CIST 1130 Final Exam 5-10
You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors? a. /app/log b. /bin c. /var/log d. /root
/var/log
Current encryption algorithm used today.
AES
What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video? a. Accelerometer b. Wi-Fi connection c. Internet browser d. GPS
Accelerometer
You have exhausted your knowledge of a problem and it still is not solved. Before you escalate it, what else can you do? a. Go back through the problem one more time, looking for what you overlooked. b. Explain to the user that you cannot solve his problem but you will find someone who can. c. Ask a knowledgeable coworker for help. d. Interview the user one more time to make sure you correctly understand the problem.
Ask a knowledgeable coworker for help.
A user tells you that Microsoft Word gives errors when saving a file. What should you do next? a. Install Windows updates that also include patches for Microsoft Word. b. Ask the user when the problem first started. c. Ask the user to save the error message as a screenshot the next time the error occurs and email it to you. d. Use Task Manager to end the Microsoft Word program.
Ask the user when the problem first started.
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup? a. Event Viewer b. Boot Logging c. Safe Mode with Networking d. Windows Boot Manager
Boot Logging
An error message is displayed during Windows startup about a service that has failed to start, and then the system locks up. You try to boot into Safe Mode, but get the same error message. What do you try next? a. Use the command prompt to edit the registry. b. Boot to Windows RE and enable boot logging. c. Perform an upgrade repair of Windows 10. d. Boot to Windows RE and perform a startup repair.
Boot to Windows RE and perform a startup repair.
You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first? Second? Explain the reasoning behind your choices. a. Ask your network administrator to give you permission to access the folder. b. Check File Explorer to verify that you can connect to the network. c. Save the workbook file to your hard drive. d. Using File Explorer, remap the network drive. e. Reboot your PC.
Check File Explorer to verify that you can connect to the network and Save the workbook file to your hard drive.
When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second? a. Check the C:\User\Belinda Lim\Documents folder. b. Check the C:\Users\Belinda Lim\Documents folder. c. Use the chkdsk command. d. Use the sfc command.
Check the C:\Users\Belinda Lim\Documents folder and Use the chkdsk command.
Which of the following mobile device OSs are open source? Choose all that apply. a. iOS b. Windows 10 Mobile c. Chrome OS d. Android
Chrome OS and Android
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change.Which of the following steps should the technician take to make this change? a. Click the Advanced button to open Advanced Security Settings for the file. b. Click the Administrator user name and click the Edit button. c. Click the Sharing tab and click Advanced Sharing. d. Click the Previous Versions tab, highlight the file, and click Restore.
Click the Advanced button to open Advanced Security Settings for the file.
Where in Group Policy can you locate the policy that requires a smart card to be used to authenticate a user to Windows? a. Computer Configuration, Windows Settings, Security Settings, Local Policies, Biometrics b. Computer Configuration, Administrative Templates, System, Logon c. Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options d. User Configuration, Administrative Templates, System, Logon
Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.How can the settings be configured with the least effort by the admin? a. Configure Group Policy to run a logon script. b. Configure Local Group Policy on each workstation to run a logon script. c. Configure user account properties for each domain user in Active Directory to run a logon script. d. Configure folder redirection in Group Policy.
Configure Group Policy to run a logon script.
You have set up a user group named Accounting and have put all employees in the Accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the Accounting department allowed to access this folder. What is the best way to configure the new share? a. Assign Megan read/write permissions to the Payroll folder, and explain to your boss that it is not a best practice to give only one employee access to an important folder. b. Assign Megan read/write permissions to the Payroll folder. c. Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder. d. Ask your boss to allow you to put the folder outside of the Financial folder so you can assign a new user group read/write permissions to this folder that will not conflict with the Accounting user group.
Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder.
You need to install a customized console on 10 computers. What is the best way to do that? a. When installing the console on the first computer, write down each step to make it easier to do the same chore on the other nine. b. Create the console on one computer and copy the .mmc file to the other nine. c. Create the console on one computer and copy the .msc file to the other nine.
Create the console on one computer and copy the .msc file to the other nine.
On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service? a. Details b. Processes c. Performance d. Startup
Details
When a driver is giving problems in Windows 10, which tool offers the least intrusive solution? a. Device Manager b. Windows Update c. System Restore d. Registry Editor
Device Manager
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs? a. Disable AutoRun. b. Disable AutoPlay. c. Disable the Guest account. d. Enable screen lock.
Disable AutoRun.
When trying to improve performance of a slow system, you notice in Task Manager that the superfetch service is using a high percentage of CPU time. What is your next best step? a. Disable superfetch to improve performance. b. Update Windows to improve superfetch performance. c. Superfetch is an essential Windows process and should not be disabled. Move on to other solutions to improve performance. d. Ask the user if he uses the superfetch service. If he doesn't, uninstall it.
Disable superfetch to improve performance.
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.What is best practice for the remaining unused account? a. Disable the account until the employee is ready to use it. b. Delete the account and re-create it when the employee is ready to use it. c. Remove the account membership to all groups. d. Leave the account active since it will be unused for only two weeks.
Disable the account until the employee is ready to use it.
A scanner connected to your Mac is giving problems and you suspect corrupted device drivers. What should you do first? Second? a. Download and install drivers from the scanner manufacturer. b. Back up the macOS startup disk using Time Machine. c. Update macOS. d. Uninstall the scanner and install it again.
Download and install drivers from the scanner manufacturer and Update macOS
James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart.What setting in the Startup Settings screen will enable James to see which driver might be failing and causing his computer not to boot? a. Enable Debugging b. Enable Boot Logging c. Enable Safe Mode d. Enable Safe Mode with Command Prompt
Enable Boot Logging
Use this option to see what did and did not load during the boot process
Enable Boot Logging
This tool moves system boot logs from the failing computer to another computer for evaluation
Enable Debugging
Use this option when the video settings don't allow you to see the screen well enough to fix a defective setting
Enable Low-Resolution
his option allows you to launch programs to help solve Windows issues without loading third-party drivers and software.
Enable Safe Mode
Allows Windows to load without the graphical interface.
Enable Safe Mode with Command Prompt
Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet.What can Dennis do that will allow the children to watch a video on the Internet while in the car? a. Use a cable to tether his phone to the tablet. b. Enable wireless sharing. c. Set the tablet to airplane mode. d. Enable a hotspot on his smartphone.
Enable a hotspot on his smartphone.
In question 4 above, your friend is having problems finding the bootmgr file and asks for your help. What is your best response? a. Use diskpart commands to "unhide" and locate the file. b. Use the File Explorer options applet to unhide the hidden bootmgr file. c. Explain to your friend that performing a startup repair is a better option. d. Explain to your friend that he can use the bootrec command to fix the bootmgr file without having to copy another file to the computer.
Explain to your friend that performing a startup repair is a better option.
An app that cost you $4.99 is missing from your Android. What is the best way to restore the missing app? a. Go to backup storage and perform a restore to recover the lost app. b. Purchase the app again. c. Go to the Play Store where you bought the app and install it again. d. Go to the Settings app and perform an application restore.
Go to the Play Store where you bought the app and install it again.
Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device.What else does Jackson need in order for the thermostat to be considered an IoT? a. IoT controller without an IP address b. IP address c. App to control it over the Internet d. IoT bridge
IP address and App to control it over the Internet
You are having difficulty uninstalling freeware a user accidentally installed while surfing the web. You look online and see the software is designed to work in an x86-based version of Windows. In which folder should you expect to find the program files for the software? a. C:\Windows b. C:\Program Files (x86) c. C:\Program Files d. It depends on the version of Windows installed.
It depends on the version of Windows installed.
Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains.What can you tell Sara about the ESP partition? a. It was created by the MBR to store Windows boot and startup files. b. It was created by Windows to store the Windows OS files. c. It was created by GPT to store Windows OS files. d. It was created by GPT to store Windows boot and startup files.
It was created by GPT to store Windows boot and startup files.
Which encryption protocols might be used to secure a VPN connection? Choose all that apply. a. L2TP b. SSH c. PPTP d. IPsec
L2TP, PPTP, and IPsec
You're at the store to buy a car charger for your dad's iPhone. There are several options with many different types of connectors. Which of these connectors should you choose? a. USB-C b. microUSB c. Lightning d. VGA
Lightning
Using Task Manager, you discover an unwanted program that is launched at startup. Of the items listed below, which ones might lead you to the permanent solution to the problem? Which ones would not be an appropriate solution to the problem? Explain why they are not appropriate. a. Look at the registry key that launched the program to help determine where in Windows the program was initiated. b. Use Task Manager to disable the program. c. Search Task Scheduler for the source of the program being launched. d. Use System Configuration to disable the program. e. Search the startup folders for the source of the program
Look at the registry key that launched the program to help determine where in Windows the program was initiated, Search Task Scheduler for the source of the program being launched, and Search the startup folders for the source of the program
Which Windows program must be running before a user can sign in to Windows? a. Kernel.exe b. Userinit.exe c. Explorer.exe d. Lsass.exe e. All of the above
Lsass.exe
You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you must refresh the entire installation. What do you do first? a. Use System Restore to apply a restore point. b. Make every attempt to recover the data. c. Perform an in-place upgrade of Windows. d. Reformat the hard drive and reinstall Windows.
Make every attempt to recover the data.
You are troubleshooting an application problem and want to eliminate faulty memory as a source of the problem. Which command do you use? a. Mdsched.exe b. Taskmgr.exe c. Msconfig.exe d. Sfc /scannow
Mdsched.exe
A customer reports that his recently purchased computer does not consistently run his old applications. Application errors occur intermittently, and data files get corrupted. He has tried uninstalling and reinstalling the apps, and the problems persist. As you troubleshoot the problem, you reboot the system and get a BSOD error. The customer tells you the BSOD has occasionally appeared. Which subsystem is most likely causing the problem? What is the next best step? a. Windows is corrupted; reinstall Windows. b. Windows Update is not working; use System Restore. c. Memory is faulty; run Memory Diagnostics. d. Applications are faulty; uninstall and reinstall the applications causing errors.
Memory is faulty; run Memory Diagnostics.
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for making payments at a retail checkout counter. The technology also allows the marketing team to share data quickly.What technology is set up on the marketing team's phones? a. Bluetooth b. Tethering c. NFC d. Hotspot
NFC
Which security features are available on Windows 10 Home? Select all that apply. a. Local Group Policy b. NTFS permissions c. Active Directory d. Internet Options
NTFS permissions and Internet Options
Which of the following is true about NTFS permissions and share permissions? Select all that apply. a. Share permissions do not work on an NTFS volume. b. NTFS permissions work only on an NTFS volume. c. If share permissions and NTFS permissions are in conflict, NTFS permissions win. d. If you set NTFS permissions but do not set share permissions, NTFS permissions apply only for network users.
NTFS permissions work only on an NTFS volume.
A Windows user is attempting to exit a locked up desktop application that is not responding to mouse or keyboard input.Which of the following steps can be taken to end the application process without exiting other open applications? a. Open Task Manager and end the process associated with the application. b. Open Task Scheduler and end the scheduled task associated with the application. c. Restart Windows and relaunch the application to verify it will launch. d. Press the computer power button and hold it for five seconds.
Open Task Manager and end the process associated with the application.
Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time? a. Performance Monitor b. System Configuration c. Data Sources d. Event Viewer
Performance Monitor
When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another? a. It will be easier to inventory computers in the domain. b. It will help organize users into user groups. c. An OU must contain either users or computers, but not both. d. Policies generally apply to either computers or users.
Policies generally apply to either computers or users.
Stop errors happen when which type of processes encounter an error? a. Processes created by applications b. Processes created by Windows components running in user mode c. Processes created by Windows components running in kernel mode d. Processes created by anti-malware software
Processes created by Windows components running in kernel mode
Which type of server can function as a firewall? a. Mail server b. Proxy server c. Print server d. FTP server
Proxy server
Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings but freshen up all Windows components. He currently has a USB drive with a Windows 10 ISO.What type of installation will you recommend for Zach? a. Custom installation b. Fresh start installation c. Repair upgrade d. Network installation
Repair upgrade
A company asked you to help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability.Which of the following should be included in securing the user accounts? (Select THREE.) a. Require user account passwords. b. Require strong passwords. c. Set failed logon restrictions. d. Add each user to the Guests group. e. Change each account type to Administrator. f. Disable password complexity requirements.
Require user account passwords, Require strong passwords, Set failed logon restrictions.
A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen.What display setting will the user adjust? a. Resolution b. Color depth c. Refresh rate d. Multiple displays
Resolution
You're trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although you tested it successfully yesterday, today the connection is not cooperating. You've closed apps you're not using, and you've checked that the projector and the tablet are working otherwise. Of the following troubleshooting steps, which should you try first? Second? a. Restart the projector. b. Restart the tablet. c. Reinstall the presentation app. d. Verify that you have Internet access on the tablet.
Restart the projector and Restart the tablet.
You are seeing multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first? Second? a. Restore the SYSTEM hive from backup. b. Restore the SAM hive from backup. c. Perform a startup repair. d. Perform a Windows 10 reset.
Restore the SYSTEM hive from backup and Perform a startup repair.
When cleaning up the startup process, which of these should you do first? a. Use the Registry Editor to look for keys that hold startup processes. b. Run System Configuration to see what processes are started. c. After you have launched several applications, use Task Manager to view a list of running tasks. d. Run the Defrag utility to optimize the hard drive.
Run System Configuration to see what processes are started.
Which Chromebook security feature ensures that malware can't change the OS's system files? Choose all that apply. a. Quick updates b. Power washing c. Sandboxing d. Verified boot
Sandboxing and Verified boot
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.Which of the following tabs will you suggest to the coworker? a. Security tab b. Privacy tab c. General tab d. Programs tab
Security tab
A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted.Which of the following tools should the technician use? a. Services Console b. Task Manager c. Print Management d. Resource Monitor
Services Console
You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this? a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps. b. Buy the apps a second time from your tablet. c. Back up the apps on your phone to your SD card and then move the SD card to your tablet and transfer the apps. d. Call Google support and ask them to merge the two Google accounts into one.
Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files.How can James select what to synchronize from his phone to Google storage? a. Sync app b. Device maintenance c. Connections d. Settings app
Settings app
Of the 10 devices shown earlier in Figure 9-46, how many of them are assigned IP addresses? a. Four: two phones, a web server, and a router b. Three: two phones and a web server c. Seven: a thermostat, a router, two phones, two bridges, and a web server d. All 10 are assigned IP addresses
Seven: a thermostat, a router, two phones, two bridges, and a web server
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.Which of the following is the first step in implementing this data share? a. Share the folder or volume on the file server that will store the shared data files. b. Map a network drive to the shared folder or volume on the file server on the sales computers. c. Run a system image backup of the file server, including all data folders. d. Create a system restore point on the server and all sales computers.
Share the folder or volume on the file server that will store the shared data files.
While visiting a coffee shop, you see a poster advertising a concert for a music group you'd love to see. You notice there's an NFC tag at the bottom with additional information about the concert. Which of the following devices would likely be able to read the NFC tag? a. GPS b. Smartphone c. E-reader d. VR headset
Smartphone
What is responsible for getting a system up and going and finding an OS to load? a. Windows Boot Manager b. Startup BIOS/UEFI c. Setup BIOS/UEFI d. BootMgr
Startup BIOS/UEFI
Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching configuration and decides to copy the bootmgr file from the working computer to the computer with the problem. Where can he locate the bootmgr file? a. C:\Boot\bootmgr b. System Reserved\Boot\bootmgr c. System Reserved\bootmgr d. All of the above
System Reserved\bootmgr
A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available.Which of the following is the most likely reason for this issue? a. System Restore is turned off. b. Windows 10 does not use System Restore. c. File History is turned off. d. Windows 10 is corrupt.
System Restore is turned off.
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure
TKIP
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen? a. TPM b. NIC c. EFS d. MFA
TPM
You are helping your friend troubleshoot a problem with his Linux server. You enter a common Linux command and discover it doesn't work exactly as you expected. What might be the problem and what do you do next? a. The Linux installation is corrupted; restore the system from backup. b. The Linux shell is not the one you expected; use the echo $SHELL command. c. You probably don't know how to use the Linux command; search the web for information about the command. d. The Linux shell is not the one you expected; use the echo $0 command.
The Linux shell is not the one you expected; use the echo $0 command.
Your computer displays the error message "A disk read error occurred." You try to boot from the Windows setup DVD and you get the same error. What is most likely the problem? a. The Windows setup DVD is scratched or damaged in some way. b. The hard drive is so damaged the system cannot read from the DVD. c. Both the optical drive and the hard drive have failed. d. The boot device order is set to boot from the hard drive before the optical drive.
The boot device order is set to boot from the hard drive before the optical drive.
You work at an IT help desk and have been asked to set up 25 new user accounts in Active Directory. Your boss tells you to save time by using a PowerShell script that's available on a network share. You look at several script files named CreateNewUsers that are stored on the drive. Which one is likely to be the one you want? a. The file with a .js file extension b. The file with a .bat file extension c. The file that is the largest d. The file with a .ps1 file extension
The file with a .ps1 file extension
A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally.Which of the following is the most likely reason for this issue? a. The operating system or driver is causing the issue. b. The application is corrupt or missing. c. Windows does not have a file association for the application. d. The pagefile.sys file is missing or corrupt.
The operating system or driver is causing the issue.
You work for a company that provides dozens of the same smartphone model for its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine? a. The OS version on the phone b. The specific device you're calling about c. The SIM card installed in the device d. The IP address of the phone on the cellular provider's data network
The specific device you're calling about
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.Which of the following is the most likely reason the technician is having difficulties? a. The technician should be setting NTFS permissions instead of using Group Policy. b. The technician should be using Local Security Policy instead of Group Policy. c. The technician is not signed in as a Domain Admin. d. The users in the sales department are in a different domain than the accounting department users.
The technician should be setting NTFS permissions instead of using Group Policy.
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.Which of the following describes the most likely reason for the lost data files? a. The user had previously encrypted her data files and folders using EFS. b. The user attempted to enter an incorrect password too many times. c. The technician erased all the data files while resetting the password. d. The user lost access to the network shared drive when her password was reset.
The user had previously encrypted her data files and folders using EFS.
Suppose you and your friend want to exchange lecture notes taken during class. She has an iPhone and you have an iPad. What is the easiest way to do the exchange? a. Copy the files to an SD card and move the SD card to each device. b. Drop the files in OneDrive and share notebooks with each other. c. Send a text to each other with the files attached. d. Transfer the files through an AirDrop connection.
Transfer the files through an AirDrop connection.
If you are having a problem with a driver, which of the following should you try first? Second? a. Update the driver. b. Use System Restore to apply a restore point. c. Update Windows. d. Perform a clean boot.
Update the driver and Update Windows.
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times.What tool should you use first to help repair your computer? a. Use BIOS/UEFI to see if the hard drive is available. b. Use Safe Mode to boot. c. Use Startup Repair. d. Run sfc /scannow for the Windows RE command prompt.
Use Startup Repair
An application is frozen and you cannot close its application window. What is the first thing you should try that can end the process? Second thing? a. Use the tasklist command. b. Use Task Manager. c. Reboot the system. d. Use the taskkill command
Use Task Manager and Use the taskkill command
When Windows first starts and the user signs in, a message about a missing DLL appears. Which tool or method should you use first to solve the problem? Second? a. Use Task Manager to identify the startup process. b. Use the Services console to stop the process that needed the DLL. c. Search the web on the error message to better understand the problem. d. Use Component Services to register the DLL.
Use Task Manager to identify the startup process and Search the web on the error message to better understand the problem.
When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second best option? a. Use bootable media to launch Windows RE and use System Restore to apply a restore point. b. Use bootable media to launch Windows RE and perform a startup repair. c. Use bootable media to launch Windows RE and then use commands to recover the registry from backup. d. Refresh Windows using a system image or custom refresh image.
Use bootable media to launch Windows RE and use System Restore to apply a restore point and Use bootable media to launch Windows RE and perform a startup repair.
A stop error halts the Windows 10 system while it is booting, and the booting starts over in an endless loop of restarts. How can you solve this problem of endless restarts? a. Use the Windows Startup Settings screen to disable automatic restarts. b. Press F8 at startup and then disable automatic restarts. c. Launch Windows 10 from setup media and perform a Windows 10 reset. d. Press F9 at startup and then disable automatic restarts.
Use the Windows Startup Settings screen to disable automatic restarts.
A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt.Which of the following steps should the technician take next? a. Use the tasklist utility to locate the PID for the explorer.exe process. b. Use the tasklist utility to end the explorer.exe process. c. Use the taskkill utility to locate the PID for the explorer.exe process. d. Use the taskkill utility to end the explorer.exe process.
Use the tasklist utility to locate the PID for the explorer.exe process.
Your Windows system boots to a blue screen stop error and no Start screen or desktop. What do you do first? a. Reinstall Windows. b. Use the web to research the stop error messages and numbers. c. Attempt to boot into Windows RE using the Windows setup DVD or a recovery drive. d. Verify that the system is getting power.
Use the web to research the stop error messages and numbers.
Which of the following steps can be taken to resolve limited or no network connectivity issues on a Windows computer? (Select the best TWO.) a. Verify the network cable between the computer and router is connected and not damaged. b. Verify the SOHO router is powered on and the port LEDs indicate connectivity. c. Use System Restore to create a system restore point. d. Run the dxdiag utility to verify DirectX is functioning properly. e. Run msconfig and configure startup for Safe Mode.
Verify the network cable between the computer and router is connected and not damaged, and Verify the SOHO router is powered on and the port LEDs indicate connectivity.
No longer considered secure because the key used for encryption doesn't change
WEP
Typically uses TKIP for encryption.
WPA
Typically uses AES for encryption.
WPA2
As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occur? a. When BIOS/UEFI is searching for an OS using devices listed in the boot priority order b. When Windows attempts to load the user profile c. When Windows attempts to launch critical device drivers d. When Windows attempts to launch the Windows kernel
When BIOS/UEFI is searching for an OS using devices listed in the boot priority order
As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur? a. When BIOS/UEFI is searching for an OS using devices listed in the boot priority order b. When Windows attempts to load the user profile c. When Windows attempts to launch critical device drivers d. When Windows attempts to launch the Windows kernel
When Windows attempts to launch critical device drivers
Which of these network connections would allow your smartphone to sync your photos to your online account? Choose all that apply. a. Wi-Fi b. Bluetooth c. GPS d. Cellular
Wi-Fi and cellular
Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues.What tool can Henry use to create a bootable flash drive in Windows 10? a. Windows Media Creation tool b. Factory recovery partition on his personal laptop c. Windows Media Center d. Windows DVD maker
Windows Media Creation tool
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet.Where can Eric go to look up the device driver's filename to help him determine what device uses the device driver? a. Windows BCD b. Windows\System\drivers folder c. Window\Drivers d. Windows\System32\drivers folder
Windows\System32\drivers folder
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem? a. Encryption has not been enabled. Use the Computer Management console to enable it. b. You are not using an edition of Windows that supports encryption. c. Most likely a virus has attacked the system and is disabling encryption. d. Encryption applies only to files, not folders
You are not using an edition of Windows that supports encryption.
Your company has recently been hired to install a smart security system for a large office building. The system will include security cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation? a. Wi-Fi because it is always encrypted b. Zigbee because it is always encrypted c. Z-Wave because it is the fastest wireless standard d. Bluetooth because it is easiest to configure
Zigbee because it is always encrypted
A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system.Which of the following tools is used to launch the Windows Memory Diagnostic tool? a. mdsched.exe b. dxdiag.exe c. compmgmt.msc d. taskschd.msc
mdsched.exe
Your macOS installation is corrupted and you want to boot from an external Thunderbolt hard drive to repair the installation. Which key(s) do you hold down at startup to boot from the external hard drive? a. d key b. command+r keys c. shift key d. option key
option key
Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load.Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem? a. smss.exe b. csrss.exe c. lsass.exe d. winload.efi
smss.exe
In Linux, when logged in as a normal user with root privileges, which command must precede the aptget command in the command line in order to install a program? a. sudo b. sudo user c. su d. root
sudo
You have set up an FTP server in Ubuntu Server. Jason, a user, calls to say he gets an error when trying to put a file in his /home/jason/files directory. You look at the directory structure and see that you forgot to give the user ownership of the directory. Which command can fix the problem? a. chown jason:jason /home/jason/files b. sudo chmod u=rwx /home/jason/files c. sudo chown jason:jason /home/jason/files d. chmod u-rwx /home/jason/files
sudo chown jason:jason /home/jason/files
You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie? a. sudo cat /var/log/vsftpd.log b. grep "charlie" /var/log/vsftpd.log c. sudo grep "charlie" /var/log/vsftpd.log d. cat /var/log/vsftpd.log
sudo grep "charlie" /var/log/vsftpd.log