrag.exe -A in the command-line.
B
Where are most of the operating system files stored in Windows 7? A. \Users B. \Windows C. \System D. \OS7 E. \System32
B
Which Windows Vista utility provides a single interface for configuring your firewall, getting automatic updates, and setting up malware protection? Action Center Security Center Windows Defender Windows Firewall
B
Which of the following is the correct sequence to install a keyboard layout in Windows 7? A. Control Panel> Display B. Control Panel > Region and Language > Keyboards and Languages > Change Keyboards C. Control Panel > Languages and Region > Personalization D. Control Panel> Region and Language> Change Keyboard
B
You're planning an in-place upgrade from your existing Windows Vista Business system to Windows 7 Ultimate. Which one of these methods can be used to perform this upgrade? A. Boot from the Windows 7 Ultimate installation media and choose "Install" B. Boot Windows Vista Business and start the Windows 7 upgrade from the Windows 7 installation media C. Backup the hard drive, boot from the Windows 7 installation media, install Windows 7, and restore your files D. You cannot perform an in-place upgrade from Windows Vista Business to Windows 7 Ultimate
B
When using Performance Monitor, which settings are defined to track resource usage? (Select two.) A. Processes B. Objects C. Counters D. Values
B, C
Which of the following are advantages of Xcopy over Copy? (Select the two best answers.) A. The ability to copy files off of a mapped network drive B. The ability to copy NTFS permissions C. The ability to copy files and decrypt them D. The ability to copy entire folder structures E. The ability to copy entire folder structures to remote computers
B, D
You are using Windows Vista, but you miss the good ol' days of Windows 2000's Start Menu. How would you go about changing your Start Menu to a more "classic" style? Alt. click on the desktop > Personalize > Start Menu Alt. click on the the Start Menu > Properties > Start Menu tab Start > Control Panel > Ease of Access Start > Control Panel > System and Maintenance
B. Correct Answer:Alt. click on the Start Menu > Properties > Start Menu tab. After that, you'll have all kinds of choices as to how your Start Menu works.Note: This option is not present in Windows 7.Incorrect Answers:The Ease of Access applet, along with System and Maintenance, will not have this option available.It is also not present in the Personalization applet.
An iPhone user brings you her phone, and it's completely frozen. Neither the touchscreen nor the buttons respond. What should you try first to make the phone work again? Soft reset Hard reset Close running applications Reset to the factory default
B. A soft reset will not work, because the buttons do not respond, and neither does the touchscreen, so you can't swipe to turn it off. You need to do a hard reset; press and hold the Sleep/Wake and Home buttons on an iPhone for at least 10 seconds until you see the Apple logo. If the restart does not work, try plugging in the device and letting it charge (an hour or more is recommended) and try restarting again.
A workstation on your network is configured to dual boot between Windows Vista and Windows 8.1. Previously, the user would get a menu asking him which OS to choose. He has not made any configuration changes, but now that menu no longer appears. Which file is responsible for presenting the user with this menu? WINRESUME WINLOAD BOOTMGR NTLDR
B. During the Windows 8/7/Vista boot process, WINLOAD.EXE processes a file that resides in the root directory specifying what OSs are installed on the computer and where they reside on the disk. During this step of the boot process, you may be presented with a list of the installed OSs (depending on how your startup options are configured and whether you have multiple OSs installed). In Windows 8/7/Vista, WINLOAD.EXE replaces NTLDR from the Windows XP days.
A Windows 7 workstation will not boot properly. It shows the Windows logo upon boot and then appears to lock up. No changes have recently been made to the workstation. What is most likely causing the problem? A missing or corrupt NTLDR file A missing or corrupt BOOTMGR file A missing or corrupt DLL file A corrupt file system driver
B. If Windows 7 (or Windows Vista/8) does not load properly, it could be a problem with the BOOTMGR file. That file starts the loading of the Windows OS. It replaces the NTLDR file, which was used by Windows XP and earlier Windows versions. Numerous dynamic link library (DLL) files are required to boot, but usually the lack of corruption of one of them produces a noncritical error.
You are working on a Linux workstation. A file named docs needs to be renamed to newdocs. What is the right command to execute this? ren docs newdocs mv docs newdocs cp docs newdocs rm docs newdocs
B. In Linux, the mv (move) command is used to rename files. The cp command copies a file, but that is a different process than moving it. rm is short for remove, and it deletes files. ren is a DOS or Windows command to rename files.
Of the following, which best describes the function of the Windows gpresult command? A. Lists all recently updated group policies B. Lists the group policies applied to a user C. Lists all changes to a user's group policies since the last refresh D. Lists any and all conflicting group policies
B. The gpresult command in Windows lists group policies applied to a user.
You are at a Windows 7 command prompt. A process has frozen and is making the computer slow to respond. What is the syntax used to find the process and how much CPU time it has used? tasklist /s tasklist /v tasklist /svc tasklist /c
B. The tasklist utility is used at the command line to see a list of all the running processes (and their process ID number), similar to what you see in the GUI by using Task Manager. By default, it shows the processes on the current machine, but the /s switch can be used to see the processes on a remote machine. /svc will show the services hosted in each process, and you can use /u if you need to run the command as another user. The /v switch is for verbose mode, which will show details such as CPU time and memory usage. /c is not a valid tasklist switch
You have just installed a Windows Vista workstation for a user. Company policy is that the user's TEMP folder should not be located on the system partition. Which administrative tool can you use to change the location of the user's temporary files folder? Computer Management Users and Groups Local Security Policy System Configuration
B. The user's TEMP directory is a user environment variable and is accessed through Users and Groups (or User Accounts).
The GPS app on your mobile phone has stopped responding. What should you do to resolve the issue? Perform a hard reset. Perform a force stop. Perform a soft reset. Uninstall and reinstall the app.
B. When an app is unresponsive, you can do a force stop to close it. With iOS, press the Home button twice quickly, and small previews of your recently used apps will appear. Swipe left to find the app that you want to close and then swipe up on the app's preview to close it using a force stop.
A Windows Vista workstation will not load Windows. Which file in the boot process is responsible for switching the system from real mode to protected mode? NTLDR BOOTMGR WINLOAD WINRESUME
C
In which of these would you find the Windows Memory Diagnostics Tool in Windows 7? A. Control Panel / Services B. Maintenance C. Control Panel / Administrative Tools D. All Programs / Accessories E. Control Panel / System
C
Which of the following is an illegal character in a Linux filename? A. * (asterisk) B. . (dot) C. / (forward slash) D. _ (underscore)
C
Which of the following programs in Windows 7 saves problem descriptions and solutions? A. File History B. Problem Reports and Solutions C. Action Center D. Performance Monitor
C
Which tool in Windows 8.1 enables you to create a new user account based on a global Microsoft account? A. User Accounts in Control Panel B. Users and Groups in Control Panel C. Settings charm D. Users charm
C
You are troubleshooting a tablet PC that has a frozen application. You have attempted to end the underlying task of the application but have not succeeded. Which of the following statements best describes the next recommended course of action? A. Hard reset B. Force quit the app C. Soft reset D. Bring the tablet to an authorized service center
C
Your organization uses an important application that written in-house. Unfortunately, this application conflicts with portions of the UAC process. Which of the following is the easiest way to disable portions of the UAC but still keep other aspects of UAC operating normally? A. Make a change to the system registry B. Modify the access permission of each user C. Use the Local Security Policy console to change the UAC configuration D. Modify the application to work better with Windows UAC
C
You are working on a Windows 7 workstation that will not properly load Windows. Another technician suggests using a snapshot to restore the system. Where do you do this from? Windows RE Windows pre-installation environment Safe Mode Backup and Restore
C. A restore point is a copy, or snapshot, of your system configuration at a given point in time. It's like a backup of your configuration but not your data. Snapshots are created within Windows from the System Restore program. If Windows will not load, Safe Mode can be used to run rstrui.exe, which will open a version of System Restore so you can use a snapshot.
You are examining shared folders on a Windows 7 workstation. You notice that there is a shared folder named c$ that you didn't create. What is the most likely explanation for this share? An attacker has compromised the workstation and is using the share to control it. It's a local share that all users have access to. It's an administrative share that requires administrative privileges to access. It's an administrative share that all users have access to.
C. Administrative shares are created on servers running Windows on the network for administrative purposes. These shares can differ slightly based on which OS is running, but they always end with a dollar sign ($) to make them hidden. There is one for each volume on a hard drive (c$, d$, and so on), as well as admin$ (the root folder—usually c:\winnt) and print$ (where the print drivers are located). These are created for use by administrators and usually require administrator privileges to access.
You have just installed a new wireless router for a small office network. You changed the username and password and the default SSID. Which other step should you take to increase the security of the wireless router? Enable WPS. Assign static IP addresses. Update the firmware. Enable port forwarding.
C. Changing the default username, password, and SSID are all good measures to take when installing a new router. Another good step is to update the firmware. It's possible that new firmware was introduced while your device was sitting on a shelf somewhere, and it's always smart to be up-to-date.
Mobile device users on your network are required to use a VPN app to connect to the corporate network when they are out of the office. A user reports that the app will not open for her. She turned her tablet off and back on again, and the app still will not open. What should she try next? Perform a soft reset. Perform a hard reset. Uninstall and reinstall the app. Perform a force stop.
C. If an app does not load, the first thing to try is rebooting. If that does not work, attempt to remove and reload the app. Be sure to check the vendor's site for any similar problems (and solutions) encountered by others.
The personal finance app on your Android phone will not load. You rebooted your phone and the app still does not work. What should you try next to get it to work? Perform a factory reset. Download an antivirus app and perform a virus scan. Remove and reinstall the app. Perform a force stop on the app and then open it again.
C. If an app does not load, try rebooting (forcing the device to restart, if necessary). If that does not work, attempt to remove and reload the app. Be sure to check the vendor's site for any similar problems (and solutions) encountered by others.
You are dual-booting a workstation with Linux and Windows 8.1. One day when you boot up, you get a GRUB error message. What is the most likely cause of the problem? The Windows boot loader is missing. The Linux boot loader is missing. The MBR is missing or corrupted. The BIOS/UEFI is missing or corrupted.
C. In Linux, there are two common boot loaders used. LILO (LInux LOader) is the older one but has been replaced by GRUB (GRand Unified Bootloader) in most instances. The most likely cause of a GRUB/LILO error is a missing or corrupt master boot record (MBR). The method to fix it depends on the version of Linux you are running, but generally speaking, you need to boot to the Linux installation CD/DVD, go into Linux rescue mode, and re-create the MBR.
Which of these applications would be the best choice to provide device COM+ management, access to the Event Viewer, and management of Windows Services? A. Computer Management B. Data Sources C. Component Services D. System Configuration
C. The Component Services utility is designed to manage Microsoft Component Object Model (COM+) distributed applications. In a single utility, you have access to COM+ management, the Event Viewer, and the Services utility.
Which of these would be the best way to prioritize application traffic in your network adapter properties configuration? A. Configure separate NICs for each application type B. Run critical applications on IPv6 instead of IPv4 C. Configure DSCP values to match the application priorities D. Configure the important applications with a higher-priority subnet mask
C. The Differentiated Services Code Points (DSCP) values are used by infrastructure devices to determine the quality of service (QoS) for the network traffic.
Which of the following would be the best way modify the duplex setting of the Ethernet adapter in Windows 7? A. Update the Ethernet adapter device driver B. Start the computer in Safe Mode C. Modify the adapter settings in Control Panel / Network and Sharing Center D. Change the duplex setting in the BIOS E. Modify the Windows Registry
C. The Ethernet adapter settings and other Network configuration settings can be changed through the Network and Sharing Center in the Windows Control Panel.
Your Windows startup process is crashing with a Windows Stop error before you can get a login screen. You suspect that a service is crashing the system, but you obviously can't use your normal login process to disable the service. What is the next best option for ensuring the service is disabled? A. Reinstall Windows from the original installation media B. Boot into Safe Mode C. Use the Windows Recovery Command Prompt to disable the service from the command line D. Select the Last Known Good Configuration boot option
C. The Windows Recovery Command Prompt provides a powerful set of tools that can manipulate almost any aspect of the operating system environment. The incorrect answers: A) Reinstall Windows from the original installation media - A complete reinstallation of Windows is pretty drastic, considering that you just need to have a single service disabled. B) Boot into Safe Mode - While it's true that Safe Mode only loads a fraction of the normal startup files and drivers, there's no guarantee that our problematic service won't be started. Safe Mode will not ensure with 100% that the service will be disabled. D) Select the Last Known Good Configuration boot option - In this example, our problem wasn't based on any changes or modifications. Changing the system to use the last known good configuration is an unknown variable that probably won't help our situation.
You are at a Windows Vista command prompt. You need to terminate a process on a remote system named Sparky, and the process identifier is 14456. What is the right syntax to use to kill this process and any child processes started by it? taskkill /S Sparky /PID 14456 /C taskkill /T Sparky /PID 14456 /S taskkill /S Sparky /PID 14456 /T taskkill /C Sparky /PID 14456 /T
C. The taskkill command is used to terminate processes, just like you can do in Task Manager in Windows. To kill a process by its name, use the /IM switch. If you know the process ID, use the /PID switch. The /S switch is used to specify a remote system, and the /FI switch applies a filter to a set of tasks. The /T switch terminates child processes, and /F terminates the process forcefully.
Which of these would be the best way to upgrade a 32-bit Windows 7 Professional system to a 64-bit version of Windows 7 Professional? A. Windows Anytime Upgrade B. In-place upgrade using the x64 installation media C. Windows Easy Transfer D. Windows Upgrade Advisor from the x64 installation media E. In-place upgrade using the x86 installation media
C. You cannot perform an in-place upgrade when moving from an x86 version of Windows 7 to an x64 version. If you want to keep your documents and some settings, you'll need to perform a migration. You can alternatively perform a clean install and move any personal documents to the new system.
List the System Properties tabs (5):
Computer Name, Hardware, Advanced, System Protection, Remote
An attacker is constantly trying to hack into one of your customer's SOHO networks. Which of the following statements best describes the easiest, most practical way to protect the network from intrusion? A. Disable the SSID broadcast. B. Install an antivirus server application. C. Disconnect the Internet connection. D. Install a firewall. E. Install an IDS.
D
Luana is a member of the Dev group and the HR group. She is trying to access a local resource on an NTFS volume. The HR group has Allow Full Control permission for the payroll folder, and the Dev group has Deny Read permission for the same folder. What is Luana's effective access to the payroll folder? Full Control Read Write No access
D
Users are reporting to you that a Windows feature asks them for confirmation before running certain applications or when making system changes. What is the name of this Windows feature, and where should you direct users to turn the functionality off? A. Security Center; it can be turned off in the services MMC snap in. B. User Account Control; it can be turned off under Security in the Control Panel. C. Windows Firewall; it can be turned off under System Properties. D. User Account Control; it can be turned off under User Accounts in the Control Panel.
D
When performing a clean installation, which of the following is the default location for the system files of Windows? A. C:\Windows B. C:\Windows\System32\Config C. C:\System Files D. C:\Windows\System32
D
You've configured one of your workstations to act as a host for Remote Desktop Connection, but other workstations on the network cannot connect to the host. All of the settings in Remote Desktop appear to be correct. Which of these is the most likely cause of this issue? A. The Remote Desktop service is not running B. Your Windows credentials do not have permission to use Remote Desktop C. Windows is not using the correct network adapter D. The Windows Firewall is not properly configured
D
Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounting. The Accounting folder is shared on a network server, on a partition formatted as NTFS. Which of the following statements best describes how to stop Bill from having read access to the folder without impacting any other users on the network? A. Remove Bill from all domain groups that have access to the Accounting folder. B. Deny read access to the Accounting folder for Bill through local access security. C. Deny read access to the Accounting folder for any group that Bill is a member of. D. Deny read access to the Accounting folder for Bill through shared access security.
D
A Windows 7 workstation will boot only into Safe Mode. Even after multiple reboots, Windows will not load properly. Which tool should you use to scan for problems? REGEDIT MSCONFIG Event Viewer Recovery Console
D. At times, a system will become corrupted to the point where it will only boot into Safe Mode and not allow a normal boot. While a hardware issue can cause this, it can often be associated with a damaged/missing driver. To address the problem, boot into the Recovery Console and scan for problems. You can also choose to boot to the Last Known Good configuration or resort to the recovery DVD.
You are creating a BYOD policy for mobile phones at your company. Which of the following are typically included in such a policy? Limits of proper use and authorized users Limits of proper use, authorized users, and software and security requirements Limits of proper use, authorized users, software and security requirements, and procedures for termination of employment Limits of proper use, authorized users, software and security requirements, procedures for termination of employment, and reimbursement policies
D. BYOD policies are becoming more common in corporate environments. Be sure to have a policy in place to clearly spell out security requirements and user expectations before the employee brings their own device. Most companies require the employee to sign the agreement to acknowledge that they have read and understand it.
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop? Reboot the PC as the domain will automatically rebuild the relationship Update the BIOS using the latest version Run CHKDSK Re-join the computer to the domain
D. Correct Answer:Re-joining the computer to the domain will rebuild the trust relationship.Incorrect Answer:None of the other options will rebuild the trust relationship.
A client wants to install a new video game, and he's read that the game requires DirectX 11. He's afraid that his Windows 8.1 computer doesn't support this version; which command should you tell him to run to see whether he's correct? MSTSC MSINFO32 MMC DXDIAG
D. DirectX is a collection of application programming interfaces (APIs) related to multimedia. A great utility is the DxDiag (DirectX Diagnostic) tool, which allows you to test DirectX functionality. When you start it, you can also verify that Microsoft has signed your drivers.
A Windows 8 workstation will not load properly. During the Windows 8 boot process, the MBR is responsible for loading which key Windows file? BOOTMGR NTLDR WINRESUME WINLOAD
D. During the Windows 8/7/Vista boot process, the master boot record (MBR) determines the file system and loads WINLOAD.EXE, which starts the official Windows boot process. In Windows 8/7/Vista, WINLOAD.EXE replaces NTLDR from the Windows XP days.
Your favorite restaurant locator app on your iPhone won't load. You closed it and tried to reopen it a few times and it still doesn't work. What should you try next? Remove and reinstall the app. Perform a hard reset. Perform a force stop. Reboot the phone and try the app again.
D. If an app does not load, try rebooting (forcing the device to restart, if necessary). If that does not work, attempt to remove and reload the app. Be sure to check the vendor's site for any similar problems (and solutions) encountered by others.
Your Windows 8.1 workstation just crashed, displaying a blue screen of death. You have not recently made any changes to the computer. What is the best way to restart Windows to see whether you can isolate the issue? Boot to the Windows installation CD and start the Recovery Console. Boot to Safe Mode. Boot to the Last Known Good configuration. Boot normally and see whether the error happens again.
D. If this is a first-time error, just reboot and see whether it goes away. Windows is pretty stable, but every once in a while it coughs up a hairball (not a technical term, just like blue screen of death is not a technical term) and you need to reboot. If it doesn't happen again, it's not a problem. If it continues to happen, boot into Safe Mode.
You suspect your system is failing to boot because of a corrupt master boot record. Which utility is the best to fix this? Event Viewer Refresh your PC Reset your PC WinRE Command Prompt
D. Of the options available, the best tool to fix a corrupt MBR is the Windows Recovery Environment's Command Prompt, via bootrec /fixmbr.
Which of these would be the best choice for disabling a Windows service before the operating system starts? A. System Restore B. Windows Services C. Windows Repair D. Recovery Console Command Prompt E. Windows PE
D. Recovery Console Command Prompt The Windows Recovery Console and Command Prompt can provide you with many configuration and operating system options, including the modification or removal of files, enabling and disabling of devices, and the configuration of startup programs and services.
You have a Windows 7 workstation configured in a workgroup. Before you reboot your computer to apply a change, you want to be sure that no one else is remotely connected to your workstation. Which administrative tool can you use to do this? Users and Groups Performance Monitor Control Panel ➢ Networking Task Manager
D. Task Manager's Users tab provides you with information about the users connected to the local machine. You'll see the username, ID, status, client name, and session type. You can right-click the name of any connected user to perform a variety of functions, including sending the user a message, disconnecting the user, logging off the user, and initiating a remote-control session to the user's machine.
You want to grant LaCrea the ability to change permissions for others on the Equity folder, which is on an NTFS volume. Which level of NTFS permission do you need to grant her? Modify Read & Execute Change Permissions Full Control
D. The Full Control permission gives the user all the other permissions and the ability to change permissions for others. The user can also take ownership of the directory or any of its contents. There is no Change Permissions standard NTFS permission.
Sitting at a Windows 8.1 command prompt, you want to delete the read-only doc.txt file in the directory you are in. You do not want Windows to ask you for permission to delete the file. What is the syntax to delete the file? del doc.txt /y /r del doc.txt /y /f del doc.txt /q /r del doc.txt /q /f
D. The del command, short for delete, is used to delete files. The /q switch is for quiet mode. It will not ask for confirmation to delete the file. The /f switch forces deletion of read-only files. /y and /r are not valid switches for the del command.
You have installed a second hard drive in a Windows 8.1 workstation. In Disk Management, what type of partition can you create that will allow you to create an unlimited number of logical partitions in it? Extended Dynamic Logical GPT
D. When you create a partition in Windows 8 or newer, it will ask if you want to create a Master Boot Record (MBR) or GUID Partition Table (GPT) one. GPT is newer and has far more features. One of those features is that you can create an unlimited number of logical partitions on it. Only the operating system will limit you; Windows will only allow 128 partitions on one drive.
You have a Windows 8.1 workstation that will not boot properly. After the POST, the screen displays a message saying "Operating System Not Found." What is most likely causing the problem? NTLDR BOOTMGR BOOT.INI BCD
D. Windows 8/7/Vista use Boot Configuration Data (BCD), which holds information about which OSs are installed on the computer. If BCD isn't able to find the OS bootstrap files (BOOTMGR in this case), then Windows won't load. BCD, which is edited with BCDEDIT.EXE, replaces the BOOT.INI file, which was used in Windows XP and other older versions of Windows.
Which of the following would best describe the process of sharing a local printer? A. Add the printer to the Windows Desktop B. Connect the printer and confirm the Test Print is working properly C. Configure the Windows registry to allow shared printers D. Add the printer to the "Shared Devices" section of the BIOS E. Click the "Share this printer" from the printer properties in the Sharing tab
E
Which of these would be the best choice to provide system recovery options in Windows 7 without booting the operating system? A. BIOS diagnostics B. Microsoft Register Server C. Windows Recovery Disk D. System Configuration E. System Repair Disk
E. The Windows System Repair Disk boots the computer and provides the standard list of system recovery options. From the System Repair Disk, you can run Startup Repair, System Restore, System Image Recovery, Windows Memory Diagnostic, or launch the Command Prompt.
System Configuration tabs
General, Boot, Services, Startup, Tools
Internet Options tabs:
General, Security, Priavcy ,Content, Connections, Programs, Advanced
List the Windows 7 Control Panel Categories:
System and Security, Network and Internet, Hardware and Sound, Programs, User Accounts, Appearance and Personalization, Clock, Language and Region, Ease of Access
List the things in Computer Management:
Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups, Performance, Device Mnager, Disk Management
The ability to run applications in Windows XP Mode (XPM) is included with what versions of Windows 7?
Windows 7 Professional, Enterprise, and Ultimate. This is a virtual client (emulating Windows XP Professional with Service Pack 3), and you must download and install Windows Virtual PC to use it. XPM was discontinued in Windows 8/8.1.