1130 Operating Systems Concepts Final Practice
A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups should you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) -Power Users -Guests -Administrators -Remote Desktop Users
-Administrators -Remote Desktop Users
Which of these are actions under the Change permission? -Read -Write -Create and Delete -All of the Above
-All of the Above
Your computer has a single NTFS partition that is used for the C: drive with the folders below. ~C:\Confidential ~C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: ~Move Reports.doc from C:\Confidential to C:\PublicReports. ~Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? -Deny Read for both. -Allow Full Control for Reports.doc and Deny Read for Costs.doc. -Deny Read for Reports.doc and Allow Full Control for Costs.doc. -Allow Full Control for both.
-Allow Full Control for both.
Which type of DoS attack exhausts the target's resources by overloading a specific program or service? -Amplification -Distributed -Protocol -Application layer
-Application layer
Which file attribute identifies the file as having been modified since the last backup? -Hidden -Read-only -Encrypted -Archive
-Archive
What does Windows 11 do when you log in with an administrator account with elevated privileges? -Assign you a unique administrator token. -Assign you a user and an administrator token. -Notify you that you have administrative privileges. -Use your credentials to assign you administrative privileges.
-Assign you a user and an administrator token.
What file type has the extensions of .mp3 and .wma? -Document files -Audio files -Program files -Batch files
-Audio files
You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called? -System image plan -Rollback plan -Backout plan -Risk analysis
-Backout plan
What tool can you use to create a full system image of your Windows drive? -Backup and Restore -System Repair -Windows Installation Media -Recovery drive
-Backup and Restore
Which of the following devices would you add to a computer if you needed to take inventory at a retail store by scanning the UPC symbols on products? -Scanner -Bar code reader -Touch screen -Trackball
-Bar code reader
Which of the following is designed to provide a Linux command line interface? -Bash -GCC -GIMP -GPL
-Bash
Which of the following is true of the Windows BitLocker program? -BitLocker is designed to protect files against offline access only. -BitLocker is designed for use on the Home version of Windows 10 and later. -BitLocker is designed to encrypt individual files. -BitLocker is designed to protect files against offline and online access.
-BitLocker is designed to protect files against offline access only.
A technician is tasked with installing the Windows OS on a macOS computer so that the computer can boot to either macOS or the Windows OS. Which macOS feature should the technician use to complete this task? -Finder -Disk Utility -Boot Camp -Keychain
-Boot Camp
You experience startup errors after you install a new device. What should you do FIRST to resolve the issue? -Disable automatic restart. -Boot in Safe Mode and disable all unnecessary devices. -Boot in Safe Mode and roll back the driver. -Recover the system image.
-Boot in Safe Mode and roll back the driver.
Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing? -Blackout -Power surge -Brownout -Power spike
-Brownout
You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? -C:\Users\Documents and Settings\username -C:\Users\Profiles\username -C:\Documents and Settings\username -C:\Users\username
-C:\Users\username
Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? -Firewall -VPN -Sharing Internet Connections -Caching
-Caching
Which of the following settings can you modify in the Time & Language category in the Windows 10 Settings app? (Select three.) -Manage sound devices -Choose your input device -Choose the language you speak with your device -Show additional calendars in the taskbar -Let websites provide locally relevant content by accessing my language list -Choose the language you speak with your device
-Choose the language you speak with your device -Show additional calendars in the taskbar -Choose the language you speak with your device
Besides protecting a computer from under-voltages, a typical UPS also performs which other actions?(Select two.) -Conditions the power signal -Prevents electric shock -Prevents ESD -Protects network cabling from EMI -Protects from over-voltages
-Conditions the power signal -Protects from over-voltages
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run on Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select two.) -Make all users who need to run the application members of the local Administrators group. -Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. -Run the application in its own memory space. -Run the application in Compatibility Mode.
-Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. -Run the application in Compatibility Mode.
You want to set up a service on your company network that can be configured with a list of valid websites. The service should give employees a certificate warning if they try to visit a version of an untrusted site. Which of the following services is designed to provide this functionality? -Hashing -Extensions -DNS server -DHCP server
-DNS server
Katy is an IT engineer who is responsible for maintaining the environment in her company data center in San Francisco. While swapping motherboards in a server in the data center, she notices that the original motherboard is showing signs of corrosion. Which of the following is the BEST solution to resolve the corrosion issue? -Run a diagnostic check on all servers to make sure they are functioning properly. -Replace motherboards in the servers more frequently. -Check and clean all corroded server motherboards. -Decrease the humidity in the data center.
-Decrease the humidity in the data center.
Which hard drive destruction method uses a strong magnetic pulse to destroy data? -Drilling -Incineration -Degaussing -Disk shredder
-Degaussing
A user reports that the projector in the conference room has display issues when it is connected to his laptop. After identifying the cause and completely resolving the issue, the projector displays the images perfectly both on his laptop and on the projector. Which of the following troubleshooting strategies should you perform next? -Document the solution. -Establish what has changed. -Test the solution. -Identify the problem.
-Document the solution.
You have just installed a new video card in a user's Windows workstation. When the system is powered on, the screen displays in 16 colors at 640 x 480 resolution. Which of the following will BEST resolve this problem? -Upgrade the monitor to one that supports a higher sync rate. -Download and install the latest driver from the video card manufacturer's website. -Verify that the system's UEFI firmware is compatible with the video card. -Reboot the system in Safe Mode.
-Download and install the latest driver from the video card manufacturer's website.
You have just installed a new video card in a user's Windows workstation. When the system is powered on, the screen displays in 16 colors at 640 x 480 resolution. Which of the following will BEST resolve this problem? -Upgrade the monitor to one that supports a higher sync rate. -Reboot the system in Safe Mode. -Download and install the latest driver from the video card manufacturer's website. -Verify that the system's UEFI firmware is compatible with the video card.
-Download and install the latest driver from the video card manufacturer's website.
To improve the safety of your location and comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS)for all chemicals used in your shop. How should you obtain these documents? -Write them yourself after researching the issues. -Download them from the chemical manufacturer's websites. -Ask your manager for them. -Get them from your local workers' safety insurance office.
-Download them from the chemical manufacturer's websites.
A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow through it. What should you do? -Remove and then reinstall the device. -Replace the device. -Update the device drivers. -Enable the device in Device Manager.
-Enable the device in Device Manager.
You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly? -System File Checker -Advanced Options Menu -File Explorer -Event Viewer
-Event Viewer
A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the BEST way to respond to this situation? -Try to perform the task by yourself. -Tell the user it isn't in your job description and move on with your current task. -Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task. -Tell the user that they will need to find someone else to take care of their problem.
-Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.
You are establishing a new security policy for user authentication and want to implement multi-factor authentication. Which of the following would BEST accomplish this? -Smart card and one-time code text message -Fingerprint and iris scan -Username and password -Fingerprint and one-time code text message
-Fingerprint and one-time code text message
Which of the following keys let you switch between keyboard languages? -Option key -Globe key -Control key -Command key
-Globe key
Which of the following is true of groups on a Windows system? -A group allows multiple users to share a single logon. -Group members have the access rights that are assigned to the group. -Users and local resources, such as printers and shared folders, can be made members of a group. -Users can log on as the group and have all the assigned access rights.
-Group members have the access rights that are assigned to the group.
You have accepted a position working in a local hospital's IT department. Which of the following government regulations would be the most important for the hospital to be in compliance with? -GDPR -PCI DSS -FERPA -HIPAA
-HIPAA
Which of the following statements is true regarding hard tokens? -Hard tokens provide a higher level of security. -Hard tokens are easy to replace if they are lost or stolen. -Hard tokens are inexpensive to implement. -Hard tokens provide protection even if they are lost or stolen.
-Hard tokens provide a higher level of security.
Which edition of Windows 11 only offers the most basic features of the OS? -Pro for Workstations Edition -Home Edition -Enterprise Edition -Pro Edition
-Home Edition
Which tool would be the best choice for removing and replacing the motherboard BIOS chip? -Needle-nose pliers -IC extractor -Combination ratchet -Screwdriver
-IC extractor
Which of the following hard drive destruction methods runs the risk of releasing toxic by-products? -Shredding -Drilling -Incineration -Degaussing
-Incineration
Which of the following is the No operating system found error likely caused by? -Outdated applications -Time drift -Incorrect boot order -Outdated drivers
-Incorrect boot order
What backup method backs up every file that has changed since the last full or incremental backup? -Differential -Full -Synthetic -Incremental
-Incremental
You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: ~All pieces of equipment have cable locks installed. ~Server racks are locked and have alarms. ~The WAP for the guest Wi-Fi is located on the receptionist's desk. ~Biometric locks are installed on high security rooms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? -Upgrade the equipment cable locks. -Replace the biometric locks with standard locks. -Install the WAP on the ceiling or inside of a special locked box. -Install biometric locks on the server racks.
-Install the WAP on the ceiling or inside of a special locked box.
You have three computers in your office. You would like to reduce the time it takes to switch from one computer to the next, and you would like to use only one keyboard, one monitor, and one mouse for all three computers. Which of the following devices BEST allows this type of setup? -DVI -KVM -Router -USB hub
-KVM
Which of the following protocols establish a secure connection and encrypt data for a VPN? -FTP and WPA -L2TP and IPSec -WPA and WEP -WEP and RDP
-L2TP and IPSec
A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the laptop. You would like to know if it is working properly. Which of the following is the BEST action to take? -Place the laptop next to a heater set to High. -Let the laptop warm up to room temperature before turning it on. -Blow compressed air into the cooling ports before turning the laptop on. -Visually inspect the LCD screen for cracks before turning the laptop on. -Turn on the laptop and run self-diagnostic tests.
-Let the laptop warm up to room temperature before turning it on.
Which of the following is an open-source operating system? -Chrome OS -Windows -Linux -macOS
-Linux
You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer? -Programs -Windows Firewall -Local Group Policy Editor -Settings
-Local Group Policy Editor
You're trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work. Which of the following troubleshooting steps is the BEST to try first? -Replace the USB device. -Make sure the USB device is plugged in properly. -Try a different USB cable. -Install a new USB controller card.
-Make sure the USB device is plugged in properly.
Which of the following is a valid distinguished name for the MarketSpace common domain name? -MarketSpace/com -MarketSpace_com -Market.Space.org -MarketSpace.org
-MarketSpace.org
What is the ability to run multiple parts of an app simultaneously? -Multithreading -Multiprocessing -Multiples -Multitasking
-Multithreading
You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written? -Boot.log -Ntbtlog.txt -Myboot.txt -Bootlog.txt
-Ntbtlog.txt
After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup? -In the cloud -On an external drive -On the secondary drive on your computer -On the main hard drive on your computer
-On an external drive
You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file? -On a USB flash device -On the system volume -On a drive other than where the operating system files are stored -Split between two storage devices
-On the system volume
Which of the following is the generally accepted rule for manually setting the initial and maximum paging file size? -One and a half times the size of the physical RAM for the initial size and three times for the maximum size. -Two and a half times the size of the physical RAM for the initial size and four and a half times for the maximum size. -Double the size of the physical RAM for the initial size and quadruple for the maximum size. -Three times the size of physical RAM for the initial size and five times for the maximum size.
-One and a half times the size of the physical RAM for the initial size and three times for the maximum size.
During which asset management phase would you perform maintenance tasks, such as installing updates and patches or upgrading a hard drive? -Deployment -Operations -Decommissioning -Procurement
-Operations
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.) -Place the files on an NTFS partition. -Configure share permissions. -Place the files on a FAT32 partition. -Configure both share and NTFS permissions.
-Place the files on an NTFS partition. -Configure both share and NTFS permissions.
While browsing the internet, you are constantly being bombarded by small advertisements with links attached to the web page. Which of the following can you use to prevent these advertisements from appearing? -Private Browsing Mode -Data cache clearing -Browser synchronization -Pop-up blocker
-Pop-up blocker
In which of the following Windows 10 Settings app categories can you find reports on your device's health? -Apps -System -Privacy -Devices
-Privacy
While browsing the internet, you want to make sure that the browser you are using does not store your search history, cookies, or password information. Which of the following can you enable to prevent this from happening? -Browser synchronization -Data cache clearing -Private Browsing Mode -Pop-up blocker
-Private Browsing Mode
During which asset management phase would you consider whether an asset would replace an existing one and whether it will have any impact on the existing network and users? -Decommissioning -Operations -Deployment -Procurement
-Procurement
You've just installed several devices to a computer at once, but now the computer fails to boot properly. Which of the following troubleshooting steps is the BEST to try first? -Change the configuration of a single device. -Swap a single device with one that you know to be good. -Swap all of the devices with those you know to be good. -Remove all of the newly added devices and install them one at a time.
-Remove all of the newly added devices and install them one at a time.
Your computer is not performing properly; an update was recently installed. Which of the following actions from the Windows 10 Settings app is the BEST troubleshooting choice to try first for this situation? -Reset your PC. -Use the Startup Repair function. -Go back to a previous version of Windows. -Remove the installed Windows update.
-Remove the installed Windows update.
Which tool can you use to display hardware utilization statistics that tell you about your computer's operation? -Resource Monitor -Advanced System Settings -Computer Management -Event Viewer
-Resource Monitor
You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access and manage your newly-installed application? (Select two.) -Right-click the Start menu, select the application, and then select Settings. -Right-click the Start menu, select All apps, and then right-click the application. -Right-click the Start menu's application tile. -Right-click Start and select Apps & Features.
-Right-click the Start menu's application tile. -Right-click Start and select Apps & Features.
While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.) -Run a full system scan using the anti-malware software installed on your system. -Update the virus definitions for your locally installed anti-malware software. -Use an online search engine to learn how to manually remove the virus. -Close the pop-up window and ignore the warning.
-Run a full system scan using the anti-malware software installed on your system. -Update the virus definitions for your locally installed anti-malware software.
You recently upgraded a client's older workstation to Windows 11. The client has called to complain that the interface is very slow. For example, after clicking on the Start button, the Start menu slowly appears on the screen. Which of the following will MOST likely fix this problem without requiring a hardware upgrade? -Increase the hardware acceleration settings. -Increase the display resolution. -Increase the display's color depth. -Set the visual effects for best performance.
-Set the visual effects for best performance.
Which authentication category does a username and password fall under? -Something you are -Something you know -Soft token -Something you have
-Something you know
Your job functions have recently changed. As a result, you find that you need to work with more programs running on your Windows computer at the same time. As a result, you're now starting to receive error messages warning you of low virtual memory, but there's no additional RAM that can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? -Device Manager -System -Programs -Troubleshooting
-System
A user reports that he is unable to access data on an external hard drive. You investigate the problem and determine that the USB cable connection to the hard drive is damaged. You replace the cable.Which of the following actions should you take next? -Document the problem and solution. -Create an action plan. -Determine if escalation is necessary. -Test the solution.
-Test the solution.
Which user type is the Windows Beta channel recommended for? -Administrators -Commercial users -Highly technical users -The average user
-The average user
Which of the following are included in a network topology diagram? (Select two.) -The relationship between remote locations and the WAN links that connect them. -The location and IP addresses of hubs, switches, routers, and firewalls. -A layout of all plumbing and HVAC components. -A layout of server racks, cooling, and air circulation systems.
-The relationship between remote locations and the WAN links that connect them. -The location and IP addresses of hubs, switches, routers, and firewalls.
Why should you store backup media offsite? -To reduce the possibility of theft. -It is required by government regulations in the USA. -To prevent the same disaster from affecting both the system and its associated backup media. -To improve the efficiency of the restoration process.
-To prevent the same disaster from affecting both the system and its associated backup media.
The Option key (A) is used for application and navigation shortcuts. For example, Option + right/left arrow navigates between words in a text document. -True -False
-True
True or False: A domain controller is a Windows server that holds a copy of the Active Directory database. -True -False
-True
You have just finished installing a new Windows Update when your computer locks up. What should you do first? -Uninstall the Windows Update -Reset your PC -Run a System Repair -Complete a System Restore
-Uninstall the Windows Update
What do you call a system that has no anti-malware or firewall installed? -End-of-life -Unprotected -Unpatched -Compliant
-Unprotected
You have created a system image of Windows 11 on your laptop before updating several applications on your hard drive. The system image is stored on an external hard drive. After updating one of the applications, you are required to restart your laptop. However, during the restart, you receive an error message that the system is unable to reboot. You try to restore the system image from the external hard drive, but you are unsuccessful. Which of the following do you need to do BEFORE successfully restoring your Windows 11 system using the system image? -Copy the system image to a network computer and access the image from there. -Set the BIOS/UEFI settings to boot from the external hard drive first. -Use a recovery disc to restore the operating system. -Copy the system image to the Windows hard drive and then start the recovery process.
-Use a recovery disc to restore the operating system.
You have five salespeople who work out of your office and who frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection method to address your concerns? -Encrypt all company data on the hard drives. -Use cable locks to chain the laptops to the desks. -Implement screen saver passwords. -Require strong passwords in the Local Security Policy.
-Use cable locks to chain the laptops to the desks.
Which of the following actions should you take to BEST secure your video conferencing software? (Select two.) -Apply spam filters. -Use recording. -Use strong passwords. -Use waiting room features.
-Use strong passwords. -Use waiting room features.
Which document outlines how to communicate standards, procedures, and baselines that help an employee perform their job safely and effectively? -Security Policy -User Education and Awareness Policy -Acceptable Use Policy (AUP) -Bring Your Own Device (BYOD) Policy
-User Education and Awareness Policy
Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? -Firewall -Sharing Internet Connections -VPN -Caching
-VPN
While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using? -DLP -Access control list -Firewall -VPN
-VPN
Which of the following is the purpose of the Services snap-in? -View historical data that describe the operating system's stability. -View logs about programs, system events, and security. -View and manage software programs running in the background. -Display statistics that tell you about the operation of your computer.
-View and manage software programs running in the background.
Which of the following commands can you use to install updated packages (found in configured repositories) that are currently installed on a Debian Package Manager-based system? (Select two.) -apt update -yum upgrade -apt-get dist-upgrade -apt dist-upgrade
-apt-get dist-upgrade -apt dist-upgrade
You use a Linux distribution that employs Debian Package Manager (dpkg) for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? -yum install httpd -dep -yum install httpd -dep -apt-get install httpd -dpkg install httpd
-apt-get install httpd
Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session? -bash -sudo -ls -chmod
-bash
A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? -grep -ps -chmod -ls
-chmod
Which file system is an updated version of ext2, that supports journaling? -extNext -ext3 -extNew -ext1
-ext3
A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? -ls -cd -grep -sudo
-grep
You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command? -su -pwd -man cat -sudo
-man cat
A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions? -tracert -net use -ipconfig -netstat
-net use
You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again? -teracopy -xcopy -robocopy -copy
-robocopy
You use a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on the system? -yum list all -apt-get list available -yum list available -ps -e
-yum list available
You use a Linux distribution that utilizes RPM for package management. Which command would you use to verify that the httpd package (the Apache HTTP Server package) is installed? -yum list installed -yum info httpd -yum search httpd -yum list installed httpd
-yum list installed httpd
What is the correct order of the change request on a change order form? A. 1. Purpose of the change 2. Scope of the change 3. Backout plan 4. Risk analysis B. 1. Scope of the change 2. Purpose of the change 3. Risk analysis 4. Backout plan C. 1. Purpose of the change 2. Scope of the change 3. Risk analysis 4. Backout plan D. 1. Backout plan 2. Scope of the change 3. Risk analysis 4. Purpose of the change
C. 1. Purpose of the change 2. Scope of the change 3. Risk analysis 4. Backout plan