A+ Applications (220-1002)

Ace your homework & exams now with Quizwiz!

In a security awareness class, the instructor discusses malicious software that relies on other applications to execute and infect the system. Which type of malware is being discussed?

A virus

What provides the *best* security for a server room?

Badge reader

Which of the following Windows 10 features has a WAN bandwidth optimization technology?

BranchCachd

Which of the following is a drop in voltage which may cause electronic devices to fail or behave unpredictably?

Brownout

Which of the following are Storage Spaces configurations?

-Mirror -Simple -Parity

Which of the following record types must you add to DNS to implement DNSSEC?

-RRSIG -DNSKEY

Which of the following tools are used to protect against problems with the power supply?

-Surge protector -Electrical generator

Which of the following is a requirement for Windows 10 x64?

2GB RAM

After determining the scope of a user's job, what is the next step in implementing the principle of least principle?

Determine the minimum set of privileges needed to perform the user's job

Which of the following actions would you take to make drivers available to an automated installation of Windows 10?

Edit the unattend.xml file

Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish the task?

Flash the BIOS

Which part of RADIUS is the device that users directly connect to that also relays all communication between users and the RADIUS server?

NAS (Network Access Server)

Which MAC OS feature allows you to search all kinds of files, including documents, music, photos, emails, and contacts?

Spotlight

Which cipher is used by the Wi-Fi Protected Access (WPA) encryption standard to encrypt network traffic?

TKIP

What must you know in order to allow an app through the Windows Defender Firewall?

The path to the executable

Which version of Windows introduced Bitlocker in the *Professional* edition?

Windows 8

A technician contacts you that he cannot locate the NTLDR file on a Windows 7 computer. You explain that his file was replaced. Which file replaced it?

bootmgr

Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public Internet?

Hash algorithm

You need to perform a backup on a Windows computer. You only want to back up those files that have changed or have not been previously backed up. You also do not want them to be marked as backed up. Which type of backup would you choose?

Differential

You are instructing a new IT technician on securing networks and using permissions. What would you tell Graham that the default permission position should be?

Implicit deny

Stark, a user, is configuring screen lock in iOS as he is anxious about the security of the system, he wants to change his passcode for which he tapped *Turn Passcode On*, then he tapped *Passcode Options* as he wants to have a passcode of eight digits. Which of the following steps should he take *next* to further complete the process?

Click Change Passcode

What happens when you move a file structure from the fileserver's D: drive to E:?

File attributes (including security) are inherited from the new parent directory

Which of the following are the features which were once popular but have been deprecated since Windows 7?

-Gadgets -Windows Media Center -Backup and Restore

Susan is constantly shutting down her laptop improperly due to moving from meeting to meeting. Which file is in jeopardy of being affected the most?

-Registry

Several users will be using a new Windows 7 computer. You have been asked to configure the accounts in the appropriate manner to maximize security. Which procedures should you implement?

-Rename the Administrator account -Rename the Guest account -Disable the Guest account

Which of the following actions would be appropriate responses to an "Invalid boot disk" error message in Windows?

-Verify boot order in SYSTEM BIOS -Remove USB -Remove CD/DVD

What is the correct order for remediating a malware infected system?

1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore (in Windows) 4. Remediate the infected systems 5. Schedule scans and run updates 6. Enable System Restore and create a restore point (Windows)

What is the correct order of the troubleshooting process?

1. Identify the problem 2. Establish a theory of probable cause 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventative measures 6. Document findings, actions, and outcomes

How many primary partitions are supported on GPT disks?

128

You are an IT technician in your organization. When you log into your account, you press a button on your keychain and then type in the new set of number it displays. What digital authentication element are you using?

OTP

Which of the following is *not* a feature of the *FOR* loop?

Only one variable can be initialized at a time in the for statement

You remove the toner cartridge from a laser printer. what should you do with it?

Return it to the manufacturer for recycling

What happens when you combine both Share and NTFS permissions on a share?

They combine to give the most restrictive permission

Which of the following can restrict the risk of unauthorized login?

-Access control -Strong password

What's new in HomeGroup in Windows 10?

-HomeGroups are deprecated in Windows 10 -iPhone support

Which of the following network connections should always require data encryption?

-Wireless -VPN -WWan

Which of the following drive formats is used for data and audio CD-ROMs?

CDFS

Which selection from the Power options navigation menu would you choose to make the Hibernate choice available in Windows 10, assuming compatible hardware?

Choose what the power buttons do

Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space?

Enclosures

A user requests that his Windows 7 computer display dates using the yyyy-mm-dd format. Where should you go to make this change using the least administrative effort?

In Control Panel Category View, click Clock, Language, and Region. Select Region and Language

What is the role of *Winload.exe* in the Windows boot process?

Loads the hardware abstraction layer, the Registry, and boot device drivers into memory

Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup?

MSConfig

The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as __________.

VPN concentrator

What setup configuration would you choose for a new Windows 10 computer installed on your home network which does not include a server?

Workgroup

Alan of NOrthern Company is traveling to several conferences in various states to present his new product line to consumers. He usually uses a Slimport to project his Android screen but accidentally left his cables at the last site where he was. His next presentation is in four hours. What can he request from the hotel technical team to keep the show rolling for Alan?

-A Miracast or Chromecast -A Micro HDMI cable

Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her?

-A warning when the power source fails -Short-term battery backup -Surge protection

Daniel is new to your department and is asking about wireless networks. What would you tell him are three conditions that affect the external vulnerabilities of wireless networks?

-Access point power -Antenna placement -Antenna selection

You work as a support technician in an organization. You have been called to troubleshoot an issue in the customer's computer system at his place. What guidelines should you follow for providing good professional service to your customer?

-Avoid using technical jargon, acronyms, and slang -Address people appropriately -Act like you know what you're doing, even if you might have a doubt

You are providing training on security breaches regarding passwords and encryption. Which attacks often attempt this type of breach?

-Brute-force attack -Dictionary attack -Rainbow attack

There are different types of fire extinguishers on the market. Which fire extinguishing substances can be used for multiple types of fires?

-CO2 -Dry chemicals

You are aware that cell phones and tablets contain toxic materials including non-removable batteries. What will you take into considerations before disposing them off?

-Check for viability for donation to charity -Perform a factory reset -Send for recycling to device vendor

You want to ensure that a particular application can always connect to the client in order to push update the latest application data regardless of the network the client is connected to. What do you do?

-Create an inbound Firewall Rule -Enable for All Profiles

What are the layers defined in the defense in depth strategy?

-Data -Application -Host -Internal network -Physical facility

You are working as a desktop technician in an organization. Adam reports that some unauthorized users are accessing his email messages. He also reports that he received an email from an unauthorized user requesting confidential information about his bank account. What should you suggest Adam do?

-Delete the email message received from unauthorized users -Encrypt outgoing messages

Howard the maintenance supervisor has identified several devices in your company's facility that contain phosphorous. Which guidelines would you need to emphasize to his team regarding how to properly dispose of phosphorus?

-EPA guidelines -MSDS -OSHA guidelines

You are the CEO of an organization, your company is located in an area, where the air quality can impact the employees and devices. What tools will you use to protect the device and employees from airborne particles?

-Enclosures with good ventilation -Use of compressed air and mechanical blowers

You want to prevent your computer from any type of electrostatic discharge (ESD), while servicing the computer. Which actions should you NOT perform while servicing the computer?

-Ensure that the room in which computer is serviced is carpeted -Ensure that the room in which computer is serviced is cool and dry

Which of the following actions are you most likely to take in the vent your mobile device has suffered unauthorized access via malware?

-Hard reset -Restore from Cloud backup

Alen, a security administrator, is configuring SOHO network, this network does not provide most of the security zones and subnets. To keep then network devices secure, what points will you consider?

-Harden network devices like switches, routers and firewalls by disabling unnecessary services -Disable remote management of routers and other network devices

Jane is new to the PC technician world and is curious about ESD. Which steps would you tell her to use as preventative measures against static electricity?

-Have proper grounding of building and outlets -Wear anti-static bands while servicing computer components

John, a user, reports about slow system performance. What are the probable causes of this trouble?

-Heavily fragmented hard drive -Application errors that are taking over system resources

Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem?

-Her device is in discoverable mode -Other Bluetooth devices are trying to connect

Which of the following statements are true about the homegroup sharing model?

-Homegroups are created by one user and can be joined by anyone with a shared password -Computers in domains can join homegroups, but not create them -Home and business editions of Windows can join homegroups

Which factors generate and promote the transmission of electrostatic discharge (ESD) to devices?

-Humidity less than 40 percent -Improper grounding -Moving machines -Moving people

Which of the following are examples of authentication possession (something you have) to support multifactor authentication?

-Key fob -Smart card

You launch Performance Monitor in Windows 7 Professional. Which components can you monitor using this tool?

-Memory -Processor -Disk -Network

Which two password policy settings to combine to make it impossible for users to quickly reuse their last password?

-Minimum Age -Enforce History

You are instructing your company's IT technicians on how to calibrate the screen of a touch screen device. The technician will need to perform this step only in certain conditions. Which conditions will require this?

-Nothing happens when touching an application -Incorrect application opens

Stephen, a server administrator, is assigned the task to securely overwrite an entire hard drive, for that he requires formatting utilities. So, which utilities will he apply?

-Perform a full format -Implement data destruction utilities -Perform a low-level format

What permissions must be assigned to the Authenticated Users group on the distribution share to ensure all users will have the application installed?

-Read -Read & Execute

You work as a PC technician in an organization. You are working on you Windows computer. Suddenly, the screen of the computer crashes and a blue screen appears. Which of the following approaches d

-Reboot the computer to see if the problem is resolved -Note the error and research in Microsoft's Knowledge base

A user has recently upgraded the video adapter drivers on a Windows 7 computer. Since that time, the computer has been continuously restarting. You tried rebooting the computer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort?

-Restart the computer in Safe Mode -Roll back the video adapter drivers

Which of the following are examples of inheritance possession (something you are) to support multifactor authentication?

-Retinal scanner -Fingerprint reader

Smith, a system administrator in an organization, is working on computer equipments and peripheral devices, and he needs to keep himself safe from any kind of injury. What personal safety guidelines should Smith follow?

-Secure loose cables out of the way -Disconnect the power before repairing a computer or other device -Use proper lifting techniques when moving heavy equipment -Remove loose items such as jewellery, scarves, or ties that could get caught on components -Be prepared for electrical fires and have a Class C fire extinguisher handy

You are researching the biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices?

-Signature -Fingerprints -Hand geometry -Face -Iris -Voice -Retina

Which of the following remote access technologies provide features of screen sharing and file tranfer?

-Telnet -SSH

Which of the following are the causes of vertical lines on the page in the laser printing process?

-Toner on the main corona or transfer corona wire -Low resolution image -Print resolution setting is too low

You have been sent to clean up a computer that has been infected with malware. When you arrive at the computer, you identify the symptoms that are occurring, quarantine the system, and disable System Restore. Now you must remediate the computer. Which steps are parts of this process?

-Update the anti-malware software -Use scan and removal techniques to clean up the computer

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open Device Manager. Please put the steps in the correct order to fix the error.

-Update the drivers -Uninstall the device

You purchased several new computers with dual physical processor configurations. The new computers have dual 1-gigahertz (GHz) processors and 2 gigabytes (GB) of RAM. Which editions of Windows 7 could you install to be able to utilize all components?

-Windows 7 Enterprise -Windows 7 Professional

Your company's network contains workstations that run Windows 8, Windows 8.1, Windows 10 Professional, and Windows 7 Ultimate. You need to install the Multilingual User Interface (MUI) on all the workstations. Which operating systems will provide multilungual support for both the operating systems and applications?

-Windows 7 Ultimate -Windows 8 -Windows 8.1 -Windows 10 Professional

You are a technician in an organization. You have been asked to perform in-place upgrades in every user's laptop. Which of the following are the valid paths which you can use during the upgrades?

-Windows 7 to Windows 8 -Windows 7 to Windows 10 -Windows 8 to Windows 8.1 -Windows 8.1 to Windows 10

You need to upgrade a computer running Windows 7 Home Premium with Service Pack 1 to Windows 8. To which editions of Windows 8 can this computer be upgraded?

-Windows 8 Basic -Windows 8 Pro

On which versions of Windows can PowerShell Core 6.0 be used?

-Windows 8.1 -Windows 10 -Windows 8

Which of the following file extension of a script runs through the Windows Scripting Host instead of command shell?

.vbs

In which of the following Mac OS X versions does the dark mode to reduce eyestrain has been introduced?

10.14 Mojave

You want to install Windows 7 Professional 64-bit edition on a new computer. Which hardware is NOT a minimum requirement?

16 GB available hard drive space

You need to install Windows 7 Professional on a user's x86 computer. Which hardware is NOT a minimum requirement?

2 gigabytes RAM

A customer contacts you with a technical issue you must research. After obtaining permission, you place the customer on hold to complete the research. What is the maximum amount of time the customer should remain on hold before receiving an update?

2 minutes

Which Active Directory security feature is a single sign-on system that uses the common Internet Standard SAML?

ADFS

Which toolset lets you restore a deleted Active directory object?

Active Directory Administrative Center

You need to broaden the area to which a wireless access point (AP) can transmit. What should you do?

Adjust the power level setting slightly higher

Which of the following choices would you type into the Start menu to search to configure virtual memory with the least administrative effort?

Advanced System Settings

You are at a customer's site. The customer reports problems staying connected to the Internet, but does not provide any specific information. What should you do to gather more information on the problem?

Ask the customer to demonstrate the problem

You need to troubleshoot a driver issue. When windows 7 is booting, you press F8 to enter the Advanced Boot Options menu. Which option is *NOT* an option listed in the menu?

Automated system recovery

You decide to edit the boot order for your Windows 8 computer using the *MSCONFIG* utility. To which file is this edit saved?

BCD

A technician contacts you and says that he needs to access the System Recovery Options on a Windows 7 computer. Which procedure or special key should he use?

Boot from the installation CD/DVD

You run the *systeminfo* command on a Windows 7 computer. What will NOT be displayed?

Boot options

Which of the following do you make available first so that your network-based automated deployment can proceed with exclusive access to the installation volume?

Boot.wim

An electrical fire has started in your server room. Which type of fire extinguisher should you use?

Class C

You need to locally install Windows 7 Ultimate on a new computer. Which installation method will you most likely use?

DVD

You work as a security administrator in an organization. You have saved some secret details of the organization on a magnetic hard drive. You want to destroy the drive to secure the details from getting leaked to any unauthorized person. Which of the following should you use to destroy the details in this situation?

Degaussers

Which configuration setup would you choose when implementing BranchCache in a remote office with no onsite server?

Distributed

Which Firewall network profile is automatically enforced with no user intervention?

Domain

Martha, a Mac OS user, faced an issue, which required her to close an unresponsive app, which tool will you use to troubleshoot the issue?

Force Quit

You are accessing the Tools tab of the hard drive's properties dialog box on a Windows 7 computer. Which of the following is NOT a disk maintenance utility found there?

Format

You have a 3-TB drive on which you want to install Windows. How must you format the drive to have the operating system recognize the entire drive?

GPT

Which of the following tabs of the system configuration settings is used to choose the type of startup for the next time the computer boots to troubleshoot system startup problems?

General

Which of the following tabs would you select in File Explorer -> Options to disable Quick Access?

General

Your company has several security measures that they have implemented on all mobile devices. Which of the following is NOT a security measure for mobile devices?

Geotracking

Which of the following registry subtrees contains all the file association information to determine which application Windows should open whenever you double-click a file with a specific extension?

HKEY_CLASSES_ROOT

David works in the IT department and is training his team on how to look for certain attacks. He is discussing a type of attack that is used by an attacker to persuade the Internet browser to connect to a fake server that appears as a valid session. Which type of attack is he discussing?

Hyperlink spoofing

What should you do if you discover inappropriate material on a company-owned computer but no specific company computer-use policy exists?

Inform your supervisor of the inappropriate material

You need to upgrade a Windows 7 Home Premium computer to Windows 8 Home Premium. What should you do prior to the upgrade?

Install the latest service pack

An IT technician reports that he ran the *sfc* utility on a user's computer. Why would this utility be used?

It repopulates the dllcache folder when contents are corrupted

A customer has contacted you and expressed anger about the service provided by your company. During the call, you discover that another technician responded to the customer's original issue. In spite of the customer's tone, you remain calm. What should you do next?

Listen to the entire complaint

A technician is recycling PCs to be used by a middle school. Which of the following methods is *most* appropriate for ensuring that data has been removed from the PCs?

Low-level format

You suspect that a Windows 7 computer has been infected with a Trojan horse. You need to determine if any Trojan horses are loading at system startup and remove them. Which tool should you use to find out if any Trojan horses are being loaded at startup?

MSCONFIG

What utility is used to troubleshoot system problems ranging from hardware failures to problems with software and device drivers?

MSINFO32

Which of the following correctly identifies a document describes procedures for safe handling, use, storage, and disposal of potentially hazardous materials?

Material safety data sheet (MSDS)

In which of the following Mac OS X versions does the dark mode to reduce eyestrain has been introduced?

Mojave

A user has a Windows 7 computer with 512 MB of RAM and two hard drives, named drive C and drive D. the paging file is located on drive C. The user complains that his computer does not perform well after running for a couple of hours. What should you tell the user to do?

Move the paging file to drive D.

A user has connected to a second monitor to his Windows 7 Ultimate computer. The new monitor is detected. However, the dual-monitor configuration is not configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors?

Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution

What is the name of a Microsoft Windows feature that allows for user-based file level encryption?

New Technology File System (NTFS)

Which of the following is the correct PowerShell cmdlet to create a user object in Active Directory

New-AdUser

Michael runs a mobile devices repair business and is responsible for keeping up to date with all mobile devices. What is one of the top common software issues he can expect to see on a regular basis?

No Bluetooth connectivity

You are a support specialist in an organization. As some problems persisted, you are performing the change management process. You are in the last step of the process in which you have to finalize the changes. You have tested the results of the change and enabled the necessary services. Which of the following will be your next step in this process?

Notify users and administrators

What tool would you use to make a flat file database available to an application you are developing?

ODBC Data Sources

Sam is delighted with his new Android phone. However, one of the apps causes performance issues with the other apps almost every time he launches the app. What does he need to do with this app when this happens?

Perform a force stop

You have two wireless networks in your buidling. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do?

Periodically complete a site survey

Which is primarily used to segregate network traffic, optimize network speed, and to permanently assign a network path for a specific protocol or network service?

Port forwarding

Which of the following is sued to restrict devices which connect to the notwork or to detect and block some attacks using spoofed MAC addresses?

Port security

Which of the following authentication systems is used as the authentication back end for Wi-Fi networks using WPA Enterprise security?

RADIUS

You are a PC technician. You have been provided with a Windows XP computer which is not booting and is affected by a malware which has compromised the operating system enough to prevent repair. Which of the following should you use in this situation?

Recovery Console

What should you do with the default admin and guest accounts on a Windows system?

Rename them

Which of the following malwares fakes system problems or virus detection in order to make you buy paid security scanners?

Rogue antivirus

You need to run Disk Defragmenter, but several other applications are running. Why should you shut down all running applications first?

Running other applications may result in disk operations forcing Disk Defragmenter to restart continually

Which of the following is a US federal law designed to prevent fraudulent accounting practices?

SOX

Which of the following features of Bitlocker is unavailable without a TPM 2.0 module?

Secure Boot (preboot security)

Edith and Clarence are studying for their A+ exam and want to learn more about NTFS permissions versus share permissions on Windows 8 computers. Which of the following statements is FALSE?

Share permissions include Read, Write, Modify, and Full Control

Which activity is covered under the confidentiality objective of the CIA triad, and involves examining someone's computer to steal confidential information?

Shoulder surfing

Which statement is true regarding smart cards?

Smart cards can be deactivated or replaced

What term best describes an attack that involves sending an email addressed to everyone in your company, that appears to come from an internal address and requires your network credentials in order to open an attachment, all in an attempt to steal the credentials?

Spear phishing

Which of the following is a complete application installer which requires a network connection to download the applications but once downloaded, the user has all the files that are needed?

Standalone

You detect the humidity of your server room fluctuating towards the lower side. What could be the possible effect of low humidity in server room?

Static electricity

Daisy, a student, is assigned a task to design a webpage for XYZ organization. She has used the scripting language to manage the behavior of the webpage, while coding she has used a variable which is a sequence of alphanumeric characters. Which of the following data types has she used?

String

Which tool troubleshoots the startup process of an operating system and Windows services?

System Configuration

A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a restore point is created every day at the same time. Which tool should you use to schedule the restore point creation?

Task Scheduler

Which of the following statements regarding Android phones is INCORRECT?

The Android GPS requires the help of cell towers to obtain a location

Your organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS). You need to copy an EFS-encrypted file. The file will be copied to an NTFS volume that does not implement EFS. What is the state of the file?

The original version of the file remains encrypted. The new version of the file is decrypted.

You manage a network installed with multiple Windows 8.1 workstations. One of the users reports that his computer does not boot to Windows. You notice that the computer generates the following message during boot up: "Windows 8.1 could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

The registry is corrupt

According to your organization's data backup policy, you must keep track of the number and location of backup versions of the organization's data. What is the main purpose of this activity?

To ensure proper disposal of information

While performing your IT technician duties, you plan to use the USMT tool. Why should you use this tool?

To migrate user settings and files from one operating system to another

Which mode of Bitlocker authentication allows the user to start up the computer and log into Windows as normal?

Transparent operation

Which layer is *not* defined in the defense in depth strategy?

Transport

Which of the following best describes the kind of malware that infected the CFO's laptop after he downloaded and installed a popular file sharing app?

Trojan

You are a help desk technician for your company. Several hours into the day, you receive your first technical call from a customer. Your radio is on, and you are in the process of eating your lunch. What should you do?

Turn off your radio, stop eating, and listen to your customer

You have recently installed the latest version of Microsoft Edge on a Windows 7 computer. You want to prevent fraudulent Web sites from gaining access to your personal information through Microsoft Edge. What should you do?

Turn on the SmartScreen filter

A user reports that an app that has worked fine in the past will no longer launch. He indicates that he closed out the app and then turned off and back on the device. What should you suggest that he do NEXT?

Uninstall and then reinstall the app

What *applet in Settings* will let you recover a failed installation?

Update & Security

What applet in Settings will let you recover a failed installation?

Update and Security

Recently, you upgraded a user's computer to a dual-core processor. The user complains that an application's performance did not increase after the upgrade. You need to ensure that the application fully utilized the dual-core processor. What should you do?

Upgrade the application to a version that supports multithreading

You are a PC technician in an organization. You are working on a Windows computer and get to know that some necessary DLL files are missing. Which of the following will you do to troubleshoot the missing DLL files?

Use REGSRV32

Which of the following actions would let you recover from a system failure with the least administrative effort?

Use the Factory Recovery Partition

Isaac purchased a refurbished iPhone and installed the latest version of iOS. However, his iPhone, will not hold a charge for very long. What will you recommend him to alleviate extremely short battery life?

Use the Low Power Mode setting

When explaining new equipment features to a customer, all of the following are acceptable practices, EXCEPT:

Use the correct acronyms with the customer

You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose?

Wi-Fi Protected Access (WPA)

Which tool would you use to boot Windows following a stop error from which the machine is unable to restart?

WinPE

A small business owner has five computers in the office that need to be networked. The users need to share files and print services and manage the administration of their shared resources. Which type of network would you recommend to the owner?

Workgroup

Which command is used for changing the owner or the group of a file or directory?

chown

You need to create a hard drive image on a Linux computer. Which command should you use?

dd

You need to defragment a hard drive. When the defragmentation is complete, you want to view both the analysis and defragmentation reports. Which command should you run?

defrag /v

Which of the following commands will mount the wim file E:\wims\install.wim to the mount directory E:\mount?

dism /mount-wim /wimfile:E:\wims\install.wim /index 2 /mountdir:E:\mount


Related study sets

Econ 1, Module 28, 34: Monopoly, Monopolistic Competition

View Set

AS Level ICT: Hardware and Software

View Set

Fundamentals Exam 1 set 5 infection control, prevention, and management

View Set

Fitzgerald Practice Questions Endocrine

View Set