Software Support

Ace your homework & exams now with Quizwiz!

c

Question 8 1 / 1 point What is the maximum character limit for file names in Windows? 8 218 255 400

c

Question 1 0 / 1 point You want a computer to receive automatic updates to Microsoft Office. Which tool does this for you? Windows update System update Microsoft update None of the above

c

Question 1 1 / 1 point A netboot - booting the OS from the network - can be done with Windows 8 using which of the following? Windows Bitlocker Windows On the Go Microsoft Desktop Virtualization Windows Solutions

a

Question 1 1 / 1 point In Windows, which file is used as the swap file? PAGEFILE.SYS WINDOWS.OLD SYSTEM32 TWAIN-32

c

Question 1 1 / 1 point What Linux command can be used to see the contents of a directory? pwd tell ls cd

b

Question 1 1 / 1 point What do most smart cards require the use of, just in case they are lost or stolen? Token PIN Certificate Ring

c

Question 1 1 / 1 point Which Windows 7 utility can identify spyware and unwanted software? Windows DNS Windows Security Lock Windows Defender Windows Hardening Tool

b

Question 1 1 / 1 point Which of the following is not an operating system commonly found on mobile devices? Android UNIX iOS Windows

b

Question 1 1 / 1 point Which port is used to transfer mail between mail servers on a network? 23 25 110 143

d

Question 1 What is the final step in the troubleshooting process? Identify the problem. Verify functionality. Establish a theory. Document findings.

a

Question 10 0 / 1 point The Security Center that existed in previous operating systems is known as what in Windows 7? Action Center Advanced Securoty Defender Performance Monitor

d

Question 10 1 / 1 point Using client-side virtualization, how many operating systems can be running on your computer at one time? Two Three Six Only limited by available resources

d

Question 10 1 / 1 point What term is used to refer to a mobile device's mirroring of data with a conventional computer? Duplication Backing up Backing up Synchronization

d

Question 10 1 / 1 point When the Autorun feature is enabled on a system, which file does it look for to find actions to execute? COMMAND.COM CONFIG.SYS AUTOEXEC.BAT AUTORUN.INF

c

Question 10 1 / 1 point Which Registry hive listed below is one of the root hives? HKEY_CONFIGURATION HKEY_SOFTWARE HKEY_LOCAL_MACHINE HKEY_MICROSOFT

d

Question 10 1 / 1 point Which of the following is the minimum graphics device, with WDDM driver, acceptable for Windows 8? DirectX 7 DirectX 8 DirectX 8.1 DirectX 9

c

Question 10 1 / 1 point Which part of the operating system can be described as extremely specific software written for the purpose of instructing the OS on how to access a piece of hardware? Source Application Driver Kernel

d

Question 10 Within Windows, the ______ tool allows you to register and unregister modules and controls for troubleshooting purposes. MSEdit MSConfig RegEdit RegSvr32

a

Question 2 1 / 1 point Hand scanners are examples of what type of security device? Biometric Multifactor Logistical Concentrated

b

Question 2 1 / 1 point Many Linux commands can be used with characters such as the asterisk (to mean all) and the question mark (to mean one). What are these characters known as? Decks Regular expressions Permissions NFCs

a

Question 2 1 / 1 point What can be done with open-source software that cannot be done with closed-source software? The code can be changed. It can be installed by the user. It can be updated by the user. It can be downloaded from the Internet.

c

Question 2 1 / 1 point Which cloud feature allows users to immediately get additional storage space as needed? Measured service Resource pooling Rapid elasticity Instant access

c

Question 2 1 / 1 point Which file attribute cannot be set on NTFS folders if encryption has been enabled? System Indexing Compression Hidden

d

Question 2 1 / 1 point Which of the following does Microsoft recommend be used to optimize Windows for SSD drives - reducing the number of write operations that Windows make? WinSSD.exe WinREP.exe WinBCK.exe WinSAT.exe

d

Question 2 1 / 1 point Which switch can you use with TASKLIST to see processes on a remote machine? /A /T /R /S

d

Question 2 1 / 1 point Within Windows, Remote ______ allows a friend or a technician to use an Internet connection to access your computer to provide help. Support Control Windows Assistance

b

Question 2 When a Windows program attempts to access a memory address which doesn't exist on the computer, what will occur? Ne errors will occur. General protection fault. Illegal operation Windows protection error.

a

Question 3 0 / 1 point Within an account policy, the Account Lockout Counter indicates how many wrong attempts are allowed before the account is locked. What is the default setting? 0 3 5 10

c

Question 3 1 / 1 point If a DHCP client is unable to reach a DHCP server, what will it do? Query the root DHCP server Configure itself with the address it last used Configure itself with an APIPA or link-local address It will not be able to use the network

c

Question 3 1 / 1 point Spyware differs from other malware in that it: copies itself to every available host sits dormant for a long period of time works on behalf of a third party all of the above

b

Question 3 1 / 1 point Where can you find applications for both Android and iOS devices? From websites run by the app developers From sources designed for the operating systems On discs purchased from retail outlets From the device's manufacturer

d

Question 3 1 / 1 point Which of the following shells is commonly used to run Linux utilities? rsh CMD PowerShell bash

c

Question 3 1 / 1 point Which of the following utilities replaced FDISK? MSINFO32 GDISK DISKPART FORMAT

c

Question 3 1 / 1 point Which utility can be used to change the attributes of a folder? FOLDER RIGHTS ATTRIB PREMISS

c

Question 3 1 / 1 point Which version of Windows 8 include Windows To Go (WTG) to be installed on any USB-bootable device? Ultimate Professional Enterprise Personal

b

Question 3 If Windows won't boot normally, you can reboot into ______ Mode. DOS Safe Restricted Protected

b

Question 4 0 / 1 point What is the maximum amount of RAM supported by Windows 7 Home Premium? 2GB 16GB 128GB 192GB

c

Question 4 1 / 1 point How often should you update your antivirus definitions? Once a year Once a month Once a week Antivirus definitions do not need to be updated.

b

Question 4 1 / 1 point In which directory do many of the system files reside? C:\SYSWOW64 C:\WINDOWS\SYSTEM32 C:\WINNT\SYSTEM C:\SHELL

a

Question 4 1 / 1 point What was the name of the Windows 8 interface when the operating system was first released? Metro Firenze Surface Dynamo

a

Question 4 1 / 1 point Which of the following networking utilities would perform, in Linux, functions similar to what ipconfig does in Windows? ifconfig mkdir show chown

c

Question 4 1 / 1 point Why do mobile devices use accelerometers and gyroscopes? For geographic positioning To replace magnetometer For screen orientation For more accurate caller ID

d

Question 4 1 / 1 point With Windows 8, which of the following is an area of the hard drive set aside to hold files that can be used to recover the operating system in the event of a failure? Remote Install Disk Sysprep Bootable Media Recovery Partition

b

Question 4 1 / 1 point Your company has decided to host its own website and maintain DNS on site. How many DNS servers are needed? One Two Three Depends on the network size

a

Question 4 Within the Windows environment, certain lockups are referred to as the Blue Screen of ______. Death Error Trouble Life

a

Question 5 1 / 1 point A _____ is different from a virus in that it can reproduce itself, it is self-contained, and it doesn't need a host application to transported. worm rootkit trojan bomb

a

Question 5 1 / 1 point Double clicking an item does what? Opens the item. Selects the item Closes the item. None of the above.

c

Question 5 1 / 1 point To use an analogy, ______ is to the OS X what Windows Explorer was to Windows 7. Dock Boot Camps Finder Spot light

d

Question 5 1 / 1 point What Windows 7 feature provides encryption for removable drives? ReadySafe ReadyBoost BitLocker BitLocker to Go

c

Question 5 1 / 1 point What is the name of the file on a DNS server that stores records? Hosts file LMHOSTS Zone file Internet file

b

Question 5 1 / 1 point What is the purpose of a magnetometer in a mobile device? To make the image on the screen turn sideways when the device is oriented that way To orient the device using the earth's magnetic field To allow in proximity charging To enable near field communication (NFC)

d

Question 5 1 / 1 point Which XCOPY switch copies only files that already exist in the destination? /F /H /D /U

c

Question 5 1 / 1 point Which of the following operations in the Windows Recovery Environment will reinstall Windows and delete all but the default apps? Refreshing Restoring Resetting All of the above

a

Question 5 To access Safe Mode during boot, press which key? F8 F12 Del Alt

c

Question 6 0 / 1 point XPM is a virtual client emulating Windows XP running which Service Pack? None 1 3 5

d

Question 6 1 / 1 point Screen sharing with the built in features of Mac OS X require a _____ connection. IMAP4 POP3 WebCT VNC

b

Question 6 1 / 1 point Social ________ is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. networking engineering assailing pinging

a

Question 6 1 / 1 point The CHKDSK option that attempts to fix any errors it finds is: /F /E /S /O

d

Question 6 1 / 1 point What is the minimum memory requirement for the 64-bit version of Windows 8? 128MB 256MB 1GB 2GB

d

Question 6 1 / 1 point What port number does SMTP with SSL use? 995 993 587 465

d

Question 6 1 / 1 point What type of device centralizes security management? IPS IDS Firewall UTM

c

Question 6 1 / 1 point With Windows 8, how many characters is the activation code? 16 20 25 30

c

Question 6 During the boot process, which file processes a file that resides in the root directory specifying what OSs are installed on the computer and where they reside on the disk? BOOTMGR.EXE BCD WINLOAD.EXE WINRESUME.EXE

a

Question 7 1 / 1 point A(n)____ point is a copy of your system configuration at a given point in time. restore backup mirror image

b

Question 7 1 / 1 point What Windows 7 feature adds touchscreen ability to the operating system? Gyro Touch Aero Float

a

Question 7 1 / 1 point What is the most reliable way to reduce the cost of connecting to the Internet on a mobile device? Turn off cellular data and connect to a Wi-Fi network Use a disposable phone Prepay for Internet time Change mobile carriers before your contract expires

d

Question 7 1 / 1 point What type of storage refers to a location away from the computer center where paper copies and backup media are kept? Duplicated Warm Cold Offsite

a

Question 7 1 / 1 point When an individual follows someone through a physical checkpoint - such as a door - so closely that they avoid having to authenticate, this is known as: Tailgating Shoulder surfing Detection avoiding Mantrapping

a

Question 7 1 / 1 point Which of the following versions of Windows 7 can be upgraded to Windows 8 Enterprise. Enterprise Ultimate Home Premium Home Basic

a

Question 7 1 / 1 point Which type of hypervisor is also called a bare metal hypervisor? Type 1 Type 2 Type 3 Any type, depending on how it's installed

b c

Question 7 2 / 2 points Which TWO of the following are steps in drive preparation before its first use? Defragmentation Formatting Partitioning Disk Cleanup

a

Question 7 In Windows, the ______ feature has the sole purpose of keeping the user from running programs that could pose a potential threat by escalating privileges to that of Administrator. UAC LOADER PowerShell

a

Question 8 1 / 1 point If a hard drive is configured to be able to boot into more than one operating system, whichever one the user chooses at startup, the system is said to be: Dual boot Mirrored Virtual Cored

c

Question 8 1 / 1 point What is the name for a security device that you carry with you that displays a randomly generated code to use for authentication along with your PIN? Tracker Ticket Fob Deterrent

c

Question 8 1 / 1 point Which Windows 7 feature allows you to change from one Windows 7 edition to another? Microsoft OS Upgrade Microsoft Update Windows Anytime Upgrade Windows Update

c

Question 8 1 / 1 point Which of the following is not a common use for Bluetooth? To share data between devices To connect a mobile device to a sound system To replace Wi-Fi To connect a headset to a mobile device

c

Question 8 1 / 1 point Which type of cloud service gives users extra network capacity but no software? SaaS PaaS IaaS NaaS

b

Question 8 1 / 1 point With Windows 8 touch features, what will swiping in and out from the left edge of the screen do? Begin a shutdown Show a list of open apps Bring up the search feature Nothing

a

Question 8 In Windows, the ______ will look for common problems such as more than one virus detection program running, multiple users logged into the same machine, visual settings affecting performance, and so on. Performance Troubleshooter Windows Defender User Account Control NTLDR

d

Question 9 0 / 1 point Which of the following mail protocols is more likely than other mail protocols to use the same TCP port number when secure as it does when not secure? IMAP4 POP3 Web client SMTP

b

Question 9 1 / 1 point Administrators should have one account for their routine work and another for when they need to make system changes. This concept falls beneath which principle? Common Criteria Least privilege Rules-based administration Open Source Interconnect

d

Question 9 1 / 1 point If Windows 7, during boot, is continuing a previous session, which files does BOOTMGR call? WINCONTINUE.EXE WINRUN.EXE WINSYS.EXE WINRESUME.EXE

c

Question 9 1 / 1 point What feature in Windows 8 is intended to serve as a single sign-on feature? PowerShell Action Center Live sign-in Windows Charms

d

Question 9 1 / 1 point What operating system feature offers the ability for a single application to have multiple requests into the processor at one time? Multiuser mode Dystopia Preemption Multithreading

a

Question 9 1 / 1 point Which type of Internet appliance will detect potential attacks for multiple computers and can take actions to stop them? NIPS NIDS HIPS HIDS

b

Question 9 1 / 1 point Which utility is used to test DirectX functionality? MemStat DxDiag Resolve Overseer

c

Question 9 Which command can be used with a missing or damaged boot file in Windows8? rebuildbcd /fixbootrec bootfix /rebuildbcd bootrec /rebuildbcd fixboot /rebuildbcd


Related study sets

Ch 4 Sect. 3&4: Cell and Inheritance/ DNA Connection

View Set

Chapter 2 - Network Infrastructure and Documentation

View Set

Reading Assessment for Chapter 6

View Set

Φυσική Α' Γυμνασίου

View Set

French Unit 3 speaking/Conjugations/Culture

View Set

Bible (Route 66) - Unit 9 Review

View Set