ITSC 1405 Final
What Performance counter tracks the percentage of time the hard drive is in use? Avg. Disk Queue Length % Disk Time Disk Buffer Length Max Disk Queue Length
% Disk Time
Linux utilizes what two different wildcard characters at the command line? and | * ?
* ?
A custom view filter in Event Viewer can be saved to a file using what extension? .evf .evlog .evs .evtx
.evtx
Which of the following file extensions are hidden just after Windows is installed? Choose all that apply. .exe .xlsx .com .txt
.exe .com .txt
Text files that are called initialization files often utilize what two file name extensions? .init .ini .inf .start
.ini .inf
A disc image, as defined by the International Organization for Standardization, uses what file extension? .iso .img .disc .cd
.iso
In order to ensure that a Mac has no startup items, what two directories should you check for items? /etc /Library/StartupItems ~/.startup /System/Library/StartupItems
/Library/StartupItems /System/Library/StartupItems
What option, when passed to the shutdown command, will restart the local computer? /h -h /s /r
/r
On Linux, where are the commands required for system administration stored? /bin /usr /opt /sbin
/sbin
How much storage does a dynamic disk require for the disk management database? 1 MB 10 GB 5 MB 50 MB
1 MB
How much drive space should be available for each virtual machine on a system? 5 GB 10 GB 20 GB 50 GB
20 GB
The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives? 1GB 1TB 2TB 2PB
2TB
After installation, how many days do you have to activate Windows 7? 7 30 45 60
30
What port is utilized by the Remote Desktop service? 22 23 3389 1729
3389
What is the maximum amount of memory supported by a 32-bit Windows operating system? 1GB 4GB 16GB 64GB
4GB
On a magnetic drive, what is the most common sector size? 512 bytes 512 KB 16 KB 4 KB
512 bytes
What type of OS should you install for best performance when you have enough RAM? 8 bit 16 bit 32 bit 64 bit
64 bit
If you need to redirect the output from a command, what symbol should you use? | * > ?
>
A tool that lists errors and issues that need attention
Action Center
Which Windows utility program lists errors and issues that need attention? -Action Center -Control Panel -System Information Windows -Network and Sharing Center
Action Center
What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.) Activates the HAL starts critical services Loads system registry hive Starts the Session Manager
Activates the HAL starts critical services Starts the Session Manager
Under the Control Panel, what console contains Print Management, Computer Management, and Event Viewer? Windows Firewall System Administrative Tools Admin Page
Administrative Tools
What is the name for the 3D user interface provided by Windows 7 and Vista? Glass Aero Air Shield
Aero
What operating system is based on open source code? Android Blackberry Windows Phone iOS
Android
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in? Administrators Guests Backup Operators Anonymous users
Anonymous users
What are the two most popular web server applications? Nginx Tomcat Apache IIS
Apache IIS
To which group does Windows give access to folders that you create which are not part of your user profile? Power Users Guests Authenticated Users Anonymous Users
Authenticated Users
Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? Control Panel BIOS setup Device Manager Computer
BIOS setup
Using what Windows 7 utility allows you to create a backup schedule that can include any folder on the hard drive and the system image? Automated System Backup Complete PC Recovery Automated System Recovery Backup and Restore
Backup and Restore
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup? Event Viewer Boot Logging Safe Mode with Networking Windows Boot Manager
Boot Logging
Where is the Windows system registry hive? C:\Windows\reg C:\Windows\settings\config C:\Windows\etc\hive C:\Windows\System32\Config
C:\Windows\System32\Config
Registry files, if deleted, can be restored from those saved in what folder? C:\Windows\System32\WinBackup C:\Windows\System32\Config\RegBack C:\Windows\System32\Config\Hive C:\Windows\RegBack
C:\Windows\System32\Config\RegBack
In order to ensure drive health, what command should you use to search for and repair file system errors? Defrag Chkdsk Analyze Optimize
Chkdsk
searches for bad sectors on a volume and recovers the data from them if possible
Chkdsk utility
Which products are considered to be hypervisors? Client Hyper-V Virtual PC VirtualBox VMVisor
Client Hyper-V Virtual PC VirtualBox
A window that consolidates several Windows administrative tools that you can use to manage the local PC or other computers on the network
Computer Management
What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete
Ctrl+Alt+Delete
If you enter a command and want to terminate its execution before it is finished, what key press should you use? Ctrl+C Ctrl+V Ctrl+B Ctrl+X
Ctrl+C
During the Windows 8.1 installation, what option must be selected in order to perform a clean install? -Custom: Install Windows only (advanced) -upgrade to Windows 8.1 -Clean Install (advanced) -Fresh Install (advanced)
Custom: Install Windows only (advanced)
What command should you use to rearrange parts of files on the drive so they are contiguous? Optimize Analyze Defrag Chkdsk
Defrag
You can use what utility to convert two or more basic disks to dynamic disks? Disk Management Windows Management System Management Disk Config
Disk Management
What types of events are logged by Windows and can be viewed using the Event Viewer? (Choose all that apply). Scheduled Error Warning Information
Error Warning Information
What error messages indicate that the MBR sector is damaged, or the active partition is corrupt or missing? (Choose all that apply.) No boot device found Error loading operating system Missing operating system Invalid partition table
Error loading operating system Missing operating system Invalid partition table
When troubleshooting a device or service that has failed to start, what utility may have information regarding the cause? Microsoft Management Console Event Viewer Performance Monitor Resource Monitor
Event Viewer
Where can a user find out more information about a hardware or network failure that occurred on that particular PC? -Event Viewer -Performance Information and Tools -Task Scheduler -Resource Monitor
Event Viewer
a Windows tool useful for troubleshooting hardware or network failures, OS error messages, failed services and more.
Event Viewer
What utilities can be accessed using the Computer Management window? (Choose all that apply). Task Manager Event Viewer Performance Monitor System Configuration
Event Viewer Performance Monitor
What two applications are an example of a mail server and a mail client application, respectively? Exchange Maverick Outlook Firefox
Exchange Outlook
The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence? F4 F8 F10 F12
F8
What file systems supported by Windows can be used for volumes and drives that don't hold the Windows installation? (Choose all that apply.) FAT64 FAT32 exFAT NTFS
FAT32 exFAT NTFS
A computer must have a DVD drive in order to install Windows 8. True or False
False
A hard drive can only have one single root directory. True or False
False
A service is a program that runs in the foreground and is visible on the taskbar. True or False
False
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False
False
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. True or False
False
If you make a mistake that makes the problem worse, it's best to hide the problem until you can resolve it or until you have left the customer site. True or False
False
LILO is the most commonly installed boot loader by the Linux operating system. True or False
False
Most Microsoft patches and device drivers can be applied to a 32-bit installation and also a 64-bit installation. True or False
False
On Linux, the root user's home directory is /home/root. True or False
False
On a peer-to-peer network, authentication is the responsibility of the domain. True or False
False
On the IE General tab you can block cookies. True or False
False
Once you feel like you have resolved a problem, politely tell the customer the job is finished, and go on your way. True or False
False
Programs on Mac that launch at startup are called login items. True or False
False
The Windows 8 interface is known as the Aero interface. True or False
False
The Windows shell is responsible for interacting with hardware. True or False
False
The chkdsk command will not fix anything on the drive unless the drive is unlocked. True or False
False
The price for Windows 7 is the same regardless of the edition and type of license you purchase. True or False
False
There is no option for networking access when using Safe Mode. True or False
False
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional. True or False
False
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or False
False
Windows Disk Cleanup is the utility to use whenever you want to defragment your hard drive. True or False
False
You do not have to be logged on as an administrator in order to use tools found in Computer Management. True or False
False
What Linux distribution is considered a cutting-edge distribution? Debian Fedora Red Hat Enterprise Linux Ubuntu
Fedora
What status indicators apply only to dynamic disks? (Choose all that apply.) Foreign drive Unallocated Healthy (At Risk) Active
Foreign drive Healthy (At Risk)
What two methods are available for Windows to use to partition a drive? UEFI GPT EFT MBR
GPT MBR
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group? Administrators group Backup Operators group Power Users group Guests group
Guests group
a component of the kernel which makes up the layer closest to the hardware
HAL
What registry key stores information that determines which application is opened when a user double-clicks a file? HKEY_CLASSES_ROOT HKEY_USERS HKEY_CURRENT_USER HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
When a user logs into Windows, what registry key is created? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_USERS HKEY_CURRENT_USER
HKEY_CURRENT_USER
What registry key is considered to be the most important key, containing hardware, software, and security data? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_CLASSES_ROOT HKEY_USERS
HKEY_LOCAL_MACHINE
What dynamic link library handles low-level hardware details? Ntoskrnl.exe Smss.exe Hal.dll Winlogon.exe
Hal.dll
When all users on a network require the same access to all resources, what type of network model should you use? Domain Homegroup Workgroup Guestgroup
Homegroup
Which of the following is used to uniquely identify a computer on a network? network ID ARP address IP address serial number
IP address
What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock
KeePass LastPass Dashlane
In Windows 7, what startup option can be used to restore the registry settings from the previous login? Last Known Good Configuration System Restore Debugging Mode Safe Recovery
Last Known Good Configuration
What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software
LoJack
What Windows process is responsible for authenticating users? Lsass.exe Smss.exe Csrss.exe Ntoskrnl.exe
Lsass.exe
What command creates a subdirectory under a directory? RD MD CD AD
MD
Windows 10 features what new web browser, which is designed to replace Internet Explorer? Microsoft Spartan Microsoft Slim Microsoft Edge Microsoft Plus
Microsoft Edge
Using what utility allows you to build your own customized console windows? -Microsoft Management Console -Microsoft Manager Console -Microsoft Management Components -Microsoft Manager Controls
Microsoft Management Console
Swiping up with three fingers on Mac OS X launches what? Dashboard Mission Control Spotlight System Preferences
Mission Control
What type of permission should you set to control access to files and folders by local and network users? -sharing on FAT32 volumes only -NTFS on NTFS volumes only -NTFS on exFAT or NTFS volumes -sharing on NTFS or exFAT volumes
NTFS on NTFS volumes only
A utility that can be used to solve a failed network connection
Network and Sharing center
Which of the following text error messages can indicate that BIOS could not find a hard drive? (Choose all that apply). Drive not recognized No boot device available Hard drive not found A disk read error occurred
No boot device available Hard drive not found
What is the file name given to the Windows kernel? kern.sys Ntoskrnl.exe Hal.dll Winkernel.exe
Ntoskrnl.exe
A Microsoft online storage service
OneDrive
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect? SMTP PNRP SNMP LDAP
PNRP
a hidden file stored in the root directory of drive C
Pagefile.sys
What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time? Event Viewer Reliability Monitor Performance Monitor Resource Monitor
Performance Monitor
What Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes? Applications Services Processes Performance
Processes
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.) Full control Read execute Write
Read Write
a database designed with a treelike structure that contains configuration information for Windows, users, software applications, and installed hardware devices
Registry
If you need to see information about problems and errors that have happened over time, what utility should you use? Performance Monitor Resource Monitor Reliability Monitor Services Console
Reliability Monitor
What two methods can be used to access items in the Quick Launch menu? -Right click the Start button, select an item from the Quick Launch menu -Right click the taskbar, select Quick Launch, select an item -Press Win+X on the keyboard to access the Quick Launch menu from anywhere -Press CTRL+X on the keyboard to access the Quick Luanch menu from anywhere
Right click the Start button, select an item from the Quick Launch menu Press Win+X on the keyboard to access the Quick Launch menu from anywhere
Within the Properties box of a service in the Services console, what is NOT a valid startup type for a service? Automatic (Delayed Start) Scheduled Manual Automatic
Scheduled
A program that runs in the background and is called on by other programs to perform a background task
Service
What Windows utility is used to control the Windows and third-party services installed on a system? Microsoft Management Console Event Viewer System Configuration Utility Services console
Services console
What program is used to start the part of the Win32 subsystem that displays graphics? Winlogon.exe Ntoskrnl.exe Smss.exe Lsass.exe
Smss.exe
What tabs found in the Windows Task Manager dialog box? (Choose all that apply). Applications Startup Processes Performance
Startup Processes Performance
What is responsible for getting a system up and going and finding an OS to load? Windows Boot Loader Startup BIOS Setup BIOS BootMgr
Startup BIOS
What Windows utility can be used to find out what processes are launched at startup? Task Manager Microsoft Management Console System Configuration Computer Management
System Configuration
Restore points are created at regular intervals and just before you install software or hardware by what utility? System Activation System Protection System Restoration System Prevention
System Protection
lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity, and user activity
Task Manager
can be set to launch a task or program at a future time, including at startup
Task Scheduler
What is the name of the OS X built-in backup utility? iBackup Time Machine Backup Utility Cloner
Time Machine
A Windows 7 system repair disc can be created using the Backup and Restore utility. True or False
True
A hard boot takes more time than a soft boot. True or False
True
A root certificate is the original certificate issued by the CA. True or False
True
Defragmenting is not recommended for solid-state hard drives. True or False
True
Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as other types of errors. True or False
True
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network. True or False
True
In Windows, there are two types of user accounts: an administrator account and a standard account. True or False
True
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False
True
The Advanced Boot Options menu appears when a user presses F8 as Windows is loading. True or False
True
The Android OS for mobile devices is based on Linux. True or False
True
The GUID Partition Table (GPT) method for partitioning a drive allows up to 128 partitions. True or False
True
The Home editions of Windows 7 do not include the Local Security Policy or Print Management. True or False
True
The OEM version of Windows 7 can only be installed on a new PC for resale. True or False
True
The Windows desktop is itself a folder. True or False
True
The default value of the security level in IE is Medium-high. True or False
True
There is no undo feature in the Registry Editor. True or False
True
Using Group Policy, you can set security policies to help secure a workstation. True or False
True
Using Windows 7 Backup and Restore, you can back up the volume on which Windows is installed. True or False
True
VMs running under a Type 1 hypervisor are isolated from each other. True or False
True
When a partition is formatted with a file system and assigned a drive letter it is called a volume. True or False
True
Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. True or False
True
Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for a variety of other tasks, so it's important to delete unneeded files occasionally. True or False
True
You should take ownership of a customer's problem as if it is your own problem. True or False
True
What dialog box in Windows appears each time a user attempts to perform an action that can be done only with administrative privileges? -User Account Confirmation -User Account Control -User Access Control -User Access Confirmation
User Account Control
If you want to be able to power up a computer remotely, what feature should you use? QoS RDP RemoteApp Wake-on LAN
Wake-on LAN
What Windows 7 64-bit version editions could be installed on a computer that has 16 GB of RAM? (Choose all that apply.) Windows 7 Professional Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium
Windows 7 Professional Windows 7 Home Premium
What versions of Windows 8.1 are valid in-place upgrade paths for a computer that has Windows 7 Starter edition on it? (Choose all that apply.) Windows 8.1 Windows 8.1 Pro Windows 8.1 Enterprise Windows 8.1 Ultimate
Windows 8.1 Windows 8.1 Pro
What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS? MBR program Session Manager program Windows Boot Loader Windows Boot Manager
Windows Boot Manager
What software in Windows 8 serves as built-in antivirus software? Windows Firewall BitLocker Windows AnitMalware Windows Defender
Windows Defender
a utility to copy user data and settings from one computer to another
Windows Easy Transfer
When a technician needs to start an image deployment, what version of Windows will be run on the target computer? Windows 7 Starter Windows 8 Starter Windows PE Windows XP
Windows PE
uses a flash drive or secure digital (SD) memory card to boost hard drive performance
Windows ReadyBoost
If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be? system32 Windows Windows.old Program Files (Saved)
Windows.old
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path? \\sharedfolder\server \server\sharedfolder \\server\sharedfolder /sharedfolder/server
\\server\sharedfolder
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS
a TPM chip on the motherboard
What statement about user accounts and groups is NOT true? -a user account can belong to only one group at a time -by default, standard users accounts belong to the Users group -Guest group has limited rights on the system -Backup Operators group can restore any files regardless of the group's permissions to those files
a user account can belong to only one group at a time
What partition is the bootable partition that startup BIOS turns to when searching for an operating system to start up on an MBR partitioned drive? extended partition startup partition active partition volume
active partition
Which of the following are valid types of user accounts in Windows? visitor administrator standard temporary
administrator standard
Regarding the use of Group Policy, what statement is NOT accurate? -policies can be applied to a computer -all policies are applied before the logon screen appears -Group Policy is available in Windows Professional edition -you can set the QoS level for an application using Group Policy
all policies are applied before the logon screen appears
What should you do when you have a customer that is frequently complaining about your company, products, or services? -explain how the customer is being inappropriate and end the conversation -inform the customer that you agree and will make suggestions to management -allow the customer to vent for a while and apologize as necessary -if the complaint is not in your area of expertise, explain how it is not your problem and ask to move on
allow the customer to vent for a while and apologize as necessary
When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS
an encrypted file moved to an unencrypted folder remains encrypted
used during an unattended installation
answer file
What is another name for several small utility programs that are found in the Control Panel? downloads system processes categories applets
applets
an extra copy of a data or software file that you can use if the original file becomes damaged or destroyed
backup
What should be done before any changes are made to a system that is experiencing a problem? Examine the system Backup data Establish a Theory Test your Theory
backup data
can be partitioned and formatted as a stand-alone hard drive
basic disk
contains a list of OS commands that are executed as a group
batch file
When working with co-workers and supervisors, which of the following is a good practice? -if you have a problem with a co-worker, first discuss it with other co-workers -if you need to give bad news or criticism, use email the lessen the blow -be professional by putting business matters over personal matters -never tell your boss you can't take on a new project, even if it's beyond your skills
be professional by putting business matters over personal matters
When working with a computer illiterate user over the phone, what is NOT a good practice? -frequently ask the customer to tell you what is displayed on the screen -don't ask the customer to perform a task that might destroy data -before proceeding with the call, tell the customer to put someone else on the line -provide step-by-step mouse and keyboard instructions
before proceeding with the call, tell the customer to put someone else on the line
What should be done if a system cannot boot from the hard drive? -reinstall Windows -boot from the Windows setup DVD -run System File checker -replace the hard drive
boot from the Windows setup DVD
If using a dual or multiboot configuration, what screen appears during the boot sequence? OS select BIOS screen boot loader menu Multi-Windows Login screen Secure Boot OS page
boot loader menu
What command can be used to scan for Windows installations not stored in the BCD? bootrec /scanOS bootrec /fixmbr bootrec /fixboot bcdedit
bootrec /scanOS
What command can be used to repair a dual boot system? bootsect bootrec bcdedit bootrep
bootsect
Which of the following is NOT true about Remote Desktop? -the client can be running any version of Windows 7 -by default all users can access Remote Desktop -Windows firewall can block Remote Desktop connections -you can start the remote desktop client using the mstsc command
by default all users can access Remote Desktop
What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'
by default, accounts with a blank password cannot logon remotely
What is a typical use of a Type 2 hypervisor? (Choose all that apply.) -by developers to test applications -as honeypots to lure hackers -for VDI deployment -cloud computing
by developers to test applications as honeypots to lure hackers
What is the main advantage of using a thick client? -reduced cost of the machine -can be used for purposes other than server-side virtualization -a tablet can serve as a thick client
can be used for purposes other than server-side virtualization
Regarding the Performance Monitor utility, which statements are accurate? (Choose all that apply.) can monitor in real time can save data in logs keeps a log of errors helps to identify bottlenecks
can monitor in real time can save data in logs helps to identify bottlenecks
What command lets you view the contents of a file? cat view open rm
cat
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list
chain of custody
A directory that is housed inside another a directory
child directories
What command can be used to check for file system errors? System Restore MSconfig sfc /scannow chkdsk /r
chkdsk /r
What two commands are used to change the permissions and ownership of a file or directory in Linux? chmod cacls usermod chown
chmod chown
In order to remove any partition or volume information from a selected disk, what diskpart command should be used? format select partition clean create partition primary
clean
What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed? clean install dual boot in-place upgrade standard
clean install
What is another name for a file allocation unit? sector cluster segment fragment
cluster
What keypress sequence is used to open the Force Quit window on a Mac? ctrl+alt+delete command+option+delete ctrl+option+delete command+option+esc
command+option+esc
If you have an overly confident user on the phone, what is a good practice? -compliment the user's knowledge, insight, and experience -keep the conversation moving to place the user at a disadvantage -point out the customer's mistakes to shake their confidence -use technical jargon the matches or exceeds the customer's use of jargon
compliment the user's knowledge, insight, and experience
Creates a folder with a .zip extension
compressed folder
What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM
computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
What are three possible reasons for an application error that should be considered at step 3 of the application troubleshooting process? (Choose all that apply.) back ups may be bad consider data corruption application settings may be wrong application may be corrupted
consider data corruption application settings may be wrong application may be corrupted
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order
copyright
In order to break out of a command or process on a terminal, what keys should you press? ctrl+alt+del ctrl+space alt+del ctrl+c
ctrl+c
What command can be used to copy and convert files, directories, partitions, and even entire DVDs or hard drives? copy cp dd cat
dd
rearranges files on the drive into as few segments as possible
defragmenting
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter
degausser
The initial screen that is displayed when an OS has a GUI interface loaded
desktop
Small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device
device drivers
What task can't be performed from the IE General tab? change the home page disable file downloads delete browsing history manage the IE cache
disable file downloads
What command can be used to remove partitions and convert a drive to GPT? fdisk bootrec diskpart gptconv
diskpart
What command that can be used to manage hard drives, partitions, and volumes? wpeinit bootrec bdcedit diskpart
diskpart
What is the last step in the six step troubleshooting method covered in this chapter? plan the fix resolve the problem document verify and prevent
document
If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create? dual cross controlled selective
dual
If a game or desktop publishing app that relies heavily on graphics is not performing well or giving errors, what command can you run to view DirectX information? dxtshoot.exe gpudiag.exe dxdiag.exe video.exe
dxdiag.exe
can span more than one hard drive
dynamic volumes
What might be required to set up a virtual machine such that hardware is virtualized and presented to the VM, including such devices as a virtual processor, memory, motherboard, hard drive, optical drive, keyboard, mouse, monitor, and other components or peripherals? external motherboard PCI virtual expansion cards dummy system emulator
emulator
What are two valid steps in the six step troubleshooting method discussed in this chapter? boot to Safe Mode establish a theory document outcomes reinstall Windows
establish a theory document outcomes
What are some useful rules to use when troubleshooting? (Choose all that apply). establish your priorities become a researcher never suspect the user make no assumptions
establish your priorities become a researcher make no assumptions
The Windows kernel includes what two main components? background services executive services HAL shell
executive services HAL
What is the fourth partition on a hard drive called? extended partition master boot record volume primary partition
extended partition
What part of the path to a file indicates how the file is organized or formatted? subdirectory filename root directory file extension
file extension
What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi? filename file extension file version file type
file extension
the overall structure an OS uses to name, store, and organize files on a drive
file system
the overall structure an OS uses to name, store, and organize files on a volume
file system
a mini-app that provides information such as the time, date, news headlines, or weather.
gadget
What is the name of the interface that uses graphics as compared to a command-driven interface? text menu-based common user graphical user
graphical user
The power saving state that saves all work to the hard drive and powers down the system is known by what term? sleep mode suspend mode save mode hibernation
hibernation
What command can be used to take full access of a file? takeown attrib perms icacls
icacls
When utilizing both share and NTFS permissions, what statement is inaccurate? -if both permissions are used, the least restrictive permission between the two applies -if NTFS permissions conflict between a user and group the least restrictive permission applies -when you copy a file, the file takes on the permissions of the destination folder -inherited permissions pass from parent folder to child file or folder
if both permissions are used, the least restrictive permission between the two applies
What should you do after a problem has been resolved at an on-site service call? -if you restored data, tell the user all their data is fully restored -hand the customer the bill and tell him to have a nice day -tell the customer that if they contracted for preventative maintenance, these problems won't happen -if you changed anything since the last boot, reboot one more time
if you changed anything since the last boot, reboot one more time
When attempting to solve application errors, what does the first step involve? (Choose all that apply.) -interview the user and back up data -ask the user to reproduce the problem while you watch -try a reboot -check the Action Center
interview the user and back up data ask the user to reproduce the problem while you watch try a reboot
What is a typical symptom that might indicate the MBR record is damaged? loud clicking noise invalid partition table error RAID not found error message invalid boot disk erorr
invalid partition table error
What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access
it is disabled by default
The core of the OS that is responsible for interacting with hardware
kernel
What occurs when Linux encounters an error from which it cannot recover? BSOD page fault segmentation fault kernel panic
kernel panic
In Windows 7, a collection of folders can be organized into conveniently accessed shortcuts known by what term? directory library root directory setting
library
What is a good practice when working with a customer on site? -if a customer has a document on the screen, it's okay to read it -limit use of your cell phone to work-related calls -since you are there to help, it's okay to use the customer's phone for important calls -inform the user that if you have to leave while they make a phone call, they will have to pay more
limit use of your cell phone to work-related calls
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term? live CD repair disk boot CD supplemental OS
live CD
Apps that offer continuous real-time updates on the Windows 8 modern interface are referred to by what term? live tiles stream apps fast tiles webapps
live tiles
Volumes within an extended partition are known by what term? extended volumes extra volumes logical drives logical expansions
logical drives
What type of storage drive contains spinning platters? optical hard drive solid-state drives floppy hard drives magnetic hard disk drives
magnetic hard disk drives
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates
malware signatures
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle
man-in-the-middle
What command will open the Memory Diagnostics utility? memdiag.exe mdsched.exe ramcheck.exe memfix.exe
mdsched.exe
You can quickly identify a problem with memory or eliminate memory as the source of a problem by using what tool? Last Known Good Configuration Event Viewer Device Manager Memory Diagnostics
memory diagnostics
a volume that can be accessed by way of a folder on another volume so that the folder has more available space
mounted drive
What two tools can be used to disable a service and to give a list of all currently running services, respectively? compmgmt.msc regsvr32.exe msconfig taskmgr.exe
msconfig taskmgr.exe
What application can be used to set Windows 8 to boot into Safe Mode while still in Windows? msconfig.exe sfc.exe services.msc rstrui.exe
msconfig.exe
If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed, what utility should you open? Task Manager msinfo32.exe Event Viewer msconfig.exe
msinfo32.exe
What command can be used to launch the System Information window? msinfo32.exe sysinfo.exe info32.exe msconfig.exe
msinfo32.exe
What command launches the Remote Desktop client for Windows? rdp rdesktop vnc mstsc
mstsc
Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric
multifactor
Found on the left side of the Windows Explorer or Computer window
navigation pane
What file holds the preferences and settings of the currently signed-in user? ntprofile.dat ntuser.dat profile.ini userconfig.ini
ntuser.dat
How often does Windows 7/Vista automatically defragment a hard drive? once a week once a day once a month once an hour
once a week
What type of software is used to control a computer? application operating system interface routine ROM routine
operating system
What piece of equipment is NOT a tool that would be considered appropriate equipment for on-site visits? oscilloscope flashlight multimeter ESD strap
oscilloscope
What type of network does not have centralized control, such as one in a small office or home office? client server network star topology peer-to-peer (P2P) hub network
peer-to-peer (P2P)
What command below is used to test network connections by sending a request packet to a host? ps ifconfig ping df
ping
What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep
press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data? -private data for each user should be kept in their C:\Users folder -all users have access to the folders in the C:\Users folder -C:\Users\Public should only be used by the Guess account -only Administrators and Guest have access to C:\Users\Public
private data for each user should be kept in their C:\Users folder
Which of the following involves assigning a problem to those higher in the support chain? ticket logging problem escalation responsibility passing issue resolution
problem escalation
What important information is needed if you are installing an OEM version of Windows 7? installation code receipt of purchase OEM license product key
product key
What kind of a computer intercepts requests that a browser makes of a server and can cache received content? DNS server VPN server proxy server Web server
proxy server
a server automatically installs a new image or OS upgrade to a computer when a user is not likely to be sitting at it
push automation
CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle
ransomware
For some brand-name computers, the hard drive contains a partition that can be used to reinstall Windows. What is the name for this partition? reinstall partition recovery partition restore partition rebuild partition
recovery partition
What command will unregister a component when run? unreg.exe /a del.exe com+ regsvr32.exe /u service /c
regsvr32.exe /u
What task can't be performed by using Task Manager? end a proces end process tree restart a process start a process
restart a process
What is a snapshot of the system settings and configuration called? rollback point restore unit rollback unit restore point
restore point
snapshots of the system and include Windows system files that have changed
restore points
What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice
retina fingerprint voice
What statement about controlling access to folders and files is accurate? -permissions refer to the tasks an account is allowed to do in the system -account configuration should keep in mind the principle of highest privilege -rights are assigned to accounts -in Windows, accounts have no rights assignments until you configure them
rights are assigned to accounts
What user account is known as the system administrator or super user account? root sysadmin admin super
root
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm
rootkit
The System Restore utility can be started from command line using what executable? msconfig.exe sfc.exe services.msc rstrui.exe
rstrui.exe
What commands are used by the USMT software? (Choose all that apply.) imagecopy scanstate loadstate imagestate
scanstate loadstate
What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender Bootlocker
secure boot
What type of virtualization should you deploy to provide a Virtual Desktop Infrastructure? server-side client-side fat-client type-2
server-side
A major update release on Windows is referred to by what term? system release update pack security release service pack
service pack
What console can be used to enable, disable, start, or stop a service? msconfig services.msc devmanage.msc taskmgr
services.msc
What is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started? kernel device driver setup UEFI/BIOS system drive
setup UEFI/BIOS
If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files? chkdsk /scannow sfc /scannow sfc /r chkdsk /r
sfc /scannow
What should be entered at a command prompt in order to scan all system files? msinfo32 /verify systeminfo /sysfiles sfc /scannow chkdsk /r
sfc /scannow
the portion of an OS that relates to the user and to applications
shell
A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering
shoulder surfing
Apps that offer continuous real-time updates on the Windows 8 modern interface are referred to by what term? Aero App multitasking side-by-side apps app tiling
side-by-side apps
What term is used to describe the unused space at the end of the last cluster? zero slack void null
slack
What two terms describe a power saving mode in windows that saves the current running state including open files to memory and then shuts down, while keeping memory powered? hibernation mode sleep mode half-awake mode suspend mode
sleep mode suspend mode
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM
smart card
What is the term given to the individual tools in a console? consoles add-ins snap-ins views
snap-ins
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows startup process? F8 spacebar F5 Enter
spacebar
a copy of an entire hard drive that includes the Windows OS, drivers, and applications that are standard to all the computers that might use that copy
standard image
What terms refer to directories that exist under the root directory? subdirectories child directories folders containers
subdirectories child directories folders
When using Mac OS X, what gesture can be used to show the Launchpad? secondary click pinch swipe slide
swipe
contains instructions for running essential hardware devices before an operating system is started
system BIOS
In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system is stored, respectively? primary partition logical partition system partition boot partition
system partition boot partition
What GUI element is usually on the right side of the taskbar and displays open services? status tray display area system tray identification area
system tray
What is another name for the notification area in Windows? system tray taskbar Control Panel Start Menu
system tray
Can give you a quick look at what hardware and software is installed
system window
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking
tailgating
What part of the Windows display shows information about open programs and provides quick access to others? Aero Snap taskbar notification area properties
taskbar
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard
the BIOS
What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device
the device has been jailbroken
When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure
the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols
When using Group Policy to configure QoS, what options are available? (Choose all that apply.) -the priority is a number from 0 to 63 -outbound traffic can be throttled -you must choose a specific application to apply the policy -you can choose the protocol (either IP or ICMP) for the policy
the priority is a number from 0 to 63 outbound traffic can be throttled
What events can occur during BootMgr's role in startup? (Choose all that apply.) -POST is performed -MBR program searches for partition table -the settings in the BCD are read -Dual-boot menu is displayed
the settings in the BCD are read Dual-boot menu is displayed
What statement regarding Type 1 hypervisors is accurate? -they are typically used on desktops and laptops -the VirtualBox software is an example -they are called bare-metal hypervisors -they install as an application
they are called bare-metal hypervisors
If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used? thick provisioning thin provisioning explicit zeroing implicit zeroing
thin provisioning
What is defined as a record of a call for help with a computer problem? token tracker online help database expert system ticket
ticket
What is a valid reason for wanting to configure a proxy server in Internet Explorer? -to increase the security of the connection -to connect to secured websites on a corporate network VPN -to improve website performance -to surf anonymously
to connect to secured websites on a corporate network VPN
an installation that does not require a technician to respond to prompts by the setup program
unattended installation
What are two methods that can be used to free up disk space on a hard drive? -Format the hard drive -Delete the Windows/System directory -Uninstall software you no longer use -Use drive compression
uninstall software you no longer use use drive compression
What can you do if you suspect an application requires more privileges than the currently logged-on account? -run the application from the command line using the /highpriority parameter -use the Run as administrator shortcut menu option -double-click the application icon while holding down the Home key -download a 64-bit version of the application and try it again
use the Run as administrator shortcut menu option
Shell subsystems that have only a limited access to system information and can access hardware only through other OS services are operating in what mode? process mode elevated privilege mode user mode kernel mode
user mode
a command that provides encryption options and hard link management within USMT
usmtutils
What is it called when software is used to simulate the hardware of a physical computer? dual boot Windows XP mode virtual machine compatibility mode
virtual machine
software that simulates the hardware of a physical computer
virtual machine
What is Pagefile.sys used for in Windows? system file storage to store E-books video RAM virtual memory
virtual memory
used to enhance the amount of RAM in a system
virtual memory
What is the name for a partition that has been formatted and assigned a drive letter? partition root volume container
volume
Which of the following are true about NTFS permissions? (Choose all that apply.) -inherited permissions override explicit permissions -when a subfolder is created, it is assigned the permissions of its parent folder -it is not possible to change the owner of a file -if NTFS permissions conflict locally, the more liberal permission applies
when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies
What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI? winload.exe winresume.exe winwake.efi winresume.efi
winresume.exe winresume.efi
What command can be issued within Windows RE to enable networking? ifconfig start netconf load wpeinit netsh if up
wpeinit
What terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server? (Choose all that apply.) thick client zero client dumb terminal ultra-thin client
zero client dumb terminal ultra-thin client