Chapt 26 (Pract A) Flashcards
Which of these is not generally attributed to an intermittent Wireless issue?
A) radar
B) wireless access points
C) microwave ovens
D) Bluetooth devices
Wireless access points
WAP’s are not generally attributed to intermittent Wireless issues. Adding more wireless access points generally reduces connectivity problems. Microwave ovens and Bluetooth devices operate on a 2.4 gigahertz van and can affect 2.4 GHz Wireless. Radar operates on the 5 gigahertz fan and can affect 5 gigahertz wireless devices.
What type of software licensing agreement provides a free trial software, with the expectation that the users will pay for it if they decide to keep it?
A) open source
B) shareware
C) freeware
D) single user
Shareware
When is winresume.exe called by if a system is not starting fresh but resuming a previous session?
BOOTMGR
Which tool can be used to restart a failed service?
A) msconfig.exe
B) WinRE
C) computer management MMC
D) resource monitor
Computer management MMC
What gpupdate tool options reapplies all policies, even those which haven’t been changed?
/force
What is the first step that user should take after they have isolated the problem to an action or process in the operating system?
A) formulate a theory of probable cause
B) test the theory to determine the cause
C) document findings, actions and outcomes
D) establish a plan of action to resolve the problem and implement the solution
Formulate a theory of probable cause
What authentication system is used as the authentication back end for Wi-Fi networks that are using the WPA Enterprise security?
RADIUS
You have a laptop that has no CD-ROM drive. And which of the following ways could you install Windows 10? Choose all that apply.
A) by using CD-ROM
B) by using eSATA
C) by using PXE
D) by using USB
C, D
PXE and USB
Which of these will accomplish a specific task for the user?
A) filesystem
B) operating system
C) application
D) driver
Application
How many partitions does GPT support in microsoft?
A) 4
B) 32
C) 64
D) 128
128
When you log into your account, you press a button on your keychain and then type in the new set of numbers it displays. What digital authentication element are you using?
A) digital certificate
B) biometric
C) smart card
D) one time password
One time password
You are using one time password that is valid for a single session, so it can’t be stolen and reused. A one-time password can be generated independently on both ends by a sequential or time-based algorithm, or it can be generated by the authenticator and transmitted to the user out of band, such as to an email address or phone number
You are having trouble connecting to a server and want to make sure you are receiving the correct IP address from the dns. Which command should you use?
A) tracert
B) ping
C) netstat
D) nslookup
nslookup
This command will allow you to verify DNS. When DNS problems arise, this command allows you to verify that DNS is working correctly and that the correct results are being returned. The netstat command will show you network statistics and network connections. The trace route command will show you the path Network traffic will take. The Ping command will allow you to view the current IP address configured on the computer
What operates on Port 22?
TCP SSH
Port 23
TCP telnet
HTTPS operates on what port?
TCP 443
RDP
TCP 3389
What happens when the users initialize a disk in windows?
A) they are allowing the DLM to recognize the disc
B) they are allowing LDM to recognize the disc
C) they are allowing the multi boot to recognize the disc
D) they are allowing the image deployment to recognize the disc
They are allowing LDM to recognize the disc
Logical disc management
Which of the following Windows features provides a scripting language ability that can be used by the users for task automation?
A) Event Viewer
B) command prompt
C) Powershell
D) computer management
Powershell
Powershell is a more advanced command prompt included with Windows 7 and later. It provides a wider variety of commands and features than the original command prompt and also provides a scripting language ability that can be used by the users for task automation
Which of these is a multitasking method that depends on the application itself to be responsible for using the processor and then freeing it for Access by other applications?
A) Cooperative multitasking
B) preemptive multitasking
C) multi-threading
D) shell
Cooperative multitasking
Which of these is a multitasking method in which the OS allots each application a certain amount of processor time and then forcibly takes back control and gives another application or task access to the processor?
A) Cooperative multitasking
B) preemptive multitasking
C) multi-threading
D) shell
Preemptive multitasking
What is the page file called in windows?
pagefile.sys
It is located in the root directory of the drive on which the users installed the OS files
Which format is used to check for bad sectors on the physical disk before installing the file system structure?
A) full
B) dynamic
C) basic
D) quick
Full format
Which of these are embedded RFID circuits that fit on a set of keys and are used with physical Access Control systems?
A) smart card
B) biometric
C) magnetometer
D) key fob
Key fob
What is it called When you search for a product and click the link in the results, the malware will direct your browser to the intended site with an Associated link attached. Now anything you purchase will credit a commission to the person who redirected the browser with the associated bank.
Affiliate redirection
What is a US federal law designed to prevent fraudulent accounting practices?
SOX
You are a PC technician in an organization. You are working on a Windows computer and got to know that some necessary dll files are missing. what will you run to troubleshoot the missing dll files?
regsvr32
What is designed to centrally administered devices in order to assign device permissions, verify Security compliance, apply updates and even monitor activity?
MDM
What tab in task manager allows you to see processes separated by each customer on the system?
Users
What program is used to boot windows?
winload.exe
Which of these is not the common culprit of Random reboots?
A) storage health
B) running applications
C) Auto restart
D) update
Storage health
What are some common culprits of Random reboots?
Battery health, update, storage, running applications, Auto restart, factory reset
What is primarily used to segregate Network traffic, optimized network speed and permanently assign a network path for a specific protocol or Network service?
Port forwarding
Which term defines the pre-compiled instructions that are programmed and allows an operating system and its applications to operate?
A) shell
B) source
C) GUI
D) multitreading
Source
Also known as the source code defines the pre-compiled instructions that are programmed and allows the operating system and its applications to operate those instructions
You are an IT technician and an organization. You have been given a task to repair a malware infected system. You have identified the symptoms that suggest the presence and nature of the installed malware. Which of the following should be your next step?
A) update the system and schedule future scans
B) update anti-malware software
C) quarantine the infected system
D) disable system restore
Quarantine the infected system
To properly remove malware from an infected computer, you should perform what following steps?
1 identifying malware symptoms
2 Quarantine infected systems
3 Disable system restore
4 Remediate infected systems
5 Schedule scans and updates
6 Enable system restore and create a restore point
7 Educate and users
You need to change a computer’s name and join it to a domain. Which of the following will allow you to perform these actions?
A) system properties
B) user accounts
C) device manager
D) credential manager
System properties
sysdm.cpl