Job Interview - Kenexa Prove It! - Technical Support - IT/Network - Robert Half Technology

Ace your homework & exams now with Quizwiz!

Which of the following commands will enable the admin account? A. Net user administrator /active:yes B. Net user administrator /active C. Net user administrator /enable:yes D. Net user administrator /enable

A. Net user administrator /active:yes (Enable the Built-in Administrator Account)

Which of the following is the best way to uninstall software from a machine using Windows 10? A Restore the operating system to a time before the program was installed. B Delete the program shortcut from the menu and the program folder from the hard drive. Once that is done, search for and delete any reference(s) found in the Registry. C Go to Settings > System > Apps and Features and then select Uninstall. D Boot into 'Safe Mode' and change the name of the program folder.

C Go to Settings > System > Apps and Features and then select Uninstall.

Which of the following programs exists in a base installation Windows 98, but not Windows XP. Winipcfg.exe Telnet.exe Cmd.exe Ping.exe Tracert.exe

winipcfg.exe Winipcfg.exe was included as part of the standard Windows installation up to Windows ME. When Windows XP came out, winipcfg was replaced by two methods

How do you zap PRAM on a MAC desktop? A. On boot, press and hold the Command and Option and P and R keys all together. Continue holding until you've heard a series of three chimes. B. On boot, press and hold the Command and P and R keys all together. Continue holding until you've heard a series of three chimes. C. On boot, press and hold the Command and P keys together. Continue holding until the desktop appears. D. None of the above

A. On boot, press and hold the Command and Option and P and R keys all together. Continue holding until you've heard a series of three chimes.

In which of the following locations will you find a log of error messages related to Active Directory. (Please select the best possible answer A. The Event Viewer - System Log B. The Event Viewer - Directory Services Log C. The Active Directory Events and Logs tool D. The Computer Management tool

A. The Event Viewer - System Log

Which of the following can a POST code card be used to troubleshoot? A. Video cards B. Hard drives C. Motherboards D. Operating systems

A. Video cards These troubleshooting tools can usually find problems with the BIOS, video, CPU, hard drive controllers (not the hard drive itself) among other components. Power supply Memory (RAM) Video card failure

The optimum size for the Maximum Transmission Unit (MTU) for an Ethernet would be..... A. a size equal to 1500 bytes B. the smallest possible size that works. C. the maximum size available D. A and C E. All of the above

A. a size equal to 1500 bytes

If you can't load a Web page by entering the URL address but the page can be loaded by entering the Web server's IP address, you can conclude that... A. there is a name resolution issue B. there is an IP routing issue C. the default gateway is not working properly. D. this Web site only works with a static IP address.

A. there is a name resolution issue

As you are walking down the hallway to help an important client with a trouble ticket they submitted, one of your coworkers rushes up to you and begs you to help them install some software on their computer. The appropriate answer is: "Be right there!" "Do you have a license for me to install the software?" "I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP." "Can this wait until tomorrow? I'm very busy right now." "As soon as I help Mr/s. X I'll be right with you!"

"I'm sorry, but I'm on my way to help out Mr/s. X. If you put in a ticket, I'll be sure to look for it when I'm done and get to you ASAP."

.

.

Questions Correct: 31 out of 39 Percent Correct: 79%

8 of the answers are incorrect

Which of the following indicates the difference between a thread and a computer process? A A process is an instance of a computer program while a thread is several executable programs that work together as a single process. B A process is an instance of a computer program while a thread is the connection used by that program to the data sources. C A process is several applications instantiated on a computer system while a thread is several programs that operate in tandem and mimic a single program for task purposes. D A computer process is a series of threads, which is just a method of utilizing multiple CPUs.

A A process is an instance of a computer program while a thread is several executable programs that work together as a single process. PROCESS (your whole program) : is an executing instance of an application . They run in separate memory space unlike threads THREAD (independent task withing a program) : are path of execution within a process . Threads within the same process runs in a shared memory space .

Which of the following tools is used to help troubleshoot startup issues with Windows? A msconfig B ipconfig C systeminfo D sfc

A msconfig MSConfig (officially called System Configuration in Windows Vista, Windows 7, Windows 8 or Windows 10 Microsoft System Configuration Utility in previous operating systems) is a system utility to troubleshoot the Microsoft Windows startup process. The IPConfig command line utility will show detailed information about the network you are connected to. It also helps with reconfiguration of your IP address through release and renew. SFC System File Checker is a utility in Microsoft Windows that allows users to scan for and restore corruptions in Windows system files.

When a Windows application is not functioning correctly, such as freezing intermittently or displaying odd behavior, the first step one should try is... A. ... to save the current work and restart the application B. ...to close all other programs and wait for the system to restabilize C. ...to close all programs and defrag the hard drive D. ...to scan for viruses and malware

A. ... to save the current work and restart the application

What IP address is commonly known as the "loopback" address? A. 127.0.0.1 B. 10.0.0.127 C. 255.255.255.0 D. 255.255.0.127

A. 127.0.0.1

A user is on a PC running Windows 7. She has been using the current OS install for a while and complains that the system is incredibly slow and unstable, freezing and crashing frequently. You've done some analysis and you haven't discovered any hardware failures. The OS has been updated regularly and it's running the latest updates. You verify that the system does freeze up and crash frequently. Your manager has given you one day to resolve her performance issues before she takes the system out of town on business for two weeks. Which of the following is the best option to make sure this performance issues gets resolved? A. Backup all data, wipe the hard drive and do a clean install. Once that is done, update the OS and restore the data. B. Use third-party Registry cleaner to remove all of the dead Registry entries that may hamper performance. C. Ran defrag and scandisk multiple times to clean up the hard drive. D. Run application to remove the spyware that has accumulated.

A. Backup all data, wipe the hard drive and do a clean install. Once that is done, update the OS and restore the data.

You realize that you've scheduled two users' visits at the same time, causing a time conflict. Which is the best way to resolve the issue? A. Call one of the clients and apologize and reschedule with them. B. Email each client to reschedule. C. Got to the first scheduled appointment, then the other immediately following the first. D. Do not go to the second scheduled appointment.

A. Call one of the clients and apologize and reschedule with them.

Which of the following indicates how a corrupted Winsock should be corrected in Windows? A Delete the Winsock registry entries and restart Windows. B Use the "netsh winsock reset catalog" command. C Reboot the system and that will fix the issue. D Reinstall Internet Explorer and the system will automatically correct the issue.

B Use the "netsh winsock reset catalog" command. The command above, will reset winsock catalog back to default setting or clean state. You can try this if you are having following Internet access or networking problems but still failing to resolve the problem after trying all other suggestions

Which of the following command-line tools is used to partition a hard drive? A defrag B fdisk C format D scandisk

B fdisk The Fdisk tool is an MS-DOS-based tool that you can use to prepare (partition) a hard disk. Microsoft ScanDisk (also called ScanDisk), is a diagnostic utility included in MS-DOS and Windows 9x. It checks and repairs file systems errors on a disk drive.

You aren't able to use the Windows GUI to navigate to a particular network share. From the command line, you can still map the shared folders to a network drive using which of the following? A map config \\server\shared_folder B net use * \\server\shared_folder C mountvol \\server\shared_folder /add D route \\server\shared_folder

B net use * \\server\shared_folder

On a MAC workstation, to boot from another hard drive or USB flash device you... A. ... hold down the Command key while the machine is starting up. B. ... hold down the Option key while the machine is starting up. C. ...hold down the Shift key while the machine is starting up. D. ...hold down the Command + Shift key while the machine is starting up.

B. ... hold down the Option key while the machine is starting up.

A user working from a remote office is having problems with her VPN connection. What's the first question you should her about her connection? A. Has your network password changed recently? B. Can you connect to the internet? C. Are you able to print? D. Have you tried calling your ISP provider?

B. Can you connect to the internet?

In technology, API usually stands for Application Programming Interface Academic Performance Index Acquisition Program Integration Apple Learning Interchange Arithmetic Polynomial Interpolation

Application Programming Interface In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software. In general terms, it is a set of clearly defined methods of communication between various software components.

When troubleshooting IP connectivity and routing issues, it's important to... A ...disable the firewall. B ...always boot into Safe Mode. C ...restore the BIOS default settings before proceeding. D ...exit all applications shown on the Task Bar.

B ...always boot into Safe Mode. Safe Mode is a special way for Windows to load when there is a system-critical problem that interferes with the normal operation of Windows. The purpose of Safe Mode is to allow you to troubleshoot Windows and try to determine what is causing it to not function correctly. Safe mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. In Windows, safe mode only allows essential system programs and services to start up at boot. Safe mode is intended to help fix most, if not all problems within an operating system. It is also widely used for removing rogue security software.

A PC using a sound card no longer puts out sound through the speakers. You check the connections and the speakers work fine on another computer. The system volume is not muted and is set to the appropriate level. You check the sound card in the Device Manager and see a yellow triangle with an exclamation point. You uninstall the device and reboot so that plug-n-play can reinstall the driver. When you check the item in the Device Manager again, the yellow triangle remains. This tells you... A ...that this computer was never able to output sound, regardless of what the user claims. B ...that there is a hardware resource conflict. C ...that there is not enough memory available to run the sound card. D ...that the sound card is missing an output port.

B ...that there is a hardware resource conflict.

Which of the following indicates the major difference between NTFS (New Technology File System) or FAT (File Allocation Table) on a local server? A FAT32 has better security for Domain and local users. B NTFS has better security for Domain and local users. C FAT32 provides better performance. D NTFS provides better performance.

B NTFS has better security for Domain and local users. NTFS has several improvements over FAT such as improved support for metadata and the use of advanced data structures for reliability, and disk space utilization, plus additional extensions such as security access control lists and file system journaling. Fault Tolerance: NTFS maintains a log of disk changes and in case of power failure or abrupt errors it repairs the files and folders automatically without the user being notified anything. FAT32 maintains two different copies of the file allocation table and uses a back up mechanism if some damage occurs. Security: In FAT32 you will have to depend on share permissions for security. This means that they are good in the Network but locally they are vulnerable. On the other hand NTFS allows you to set permissions on local files and folders as well. Compression: FAT32 offers no compression feature whatsoever. While NTFS lets you compress files and folders individually so that you do not have to slow down the system by depending on partition compressions. Conversion: You may easily convert a FAT32 system to NTFS. But the reverse is not true because NTFS follows a secure protocol.

The letters from the word ACT can be arranged to spell out 6 different three-letter combinations: ACT, ATC. CAT, CTA, TAC. TCA. The letters from the word: "BOB" can be arranged to spell 3 different three letter combinations: BBO, BOB, OBB. How many different four letter combinations can be made from the letters in the word "NOON"? A. 4 B. 6 C. 8 D. 10 E. 12

B. 6

All Windows XP drivers can be used with Windows 7 if Windows 7 drivers are not available. A. True B. False

B. False

How do you boot a MAC desktop into single user mode? A. On boot up press and hold the S key. B. On boot up press and hold Command and S keys together. C. On boot up press and hold Control and S keys together. D. On a MAC it's not possible to boot into single user mode.

B. On boot up press and hold Command and S keys together.

What do registers provide for the CPU? A. Register determine the clock speed B. Registers are used for temporary storage of internal commands and data C. Registers enable the CPU to address RAM. D. Registers enable the CPU to control the address bus.

B. Registers are used for temporary storage of internal commands and data

In a Windows 7 environment there's a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP. You need to display information about client connectivity to the WAP. What should you do? A. User Event Viewer to view the events from a source of WlannConn. B. User Event Viewer to view events from a source of WLAN AutoConfig. C. Use auditpol.exe to enable failed attempts in the object Access category. D. Use auditpol.exe to enable successful attempts in the Object Access category.

B. User Event Viewer to view events from a source of WLAN AutoConfig.

MAC address refers to... A. a standard code used to identify physical layer types. B. a hardware address that uniquely identifies network nodes. C. a hard-coded constant used to specific programming purposes. D. a unique number dynamically assigned to participating network devices.

B. a hardware address that uniquely identifies network nodes.

You are trying to tune a network for maximum performance when doing file transfers from a PC. You telnet into routers and switches and enter values for the MTU parameter. You should always be aware that for a given network segment, MTU size is ultimately controlled by... A ...the negotiation between the client and the server. B ...the ICMP messages generated by the switch or router. C ...the MTU size configured on the switch or router. D ...the MaxMTU string-value found in the Windows Registry key for the network adapter.

C ...the MTU size configured on the switch or router. The default maximum transmission unit (MTU) size for frames received and transmitted on all interfaces on the switch is 1500 bytes. You can increase the MTU size for all interfaces that operate at 10 or 100 Mbps with the system mtu global configuration command.

You boot up a Windows system on a company network and find that the PC can't see the network. When you check the IP address, it shows the address as 169.254.235.45. This means that... A ...the IP was mapped by Network Address Translation. B ...the IP was dynamically assigned. C ...this PC wasn't configured by the DHCP server. D ...the DNS server was down.

C ...this PC wasn't configured by the DHCP server. This type of IP address is sometimes referred to as a link local address. It is used by computers when they do not have an address that was manually configured or the computer was not told what address to use on that network. However, in practice, these auto-configured addresses tend to do more harm than good, particularly in SOHO networks. Receiving an IP outside of the expected subnet carries more potential for confusion and frustration for end users than does receiving no IP at all. The 169.254.x.x range of IP addresses is reserved by Microsoft for private network addressing. If you have a pc set to automatically obtain an IP and you recieve one of these addresses, windows has assigned this because it cannot find a DHCP server within the network subnet. Check to make sure your DHCP server is functioning correctly. If you do not have a DHCP server, you will need to manually set an IP configuration.

Which of the following command-line tools can be used to restore the TCP/IP stack to a default status without taking the time to completely remove, reboot, and reinstall? A netdiag B netstat C netsh D ipconfig

C netsh netsh winsock reset is useful command that you can use in Microsoft Windows to reset winsock catalog back to default setting or clean state. You can try this if you are having following Internet access or networking problems but still failing to resolve the problem after trying all other suggestions. Netstat (Network Statistics) displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is an important part of the Network + exam but it's a helpful tool in finding problems and determining the amount of traffic on the network as a performance measurement. The IPConfig command line utility will show detailed information about the network you are connected to. It also helps with reconfiguration of your IP address through release and renew.

Which of the following indicates the purpose of IntelliMirror? A It keeps a complete set of server settings in a backup repository. B It logs incremental changes to the server and all its parameters. C It reconciles desktop settings, applications and stored files for users moving between workstations or offline. D A and B E All of the above

C It reconciles desktop settings, applications and stored files for users moving between workstations or offline. The technology behind the IntelliMirror technologies assists with managing user and computer information, settings, and applications. IntelliMirror uses Active Directory and Group Policy to provide policy-based management of users' desktops through a centrally defined policy that is based on users' business roles, group memberships, and locations. You can configure Windows 2000-based desktops to meet a new user's requirements each time that user logs on to the network.

Which of the following commands reveals a current or recent connection from another PC on the same LAN? A nbtstat -s B netsh winsock show catalog C netstat -s D route print

C netstat -s Netstat (Network Statistics) displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is an important part of the Network + exam but it's a helpful tool in finding problems and determining the amount of traffic on the network as a performance measurement. netsh winsock show catalog (If you want to see a list of all Winsock 2 LSPs installed on a Windows system) This command resets the Winsock catalog to the default configuration. This can be useful if a malformed LSP is installed that results in loss of network connectivity. While use of this command can restore network connectivity, it should be used with care because any previously-installed LSPs will need to be re-installed. Nbtstat (NetBios over TCP/IP) enables you to check information about NetBios names.It helps us view the NetBios name cache (nbtstat -c) which shows the NetBios names and the corresponding IP address that has been resolved (nbtstat -r) by a particular host as well as the names that have been registered by the local system (nbtstat -n).

A user reports that when he addresses and email in Outlook the drop down list of potential email addresses which use to appear is no longer showing up. He's referring to the A. ...global address list. B. ...field chooser. C. ...autocomplete file. D. ...email address.

C. ...autocomplete file.

In the Windows DNS server, which of the following describes the Stub Zone? A. This is were the normal DNS file is saved in text format. B. The Stub Zone maintains a read only copy of the zone database on a second DNS server C. It stores a copy of the name and SOA records speeding up DNS search orders. D. A and B E. All of the above

C. It stores a copy of the name and SOA records speeding up DNS search orders. A stub zone is a copy of a zone that contains only those resource records that are necessary to identify the authoritative Domain Name System (DNS) servers for that zone. Typically, you use a stub zone to resolve names between separate DNS namespaces.

You're upgrading the memory on a user's desktop. You've installed two (2) 2GIG DIMMS, but when you power on the desktop, the POST shows 2GB of RAM. What steps do you take next? A. Update the manufacturer's chipset drivers B. Replace the two 2GB DIMM's with for 1 GB DIMM's. C. Update the PC Bios and verify all memory is seen in POST. D. Replace both of the 2GB DIMM memory with new memory.

C. Update the PC Bios and verify all memory is seen in POST.

Which of the following is the best way to uninstall software from a machine using Windows 7? A. Restore the operating system to a time before the program was installed. B. Delete the program shortcut from the menu and the program folder from the hard drive. Once that is done, search for and delete any reference(s) found in the Registry. C. Use the Program and Features option found in the Control Panel to uninstall the program D. Boot into 'Safe Mode" and change the name of the program folder.

C. Use the Program and Features option found in the Control Panel to uninstall the program The wrong way is to just delete the program folder or icon. This leave behind large amount of configuration information in the windows registry.

A PC that you are investigating has an IP address of 10.1.1.23. Without any further information, which conculusion can be drawn from this IP address assignment? A. This is a LINKLOCAL network address assisnged by Automatic Private IP Addressing. B. The PC must be part of an enterprise level network. C. The IP address was statically assigned. D. The PC is a LAN client not connected directly to the Internet.

D. The PC is a LAN client not connected directly to the Internet.

A PC that you are investigating has an IP address of 10.1.1.23. Without any further information, which of the following can you conclude from this IP address assignment? A. This is a LINKLOCAL network address assigned by Automatic Private IP Addressing. B. The PC must be part of an enterprise level network. C. The IP address was statically assigned D. The PC is a LAN client not connected directly to the Internet.

D. The PC is a LAN client not connected directly to the Internet.

A Windows PC freezes upon startup and never reaches the Desktop. The system can be restarted in Safe Mode successfully. A reasonable assumption based on this information is that... A ...the problem is with the hard drive. B ...booting into 'Safe Mode' corrected the problem. C ...it must be a network driver issue. D ...it is a software issue affecting the operating system.

D ...it is a software issue affecting the operating system.

A series of short beeps are heard when you attempt to boot a PC. The system fails to boot and never displays POST messages on the monitor. This usually means that... A ...the hard drive is bad. B ...the CMOS battery is missing. C ...the power supply is faulty. D ...there is a problem with the video, memory, or the CPU.

D ...there is a problem with the video, memory, or the CPU.

"Tattooing the Registry" means that... A ...a user can modify and view user preferences not stored in the maintained portions of the Registry. B ...when group policy is changed, user preference will still persist. C ...a permanent set of values for the registry can be copied to corrupted machines to solve registry corruption issues. D A and B E All of the above

D A and B ...a user can modify and view user preferences not stored in the maintained portions of the Registry. ...when group policy is changed, user preference will still persist. Answer: The term means user can modify and view user preference that are not stored in the maintained portions of the Registry. Even if the group policy is changed or removed, the user preference will still persist in the registry. Tattooing was the effect that you saw whenever you applied a registry policy to a computer or user and then removed that policy file. Even though the policy file was gone, those registry values that were set by the policy remained-tattooed into the registry until you explicitly removed them, either by setting the policy to the opposite value or manually going in and deleting the registry values.

Which of the following query types does DNS utilize? A Iterative Query B Incremental Query C Recursive Query D A and C E B and C

D A and C A Iterative Query C Recursive Query With a recursive name query , the DNS client requires that the DNS server respond to the client with either the requested resource record or an error message stating that the record or domain name does not exist. The DNS server cannot just refer the DNS client to a different DNS server. Thus, if a DNS server does not have the requested information when it receives a recursive query, it queries other servers until it gets the information, or until the name query fails. Recursive name queries are generally made by a DNS client to a DNS server, or by a DNS server that is configured to pass unresolved name queries to another DNS server, in the case of a DNS server configured to use a forwarder. An iterative name query is one in which a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data. If the queried DNS server does not have an exact match for the queried name, the best possible information it can return is a referral (that is, a pointer to a DNS server authoritative for a lower level of the domain namespace). The DNS client can then query the DNS server for which it obtained a referral. It continues this process until it locates a DNS server that is authoritative for the queried name, or until an error or time-out condition is met.

Which of the following is required when TCP/IP is configured on Windows Server for an IPv4 client? A FTP Port B IP Address C Subnet Mask D B and C E All of the above

D B and C B IP Address C Subnet Mask

Which of the following command line utilities can be used to check TCP/IP configurations and IP connectivity? A tracert B ipconfig C ping D B and C E All of the above

D B and C B ipconfig C ping Tracert is very similar to Ping, except that Tracert identifies pathways taken along each hop, rather than the time it takes for each packet to return (ping). PING utility tests connectivity between two hosts. PING uses a special protocol called the Internet Control Message Protocol (ICMP) to determine whether the remote machine (website, server, etc.) can receive the test packet and reply.Also a great way to verify whether you have TCP/IP installed and your Network Card is working. The IPConfig command line utility will show detailed information about the network you are connected to. It also helps with reconfiguration of your IP address through release and renew.

A user is emailing documents to his personal account so that he can work on them from home. He calls in for assistance because instead of receiving the documents he attempted to send, he has attachments with the filename "winmail.dat". Each attempt produces the same result. At work his email client is MS Outlook and at home he is using Outlook Express. Which of the following possible resolutions will fix this issue? A Have him use the security options to block the receipt of attachments. B Have him do an online update for Outlook Express. C Have him use a different email client at home like Gmail. D Change the options within MS Outlook from "Rich Text" to "Plain Text."

D Change the options within MS Outlook from "Rich Text" to "Plain Text." The Winmail.dat file is used to preserve Rich Text formatting. Outlook uses it when sending a Rich Text-formatted message. During transport, the content of the message may be changed, preventing the receiving client from being able to read the formatting instructions. In other cases, the receiving client does not use or recognize the winmail.dat file.

Which of the following tools allows you to see what programs and processes are running? A Device Manager B Microsoft Management Console C Disk Manager D Task Manager

D Task Manager

When assessing a service call/service ticket request, which of the following is the first step in determining how to approach the problem? A Whether the issue is a hardware, software, or user-training problem. B What work-around the user can rely on to keep going. C Whether the issue is something that you can fix. D What the user was doing before the issue occurred.

D What the user was doing before the issue occurred.

Which of the following tools can be used to display the current TCP/IP network configuration values? A nslookup B netstat C nbtstat D ipconfig

D ipconfig - will give a quick view of you IP address, your subnet mask and default gateway. NSLookup NSLookup provides a command-line utility for diagnosing DNS problems. In its most basic usage, NSLookup returns the IP address with the matching host name. Netstat (Network Statistics) displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is an important part of the Network + exam but it's a helpful tool in finding problems and determining the amount of traffic on the network as a performance measurement. Nbtstat (NetBios over TCP/IP) enables you to check information about NetBios names.It helps us view the NetBios name cache (nbtstat -c) which shows the NetBios names and the corresponding IP address that has been resolved (nbtstat -r) by a particular host as well as the names that have been registered by the local system (nbtstat -n). The IPConfig command line utility will show detailed information about the network you are connected to. It also helps with reconfiguration of your IP address through release and renew.

Computers on a LAN can have their network configurations automatically set by a... A. ...DNS Server. B. ...HOST file. C. ...IIS. D. ...DHCP server.

D. ...DHCP server.

For an IP address, the network component and the host component are distinguished by the... A. ...script maker. B. ...process ID. C. ...group ID. D. ...subnet mask.

D. ...subnet mask.

If there is no connectivity between a source and destination, the first problematic area along the path can be revealed through use of ... A. ...nslookup. B. ...ping. C. ...show path. D. ...tracert (or traceroute).

D. ...tracert (or traceroute). Tracert identifies pathways taken along each hop, rather than the time it takes for each packet to return (ping). NSLookup NSLookup provides a command-line utility for diagnosing DNS problems. In its most basic usage, NSLookup returns the IP address with the matching host name. PING utility tests connectivity between two hosts. PING uses a special protocol called the Internet Control Message Protocol (ICMP) to determine whether the remote machine (website, server, etc.) can receive the test packet and reply.Also a great way to verify whether you have TCP/IP installed and your Network Card is working.

When attempting to troubleshoot a problematic software install, which of the following should you be concerned with? A. You should make sure the screen saver is disabled. B. You should close extra programs running in the background. C. You should temporarily disable any anti-virus programs. D. A and B E. All of the Above

D. A and B A. You should make sure the screen saver is disabled. B. You should close extra programs running in the background.

When adding a patch to any Windows operating system, which of the following should you consider? A. You should consider whether the system really needs the patch. B. You should consider whether the patch will cause issues to the current hardware setup C. You should consider which patches/service packs have already been installed D. All of the above

D. All of the above

You've enabled a "white list filter" feature so that only the PCs added to this list can access a particular router. The list only accepts the network adapter's MAC address. Which of the following is a way you can determine the MAC addresses of the client PCs without making a specific trip to each individual console to get the information? A. tracert (remote computer name) B. run ipconfig/displaydns C. use netsh show helper D. ping the PCs then check the local arp table

D. ping the PCs then check the local arp table Tracert is very similar to Ping, except that Tracert identifies pathways taken along each hop, rather than the time it takes for each packet to return (ping). ARP utility helps diagnose problems associated with the Address Resolution Protocol (ARP). TCP/IP hosts use ARP to determine the physical (MAC) address that corresponds with a specific IP address. Type arp with the - a option to display IP addresses that have been resolved to MAC addresses recently. PING utility tests connectivity between two hosts. PING uses a special protocol called the Internet Control Message Protocol (ICMP) to determine whether the remote machine (website, server, etc.) can receive the test packet and reply.Also a great way to verify whether you have TCP/IP installed and your Network Card is working.

Which of the following will configure the DHCP Server so that it allocates the same IP address to certain devices each time the address is removed? A Assign a "sticky" IP address to the devices. B Use the MAC address of the device to create a reservation. C Implement static IP addressing. D A and C E All of the above

E All of the above A Assign a "sticky" IP address to the devices. B Use the MAC address of the device to create a reservation. C Implement static IP addressing.

It is possible to connect Active Directory to third-party directory services by... A ...using the built-in process provided by Active Directory, which can connect to any service. B ...using only Microsoft communication protocols. C ...using dirXML or LDAP. D A and B E All of the above

E All of the above ...using dirXML or LDAP. NDS (Novel directory System) ...using only Microsoft communication protocols. MIIS (Microsoft Identity Integration Server) ...using the built-in process provided by Active Directory, which can connect to any service. SAP or Domino

Select the fastest latency for a network ping A. 1000ms B. 500ms C. 250ms D. 100ms E. 60ms

E. 60ms

A computer's operating system (OS) performs all of the following functions except: Accessing data storage devices Executing compiled programs Managing memory Editing sound files

Editing sound files

If you don't know the answer or solution to a technical question or problem, your first resource should be the person in the office next to you. True False

False

In technology, GPL usually stands for General Protection Layer Gallant Production Level Gerand Porcine Logic Gnu Public License Gel Padded Lathe

Gnu Public License The GNU General Public License (GNU GPL or GPL) is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.

While trying to uninstall a large piece of software, the uninstaller crashes and the computer reboots. Please describe the process you would use to finish removing the software.

I would go back into Windows and retry a second time to remove the program with Windows "Program and Feature" and uninstall from there. If successful, I would restart the computer. If unsuccessful I would then use a third-party uninstaller (eg. Revo Uninstaller, CCleaner) to attempt to remove the program. Once it was done I would use go to the command prompt and type regedit.exe. I would search through the registry manually to search entries of such program. To simplify and expedite the search I would use a third-party program (eg. RegScanner) to perform a search. I will have to make sure I back up the registry before deleting any entries. Finally I would restart the computer and do a manually search to see if there are any leftover traces of the program. If there are still traces, I would consider that the program might be a malware. So I would restart in safe mode and use malware removal software (eg. MalwareBytes, BitDefender).

If, while trying to run a new software title, you get the error message "Access Denied" and the program fails to launch, where would you look for the problem? In the flash drive In the device drivers In the integrity of the resident memory In the file permissions In the user's profile

In the file permissions

How would you install an operating system on more than 30 computers? Use as much detail as possible.

There are two ways you can install an OS to multiple computers. I would use the first method if there was NO network connectivity. I would install the OS and all the drivers into one computer (this may take about an hour or more). Next I would use a third-party software (eg. Norton Ghost, Symantec Ghost) to create an image of the computer I want to copy. Then I would burn about 10 physical CDs of the ghost image. Finally I would use the 10 CDs to physically upload the OS to each computer, switching out the CDs as they finish. Usually it takes about 5-10 minutes to restore from a ghost image. The second method is to distribute the OS through a network. I will have to install Windows Server 2012/2016 on a server, insuring it has AD, DHCP, and DNS already installed. I will have to create a partition on the server were I will keep my OS images, it must be NTFS formatted. Then I will add the Windows Deployment Services role on the server. Once it is installed I will have to specify where the boot and installation images will be kept. I will use the WDS wizard to add the boot and install image. From a separate computer I will need to create an image first; it needs to be a physical computer that has all the operating system, all the applications and configurations I want on it. Next I will run the sysprep.exe from the command prompt and follow the GUI wizard. After the computer reboots, F12, it will boot from PXE and I will select the capture option; choosing where to store the file (into the server). Then I will have to enable all the BIOS of every PC so they can boot from NIC. They should have network bootable network cards. Finally I will boot all the PCs and press F12 so the machines will boot via the network. After a while the operating system should be up and running. I will have to insure this is done after office hours since it will be using network bandwidth.


Related study sets

Wood Construcon Module Quiz- FIRE 4

View Set

CRIMINAL PROCEDURE - 5TH AMENDMENT

View Set

chapter 10 mastering biology hwk

View Set

Smartbook Recharge Chapter 14 ACCT 405

View Set