1102 Certification Practice Exam 5 Flashcards
An employee calls to complain that their browser keeps opening up to a strange search engine page, and a toolbar has been added to their browser.
Which of the following malware issues are MOST likely causing the problem?
Software issues
Which of the following is true of a domain controller?
A domain controller is a Windows server that holds a copy of the Active Directory database.
While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file.
Which of the following tools would be best suited for this task? (Select two.)
- Cat
- Tail
Both tail and cat are suited for this task. The tail command prints out the last 10 lines of a file by default. The cat command prints out the contents of a file.
One of the Windows workstations you manage has three user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user.
Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other’s files.
Which of the following would MOST likely increase this system’s security?
-Set a screen saver password.
-Disable Autorun on the system.
In which of the following situations would you use a custom/clean installation?
You want to preserve the existing operating system.
You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department.
One of your users, Jaclyn in HR, is trying to access shared files from Tom’s computer in the sales department. Jaclyn states she was able to previously access these files.
As part of your troubleshooting, you verify that both Tom and Jaclyn can access the network printer in their departments.
Which of the following would be the MOST likely reason Jaclyn is unable to access files on Tom’s computer?
Tom and Jaclyn are no longer on the same subnet.
Which of the following BEST describes the purpose of the USB Selective Suspend feature?
If a USB device is not in use, the USB Selective Suspend feature stops providing power to the port.
To protect a Windows 11 system, you’ve configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?
No. You need to enable File History.
Jeannette’s workstation is overheating. She decides to open the workstation and clean any accumulated dust to see if it helps with the overheating issue.
Which of the following can Jeannette safely do to remove dust?
-Use a special vacuum to clean dust from all hardware components.
-Use short bursts of compressed air to clean delicate components.
You have just finished installing a new Windows Update when your computer locks up. What should you do first?
Uninstall the Windows Update
Which of the following paths open the Computer Management tool in Windows?
-Right-click the Windows icon and select Computer Management.
-In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon.
Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not.
Which category do apps fall into if they have been reviewed, approved, and signed with a certificate?
-TRUSTED
What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?
-UNTRUSTED
Which Windows service stores registered biometric scans for authentication and determines whether they match the stored scan?
Windows Hello
Two employees are unable to access any websites on the internet, but they can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem.
Which of the following actions would BEST resolve this issue?
Identify the proxy server name and port number in Internet Options.
Which of the following Windows components is designed to help you make video calls with contacts through their Microsoft accounts?
Chat
Which of the following is a troubleshooting step to try when troubleshooting application conflicts?
Check for application driver updates.
Match each file system component on the left with the correct description on the right.
A logical division of a storage device associated with a hard drive.
-Partition
A single accessible storage area within a file system.
-Volume
A container in a file system used to logically sort and organize data.
-Directory
A one-dimensional stream of bits treated as a logical unit.
-File
Which of the following door locks provides authentication to a specific lock over a Bluetooth connection?
Key fob
Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process.
What do the employees need to do on their mobile devices in order to be able to participate in the beta test?
Turn on Developer mode.
Match each disk type on the left with its corresponding description/features on the right. Each disk type may be used once, more than once, or not at all.
Support up to 128 volumes.
-Dynamic Disks
Use primary and extended partitions.
-Basic Disks
Are supported by all operating systems.
-Basic Disks
Support volumes that use discontiguous disk space.
-Dynamic Disks
Store partitioning information in a hidden database on all such disks in the system.
-Dynamic Disks
Only support volumes made up of contiguous disk space.
-Basic Disks
Which of the following would you MOST likely recommend that your client do to increase security based on this information?
Install the WAP on the ceiling or inside of a special locked box.
Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis?
Hotfix
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?
Phishing
What method is used to ensure proper ventilation in a server room?
Hot and Cold aisles