1102 Practice Questions Flashcards
PE-1102-3: You are planning on formatting a hard drive with NTFS that will be used to share files between Win 10 and Win 11 Pro computers. Which of the following features are present in NTFS? (choose two)
Linux OS support
File compression
File and folder encryption
Enhanced flash drive support
File compression
File and folder encryption
PE-1102-6: You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content?
Online content is considered open source; therefore, you may use whatever you find
Online content can be protected thru the use of DRM
Online content is protected through the use of a EULA
Online content is protected thru terms established by Microsoft
Online content can be protected thru the use of DRM
PE-1102-9: You have a situation that requires installing Windows 11 from installation media. You’ll be launching setup on the media while you are on the existing Windows 10 desktop. Which of the following is not an option?
Full Upgrade
Keep Data Only
Forensic Install
Clean Install
Forensic Install
PE-1102-15: You have installed a second hard drive in a Windows workstation. In Disk Management, what type of partition can you create that will allow you to create and unlimited number of logical partitions in it?
Extended
Dynamic
Logical
GPT
GPT
GUID Partition Table
- no limits on logical partititions
- partitions can be limited by OS; e.g: Win 10 limits logical partitions at 128
- newer tech
- Win 11 supports only this
PE-1102-24: You want to protect mobile device users on your network from potentially leaked files or data. Which of the following should you do to help reduce risk? (Choose two)
Disable network autoconnect
Enforce data transmission over limits
Enable device encryption
Install mobile firewalls
Disable network autoconnect
Enable device encryption
PE-1102-34: You are at a Windows command prompt in the D:\users folder. You want to use the copy command to copy the D:\users\jdoe folder to the D:\files folder. Which of the following statements is true?
- You can’t use the copy command to perform this task
- You can use the command copy D:\users\jdoe*.* D:\files
- You can use the command copy D:\users\jdoe D:\files
- You can use the command copy D:\users\jdoe D:\files /y
You can’t use the copy command to perform this task
Note: xcopy is used to copy folders
PE-1102-37: You are troubleshooting a malware problem with a Windows 11 computer and find that you need to boot into safe mode/safe boot, which loads minimal drivers. Which management tool can you use to force the system to boot into safe mode when it reboots?
Task Scheduler
Computer Management
System Configuration
Task Manager
System Configuration
PE-1102-38: Which of the following is an advantage of using share permissions over NTFS permissions?
- Share permissions will override NTFS permissions if there is a conflict
- Share permissions can be enabled to secure resources across the network that are not on an NTFS partition
- Share permissions apply when users access a resource across the network, but NTFS permissions only apply to local users
- Share permissions are able to be set at the file level, whereas NTFS permissions can be set only at the folder level
Share permissions can be enabled to secure resources across the network that are not on an NTFS partition
What to know about NTFS and Share Permissions
- Share permissions are only in affect when a user connects across a network
- NTFS permissions are able to be applied at file and folder level
- Share permissions are applied only at folder level
- NTFS permissions can apply locally or across the network wherever NTFS permissions are applied
PE-1102-39: Your manager is concerned that your company could divulge PII. Which of the following types of data is not considered PII?
First name
Home address
Family member names
Employee ID number
First name
PE-1102-43: You have a Linux server on your network. You want to back up all files in the /user/files volume without disrupting user access. What should you use to do this?
Time Machine
Remote Disc
Snapshot
FileVault
Snapshot
THIS IS BULLSHIT BECAUSE ITS CALLED TIME MACHINE SNAPSHOTS AND YOU COMPTIA FUCKERS DIDNT SAY IT WAS A VM!!!! FUCK!
PE-1102-46: You are attempting to update a WIn 10 workstation using Windows Update. The update fails with this message: “failure configuring Windows updates. Reverting changes.” You reboot, try again and receive the same error. What should you try next? (Choose two)
- Wait until the changes are reverted. Unplug removable media from your computer and try again.
- Wait until the changes are reverted. Run a virus scan and try again
- Wait until the changes are reverted. Run the Windows Update Troubleshooter
- Ignore the update
- Wait until the changes are reverted. Unplug removable media from your computer and try again.
- Wait until the changes are reverted. Run the Windows Update Troubleshooter
PE-1102-50: Which of the following features are not available in the Home edition of Windows but are available in the Pro and higher editions? (Choose three)
- File compression
- Join a Windows domain
- Group Policy Editor (gpedit.msc)
- RDP
- Join a Windows domain
- Group Policy Editor (gpedit.msc)
- RDP
PE-1102-51: You’re configuring a remote connection and need a protocol or process to ensure that both parties to a transaction are who they say they are and to encrypt their user information as it passes from one to the other. Which of the following will you use?
- MFA
- Kereberos
- RADIUS
- TKIP
Kereberos
Which authenticates both parties?
- Kereberos
- RADIUS
Kereberos
RADIUS only authenticates the remote user
PE-1102-52: A user called the help desk because their mouse is moving across the street and windows are opening and closing. They believe its not malware because they said they didn’t do anything; they just opened an email with a strange subject. Which of the following will be most important to prevent malware on this computer going forward?
Educate users regarding threats
Install anti-malware and set it to update automatically
Enable and configure software firewalls
Enable and configure hardware firewalls
Educate users regarding threats
PE-1102-53: When your friend launches their favorite new game, they often get low memory warnings. Which of the two following can you do to prevent this problem from happening in the future? (Choose two)
Use Task Manager to end unnecessary programs
Increase virtual memory
Increase physical memory
Put in a faster NIC
Increase virtual memory
Increase physical memory
PE-1102-54: A friend is having trouble with the network connection on their Windows 10 computer,so you open Network and Internet in the settings app. Which of the following is not an option there?
Network Troubleshooter
Mobile Hotspot
Change Adapter Settings
Share a Printer
Share a Printer
PE-1102-55: You need to manually configure the IP address for a server, so you go to Network and Sharing Center, Change Adapter Settings, then right-click the connection, choose Properties and select IPv6. Which of the following pieces of information is not needed to configure IPv6?
IPv6 address
Subnet mask
Subnet prefix length
Default Gateway
Subnet mask
PE-1102-68: Your friend in another state is having a problem with their Win 10 Home edition computer and wants your help. What could you do to provide the quickest help possible?
RDP
VPN
MSRA
RMM
MSRA
Note: RDP not available in Win 10 Home
This is now calledor related to Quick Assist in Win 11
PE-1102-70: You need to add a new user on a Windows desktop computer. Where can you go to do this? (choose two)
Settings -> Accounts
Settings -> Users
Control Panel -> User Accounts
Control Panel -> Credential Manager
Settings -> Accounts
Control Panel -> User Accounts
PE-1102-72: One of the users you are responsible for called the help desk because when they turned the computer on this morning, instead of booting into WIndows, it showed a green screen with 1s and 0s running down it. What will you do?
- Turn the computer off and boot using boot media from your antivirus company
- Go into WinRE and repair the OS installation
- Go into WinRE and perform a clean installation of the OS
- Boot into Safe Mode and restore from a recent restore point
- Turn the computer off and boot using boot media from your antivirus company
PE-1102-82: Your client has a computer on their network that they have configured to be a secure web server. How should you configure their router to ensure that traffic for the server is going to the server? (choose two)
- Forward outgoing requests for port 443 to the web server’s IP address
- Forward incoming requests for port 443 to the web server’s IP address
- Set the router to use UPnP
- Create a screened subnet for the web server
- Forward incoming requests for port 443 to the web server’s IP address
- Create a screened subnet for the web server
PE-1102-93: You need to ensure that your Linux computer is up to date. Which command can be used to do this automatically?
yum
pwd
chmod
apt-get
yum
PE-1102-95: An application on your mobile device has crashed and is unresponsive. What should your first choice be to fix it?
Force-close the application
Restart the device
Revert to factory defaults
Reinstall the application
Force-close the application
PE-1102-100: You’re on your smartphone and notice that the apps are all responding slowly, almost jittery when you change from one to the other. What is the first thing to do?
Check the device storage
Close some running apps
Suspect a virus
Check the battery charge
Check the battery charge