1002 Quiz A
Which of the following environment variables is used to access the absolute file path of the Windows system folder?
%SystemRoot%
Question 11 : You are a network administrator of an organization. You have been given a task to maintain the right and healthy environment for the electronic equipment in the server room. What environmental guidelines should you follow?Each correct answer represents a complete solution. Choose all that apply.
A well ventilated HVAC system should be used to dissipate heat Temperatures should not fluctuate much between 65 to 85 degrees. Good ventilation and proper air flow should be maintained.
Which is an application layer protocol that enables the transmission and delivery of email over the Internet?
SMTP
Which of the following is a US federal law designed to prevent fraudulent accounting practices?
SOX
Which of the following includes safety and health information about chemical products, including health risks and storage, disposal recommendations, and procedures for containing a leak or a spill?
Safety Data Sheet
Smith, a system administrator in an organization, is working on computer equipment's and peripheral devices, and he needs to keep himself safe from any kind of injury. What personal safety guidelines should Smith follow?
Secure loose cables out of the way. Use proper lifting techniques when moving heavy equipment. Disconnect the power before repairing a computer or other device.
You are a technician in an organization. You are working on a computer system. Suddenly, you felt an electric shock while operating it. You don't have an electrostatic discharge (ESD) device to protect your system. Which of the following will you use in this situation?
Self-grounding
Which of the following can hold digital certificates, store temporary data, or even perform cryptographic processing functions to keep its data secure?
Smart card
Which is an attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content?
Spam
Which of the following is a complete application installer which requires a network connection to download the applications but once downloaded, the user has all the files that are needed?
Standalone
Which cipher is used by the Wi-Fi Protected Access (WPA) encryption standard to encrypt network traffic?
TKIP
You have just replaced an old battery with a new battery in your car. Now, you have to dispose off the old battery. What is the recommended way of doing this?
Take the old battery to an authorized recycling facility.
Which of the following port numbers is used by the Telnet protocol?
Telnet 23
You are a technician in your organization. You have been provided with a mobile device which has many issues such as slow performance, some applications are stuck, and some features are not functioning. Which of the following troubleshooting steps will you do to restore the mobile device to a good condition? Each correct answer represents a complete solution. Choose all that apply.
The Reset settings option can return the operating system settings to their defaults. Power down and restart the device again. The Reset network settings option can fix network connectivity issues.
Which of the following Mac OS tools creates an incremental backup of files that can be restored at a later date?
Time Machine
Why does the commercially distributed software and media make use of digital rights management (DRM)?
To enforce copyright restrictions
Which of the following Windows versions uses a "rolling release" schedule with regular free feature updates that add new features but don't change the version number?
Windows 10
You are a technician in an organization. You have been asked to perform in-place upgrades in every user's laptop. Which of the following are the valid paths which you can use during the upgrades?Each correct answer represents a complete solution. Choose all that apply.
Windows 7 to Windows 8.1 Windows 7 to Windows 10 Windows 8 to Windows 8.1
You are a technician in your organization. You are asked to create a specialized embedded security camera. Which of the following Windows versions will you use for this?
Windows IoT
You are an IT technician in an organization. You have to view the basic information about your computer. You navigate to Control Panel > System and Security > System. What basic information about your computer will you see on the main page of the System settings? Each correct answer represents a complete solution. Choose all that apply.
Windows edition Windows Activation Processor, memory, and system type
Andrew, a technician, is using a Windows 8 computer and wants to display a list of files and folders within a directory. Which of the following commands will he use to complete the task?
dir
Which of the following Linux commands helps the users to find files with specific words or phrases?
grep
Which of the following commands can be used to manage network shares, network print jobs, and network users?
net
Question 24 :Henry, a customer, calls you to explain an issue with his computer and expressed anger about the service provided by your company. What guidelines should you follow while dealing with the customer?Each correct answer represents a complete solution. Choose all that apply.
Avoid being judgemental. Ask open-ended questions Do not argue or become defensive
Joe, an IT technician in an organization, is allowed to use his personal laptop and mobile phone freely for work as the organization feels this saves money and increases morale of the employees. What kind of policy is being followed by the organization?
BYOD
You are a security administrator in your organization. You have secured the server room by establishing a badge reader on the entrance which allows only the authenticated persons to enter but then also an unauthenticated person entered the server room and caused some harm. The management asks you to secure the server room with a physical property that is intrinsic to an individual human body. What control should you use to secure the server room?
Biometric
You are a technician in uCertify Inc. Jacob, a software developer in your organization, asks you to install Windows on his Mac system by repartitioning the hard drive. Which of the following Mac OS features will you use in this situation?
Boot Camp
Jenny, a system administrator in an organization, is working on a computer system. Suddenly, a voltage drop in power supply occurs which lasts for around 45 minutes. This problem causes the computer system to behave unpredictably. Which of the following power supply problems occurred in this situation?
Brownout
Which of the following are the common symptoms of malware present on a personal computer?Each correct answer represents a complete solution. Choose all that apply.
Changes in file permissions Installs unfamiliar programs Receives frequent security alerts
Question 88 :Joe, a user, is working on a Windows 8 computer. He is unable to access some files on the hard disk. However, he is able to successfully log on and access other files. What should you do to resolve the issue?
Check the file permissions on the hard disk drive.
Question 62 :Andy, a technician in an organization, has to protect and secure the network hosts of his computer system as the risk of attack on the network is quite high. What guidelines should Andy follow?Each correct answer represents a complete solution. Choose all that apply.
Close unnecessary network services and ports. Configure network applications to be as secure as possible without interfering with normal functions. Ensure the system has a firewall installed and configured.
Which of the following administrative tools is used to configure object sharing between applications?
Component Services
Which utility will you use to schedule automated tasks, partition hard drives, view logged system events, and manage Windows services and hardware devices?
Computer Management
Question 76 :Which of the following has special permissions to decrypt EFS files on a domain account?
Data recovery agent
Which file system allows encryption of individual drives and folders on any NTFS volume?
EFS
Which of the following is the legal contract between a licenser and purchaser to govern and establish the purchaser's right to use a software?
EULA
Question 87 :Which of the following guidelines should be followed for the account management in a Windows 7 computer system?Each correct answer represents a complete solution. Choose all that apply.
Each account should have appropriate user permissions. Accounts should be protected by strong passwords or other authentication methods. Each user on a workstation should have a separate account.
Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space?
Enclosures
Which of the following encryption systems is included with the Business/Professional/Enterprise/Ultimate editions of Windows as well as all editions of Windows Server?
Encrypting File System
Which utility shows a log of application and system messages, including errors, information messages, and warnings?
Event Viewer
Joe, a technician in an organization, is asked to scan and repair a mobile device which has been affected by malware. In order to repair the device completely from malware, he has to put the device back again to its fresh state. Which of the following tools will Joe use to repair the mobile device?
Factory resets
Which of the following symptoms of mobile system and app issues is caused by lack of sufficient storage, too many applications running at one time, or low battery?
Frozen system
Which format is used to check for bad sectors on the physical disk before installing the file system structure?
Full
Which of the following can be used with disks of any size and allows an almost unlimited number of partitions?
GPT
Which of the following are the features which were once popular but have been deprecated since Windows 7? Each correct answer represents a complete solution. Choose all that apply.
Gadgets Windows Media Center Homegroup
Which of the following tabs of the system configuration settings is used to choose the type of startup for the next time the computer boots, to troubleshoot system startup problems?
General
Which of the following is the main reason of the 64-bit operating systems being more effective and popular than the 32-bit operating systems?
Handles large amounts of RAM
Which of the following statements are true about the homegroup sharing model? Each correct answer represents a complete solution. Choose all that apply.
Home and business editions of Windows can join homegroups. Computers in domains can join homegroups, but not create them. Homegroups are created by one user and can be joined by anyone with a shared password.
Which protocol is used for accessing and maintaining distributed directory information services over an IP network?
LDAP
Which of the following ways writes zeros to the entire drive and restores the drive to its newly installed configuration?
Low-level format
Which software is designed to centrally administer devices in order to assign device permissions, verify security compliance, apply updates, and even monitor activity?
MDM
Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup?
MSConfig
Which of the following are the probable causes of the occurrence of the Blue Screen of Death (BSOD) error in a Windows computer? Each correct answer represents a complete solution. Choose all that apply.
Malware infection Memory Device Drivers
In which of the following attacks does an attacker intercept and relay communications between two points and impersonate each party in the eyes of the other?
Man-in-the-middle
Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder?
Modify
You are a support specialist in an organization. As some problems persisted, you are perfoming the change management process. You are in the last step of the process in which you have to finalize the changes. You have tested the results of the change and enabled the necessary services. Which of the following will be your next step in this process?
Notify users and administrators.
Which of the following passwords is valid for a single session, so can't be stolen and reused?
OTP
You are an IT technician in your organization. When you log into your account, you press a button on your keychain and then type in the new set of numbers it displays. What digital authentication element are you using?
OTP
Which of the following are the common system requirements to install and run an application on a computer? Each correct answer represents a complete solution. Choose all that apply.
Operating system Drive Space Cpu
Which is primarily used to segregate network traffic, optimize network speed, and to permanently assign a network path for a specific protocol or network service?
Port forwarding
Which user group exists on Windows but has no special privileges and can be customized to make a general set of "privileged user" permissions?
Power Users
Question 86 :Which of the following Windows features provides a scripting language ability which can be used by the users for task automation?
PowerShell
Which of the following are the causes of vertical lines on the page in the laser printing process?Each correct answer represents a complete solution. Choose all that apply.
Print resolution setting is too low Low resolution image Toner on the main corona or transfer corona wire
What is used to examine the potential impact of the change and evaluates the possible outcomes in the change management process?
Risk analysis process
Question 45 : You have created a script file that runs in the Windows Command Prompt environment (CMD.EXE) or in its DOS-based predecessors. What is the extension of this script file?
.bat
Question 49 :Which of the following gpupdate tool options reapplies all policies, even those which haven't been changed?
/force
In which of the following Mac OS X versions was dark mode introduced to reduce eye strain?
10.14 Mojave
Question 78 :Which of the following Active Directory security features allows the Active Directory network to maintain a public key infrastructure?
Active Directory Certificate Services
Question 37 : You work as a support technician in an organization. You have been called to troubleshoot an issue in the customer's computer system at his place. What guidelines should you follow for providing good professional service to your customer?Each correct answer represents a complete solution. Choose all that apply.
Address people appropriately. Avoid using technical jargon, acronyms, and slang. Act like you know what you're doing, even if you might have a doubt.
Which steps should you take to troubleshoot application crashes or compatibility errors in a Windows computer? Each correct answer represents a complete solution. Choose all that apply.
Apply application updates. Perform a repair install of the application from Control Panel or Settings. Change the operating mode of the application on the Compatibility tab of the application's Properties dialog box.
Which is a set of business practices that incorporates IT assets across all business units within an organization?
ITAM
Which of the following is a probable cause of irregular wireless connectivity in mobile devices?
Items blocking the signal between the device and a wireless access point.
You are a support specialist in a company. While servicing a computer at a customer's location, you notice a file containing some private and confidential information of the customer. What should you do to deal appropriately with the confidential and private file?
Keep the file confidential and secure.
Which of the following are drawbacks of the cloud backup type? Each correct answer represents a complete solution. Choose all that apply.
It consume Internet bandwidth. A system failure or cyberattack could compromise it. Regulatory requirements might limit cloud storage of some data. It can be more costly than local storage.
Which of the following types of malware silently tracks and records all user input to gather information about the user and send to other parties?
Keylogger
You are an IT technician in an organization. You have been given a task to repair a malware infected system. You have identified the symptoms that suggest the presence and nature of the installed malware. Which of the following should be your next step?
Quarantine the infected system.
Which of the following authentication systems is used as the authentication back end for Wi-Fi networks using WPA Enterprise security?
RADIUS
Which provides remote display and input capabilities over network connections for Windows-based applications running on a server?
RDP
Which is a particularly intrusive sort of malware that attempts to extort money from the victim in order to undo or prevent further damage?
Ransomware
Question 20 :You work as a PC technician in an organization. You are working on your Windows computer. Suddenly, the screen of the computer crashes and a blue screen appears on it. Which of the following approaches should you try to troubleshoot this error?Each correct answer represents a complete solution. Choose all that apply.
Reboot the computer to see if the problem is resolved. Note the error and research in Microsoft's Knowledge Base. Check Event Viewer to try to find the problem.
Which of the following is the central configuration database where Windows stores and retrieves startup settings, hardware and software configuration information, and information for local user accounts?
Registry
Question 68 :Joe, a technician, wants to log into a user's computer to fix the user's corrupt local profile. Which of the following will allow him to connect to the user's computer?
Remote Desktop
Which of the following installation types is used to install an operating system from an image on a network server using PXE or NetBoot?
Remote network
Question 40 : Which of the following are the components which are included in a safety program?Each correct answer represents a complete solution. Choose all that apply.
Toxic waste handling and disposal An injury incident reporting system Compliance with all government regulations
Which utility notifies you when an action will change Windows settings and gives you an option to stop?
UAC
Which provides emergency power to a load when the input power source or mains power fails?
UPS
Which of the following is the sign and symptom of a spyware in a mobile device?
Unexpected activation of cameras or microphones without using them
What are the signs of hijacked email when a malware attacks a computer system? Each correct answer represents a complete solution. Choose all that apply.
Unfamiliar messages in sent mail folders Automated responses to messages the user never sent Reports from email contacts of unusual messages
Which of the following troubleshooting steps can be performed to correct problems with a slow Windows startup?Each correct answer represents a complete solution. Choose all that apply.
Update drivers. Enable Fast Startup. Disable unnecessary startup applications and services.
You are a PC technician in an organization. You are working on a Windows computer and get to know that some necessary DLL files are missing. Which of the following will you do to troubleshoot the missing DLL files?
Use REGSVR32.