CompTIA A+ 220-1002_4

Ace your homework & exams now with Quizwiz!

Which of the following would resolve problems related to excessive paging and disk thrashing? * CPU upgrade * Disk Cleanup utility * Adding more RAM * Hard drive replacement

Adding more RAM

Which of the following would be the best recommendation for a minimum password length? * At least 2 characters * At least 4 characters * At least 6 characters * At least 8 characters

At least 8 characters

What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications? * COPE * BYOD * JBOD * CYOD

BYOD

A user interface element controlling access to a mobile device after the device is powered on is called: * Launcher * Screen lock * Privacy filter * Hardware lock

Screen lock

A strong password that meets the password complexity requirement should contain: (Select the best answer) * Uppercase letters (A-Z) * Digits (0-9) * Non-alphanumeric characters if permitted (e.g. !, @, #, $) * Lowercase letters (a-z) * A combination of characters from at least 3 character groups

A combination of characters from at least 3 character groups

Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in: * Local Users and Groups in Computer Management * Windows Control Panel * User Accounts in Windows Control Panel * Administrative Tools folder in Windows Control Panel

Administrative Tools folder in Windows Control Panel

Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu? * Hardware * System Protection * Environment Variables * Advanced

Advanced

Examples of hard drive destruction and disposal tools/methods include: * Shredder * Drill * Hammer * Degaussing * Incineration * All of the above

All of the above

If a recently installed app, driver, or update for Windows has a degrading effect on system performance, Windows Restore can be used to undo system changes by reverting the computer to a restore point. Methods for accessing Windows Restore include: * Windows Run dialog box -> type in rstrui.exe + press Enter * Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> System Restore... * Windows Control Panel -> System applet -> Advanced system settings -> System Protection tab -> System Restore... * Windows Control Panel -> Recovery applet * Windows Settings menu (Windows 8/8.1/10) * All of the above

All of the above

Which of the following actions allow(s) to improve the security of a SOHO router? * Changing default admin credentials * Implementing MAC address filtering * Blocking unwanted traffic via firewall settings * Disabling unused physical ports * Implementing content filtering * Performing firmware updates * Implementing physical security controls (e.g. a door lock) * All of the above

All of the above

Which of the following actions would be of help in troubleshooting the "Missing operating system" error message displayed during system boot? * Run Startup Repair utility * Use bootrec.exe to fix Master Boot Record (MBR) errors * Verify that the drive is detected in BIOS * Use diskpart utility to label the system partition as active * All of the above

All of the above

Which of the following actions would help in optimizing Windows for faster performance? * Updating Windows and installing the latest device drivers * Closing unnecessary applications and web browser tabs * Making sure the system has enough virtual memory available * Checking for low disk space and freeing up space (deleting unused programs / using Disk Cleanup utility) * Defragmenting installed magnetic hard drives * Adjusting system visual effects, such as animations and shadow effects * Disabling unnecessary startup programs * Checking for and removing viruses and malware * Adjusting power configuration settings * Restoring the PC from a system restore point * Restarting the system regularly to clear out the memory * Adding more RAM * All of the above

All of the above

Which of the following actions would help in resolving Windows network connectivity issues? * Turning off airplane mode if enabled * Adjusting wireless signal range * Checking physical cable connections * Rebooting router/modem * Using Windows built-in troubleshooting utilities * Checking network resources permissions * Temporarily turning off firewalls * Temporarily turning off antivirus and anti-malware * Reinstalling the network adapter driver * Restarting Windows * Manually updating network settings * All of the above

All of the above

Which of the following answers refers to (a) screen lock type(s) used for securing access to a mobile device? * Fingerprint lock * Face lock * Swipe lock * Passcode lock * All of the above

All of the above

Which of the following data encryption tools can be used to secure a Windows workstation? (Select all that apply) * FileVault (file-level encryption) * BitLocker (drive-level encryption) * EFS (file-level encryption) * FileVault (drive-level encryption) * BitLocker To Go (removable media encryption)

BitLocker (drive-level encryption) EFS (file-level encryption)

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use? * BYOD * COPE * VDI * CYOD

COPE

If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and: * Choosing "Restore previous versions" option from the pop-up menu * Selecting "Run program using recommended compatibility settings" option from the pop-up menu * Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab * Selecting "Run as administrator" option from the pop-up menu

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab

Which of the following is an application software that selectively blocks access to websites? * Captive portal * Firewall * Content filter * Proxy server

Content filter

Which of the following steps provide access to Windows Reliability Monitor? (Select 2 answers) Control Panel (Icon view) -> Administrative Tools folder -> Reliability Monitor Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history Windows Settings menu -> Update & Security -> Troubleshooting -> Reliability Monitor Control Panel (Category view) -> System and Security -> System -> Advanced system settings -> Performance -> Settings... -> Advanced -> View reliability history

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history

Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device? (Select 2 answers) Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Control Panel (Icon view) -> Network and Sharing Center -> Change adapter settings -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Settings menu -> Devices -> Network Adapters -> select the device -> select the required action from the Driver menu Control Panel (Category view) -> Network and Internet -> View network computers and devices -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab

Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab

Solid-State Drives (SSDs) require periodic defragmentation to improve system performance. True False

False

What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows? Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply) * Damaged hard drive * BIOS does not detect the hard drive * Windows starts in VGA mode * System partition not set as active * Corrupt Master Boot Record (MBR)

Damaged hard drive BIOS does not detect the hard drive System partition not set as active Corrupt Master Boot Record (MBR)

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive? * Standard format * Overwriting data * Degaussing * Low-level format

Degaussing

Which of the following could be of help in troubleshooting a system that attempts to boot to incorrect device? (Select 2 answers) * Device Manager * Safe mode troubleshooting * Troubleshooting applet in Windows Control Panel * Disconnecting any removable drives * Updating boot order in BIOS

Disconnecting any removable drives Updating boot order in BIOS

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as: * Encrypting File System (EFS) * Advanced Encryption Standard (AES) * Trusted Platform Module (TPM) * New Technology File System (NTFS)

Encrypting File System (EFS)

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of: * Event Viewer * Resource Monitor * Task Manager * System Information utility

Event Viewer

Which of the following enable(s) biometric authentication on a mobile device? (Select all that apply) * Face lock * QR scanner * Fingerprint lock * Swipe lock * Passcode lock

Face lock Fingerprint lock

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files. True False

False

Which of the following adversely affect performance of a magnetic hard drive? (Select 3 answers) * Disk striping * File fragmentation * Disk mirroring * Excessive paging / disk thrashing * Insufficient amount of RAM * Disk duplexing

File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM

Which of the following examples meets the requirement of multi-factor authentication on a mobile device? * Fingerprint scan and password * Password and PIN * Face scan and fingerprint scan * PIN and swipe lock pattern

Fingerprint scan and password

Which of the following passwords is the most complex? T$7C52WL4SU GdL3tU8wxYz @TxBL$nW@Xt G$L3tU8wY@z

G$L3tU8wY@z

A mobile device's built-in functionality enabling the usage of locator applications is known as: * WPS * GSM * IMEI * GPS

GPS

Which of the following enables installation of software that is not available through the official Apple App Store? * Carrier unlocking * Sideloading * Rooting * Jailbreaking

Jailbreaking

Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system? * Sideloading * Carrier unlocking * Rooting * Jailbreaking

Jailbreaking

Which of the following account management security measures narrows down a user's computer access to specified hours? * Principle of least privilege * Guest account * Failed login attempts lockout * Login time restrictions

Login time restrictions

Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer? * Low-level format * Quick format * Standard format * High-level format

Low-level format

What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network? * MAC filtering * Network Address Translation (NAT) * Static IP addressing * Network Access Control (NAC)

MAC filtering

Which of the following facilitates the enforcement of mobile device policies and procedures? * MFA * MMC * MDM * MFD

MDM

Disabling SSID broadcast: * Is one of the measures used in the process of securing wireless networks * Makes a WLAN harder to discover * Blocks access to a WAP * Prevents wireless clients from accessing the network

Makes a WLAN harder to discover

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password? * Minimum password age setting * Password complexity setting * Account lockout threshold setting * Login time restrictions

Minimum password age setting

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation? * Login time restrictions * Password complexity setting * Account lockout threshold setting * Maximum password age setting

Miximum password age setting

Which of the following answers refers to an example of content filtering configuration setting on a SOHO router? * Modem mode * Parental controls * MAC filtering * IP and port filtering

Parental controls

Which of the following password best practices would mitigate the security risk posed by temporary workers? * Password expiration * Strong passwords * BIOS/UEFI passwords * Screensaver required password

Password expiration

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused? * Password history setting * Maximum password age setting * Account lockout threshold setting * Minimum password age setting

Password history setting

The two factors that are considered important for creating strong passwords are: (Select 2 answers) * Password length * Minimum password age * Password history * Password complexity * Maximum password age

Password length Password complexity

Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization? (Select 3 answers) * Performance Monitor (perfmon.exe) * Device Manager (devmgmt.msc) * Resource Monitor (resmon.exe) * System Properties (sysdm.cpl) * Task Manager (taskmgr.exe)

Performance Monitor (perfmon.exe) Resource Monitor (resmon.exe) Task Manager (taskmgr.exe)

Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network? * Port bonding * Port labeling * Port forwarding * Port mirroring

Port fowarding

What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network? * Port triggering * Port bonding * Port forwarding * Port mirroring

Port triggering

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? * AP WPS configuration * Power level controls * Maximum Transmission Unit (MTU) * Quality of Service (QoS)

Power level controls

Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications? * Programs and Features * System Configuration * Troubleshooting * Security and Maintenance

Programs and Features

Which format type in MS Windows does not erase disk data? * Standard format * Low-level-format * High-level format * Quick format

Quick format

Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply) * Quick format * Low-level-format * Standard format * High-level format

Quick format Standard format High-level format

Which of the following allows to erase data on a lost or stolen mobile device? * Remote lock * Degaussing * Low-level formatting * Remote wipe

Remote wipe

Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in: (Select 2 answers) * Settings menu (Windows 8/8.1/10) * Power Options applet in Windows Control Panel * System Configuration (msconfig.exe) utility * Administrative Tools folder * Security and Maintenance applet in Windows Control Panel

Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel

Which of the following destruction tools/methods allow for secure disposal of physical documents? (Select 2 answers) * Shredder * Hard drive sanitization * Incineration * Low-level formatting * Degaussing

Shredder Incineration

Allowing "Unknown Sources" in Android security settings enables: * Rooting * Malware propagation * Sideloading * Jailbreaking

Sideloading

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called: * Jailbreaking * Rooting * Sideloading * Carrier unlocking

Sideloading

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors? * Low-level format * Standard format * High-level format * Quick format

Standard format

Which of the following locations in Windows 7 allows to enable/disable startup applications? * Startup tab of the Task Manager (taskmgr.msc) utility * Windows Settings (Settings -> Apps -> Startup) * Startup tab of the System Configuration (msconfig.exe) utility * Programs and Features (appwiz.cpl) applet in Windows Control Panel * Startup tab of the System Properties (sysdm.cpl) utility

Startup tab of the System Configuration (msconfig.exe) utility

What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows? (Select 2 answers) System applet in Control Panel -> System Protection tab -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Administrative Tools folder in Windows Control Panel -> Windows Memory Diagnostics -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive

Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows? * System restart * Recovery Console * Safe Mode troubleshooting * Driver rollback

System restart

Which of the following account management security solutions provide countermeasures against brute-force attacks? (Select 2 answers) * Login time restrictions * Timeout period between login attempts * Principle of least privilege * Screensaver password requirement * Failed attempts lockout

Timeout period between login attempts Failed attempts lockout

An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default. True False

True

An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process. True False

True

Assigning static IP addresses on a SOHO network provides better administrative control over hosts and devices residing on the inside of the network. True False

True

BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password. True False

True

Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used. True False

True

Because wireless routers are shipped with default credentials, the process of securing a SOHO network should include changing the default username and password on a Wireless Access Point (WAP). True False

True

By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it. True False

True

Certificate of destruction is a document issued by companies that carry out secure device/document disposal. The certificate verifies proper asset destruction and can be used for auditing purposes. In case of device disposal, the document includes a list of all the items that have been destroyed along with their serial numbers. It may also describe the destruction method, specify location (on-site/off-site), or list the names of witnesses who oversaw the entire process. True False

True

Disk Defragmenter is a software tool used to rearrange data on magnetic drives in order to improve system performance. Defragmentation results in faster read/write operations of a magnetic hard drive's read/write heads because defragmentation consolidates data into the smallest contiguous regions. This means that the heads can access data sequentially without seeking data fragments in different areas of a disk. True False

True

Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res True False

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). True False

True

Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts. True False

True

Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone's screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID). True False

True

In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel. True False

True

Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks. True False

True

One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method). True False

True

Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows. True False

True

Restarting a PC regularly might help in resolving slower performance issues as it shuts down all background processes and clears out the system memory. True False

True

Screensaver password requirement falls into the category of password best practices. A password-protected screensaver allows to block access of unauthorized persons to a user's workstation in situations where the user is forced to leave their desk. True False

True

Service Set Identifier (SSID) is another term for the name of a Wireless Local Area Network (WLAN). Wireless networks advertise their presence by regularly broadcasting the SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a Wireless Access Point (WAP). Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice. True False

True

The category of account management security best practices includes the practice of restricting user administrative privileges to operating systems and applications based on user duties. Operating systems simplify this process by introducing the concept of user groups equipped with different types of permissions which allow system administrators to simultaneously manage permissions of multiple user accounts based on group membership. True False

True

The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web. True False

True

The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS). True False

True

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? * Protocol analyzer * WAP power level controls * Logical network diagram * Network mapper

WAP power level controls

A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as: * WPA * WPS * WEP * WAP

WPS

Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers) * WPS * WAP * WPA2 * WMN * WEP

WPS

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: * War chalking * Spoofing * War driving * Insider threat

War driving

Which of the following tools would be of help in determining the optimal WAP placement? * War driving * Optical power meter * Network mapper * Wi-Fi analyzer

Wi-Fi analyzer

Which of the following steps provide access to the Disk Cleanup utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Disk Cleanup Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup

Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Disk Management utility shortcut icon -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Optimize and defragment drive -> Optimize

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize

Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects? (Select 3 answers) Control Panel -> Programs and Features -> Optimize visual display -> Personalize appearance and sound effects -> Visual Effects Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> Power Options -> select a power plan -> Change plan settings -> Change advanced power settings -> Desktop background settings -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications? (Select 2 answers) * Startup tab of the System Properties (sysdm.cpl) utility * Programs and Features applet in Windows Control Panel * Startup tab of the System Configuration (msconfig.exe) utility * Windows Settings (Settings -> Apps -> Startup) * Startup tab of the Task Manager utility

Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: * Penetration testing * Wireless site survey * Network segmentation * Vulnerability scanning

Wireless site survey

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error? * bootrec /scanos * bootrec /rebuildbcd * bootrec /fixmbr * bootrec /fixboot

bootrec /rebuildbcd

Which of the following Apple services enables remote mobile device backups? * iCloud * OneDrive * Remote Disk * Dropbox

iCloud

Which of the following Windows command-line utilities can be used to renew an IP address? * ifconfig * net config * iwconfig * ipconfig

ipconfig

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)? (Select 3 answers) * localhost * ::1 * FE80::/10 * 169.254/16 * 127.0.0.1

localhost ::1 127.0.0.1


Related study sets

Micro Economics Final- PITT STATE

View Set

Abeka 5th Grade History Quiz 22 Study Guide

View Set

Chapter 4 - Ethical Considerations in Research

View Set

Ch 47 Assessment of Kidney and Urinary Function

View Set

ECON chapter 2 guided reading (lesson 1)

View Set