CPMT 1350 2nd final exam practice
script file name extension of Windows Batch File
.bat
script file name extension of javascript
.js
script file name extension of PowerShell
.ps1
script file name extension of python
.py
script file name extension of Linux Shell Script
.sh
A technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive?
4
What is a recommended best practice for a technician who must perform tasks that require administrative access?
Ask the current user to log off, restart the computer, and then log in with the administrator account. Navigation Bar
A technician is troubleshooting a Windows 10 computer that displays an "Invalid Boot Disk" error message. What should be the first action the technician should take to troubleshoot the issue?
Change the boot order in the UEFI/BIOS settings to select the drive that has the operating system installed as the first boot device.
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
Check for the latest OS patches and updates.
A call center technician answers a call from a frequent customer who is known to be impatient and lacks experience with computers. The customer has an issue with an application that the call center supports. The customer informs the technician that the problem had been reported before but the original technician was rude, did not listen, and did not fix the problem. If the technician is confident that the problem can be resolved by increasing the amount of memory in the computer, what should the technician do?
Confirm the issues and give detailed instructions to solve the problem.
What is the best definition of personally identifiable information (PII)?
Data that is collected by businesses to distinguish identities of individuals.
Which two operations can help prevent a mobile device from being tracked without permission?
Disable or remove apps that allow connections to the GPS. Turn off the GPS when not in use.
What tool is included in the Mac OS X for backing up disks to image files and recovering disk images?
Disk Utility
Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next?
Document the reason the customer called and create a support ticket. Escalate the customer to a level two technician.
What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices.
Ensure that the operating system software and applications contain the latest updates. Back up user data on a regular basis.
A client installed a new driver for a device three weeks ago; however, this driver is causing the system to freeze occasionally and the client wishes to revert back to the old driver. What option can be used to address this issue without loss of data or applications?
Go back to the initial Windows build.
A corporate office is considering using an MDM policy to enhance its security parameters. What is achieved through the implementation of the MDM policy?
It can be used to log the onboarding of BYOD devices.
Which two statements are correct about level one and level two technicians?
Level two technicians are usually more knowledgeable about technology than the level one technicians are. Level two technicians usually respond to the "down calls" as they may be able to resolve them faster.
What is the default file system used during a fresh installation of Windows 10?
NTFS
A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.
A technician has just purchased a new Windows 10 PC and wants to transfer selected files, folders, profiles, and applications from the old Windows PC. What tool or utility does Microsoft recommend to do this?
PCmover Express
A technician is configuring a SOHO computer. The technician wants to create a local account that requires a password and wants a screen saver to appear if the person using the computer steps away for a period of time. Which two Windows Control Panels will the technician use to accomplish these tasks? (Choose two.)
Personalization User Accounts
When a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem?
Register the DLL file using the regsvr32 command. Run sfc/scannow in Safe Mode.
What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop?
Run chkdsk /F /R from the recovery console. Open Control Panel and navigate to System and Security and disable automatic restart.
A network administrator is tasked with deployment of Windows 10 Pro for a large number of new PCs in the company. The administrator uses a PC to perform a base installation together with standard company applications. The PC is tested to be fully functional. Which tool must the administrator use to remove all computer and user specific information before building a deployable image from the disk?
Sysprep.exe
What is the next troubleshooting step after a theory of probable cause has been established?
Test the theory to determine cause
An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?
The BIOS boots the computer using the first drive that contains a valid boot sector.
Which statement is correct about installing a 32-bit operating system on a x64 architecture?
The OS will run correctly.
A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem?
The computer has a virus. An update has corrupted the operating system.
A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain?
The three causes of quick battery drain on a mobile device are: The display is set to a high level of brightness. An app is using too many resources. The device is roaming between call towers.
A user is trying to execute a file using elevated permission. The user right-clicks the file, chooses Run as Administrator, and chooses Yes in the User Account Control (UAC) window. The operation fails. What is the reason?
The user is not a member of the administrator group.
Which statement is true regarding mobile devices using the Wireless Wide Area Network (WWAN)?
They require an adapter to link to a cellular provider's network through the nearest base station or transmitter.
A technician has been notified of a problem on the network. After investigation, the technician determines that a specific internal company computer is launching an attack on other company computers. Which type of malware is being used?
Trojan
Which tool is available to transfer user data and settings from an old Windows 10 PC to a new Windows 10 PC?
User State Migration tool
A technician is visiting a website and is using Google Chrome on a Windows 10 PC. The technician is trying to view the password for the website. The technician uses the Credential Manager to view the password but cannot see it. What could be the cause?
Web credentials are not saved for sites accessed by browsers other than Explorer and Edge.
A technician has been asked by a manager to recommend a security solution for protecting a computer against rootkits. Which security technique should the technician recommend?
antimalware
An instructor is discussing facts about different mobile device operating software. The instructor states: "WIFI hotspots are a location data source that can be used by locator apps to determine the position of a mobile device." To which OS does this relate
both
When performing computer forensics what is required to prove a chain of custody?
collected evidence
What is the name of the Windows Phone 10 digital, or virtual, assistant?
cortana
A company has a security policy that permits the reuse of wiped drives in other computers. The wiped drives are often used for additional storage or as a replacement drive. What are two methods that could be used to wipe data?
data wiping software degaussing equipment
What are two potential risks that could result from rooting or jailbreaking a mobile device?
enabling app access to the root directory not properly creating or maintaining sandboxing features
The registry is a database that only contains information about the device drivers on a computer.
false
What two roles or tasks are associated with level two technicians?
gathering diagnostic information from a customer computer escalating a trouble ticket to a higher level technician
When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?
least privilege
A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are two purposes of botnets?
to attack other computers to transmit viruses or spam to computers on the same network
What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?
to disable background services
A user wants to display the contents of a text file in a command interpreter. Which administrative command-line tool or command can be used to address this?
type