Software Support A+
What does the term x86 refer to?
32 bit processors
RDP port
3389
What port is utilized by the Remote Desktop service?
3389
Max transmission speed for bluetooth
3MBps
802.11ad
7GBps 60GHz 30 feet
Web server Http
80
the search app for Mac, can be configured to search the local computer, Wikipedia, iTunes, the Maps app, the web, and more
Spotlight
What signing option prevents installation of not signed drivers?
block
Whats does iwconfig show?
wireless interfaces
What Performance counter tracks the percentage of time the hard drive is in use? Avg. Disk Queue Length % Disk Time Disk Buffer Length Max Disk Queue Length
% Disk Time
What is the power good signal voltage?
+5v
what is a typical use of a Type 2 hypervisor?
- as honeypots to lure hackers - by developers to test applications
what two commands are used to change the permissions and ownership of a file directory in Linux
- chown - chmod
What parameter is used with the attrib command to remove the read-only permission?
-R
Batch File
.bat file extension that contains a list of OS commands that are executed as a group.
What three file formats are log files stored as?
.evt, .txt, and .csv
A custom view filter in Event Viewer can be saved to a file using what extension? .evf .evlog .evs .evtx
.evtx
How does one get rid of a proxy malware?
1. clear proxy settings 2. regedit currentuser\software\microsoft\windows\currentversion\internet settings
What is the steps to fix the "BOOTMGR is missing" error?
1. select adv options in troubleshoot 2. select auto repair
802.11ac
1.3GBps Below 6GHz 230 feet
Whats the default size of pagefile.sys?
1.5 times the amount of RAM?
What is the number of characters in a 40-bit WEP key?
10
10Base2
10 MBps Coax cable uses BNC connector 185 meters
CAT-5
10/100BaseT 100MHz Both two cable pairs seldom used today
CAT-6
10/100BaseT, Gigabit Ethernet Up to 250 MHz Both Less crosstalk because it has a plastic core that keeps the twisted pairs separated. CAT -6 and its variations are the most popular category used today.
CAT-5e
10/100BaseT, Gigabit Ethernet 250MHz Both Has four twisted pairs and heavy duty sheath to help reduce crosstalk.
100BaseFL, 100BaseFX
100MBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km
SMB over netBios
137, 138, and 139
IMAP email client port
143
FTP client port
20
Global address IPv6
2000::/3
FTP server port
21
SSH server port
22
Telnet port
23
SMTP email server port
25
How many characters are in a 104-bit WEP key?
26
The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives? 1GB 1TB 2TB 2PB
2TB
SLP and AFP
427
if you need to redirect the output from a command, what symbol should you use
>
Linux utilizes what two different wildcard characters at the command line
? and *
Standard Image
A copy of an entire hard drive that includes Windows 7, drives, and applications that are standard to all the computers that might use that copy.
Distribution Server
A file server holding Windows setup files used to install Windows on a computer networked to a server
Partitions
A hard drive can be divided into one or more______?
upgrade paths
A qualifying OS required by Microsoft in order to perform an in-place upgrade
Push Automation
A server automatically installs a new image or OS upgrade to a computer when a user is likely o not be sitting at it.
Network Discovery
A setting that allows this computer to see other computers on the network and vice versa
Homegroup
A type of peer to peer networks where each computer shares files, folders, and libraries, and printers with other computers in the group.
Active Directory
A windows server directory database and service that is used in managing a domain to allow for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, web sites, users and services.
What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.)
Activates the HAL Starts critical services Starts the Session Manager
Which partition is the bootable partition that startup BIOS turns to when searching for an operation system to start up?
Active partition
a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage
ActiveX control
What built-in tools can be used to clean up a computer?
Add/Remove, Defrag, disk cleanup
Which component may be considered a field replaceable unit (FRU)? (1pts) power supply hard drive LCD screen All of the above
All of the above
If a customer calls explaining their problem what should you do?
Allow them to finish and write down all the details
Zero-Touch high volume deployment
An installation strategy that does not require the user to start the process. Instead a server pushes the installation to a computer when a user is not likely to be sitting at it.
Which of the following is based on open source code?
Android
what operating system is based on open source code
Android
Which type of device is most likely to have a slot for an SD card?
Android smart phone
When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?
Anonymous users
What are three important things to consider about wireless networks?
Antenna placement, Antenna selection, and access point power
What are the two most popular web server applications?
Apache IIS
Boot Loader Menu
Appears and asks you to select an operating system when using a dual boot
Where is terminal on Mac?
Applications> Utilities> Terminal
5400, 7200, and 10,000 RPM
At what three speeds in revolutions per minute might the spindle inside a hard drive rotate?
What feature of a UPS protects from power surges/drops?
Automatic Voltage Regulation
To which group does Windows give access to folders that you create which are not part of your user profile?
Authenticated Users
You need to troubleshoot a driver issue. When Windows Vista is booting, you press F8 to enter the Advanced Boot Options menu. Which option is NOT an option listed in the menu?
Automated System Recovery
What two different types of firmware may be used on motherboards? BIOS CEFI UEFI CMOS
BIOS UEFI
Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? Control Panel BIOS setup Device Manager Computer
BIOS setup
An extra copy of a data or software file that you can use if the original file becomes damaged or destroyed.
Backup
Which component on a smart phone requires pairing with another device?
Bluetooth
A small Windows database structured the same as a registry file and contains configuration information about how Windows is started
Boot Configuration Data (BCD) store
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?
Boot Logging
Several dual-processor configured computers have been purchased that have 1 GHz cpu, 2 GB RAM what editions of Vista could be installed on these specs?
Business and Ultimate
Where is the Windows system registry hive?
C:\Windows\System32\Config
Registry files, if deleted, can be restored from those saved in what folder?
C:\Windows\System32\Config\RegBack
Besides the PSU what has a high voltage rating?
Cathode ray tube (CRT) monitor
To make sue the drive is healthy, you need to search for and repair file system errors using the Windows ______ utility.
Chkdsk
What type of fire extinguisher should be used in a server room?
Class C
Which products are considered to be hypervisors? Client Hyper-V Virtual PC VirtualBox VMVisor
Client Hyper-V Virtual PC VirtualBox
What is another name for a file allocation unit?
Cluster
A window that consolidates several Windows administrative tools that you can use to manage the local PC or other computers on the network
Computer Management
motherboard BIOS
Contained on a chip on the motherboard and manages devices such as , keyboard, monitor, and hard drive.
System BIOS (basic input/output system)
Contains Instructions for running essential hardware devices before an operating system is started.
Where does one change format of date?
Control panel> click, lang, region> select region lang
Windows Easy Transfer (7) or Files and Setting transfer Wizard (xp)
Copy user data and setting from one computer to another.
Which of the following is NOT an internet appliance?
DNS
Rearranges files on the drive into as few segments as possible.
Defragmenting
A computer must have a DVD drive in order to install Windows 8. True or False
False
Whats two methods to prevent WiFi interference?
Deploy APs in different channels within frequency or decrease power level
What is true about using the chkdsk utility?
Detects and fixes file system errors on a windows disk.
Which Windows utility can be used to view and modify partitions on hard drives and to format drives?
Disk Management
You can use ______________ to convert two or more basic disks to dynamic disks.
Disk Management
What Mac tool will verify drive health?
Disk Utility's Verify Disk Functionality
Which of the following is the last step in the six step troubleshooting method covered in this chapter?
Document
Which Windows tool can be used to identify a driver that is causing a problem by putting stress on selected drivers, causing the problem driver to crash?
Driver Verifier
What guidelines need to be stressed when discussing phosphorus?
EPA, OSHA, MSDA
What acronym is another name for static electricity, which can damage chips and destroy motherboards? LCD ESD EMI CRT
ESD
How much disk space is required for hibernation?
Equal to amount of memory
Windows server 2011, Linux, Unix
Examples of network operating systems
The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence?
F8
Computers are very complex and have frequent problems so it is very rare that a problem is caused by an error made by the user.
FALSE
The six step troubleshooting program can only be applied to software problems.
FALSE
Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as other types of errors.
FALSe
Unique local address IPv6
FC00::/7
Link-local IPv6
FE80::/64
Multicast IPv6
FF00::/8
On the IE General tab you can block cookies.
False
what Linux distribution is considered a cutting-edge distribution
Fedora
Overall structure an OS uses to name, store, and organize file on a drive.
File system
What recovery console command is used to correct a corrupted Windows boot sector?
Fixboot
_____________ happens over time as Windows writes files, deletes files, and writes new file to you drive.
Fragmentation
What version of Win Vista syncs with network folders?
Home Premium
a component of the kernel which makes up the layer closest to the hardware
HAL
What must a user be allowed to share a screen with others via a terminal session?
Grant the user access to the session and to screen mode
What registry key stores information that determines which application is opened when a user double-clicks a file? HKEY_CLASSES_ROOT HKEY_USERS HKEY_CURRENT_USER HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
What registry key stores information about all users?
HKEY_USERS
When all users on a network require the same access to all resources, what type of network model should you use?
Homegroup
Four
How many hard drives are necessary to implement RAID 10?
Which of the following is used to uniquely identify a computer on a network? network ID ARP address IP address serial number
IP address
What isnt a option in Windows Vista advanced boot menu?
automated system recovery
Whats step 1 in troubleshooting
Identify problem
Custom Installation
In Windows 7 a clean installation is called______?
Workgroup
In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralized management or security.
Domain Controller
In a Windows domain where is the centralized database kept?
You need to access a shared folder named research$. What fact is true about this shared folder?
It is hidden
You need to upgrade a Windows Vista Home Premium computer to Windows 7 Home Premium. What should you do prior to the upgrade?
Install the latest service pack.
Image Deployment
Installing a standard image on another computer. Always results in a clean install.
What is a typical symptom that might indicate the MBR record is damaged?
Invalid partition table error
What technology can be used to locate a device such as a laptop after it has been stolen? Management software LoJack Trojan Multifactor Trace software
LoJack
What software program is an example of password management software? (Choose all that apply.) KeePass LastPass Dashlane PassLock
KeePass LastPass Dashlane
In Windows 7, what startup option can be used to restore the registry settings from the previous login?
Last Known Good Configuration
Domain
Logical group of networked computers that share a centralized directory database of user account information and security.
The __ command creates a subdirectory under a directory.
MD
What type of hard drive contains spinning platters?
Magnetic hard disk drives
What is the file name given to the Windows kernel?
Ntoskrnl.exe
What is in jeopardy when shutting down a computer incorrectly alot?
registry
How often does Windows 7/Vista automatically defragment a hard drive?
Once a Week
Explorer
Once a virtual machine wizard is complete the new virtual machine is listed in the __________ window
What two applications are an example of a mail server and a mail client application, respectively?
Outlook Exchange
File System
Overall structure an OS uses to name, store, and organize files on a volume.
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?
PNRP
What cloud service provides hardware and software necessary for app dev?
PaaS
What cloud service provides hardware and software necessary for application development?
PaaS
A hidden file stored in the root directory of drive C:
Pagefile.sys
What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time? Event Viewer Reliability Monitor Performance Monitor Resource Monitor
Performance Monitor
Virtual PC, VirtualBox, VMware,
Popular virtual machine programs
a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP
Power Users
Device Manager
Primary Windows tool for managing hardware
Dial-up connects to what jack?
RJ-11
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)
Read Write
The error BOOTMGR is missing is displayed, how would one repair the boot?
Recovery env> repair> Troubleshoot> Advanced options> automatic repair
High-touch with retail media or image disc
Requires a technician physically sitting at a machine and installing Windows on a PC
A program that runs in the background and is called on by other programs to perform a background task
Service
What can be performed at Internet Properties box in connections tab?
Set up new Internet, Dial-up, VPN, and LAN
Windows Upgrade Advisor
Simplest way to find out if a system can be upgraded to windows 7 is to download, install, and run the ______?
Device Drivers
Small Programs stored on the hard drive that tell the computer how to communicate with a specific hardware device.
What Windows process is responsible for authenticating users?
Smss.exe
What program is used to start the part of the Win32 subsystem that displays graphics?
Smss.exe
Microsoft Assessment and Planning (MAP) Toolkit
Software that can be used by a system administrator from a network location to query hundreds of computers in a single scan to determine if a computer qualifies for a Windows upgrade.
Global Account
Sometimes called a Domain User account or network account, used at that domain level, created by an administrator and stored in the SAM
Startup BIOS
Starts the computer and finds a boot device that contains an operating system.
What Windows utility can be used to find out what processes are launched at startup? Task Manager Microsoft Management Console System Configuration Computer Management
System Configuration
_____________ restores the system to its condition at the time a snapshot was taken of the system settings and configuration.
System Restore
lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity, and user activity
Task Manager
can be set to launch a task or program at a future time, including at startup
Task Scheduler
Active Directory
The directory database used by Windows Server to control resources on a network
When copying a file encrypted with EFS what happens when the file is copied to a volume that doesnt have EFS enabled?
The original remains encrypted new isnt encrypted
What events can occur during BootMgr's role in startup? (Choose all that apply.)
The settings in the BCD are read Dual-boot menu is displayed
What app is used to backup and restore data on a IOS device?
Time Machine
what is the name of the OS X built-in backup utility?
Time Machine
A Windows 7 system repair disc can be created using the Backup and Restore utility.
True
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
True
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen. True or False
True
The Advanced Boot Options menu appears when a user presses F8 as Windows is loading.
True
The Android OS is based on Linux.
True
The GUID Partition Table (GPT) method for partitioning a drive allows up to 128 partitions. True or False
True
The Home editions of Windows 7 do not include the Local Security Policy or Print Management. True or False
True
There is no undo feature in the Registry Editor. True or False
True
Using Group Policy, you can set security policies to help secure a workstation. True or False
True
When a partition is formatted with a file system and assigned a drive letter it is called a volume. True or False
True
Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. True or False
True
the Android OS for mobile devices is based on Linux
True
What type of cable does Dial-up use?
Twisted-pair cabling
Which characteristic distinguishes IEEE 1394 from USB 2.0? USB supports hot swapping IEEE 1394 supports hot swapping USB supports more devices on a single bus IEEE 1394 supports more devices on a single bus
USB supports more devices on a single bus
You are trying to upgrade a Vista with service pack 2 computer, what edition of Windows 7 can it upgrade to?
Ultimate and Home Premium
What editions of Windows 7 are required to install a Language Interface pack?
Ultimate or Enterprise
What versions of Windows 7 can run XP mode?
Ultimate, Enterprise, and Professional
IP Adress
Uniquely identifies a computer on a network
Whats true regarding unsigned drivers?
Unsigned drivers can cause instability and security issues
What does a blue I indicate in device manager?
Use Automatic Settings is not enabled for this device
What wireless protocol provides maximum security?
WPA
What wireless security protocol provides most security?
WPA
Answer File
Used during an unattended installation
setup BIOS
Used to change motherboard settings
Lite-touch, high volume deployment
Uses a deployment server on the network to serve up the installation after a technician starts the process
Used to enhance the amount of RAM in a system.
Virtual Memory
What is Pagefile.sys used for in Windows?
Virtual Memory
What windows operating systems support dynamic disks?
Vista Ultimate, Vista Enterprise, Windows 7, 8, 10
What versions of windows is ready boost available?
Vista and onward
configuring a computer so that it will respond to network activity when the computer is in a sleep state
Wake on LAN
bootrec /rebuildBCD
What command can you use to rebuild the BCD
1.5 Gb/sec, 3 Gb/sec, 6 Gb/sec
What is the transfer speed for SATA I? SATA II? SATA III?
Solid state drives, magnetic drives, and hybrid drives
What three types of technologies are used inside hard drives?
In UEFI/BIOS setup
When implementing RAID on a motherboard, where do you enable the feature?
In biometrics, what is a false positive?
When someone is not suppose to have access to a system but is given access
RAID 1
Which RAID level mirrors one hard drive with a second drive so that the same data is written to both drives?
RAID 5
Which RAID level stripes data across multiple drives to improve performance and also provides fault tolerance?
B & C
Which features are available in Windows 7 Home Premium? A. backup to network b. Scheduled backups c.windows media center d. join a domain
Public Network
Which network location option means the Network Discovery is turned off and you cannot join a homegroup or domain.
MicroSD, also the same size as MicroSDHC and MicroSDXC
Which type of flash memory card is currently the smallest type of card?
Windows 7 profesional
Which windows 7 edition is intended for Business users and allows purchase of multiple site licenses.
100BaseT purpose Transmit +/-
White/green, green White/orange, orange
100BaseT purpose Receive +/-
White/orange, white/green orange, green
in-place upgrade
Windows installation that is launched from the desktop and the installation caries ahead user settings and applications.
If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be? system32 Windows Windows.old Program Files (Saved)
Windows.old
What command is used to install the recovery console?
[drive letter]:\i386\winnt32.exe /cmdcons
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
\\server\sharedfolder
What cli utility alters the action of a command?
a switch
What statement about user accounts and groups is NOT true?
a user account can belong to only one group at a time
What detects horizontal movement but not tilt on a phone?
accelerometer
What must you do before using a new iPad or iPod touch?
activate it
What does bootcamp allow on Mac?
allows for multiboot environment creation?
When using the Windows Encrypted File System, what statement is accurate? -files can be marked for encryption, but not folders -an encrypted file moved to an unencrypted folder remains encrypted -EFS only works on NTFS and FAT32 -you need to download special software to use EFS
an encrypted file moved to an unencrypted folder remains encrypted
stands for Bourne Again Shell
bash shell
100BaseT purpose Gigabit ethernet
blue, white/blue, white/brown, and brown
What should be done if a system cannot boot from the hard drive?
boot from Windows setup DVD
Which of the following is true of a Type 1 hypervisor?
called bare-metal hypervisor
what is the main advantage of using a thick client?
can be used for purposes other than server-side virtualization
Regarding the Performance Monitor utility, which statements are accurate? (Choose all that apply.) can monitor in real time can save data in logs keeps a log of errors helps to identify bottlenecks
can monitor in real time can save data in logs helps to identify bottlenecks
a personal computer that provides multiple virtual environments for applications
client-side virtualization
what command lets you view the contents of a file
cat
Which setting can be configured via the BIOS screen? Windows driver status set desktop bakcground screen saver timeout value change the boot sequence
change the boot sequence
an image of the entire partition on which an operating system is installed
clone
Restarts the computer by turning off the power or by pressing the Reset button
cold boot
What two types of backups should be used for the quickest method and least amount of space?
combo of normal and incremental
What is intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software? copyright license user agreement cease and desist order
copyright
Whats best method to protect cables from damage?
cover cables with protective material
What devices could be paired over bluetooth? docking station credit card readers memory/micro SD card headsets speakers game pads
credit card readers headsets speakers game pads
in order to break out of a command or process on a terminal, what keys should you press?
ctrl + c
When upgrading from cellphone to smart phone what should be considered?
data plans screen size apps
What should a technician do to troubleshoot a program using the least amount of effort?
determine root cause
What causes a IRQL_NOT_LESS_OR_EQUAL message?
device driver
What task can't be performed from the IE General tab?
disable file downloads
A command to manage hard drives, partitions, and volumes.
diskpart
What command can be used to manage hard drives, partitions, and volumes?
diskpart
What command can be used to remove partitions and convert a drive to GPT? fdisk bootrec diskpart gptconv
diskpart
whats step 6 in troubleshooting
document findings
What does a green ? mean in device manager?
driver installed but not all functionality enabled
a collection of data that is copied to a backup media
dump
What feature on android would secure the data?
encryption
whats step 4 in troubleshooting
establish plan of action
What command searches for files?
find
What command is used to format a hdd?
format
What should be done if you receive a personal call?
ignore it
What should the default permission position be?
implicit deny
What factors create ESD?
improper grounding, moving machines, moving people, and less than 40% humidity
The core of the OS that is responsible for interacting with hardware
kernel
What causes UNEXPECTED_KERNEL_MODE_TRAP?
memory
What can REGSVR32 be used for?
missing dll files
A Vista computer has 512 MB of RAM on two HDDs, the computer stops running good after a couple hours, what should the user do?
move the paging file to the other HDD
If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed, what utility should you open? Task Manager msinfo32.exe Event Viewer msconfig.exe
msinfo32.exe
What command launches the Remote Desktop client for Windows?
mstsc
What diagnoses problems with NetBIOS name resolution?
nbtstat
What is the fastest method to start spooler service on a computer?
net start spooler
Whats the command to create a user?
net user [username] /add
What backup type should be used to reduce amount of drives and tapes used?
normal and differential backup
What verifies entries on a DNS server?
nslookup
What file holds the preferences and settings of the currently signed-in user? ntprofile.dat ntuser.dat profile.ini userconfig.ini
ntuser.dat
Regarding the use of Group Policy, what statement is NOT accurate?
policies can be applied to a computer
Where should you install security updates on a server that's hosting virtual machines?
on the virtual machines and the hypervisor
Three categories of UPS
on-line, line interactive, and standby
T568B
orange uses pins 1 and 2 and green uses pins 3 and 6 and blue uses pins 4 and 5 and brown uses 7 and 8
When using Group Policy to configure QoS, what options are available? (Choose all that apply.)
outbound traffic can be throttled the priority is a number from 0 and 63
What causes KERNEL_DATA_INPAGE_ERROR?
paging file
How would one ensure no unauthorized user is on a WPA access point?
periodical site surveys
PAN
personal devices communicating in short range
What cant be claimed from a lot of old parts?
phosphorus from a CRT monitor with a broken screen
What is the second step in opening the case of a working computer? (1pts) power down the system and unplug it back up important data open the case cover press and hold down the power button for a moment
power down the system and unplug it
a remote application running on a server is controlled by a local computer
presentation virtualization
Why would tethering internet from phone to devices be good practice?
prevent data leaking
What important information is needed if you are installing an OEM version of Windows 7? installation code receipt of purchase OEM license product key
product key
Data is sent using UDP method some collisions occur what will happen as a result?
protocol will drop the lost packets the application will transmit the packets
What server role makes connections on behalf of the user?
proxy
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
proxy server
What type of mobile synchronization must be physically started?
pull synchronization
punchdown tool
punch indiv wires into RJ-45 jacks
a server automatically installs a new image or OS upgrade to a computer when a user is not likely to be sitting at it
push automation
What should you do first if a memory card slot is not functioning?
reboot
For some brand-name computers, the hard drive contains a partition that can be used to reinstall Windows. What is the name for this partition? reinstall partition recovery partition restore partition rebuild partition
recovery partition
What inputs would be considered to be part of a biometric device? (Choose all that apply.) keystrokes retina fingerprint voice
retina fingerprint voice
what user account is known as the system administrator or super user account
root
What linux command will start a new screen?
screen
What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load? Execute Disable Bit Secure Boot UEFI Defender Bootlocker
secure boot
A major update release on Windows is referred to by what term? system release update pack security release service pack
service pack
Whats required to upgrade a Vista Premium to 7 Premium?
service pack 1 and 2
What is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started? kernel device driver setup UEFI/BIOS system drive
setup UEFI/BIOS
What is used to create a answer file?
setupmgr.exe
What sfc command scans all protected files every time the computer starts?
sfc /scanboot
If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?
sfc /scannow
What should be entered at a command prompt in order to scan all system files
sfc /scannow
What feature in window 7 allows for windows to be arranged side by side?
snap
What is the term given to the individual tools in a console? consoles add-ins snap-ins views
snap-ins
To restart a PC without turning off the power
soft boot
What uses cookies to report user data?
spyware
a copy of an entire hard drive that includes the Windows OS, drivers, and applications that are standard to all the computers that might use that copy
standard image
What feature turns off power-consuming components ie hdd, and monitor?
standby mode
What should you do with a angry customer?
stay calm
Whats the first step when a angry customer calls?
stay calm
What is another name for a blue screen error which occurs when processes running in kernel mode encounter a problem ad Windows must stop the system
stop error
What is another name for a blue screen error which occurs when processes running in kernel mode encounter a problem ad Windows must stop the system?
stop error
What type of password can be used to block access from BIOS/UEFI only?
supervisor password
What is a IDS?
system responsible for detecting unauthorized access/attacks
You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following? shoulder surfing tailgating social engineering session hijacking
tailgating
What tool should be used to setup a scheduled restore point creation?
task scheduler
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following? -Windows POP technology -the BIOS -a feature available on some DVD drive -your USB keyboard
the BIOS
What has occurred if you see the message "Chassis Intruded! System has halted." the next time you start your computer? -the disk has failed -Windows has not been activated -the case has been opened -the keyboard has been unplugged
the case has been opened
What does a triangle with a black ! in it mean?
the device has a problem but is still working
What does the presence of the Cydia app on an iOS device indicate? a rootkit has been installed on the device the device is infected with a worm the device has been jailbroken there is spyware software installed on the device
the device has been jailbroken
When creating a strong password, what are some valid criteria the password should meet? (Choose all that apply.) -the password should be at least eight characters long -you should not use adjacent keys on the keyboard, such as asdf -you should combine uppercase and lower case letters, numbers, and symbols -you can use words from a foreign language to make the password more secure
the password should be at least eight characters long you should not use adjacent keys on the keyboard, such as asdf you should combine uppercase and lower case letters, numbers, and symbols
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
to connect to secured websites on a corporate network VPN
What's the main purpose in keeping track of all backups?
to ensure proper disposal of information
Why should all unused features be disabled in a web browser?
to provide most security
Which touch technology does finger movement control screen scroll?
touch flow
What are the two most common malware?
trojan and viruses
Vas running under a Type 1 hypervisor are isolated from each other
true
What can be done to not allow personal info to be given through browser on internet explorer?
turn on smartscreen filter
toner probe
two-part kit used to find cables in walls of buildings
A computer is upgraded to dual-core processor, the user complains the computer didn't increase in speed, what would fully ensure that the application fully utilizes the dual-core processor?
upgrade the application to support multithreading
What should be done first when display isnt showing on a laptop?
use fn key to toggle internal video adapter
How does one access system recovery on Win 7 computer?
use install disc
Which of the following can you do if you suspect an application requires more privileges than the currently logged-on account?
use run as administrator short cut menu option
RG-59
used for TV
Shell subsystems that have only a limited access to system information and can access hardware only through other OS services are operating in what mode? process mode elevated privilege mode user mode kernel mode
user mode
Whats the best way to provide authentication for a small business?
usernames and strong passwords
Which of the following are true about NTFS permissions? (Choose all that apply.)
when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies
What tabs found in the Windows Task Manager dialog box? (Choose all that apply). Applications Startup Processes Performance
Startup Processes Performance
What is responsible for getting a system up and going and finding an OS to load?
Startup BIOS
What types of events are logged by Windows and can be viewed using the Event Viewer? (Choose all that apply). Scheduled Error Warning Information
Error Warning Information
What is a recommended file system format for Windows XP, Vista, and 7 that increases security, performance, and reliability features?
NTFS
When utilizing both share and NTFS permissions, what statement is inaccurate?
when you copy a file, the file takes on the permissions of the destination folder
What is a possible remedy if your system hangs at odd times or during the boot? install new CMOS RAM remove the TPM chip flash the BIOS format the hard disk
flash the BIOS
What should be done if files that violate the acceptable use policy exist on a computer?
follow procedures that are in the acceptable use agreement
What command should be used to erase all info, test disk, ensure sector reliability, mark bad sectors, and create internal address table?
format
What disk maintenance utility is not found in the Tools tab of the properties menu?
format
Law enforcement agencies sometimes use what type of data to reconstruct a person's travels? accelerometer tethering geotracking geospotting
geotracking
Whats not a security measure for mobile devices?
geotracking
a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used
gpedit.msc
T568A
green pair connect to pins 1 and 2 whilst the orange is connected to pins 3 and 6 and blue is on pins 4 and 5 and brown uses 7 and 8
DSL (Digital Sub Line)
group of broadband technologies that covers a wide range of speeds. DSL uses ordinary copper phone lines and a range of frequencies
How should you communicate with a foreign speaking person?
hand gestures/visual aids
Where is MBR stored
hard disk
What is the most likely cause of an improper shutdown or system lockup?
hardware issue
What is a hardware requirement for Hyper-V?
hardware-assisted virtualization
What question will verify if a virus is on a computer or not?
have you opened a email attachment lately
software that is installed on a computer and used to manage virtual machines
hypervisor
What log should be looked at for login events?
security log
Which type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?
server-side
what type of virtualization should you deploy to provide a Virtual Desktop Infrastructure
server-side
What process is it when data is uploaded to desktop computer?
synchronization
What command can be used to prepare a image for duplication?
sysprep
contains instructions for running essential hardware devices before an operating system is started
system BIOS
Who should be informed of a short in the server room?
system administrator
a device dedicated to timing activities on the motherboard system clock
system clock
what terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server
ultra-thin client, zero client, dumb terminal
Space on the disk is marked as ___________ if it has not yet been partitioned.
unallocated
an installation that does not require a technician to respond to prompts by the setup program
unattended installation
What should be done to kill a program you clicked to open on linux?
use the xkill command
RG-6
used for TV uses F connector
straight-through cable
used to connect a computer to a switch or other network device
crossover cable
used to connect two like devices such as hub to hub or computer to computer
After installation, how many days do you have to activate Windows 7? 7 30 45 60
30
a group that can back up and restore any files on a Windows system regardless of access permissions to these files
Backup Operators
Besides backing up user data or system files, you can also back up the entire volume on which Windows 7 is installed using________________.
Backup and Restore
Searches for bad sectors on a volume and recovers the data from them if possible.
Chkdsk Utility
Which Windows tool allows an administrator to decrypt a file that is not available because the user account that encrypted the file is no longer accessible?
Cipher
a database designed with a treelike structure that contains configuration information for Windows, users, software applications, and installed hardware devices
Registry
If you need to see information about problems and errors that have happened over time, what utility should you use? Performance Monitor Resource Monitor Reliability Monitor Services Console
Reliability Monitor
gives a user access to a Windows desktop from anywhere on the Internet
Remote Desktop Connection
What configuration change should be done to harden the OS immediately after installation?
Rename Admin and disable Guest
What Windows utility is used to control the Windows and third-party services installed on a system? Microsoft Management Console Event Viewer System Configuration Utility Services console
Services console
Use the ______ command to rearrange parts of files on the drive so they are contiguous.
Defrag
There is no option for networking access when using Safe Mode.
False
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
False
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
False
You do not have to be logged on as an administrator in order to use tools found in Computer Management. True or False
False
You usually install an OS on a mobile device using a USB device or SD-card.
False
What editions of Windows 7 can create a Windows 7 Homegroup?
Windows 7 Home Premium, Ultimate, Pro, or Enterprise
What editions of Windows can enable Windows XP mode?
Windows 7 Pro, Home, Ultimate
A volume that can be accessed by way of a folder on another volume so that the folder has more available space.
Mounted drive
Whats Dr. Watson?
application debugger included with Windows
What log should be looked at for program events?
application log
What should not be allowed on a virtualization host?
browsing the internet
A Windows 7/Vista command option that repairs the boot sector of the system partition.
fixboot
What be used to lengthen battery time on a iPhone?
low power mode
A disc image, as defined by the International Organization for Standardization, uses what file extension? .iso .img .disc .cd
.iso
What symbol is used to add a switch to any cli utility/function?
/
What chkdsk switch fixes disk errors?
/F
Which switch in the chkdsk program directs chkdsk to skip checks that compare directories?
/I
What chkdsk switch locates bad sectors and recovers readable information?
/R
What boot.ini option forces video to a driver that is compatible with all gpus?
/basevideo
What switch tells chkdsk to skip checks that detect cycles in directory structure?
/c
on Linux, where are the commands required for system administration stored
/sbin
What boot.ini switch displays device driver names whilst being loaded?
/sos
What switch on the defrag command shows both analysis and defrag reports?
/v
what switch of chkdsk forces the volume to dismount first?
/x
Unassigned address IPv6
0::0
Loopback address IPv6
0::1 or ::1
A dynamic disk requires __MB of storage for the disk management database.
1
Whats the minimum system requirements for windows 7 32 bit?
1 GHz cpu 1 GB ram 16 GB HDD space DirectX 9
Whats the minimum system requirements for Aero?
1 GHz processor 1 GB RAM 128 MB video RAM DirectX 9
in order to ensure that a Mac has no startup items, what two directories should you check for items?
1. /Library/StartupItems 2. /System/Library/StartupItems
CAT-6a
10/100BaseT, Gigabit Ethernet, 10Gig Ethernet Up to 500 MHz Both Doubles the frequency of CAT -6. CAT -6a is sometimes unofficially called CAT -6e.
CAT-7
10/100BaseT, Gigabit Ethernet, 10Gig Ethernet Up to 600 MHz Individual pair shield and overall cable shield Shielding almost completely eliminates crosstalk and improves noise reduction. Expected to have a longer life expectancy than previous twisted-pair categories.
100BaseT
100MBps Twisted pair (UTP or STP) RJ-45 connector 100 meters
CAT-3
10BaseT 16MHz Unshielded Used for phone lines
1000BaseX
10GBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km
10GBaseT
10GBps Twisted pair (UTP or STP) RJ-45 connector 100 meters
10Base5
10MBps Coaxial with AUI 15-pin D-shaped 500 meters
10BaseF,10BaseFL
10MBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km
10BaseT
10MBps Twisted pair (UTP or STP) RJ-45 connector 100 meters
Operating range for Bluetooth 2.0
10meters
POP3 email client port
110
What are the dimensions of a ATX motherboard?
12 inches wide 9.6 inches deep
Whats the maximum amount of volts a PSU can output?
12 volts
For optimal performance, how much free space does Windows need on a hard drive?
15%
What is not a minimum requirement for Windows 7 Pro 64-bit?
16 GB HDD space
1000BaseFX
1GBps Fiber-optic uses ST or SC or LC MT-RJ connector 2km
1000BaseT
1GBps Twisted pair (UTP or STP) RJ-45 connector 100 meters
What's not a minimum system requirement for a Windows 7 Pro x86 computer?
2 GB RAM
how much drive space should be available for each virtual machine on a system
20 GB
HTTPS port
443
SMB over TCP/IP port
445
What is the maximum amount of USB devices that can be daisy chained?
5
DNS server port
53
AFP
548
802.11g
54MBps 2.4GHz 150ft
How many characters are in a 256 bit WEP key?
58
802.11n
600MBps 2.4 & 5 GHz 230 feet
What type of OS should you install for best performance when you have enough RAM? 8 bit 16 bit 32 bit 64 bit
64 bit
What is the 6th best practice with Mac and Linux?
Antivirus/Anti-malware updates
What type of update ensures that the 3G and GSM information is updated?
Baseband
What type of update, updates GSM and 3G on phones?
Baseband update
You need to ensure that the GSM and 3G phone information for you android phone is updated. what type of update wold you perform?
Baseband update
Can be partitioned and formatted as a standalone drive.
Basic Disk
Where do today's computers store almost all motherboard configuration data? BIOS ROM CMOS RAM DIMM RAM Solid State Disk
CMOS RAM
User State Migration Tool
Command line tool that only works when a computer is a member of a Windows domain. Helps migrate user files and preferences between computers.
How should you configure the Task Scheduler service to ensure that the service starts?
Configure the service to log on with the local system account
A user is locally connected to a printer on his Windows Vista computer. The printer is disconnected from the computer and connected to the local network. You need to change the port for the printer on the user's Windows Vista computer. How could you change the port settings?
Control panel > Printer (hardware and software) > right click printer > properties > ports tab
What keystroke should you press to get a logon window if you don't use the welcome screen? Alt+F1 Ctrl+Ins+Home Alt+F5+End Ctrl+Alt+Delete
Ctrl+Alt+Delete
If you enter a command and want to terminate its execution before it is finished, you can press __________ to do so.
Ctrl+Break
During the Windows 8.1 installation, what option must be selected in order to perform a clean install? -Custom: Install Windows only (advanced) -upgrade to Windows 8.1 -Clean Install (advanced) -Fresh Install (advanced)
Custom: Install Windows only (advanced)
What command allows for freeing up disk space by removing all system restore points except the most recent?
Disk cleanup
What is the 5th best practice with Mac and Linux?
Driver/Firmware updates
Can span more than one hard drive.
Dynamic Volumes
For a GPT hard drive, the bootable partition used to boot the OS and contains the boot manager program for the OS
EFI System Parition (ESP)
When troubleshooting a device or service that has failed to start, what utility may have information regarding the cause? Microsoft Management Console Event Viewer Performance Monitor Resource Monitor
Event Viewer
Where can a user find out more information about a hardware or network failure that occurred on that particular PC? -Event Viewer -Performance Information and Tools -Task Scheduler -Resource Monitor
Event Viewer
a Windows tool useful for troubleshooting hardware or network failures, OS error messages, failed services and more.
Event Viewer
What utilities can be accessed using the Computer Management window? (Choose all that apply). Task Manager Event Viewer Performance Monitor System Configuration
Event Viewer Performance Monitor
What can view a application log?
Event viewer
After initially installing Windows 7, you need to disable the Guest account so nobody can use it. True or False
False
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
False
LILO is the most commonly installed boot loader by the Linux operating system
False
On a peer-to-peer network, authentication is the responsibility of the domain. True or False
False
The Windows shell is responsible for interacting with hardware. True or False
False
The price for Windows 7 is the same regardless of the edition and type of license you purchase. True or False
False
functions similar to File Explorer in Windows, used to find and access Mac's files and applications
Finder
What is a incorrect statement regarding android?
GPS requires the help of cell towers to obtain a location
What two methods are available for Windows to use to partition a drive? UEFI GPT EFT MBR
GPT MBR
What should be done after reassembling a laptop, but before installing the battery or AC adapter? (1pts) Remove the keyboard so that you can test proper voltage on the motherboard once the battery and/or AC adapter are reconnected. Gently shake the laptop to ensure nothing is loose inside of the case Press the power button to drain any electricity in the system Attack ESD strap alligator clip to a different grounding source
Gently shake the laptop to ensure nothing is loose inside of the case
Compatibity mode
Group of settings that can be applied to older drivers or applications that might cause them to work in Windows 7
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
Guests group
When a user logs into Windows, what registry key is created? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_USERS HKEY_CURRENT_USER
HKEY_CURRENT_USER
What registry key is considered to be the most important key, containing hardware, software, and security data? HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG HKEY_CLASSES_ROOT HKEY_USERS
HKEY_LOCAL_MACHINE
What dynamic link library handles low-level hardware details?
Hal.dll
Which of the following text error messages can indicate that BIOS could not find a hard drive? (Choose all that apply).
Hard drive not found No boot device found
7 pins, 15 pins
How many pins does a SATA internal data cable have? How many pins does a SATA power cable have?
What step involves reproducing the error?
Information gathering
While servicing a printer issue a user asks you to install a application, the application isn't listed in approved software list. What should you do?
Instruct user that they must obtain installation approval and a licensed copy of the software.
Registry settings and device drivers that were in effect when the computer was last logged into successfully
Last Known Good Configuration
What are the two different methods for partitioning hard drives? -Extended Partitioning Scheme (EPS) -Master Boot Record (MBR) -Standard Partition Layout (SPL) -GUID Partition Table (GPT)
Master Boot Record (MBR) GUID Partition Table (GPT)
Windows 10 features what new web browser, which is designed to replace Internet Explorer?
Microsoft Edge
Using what utility allows you to build your own customized console windows? -Microsoft Management Console -Microsoft Manager Console -Microsoft Management Components -Microsoft Manager Controls
Microsoft Management Console
Windows Preinstallation Environment/ Windows PE
Minimum operating system used to start the installation
What error messages indicate that the MBR sector is damaged, or the active partition is corrupt or missing? (Choose all that apply.)
Missing operating system Invalid partition table Error loading operating system
swiping up with three fingers on Mac OS X launches what
Mission Control
A__________ is a volume that can be accessed by way of a folder on another volume so that the folder has more available space.
Mounted Disk
What type of permission should you set to control access to files and folders by local and network users?
NTFS on NTFS volumes only
a method to control access to a folder or file and can apply to local users and network users
NTFS permissions
Which of the following common blue screen errors means the hard drive is most likely corrupted?
NTFS_FILE_SYSTEM
Home network
Network Discovery is turned on and you can join a homegroup.
Work Network
Network Discovery is turned on, you can join a domain, but you cannot join a homegroup
What diagnostic software is used by several manufacturers, and can run tests on keyboards, video, speakers, touchpad, optical drives, wireless LANs, motherboard, processor, ports, hard drive, and memory? (1pts) PC-Fixit PC-Doctor WinScan DiagNow
PC-Doctor
A self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices
POST (power-on self test)
What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system is launched? POST card ROM module BIOS memory CMOS firmware
POST card
What cellphone update is automatic?
PRI update
What updates cell towers near phone?
PRL update
What should you configure on an iOS device if you want your data erased after ten failed logon attempts?
Passcode Lock
Drive imaging or Disc Cloning
Process of copying an entire hard drive to another bootable media device.
What Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes? Applications Services Processes Performance
Processes
Within the Properties box of a service in the Services console, what is NOT a valid startup type for a service? Automatic (Delayed Start) Scheduled Manual Automatic
Scheduled
What is the 1st best practice with Mac and Linux?
Scheduled backups
What is the 2nd best practice with Mac and Linux?
Scheduled disk maintenance
what command below is used to test network connections by sending a request packet to a host
ping
_______________ creates restore points at regular intervals and just before you install software or hardware.
System Protection
What is the 3rd best practice with Mac and Linux?
System updates/App store
True
T or F: An upgrade from Windows Vista to 7 carries applications and settings forward.
True
T or F: The OEM version of Windows can only be installed on a new PC for resale.
False
T or F: The price for Windows 7 is the same regardless of the edition and license purchased.
What must your motherboard have to use BitLocker Encryption in Windows 7 which will ensure that your hard drive cannot be used in another computer? TPM chip CMOS RAM BIOS password Encrypted USB port
TPM chip
When removing screws while working on a laptop, what should be done with the screws? (1pts) They should be stored or labeled They should be disposed of They should be left inside the case of the laptop They should be painted to indicate where they go
They should be stored or labeled
If a ground strap is unavailable, what should be done to dissipate any ESD before working on a laptop? (1pts) Touch a non-painted metallic surface on the laptop Wash your hands Touch any part of the laptop Move around prior to touching the device
Touch a non-painted metallic surface on the laptop
A hard boot takes more time than a soft boot.
True
A root certificate is the original certificate issued by the CA. True or False
True
The OEM version of Windows 7 can only be installed on a new PC for resale. True or False
True
The default value of the security level in IE is Medium-high.
True
If you want to be able to power up a computer remotely, what feature should you use?
Wake-on LAN
The chkdsk command
What command-prompt command do you use to determine if a drive has bad sectors?
SD, SDHC
What two SD standards utilize the FAT file system?
DVD-RAM, BD-RE
What two optical disc drive standards allow for rewritable discs?
DVD-R DL, DVD+R DL
What two optical disc drive standards support writing discs with a total capacity of 8.5GB?
UDF
What type of file system is used by Blu-ray discs?
exFAT
What type of file system is used by SDXC memory cards?
Volume
When a partition is formatted with a file and assigned a letter drive it is called _______?
Which of the following statements regarding working inside a laptop computer is true? (1pts) When upgrading a laptop, you should use components that are the same brand as the laptop, or use only recommended components. If an internal component needs replacing, you should always replace the component rather than disable it. Repairing a laptop is always more cost effective than buying a new one. The LCD screen of a laptop is never considered to be a field replaceable unit.
When upgrading a laptop, you should use components that are the same brand as the laptop, or use only recommended components.
When is it okay to touch the inside of a computer that is turned on? (1pts) When using a multimeter to measure voltage output When a qualified electrician is present When disassembling the computer When reassembling the computer
When using a multimeter to measure voltage output
As you work at the command prompt, you can use ________ characters in a filename to say that the command applies to a group of files or to abbreviate a filename if you do not know the entire name.
Wild card
Programs and Features Window
Window listing the programs installed on a computer where you can uninstall, change, or repair the programs.
What Windows 7 64-bit version editions could be installed on a computer that has 16 GB of RAM? (Choose all that apply.) Windows 7 Professional Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium
Windows 7 Professional Windows 7 Home Premium
What editions of Vista with service pack 2 of windows 7 could it upgrade to?
Windows 7 Ultimate and Home
What tool should be used when upgrading ensuring the components in a system is compatible when upgrading from Vista to 7?
Windows 7 Upgrade Advisor
On what operating systems is the snap function available?
Windows 7 and up
What versions of Windows 8.1 are valid in-place upgrade paths for a computer that has Windows 7 Starter edition on it? (Choose all that apply.) Windows 8.1 Windows 8.1 Pro Windows 8.1 Enterprise Windows 8.1 Ultimate
Windows 8.1 Windows 8.1 Pro
What operating systems support multilingual support?
Windows 8.1, 8, Ultimate, and Vista Ultimate
What Windows tool helps analyze security state of a organization?
Windows Baseline Security Analyzer
What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS?
Windows Boot Manager
In Windows 8/7/Vista, the program responsible for loading Windows.
Windows Boot Manager (BootMgr)
Which Windows tool monitors activity and alerts you if a running program appears to be malicious or damaging the system?
Windows Defender
a utility to copy user data and settings from one computer to another
Windows Easy Transfer
What should be used to find a computers base score?
Windows Experience Index
When a technician needs to start an image deployment, what version of Windows will be run on the target computer? Windows 7 Starter Windows 8 Starter Windows PE Windows XP
Windows PE
uses a flash drive or secure digital (SD) memory card to boost hard drive performance
Windows ReadyBoost
A lean operating system that can be used to troubleshoot problems when Windows refuses to start
Windows Recovery Environment (RE)
What Microsoft operating system first used UAC?
Windows Vista
What edition of windows vista can support 1GHZ and 2GB of RAM?
Windows Vista Ultimate and Business
Windows XP Mode
Windows XP environment installed in Windows 7 that can be used to support older applications.
Four
Windows can handle up to_____ partitions on a drive.
client/server
Windows domain is a type of ____/_____ netowrk
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have? -a USB port -an authentication key on the hard drive -a TPM chip on the motherboard -a PIN on the BIOS
a TPM chip on the motherboard
What is a rootkit?
a collection of programs that grants a hacker administrative access to a computer or network
What occurs if a application attempts to use a portion of memory that is already used or isn't valid?
a general protection fault (GPF)
What statement about an FRU is true? -they are not necessary for the computer's operation -all types can be easily disposed of in any trash can -it's easily repaired by a support technician -a support technician should know how to replace one
a support technician should know how to replace one
Whats the best way to ensure something has most updated drivers?
accept option to download drivers and new packages
What is a structured form of listening and responding to a speaker?
active listening
What informs the BIOS that a partition or volume is a valid system partition?
active parition
A red x is displayed on WiFi adapter what does this mean?
adapter is disabled
A computer is running slow and a 150 GB drive is only installed on the computer what should be done?
add identical and config for RAID-0
What is the requirements to have Windows XP mode on 7?
additional 1 GB RAM and 15 GB HDD space
Pointer movement is very erratic on a laptop what should be done?
adjust touchpad sensitivity
the folders that are shared by default on a network domain that administrator accounts can access
administrative shares
Whats step 2 in troubleshooting
analyze the problem
What does hand geometry do?
analyzes length and width of hand
used during an unattended installation
answer file
What steps can be taken to prevent ESD?
anti-static band and proper grounding
What should be done if you cannot understand a person's problem while they are explaining it?
ask for clarification
What should be done if asked to perform a task outside of job scope?
ask supervisor
Which type of communication assists you to prevent being taken advantage of by others?
assertive communication
Why type of communication creates a win-win situation for both parties?
assertive communication
What should be done before any changes are made to a system that is experiencing a problem?
back up data
contains a list of OS commands that are executed as a group
batch file
Which statement is NOT a good practice when working inside a computer case? (1pts) be sure to hold expansion cards by the edge connectors don't touch a microchip with a magnetized screwdriver remove loose jewelry don't touch the inside of a computer that is turned on
be sure to hold expansion cards by the edge connectors
A computer keeps getting bsod what is the first step to fix?
boot from last good config
What should be tried whenever a system is caught in an endless cycle of restarts?
boot in safe mode
If using a dual or multiboot configuration, what screen appears during the boot sequence? OS select BIOS screen boot loader menu Multi-Windows Login screen Secure Boot OS page
boot loader menu
What does a blue screen error mean on windows boot?
boot process failure
What file is required for users to be able to select which operating systems to load?
boot.ini
What command can be used to edit the boot.ini file?
bootcfg.exe
What replace NTLDR file?
bootmgr
What replaces NTLDR in Windows Vista?
bootmgr
What command can be used to scan for Windows installations not stored in the BCD?
bootrec /scanOS
What command can be used to repair a dual boot system?
bootsect
What type of attack uses drones to send spam email?
botnet attack
cable internet
broadband technology that uses cable TV lines and is always connected
If theirs a leak in the server room who should be called first?
building services
Which of the following is NOT true about Remote Desktop?
by default all users can access Remote Desktop
What statement regarding passwords on Windows is accurate? -it's best to write your password down so you don't get locked out of your computer -passwords cannot be longer than 14 characters -by default, accounts with a blank password cannot logon remotely -letters and numbers are allowed, but no symbols such as '@' or '!'
by default, accounts with a blank password cannot logon remotely
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term? evidence security roster chain of custody item inventory evidence tracking list
chain of custody
What command is used to display the status of a disk in a current drive?
chkdsk
What command changes the log file size?
chkdsk /l[:size]
What command can be used to check for file system errors?
chkdsk /r
MAN
city or campus internet
In order to remove any partition or volume information from a selected disk, what diskpart command should be used?
clean
What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed? clean install dual boot in-place upgrade standard
clean install
What should be done in internet explorer when the error "SSL certificates are no longer valid"
clear SSL state in internet explorer
what keypress sequence is used to open the Force Quit window on a Mac
command + option + esc
What command can compare the contents of two files?
comp
What command can display or alter compression on a NTFS partition?
compact
What are some of the ways you can use BitLocker Encryption? (Choose all that apply.) -computer authentication using TPM -user authentication using a certificate -user authentication using a USB flash drive -computer and user authentication using a PIN and TPM
computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
What would case the following errors: Non-system disk or disk error Replace and strike key when ready
computer has a non-system boot-able disk inserted into floppy drive
Preboot eXecution Environment/ PXE
contained in the BIOS code on the motherboard. It searches for a server on the network to provide a bootable operating system.
Where should one go to change the format of the date?
control panel> clock, lang, and region> region and lang
what command can be used to copy and convert files, directories, partitions, and even entire DVDs or hard drives
dd
What command displays the help information for defrag?
defrag -?
What command should be used to scan only drive D:\ for defragments?
defrag D: -A
What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive? ATA Secure Erase low-level format degausser magnetic data filter
degausser
What windows utility helps diagnose hardware-related problems?
device manager
bridge
device that is between two segments of a network and manages the network traffic
What attack best describes one involve passwords and encryption?
dictionary attacks
If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create? dual cross controlled selective
dual
If a game or desktop publishing app that relies heavily on graphics is not performing well or giving errors, what command can you run to view DirectX information? dxtshoot.exe gpudiag.exe dxdiag.exe video.exe
dxdiag.exe
what might be required to set up a virtual machine such that hardware is virtualized and presented to the VM, including such devices as a virtual processor, memory, motherboard, hard drive, optical drive, keyboard, mouse, monitor, and other components or peripherals
emulator
How to ensure probe requests arent sent by a laptop?
ensure connect when network not broadcasting is cleared
What is the first step when a fire starts?
evacuate the building
whats step 5 in troubleshooting
evaluate the results
What would be used to delete system logs?
event viewer
The Windows kernel includes what two main components? background services executive services HAL shell
executive services HAL
What is the fourth partition on a hard drive called?
extended partition
programs on Mac that launch at startup are called login items
false
the overall structure an OS uses to name, store, and organize files on a volume
file system
Programs and data that are stored on a motherboard are referred to by what term? firmware package blob instruction set
firmware
What would happen if a phone playing music was brought into a sauna but then stopped playing music soon after?
iPhone overheated
What command can be used to take full access of a file? takeown attrib perms icacls
icacls
permissions assigned by Windows that are attained from a parent object
inherited permissions
What should one install to protect computer from a power surge?
install a UPS
What should be done prior to upgrading to a windows 7 from vista?
install latest service pack
How to properly ensure that a computer receives a new ip address?
ipconfig /release ipconfig /renew
What statement is true regarding the Guest account in Windows 7? -it is disabled by default -it automatically has a complex password -you cannot rename it -it has administrative access
it is disabled by default
What does "plenum" rating tell about the cable?
it will not produce toxic gas when burnt
How would one protect cables in server room and avoid cables from cluttering floor?
keep cables organized off floor and away from walkways
what occurs when Linux encounters an error from which it cannot recover
kernel panic
What are two names for the database that holds digital signatures provided by OS manufacturers, such as Microsoft and Red Hat? key-exchange Key key-enrollment Key key-registration Key key-authority Key
key-exchange Key key-enrollment Key
WAN
large geographical wireless network
What are two main components of a high voltage probe?
large needle and gauge
What saves the registry on each login?
last known good configuration
a bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term
live CD
What does the D:\MYDOCS\FILECHK.* /S command do?
locates all files in MYDOCS with the name FILECHK
What type of partition cannot be the active one?
logical
A member has lost their phone it had remote wipe and passcode locks, what should be done?
login to iCloud and remote wipe the device
What is not a Windows 8 charm?
logoff
As a technician who frequently observes electrostatic discharge damage, you have become concerned about the presence of contributing factors in your work area. Which environmental condition is most likely to cause ESD?
low humidity
What most likely is to harm the data on a SATA hdd and backup tapes?
magnets
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild? rootkits malware signatures static updates Windows updates
malware signatures
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring? rootkit zombie brute-force man-in-the-middle
man-in-the-middle
What should be referred to whilst explaining the strengths with a technology?
manual
You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the ____ tool.
memory diagnostics
Which tool should be the first one to use when a blue screen error has occurred?
microsoft website
Using a PIN or password in addition to TPM is an example of what type of authentication? multifactor biometric asymmetric symmetric
multifactor
What general-purpose tool can measure characteristics of electricity in a variety of devices? loopback plug POST card multimeter cable tester
multimeter
Whats the easiest security for mobile devices?
passcode locks
What is the 4th best practice with Mac and Linux?
patch mangement
What windows command line tool launches performance monitor?
perfmon
when using Mac OS X, what gesture can be used to show the Launchpad
pinch
What methods exist to lock down a workstation running Windows, such as when stepping away from the screen? (Choose all that apply.) -press Ctrl+End and click Logon Screen -press Windows key + L -press Ctrl+Alt+Delete and click Lock this Computer -press F1 and click Sleep
press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
Which of the following represents a method for accessing the BIOS setup program? -boot Windows and go to Control Panel -set a motherboard jumper and start the computer -press a key or combination of keys during the BIOS POST -boot to the BIOS setup floppy disk
press a key or combination of keys during the BIOS POST
When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?
private data for each user should be kept in their C:\Users folder
CryptoLocker is an example of what type of malware? zero-day attack worm ransomware man-in-the-middle
ransomware
What does the mstsc command do?
remotes into a computer
A computer boots as usual but the screen remains black what should be done?
replace monitor
Why would one use SFC?
repopulates the dllcache folder
If you want to be able to wear gloves while using a smart phone, which screen technology will work?
resistive touch screen
Whats the term for sharing cloud services with multiple subs?
resource pooling
What task can't be performed by using Task Manager? end a proces end process tree restart a process start a process
restart a process
What can fix a driver issue when last known good config doesnt work?
restart into safemode, perform driver rollback
A snapshot of the system settings and configuration is called a ____________.
restore point
Snapshots of the system and include windows system files that have changed.
restore points
How would a program be ran with higher permissions?
right-click and run as admin, right-click cmd> run as admin> enter command for program> right-click>properties>compat tab> run as admin
What statement about controlling access to folders and files is accurate?
rights are assigned to accounts
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads? Trojan horse rootkit adware worm
rootkit
SOHO typically comes with many functions which can be:
router, switch, WAP, firewall, and Ftp server
Which statement is incorrect about routers?
routing occurs at OSI layer 4 (transport)
What kind of shoe sole should be in a technicians shoes?
rubber soles
What is the purpose of fsck command on linux?
runs a logical filesystem check
What command is used to check the directory structure in old versions of windows?
scandisk
What commands are used by the USMT software? (Choose all that apply.) imagecopy scanstate loadstate imagestate
scanstate loadstate
What SFC command scans all system files once when you restart?
sfc /scanonce
a method to control access to a shared folder and can be assigned to NTFS or FAT volumes
share permissions
the portion of an OS that relates to the user and to applications
shell
A person that secretly peaks at your monitor screen while you work may be doing what? tailgating screen capping shoulder surfing social engineering
shoulder surfing
A user was hacked at a coffee shop what attack most likely happened?
shoulder surfing
What attack involves examining someones computer to steal info?
shoulder surfing
What should be done first if a exposed electric wire is found?
shutdown electricity
How does one send a encrypted email?
signing in with a encrypted signature
What cli command verifies all drivers are signed?
sigverif
LAN
small local area network
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called? retinal scanner LoJack token smart card TPM
smart card
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows startup process?
spacebar
What should you do if you want to be able locate your laptop in the event of loss or theft and give it a command through the Internet to lock it or delete data? -set a BIOS No Access password -subscribe to LoJack for Laptops -enable a GPS module in the BIOS -install a high-power WiFi card
subscribe to LoJack for Laptops
What two different passwords can be set to lock down a computer from unauthorized access? supervisor password e-mail password screen saver password user password
supervisor password user password
What does ctl+alt+t open on linux?
terminal
whats step 3 in troubleshooting
test theory
What are two different ways by which a laptop could utilize the cellular network connection of a mobile device? proxy store and forward tethering hotspot
tethering hotspot
What type of files can the edit.com command edit?
text
What does "a device in system.ini cannot be found" mean?
there are issues with some settings in system.ini configuration file
what statement regarding Type 1 hypervisors is accurate
they are called bare-metal hypervisors
a computer that has an operating system, but has little computing power and might only need to support a browser used to communicate with the server
thin client
Whats a IV attack?
using a initialization vector to crack a WEP secret key
a command that provides encryption options and hard link management within USMT
usmtutils
What should you inform a user about the difference between VGA and DVI?
vga and dvi travel at different speeds vga are analog whilst dvi carry both digital and analog
a text editor that works in command mode or insert mode
vi editor
What is it called when software is used to simulate the hardware of a physical computer? dual boot Windows XP mode virtual machine compatibility mode
virtual machine
software that simulates the hardware of a physical computer
virtual machine
when one physical machine hosts multiple activities that are normally done on multiple machines virtualization
virtualization
What is the name for a partition that has been formatted and assigned a drive letter? partition root volume container
volume
What message displays when one is installing a unsigned driver?
warn
What precaution should be taken in a era that might have ESD?
wear rubber-soled shoes
Product Key
what important info is needed when installing an OEM version of Windows 7
In biometrics, what is a false negative?
when someone is suppose to have access but is erroneously denied
Whats the requirement for a computer to be a member of a windows 7 homegroup?
windows 7
What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI?
winresume.efi winresume.exe
What does ifconfig show?
wired interfaces
WLAN
wireless LAN
What command can be issued within Windows RE to enable networking?
wpeinit