Chapt 26 (Pract A) Flashcards

1
Q

Which of these is not generally attributed to an intermittent Wireless issue?

A) radar
B) wireless access points
C) microwave ovens
D) Bluetooth devices

A

Wireless access points

WAP’s are not generally attributed to intermittent Wireless issues. Adding more wireless access points generally reduces connectivity problems. Microwave ovens and Bluetooth devices operate on a 2.4 gigahertz van and can affect 2.4 GHz Wireless. Radar operates on the 5 gigahertz fan and can affect 5 gigahertz wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of software licensing agreement provides a free trial software, with the expectation that the users will pay for it if they decide to keep it?

A) open source
B) shareware
C) freeware
D) single user

A

Shareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When is winresume.exe called by if a system is not starting fresh but resuming a previous session?

A

BOOTMGR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tool can be used to restart a failed service?

A) msconfig.exe
B) WinRE
C) computer management MMC
D) resource monitor

A

Computer management MMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What gpupdate tool options reapplies all policies, even those which haven’t been changed?

A

/force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first step that user should take after they have isolated the problem to an action or process in the operating system?

A) formulate a theory of probable cause
B) test the theory to determine the cause
C) document findings, actions and outcomes
D) establish a plan of action to resolve the problem and implement the solution

A

Formulate a theory of probable cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What authentication system is used as the authentication back end for Wi-Fi networks that are using the WPA Enterprise security?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a laptop that has no CD-ROM drive. And which of the following ways could you install Windows 10? Choose all that apply.

A) by using CD-ROM
B) by using eSATA
C) by using PXE
D) by using USB

A

C, D
PXE and USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these will accomplish a specific task for the user?

A) filesystem
B) operating system
C) application
D) driver

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many partitions does GPT support in microsoft?

A) 4
B) 32
C) 64
D) 128

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When you log into your account, you press a button on your keychain and then type in the new set of numbers it displays. What digital authentication element are you using?

A) digital certificate
B) biometric
C) smart card
D) one time password

A

One time password

You are using one time password that is valid for a single session, so it can’t be stolen and reused. A one-time password can be generated independently on both ends by a sequential or time-based algorithm, or it can be generated by the authenticator and transmitted to the user out of band, such as to an email address or phone number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are having trouble connecting to a server and want to make sure you are receiving the correct IP address from the dns. Which command should you use?

A) tracert
B) ping
C) netstat
D) nslookup

A

nslookup

This command will allow you to verify DNS. When DNS problems arise, this command allows you to verify that DNS is working correctly and that the correct results are being returned. The netstat command will show you network statistics and network connections. The trace route command will show you the path Network traffic will take. The Ping command will allow you to view the current IP address configured on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What operates on Port 22?

A

TCP SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port 23

A

TCP telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTPS operates on what port?

A

TCP 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RDP

A

TCP 3389

17
Q

What happens when the users initialize a disk in windows?

A) they are allowing the DLM to recognize the disc
B) they are allowing LDM to recognize the disc
C) they are allowing the multi boot to recognize the disc
D) they are allowing the image deployment to recognize the disc

A

They are allowing LDM to recognize the disc

Logical disc management

18
Q

Which of the following Windows features provides a scripting language ability that can be used by the users for task automation?

A) Event Viewer
B) command prompt
C) Powershell
D) computer management

A

Powershell

Powershell is a more advanced command prompt included with Windows 7 and later. It provides a wider variety of commands and features than the original command prompt and also provides a scripting language ability that can be used by the users for task automation

19
Q

Which of these is a multitasking method that depends on the application itself to be responsible for using the processor and then freeing it for Access by other applications?

A) Cooperative multitasking
B) preemptive multitasking
C) multi-threading
D) shell

A

Cooperative multitasking

20
Q

Which of these is a multitasking method in which the OS allots each application a certain amount of processor time and then forcibly takes back control and gives another application or task access to the processor?

A) Cooperative multitasking
B) preemptive multitasking
C) multi-threading
D) shell

A

Preemptive multitasking

21
Q

What is the page file called in windows?

A

pagefile.sys

It is located in the root directory of the drive on which the users installed the OS files

22
Q

Which format is used to check for bad sectors on the physical disk before installing the file system structure?

A) full
B) dynamic
C) basic
D) quick

A

Full format

23
Q

Which of these are embedded RFID circuits that fit on a set of keys and are used with physical Access Control systems?

A) smart card
B) biometric
C) magnetometer
D) key fob

A

Key fob

24
Q

What is it called When you search for a product and click the link in the results, the malware will direct your browser to the intended site with an Associated link attached. Now anything you purchase will credit a commission to the person who redirected the browser with the associated bank.

A

Affiliate redirection

25
Q

What is a US federal law designed to prevent fraudulent accounting practices?

A

SOX

26
Q

You are a PC technician in an organization. You are working on a Windows computer and got to know that some necessary dll files are missing. what will you run to troubleshoot the missing dll files?

A

regsvr32

27
Q

What is designed to centrally administered devices in order to assign device permissions, verify Security compliance, apply updates and even monitor activity?

A

MDM

28
Q

What tab in task manager allows you to see processes separated by each customer on the system?

A

Users

29
Q

What program is used to boot windows?

A

winload.exe

30
Q

Which of these is not the common culprit of Random reboots?

A) storage health
B) running applications
C) Auto restart
D) update

A

Storage health

31
Q

What are some common culprits of Random reboots?

A

Battery health, update, storage, running applications, Auto restart, factory reset

32
Q

What is primarily used to segregate Network traffic, optimized network speed and permanently assign a network path for a specific protocol or Network service?

A

Port forwarding

33
Q

Which term defines the pre-compiled instructions that are programmed and allows an operating system and its applications to operate?

A) shell
B) source
C) GUI
D) multitreading

A

Source

Also known as the source code defines the pre-compiled instructions that are programmed and allows the operating system and its applications to operate those instructions

34
Q

You are an IT technician and an organization. You have been given a task to repair a malware infected system. You have identified the symptoms that suggest the presence and nature of the installed malware. Which of the following should be your next step?

A) update the system and schedule future scans
B) update anti-malware software
C) quarantine the infected system
D) disable system restore

A

Quarantine the infected system

35
Q

To properly remove malware from an infected computer, you should perform what following steps?

A

1 identifying malware symptoms
2 Quarantine infected systems
3 Disable system restore
4 Remediate infected systems
5 Schedule scans and updates
6 Enable system restore and create a restore point
7 Educate and users

36
Q

You need to change a computer’s name and join it to a domain. Which of the following will allow you to perform these actions?

A) system properties
B) user accounts
C) device manager
D) credential manager

A

System properties
sysdm.cpl