1102 Certification Practice Exam 4 Flashcards
You are an IT administrator who is troubleshooting a computer from within Windows Command Prompt. You are trying to execute the chkdsk command line tool, but it keeps failing.
Which of the following command switches would give you the BEST information on how to run this command?
chkdsk /?
As a system administrator, you are configuring a new Windows machine for a user in the marketing department.
The user needs to use voice-based interactions for dictation.
Which Windows permission setting should you enable?
Inking & typing personalization
Which of the following BEST describes an IP address class?
The class defines the IP address’s default network address portion.
Which of the following requirements must be met in order to extend a volume? (Select two. Each correct answer is a complete solution.)
-The volume must be formatted with NTFS.
-The volume must be spanned.
Your computer has a single hard disk with a single volume that is used by the C:\ drive. You have previously upgraded the disk to a dynamic disk.
The disk has run out of space, so you want to add more space to the C:\ volume. You add a new hard disk to the computer.
Which of the following is the BEST step to complete while adding space to the C:\ drive?
Create a mount point using space on the second disk.
Which of the following Windows desktop components lets you create multiple desktop to organize availability for different sets of applications?
Virtual desktop
You have added two new hard disks to a Windows computer. The disks are configured as basic disks. As such, which of the following could you configure on these disks? (Select two.)
-Primary partitions
-Extended partitions with logical drives
Which of the following can be used to back up a company’s certificate database?
Certificate Manager
Which of the following wireless security methods uses a common shared key that is configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
Which formatting method leaves data on a drive in a state that can be recovered using special software?
High level formatting
You have just implemented several lockout policies.
Which of the following password attacks will these policies MOST effectively protect against?
Online attack
You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database.
Which of the following attacks was your client MOST likely the victim of?
SQL injection
After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file?
EFS encrypts the FEK by creating a key pair (private and public).
Which of the following statements is true regarding hard tokens?
Hard tokens provide a higher level of security.
Which of the following BYOD risks can leave old information, even financial data and credit card details, vulnerable to malicious purposes?
Bypassing security policies