Core 2 (11/15-1/30) Flashcards

1
Q

You finish replacing the network adapter in a company workstation and verify full system functionality.

Using the six steps of troubleshooting, which step should you take next?

A

document findings, actions and outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the six steps of troubleshooting?

A

1) Identify the problem
2) Establish a theory of probable cause
3) Test the theory
4) Establish a plan
5) Verify full system functionality
6) Document findings, actions, and outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these hazards does a surge suppressor protect against?

A

Power spikes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You complete a trouble ticket submitted by a client. Once the problem is corrected, you ask the customer to verify that the system works as expected.

The customer acknowledges that the computer is functional, but states that there is a dim flicker that occurs often enough that it is giving him a headache.

You tell the customer that this is a result of action that had to be taken to correct that original problem. However it should diminish over time and the customer’s headaches will then go away.

Which of the principles shown below did you violate?

A

Do not dismiss the customer’s problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which backup type would you use to ensure all data is included in the scheduled backups?

A

Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In what way do administrators use Windows PowerShell?

A

create and run scripts used to manage the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Joe is attempting to repair an application on his computer. When he tries to start the program, the system returns a “DLL is missing” error message.

Joe imports a copy of the missing .dll file to his computer, but the program continues to return the error message and fails to start.

Which of the following tools should Joe use to complete the .dll import process?

A

regsrv32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are troubleshooting a computer at a client’s site. The client is upset because a number of important files have disappeared from his Documents folder. The client is sure that the files were there two days ago and can think of no reason why they would have disappeared.

You can restore the missing files from a tape backup.

Using the theory of troubleshooting, what should you do next?

A

Establish a theory of probably cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A customer has made several trouble calls to the help desk and is very irate. The technician that receives the call has learned that the issue has not yet been resolved. The technician politely asks the customer to explain the issue, and learns that the problem needs to be escalated. Which of the following should the technician do once the problem has been escalated?

A

communicate status with the customer and ensure a successful call transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is onsite troubleshooting a user’s issue and receives a call from another customer. Which of the following is the best course of action for the technician to take in this situation?

A

let the call go to voicemail and respond when time permits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A computer is making a clicking noise, but is otherwise operating normally. What should you do first when responding to the issue?

A

Attempt to backup data from the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user submits a trouble ticket to the help desk. In completing the ticket, the user states that the problem is related to a newly installed application. After reading the full description of the problem, you know that the problem is related to something completely different.

Instead of following the course of action that the user recommends, you try to persuade the user that your method will be best. This exchange results in some harsh words between you and the user.

How should you have responded to the user?

A

You should have acknowledged the customer’s input, and then resolved the problem using your own knowledge of the best way to proceed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best way to deal with a difficult user?

A

Don’t allow yourself to be drawn into an argument or become defensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dan, a new help desk technician, is talking with a customer on the phone. The customer has a problem that Dan has never seen before and does not know how to troubleshoot.

What is the first thing that Dan should say to the customer?

“Please hold while I escalate this problem to a Level II technician.”
“Please be patient with me. This is the first time I have encountered this problem.”
“Please hold while I consult with one of our senior technicians about your issue.”
“Would you mind holding for no more than two minutes while I check our resources?”

A

“Would you mind holding for no more than two minutes while I check our resources?”

It also gives Dan time to see if there is a simple solution to the problem or if it might need to be escalated. Until Dan has a chance to ask another technician how to deal with the user’s problem, he doesn’t know if the problem should be escalated or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the next step?

A

identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A client needs to work on some critical files, but says she cannot find them.

Using the theory of troubleshooting, what step should you complete first to resolve the problem?

A

Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user calls the help desk to report a problem with a Windows computer. On the previous day, the user downloaded a new application from an approved share on the company’s network. Everything was working well yesterday.

This morning, when the user came in and restarted his computer, he received several messages which state that a DLL file that cannot be found.

You have been assigned to resolve this problem. What is the best course of action for you to take next?

A

Copy the DLL file from a working computer and use the regsvr32 command to import the file

In this case, it would appear that a needed .dll file was overwritten when the user downloaded and installed the new application. In order to fix the problem, you will need to restore the missing .dll by copying it from a trusted source and using the Regsvr32 utility to register the .dll file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is DLL?

A

(Dynamic Link Library) files are composed of computer data and code. These are used by software makers as shared resources on Windows operating systems. Rather than install separate components, they share the same DLL file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Regsvr32?

A

a command-line utility to register and unregister OLE controls, such as DLLs and ActiveX controls in the Windows Registry. Regsvr32.exe is installed in the C:\Windows\System32 folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ann, a user at your company, brings her laptop to you for repair. What is the least professional thing you could say or offer to Ann?

“The department is slammed with repairs right now. Would you be able to bring the laptop back a little later when we are less busy?”
“Now that I have your laptop checked in for repair, may I offer you the use of a loaner laptop?”
“Please have a seat in the area while I work on your laptop.”
“Your laptop will be ready later today. Please feel free to come by any time at your convenience and see if the machine is ready.”

A

“The department is slammed with repairs right now. Would you be able to bring the laptop back a little later when we are less busy?”

Why?
1. You failed to recognize that the user has a problem.
2. You ignored the inconvenience you are causing your coworker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are considering different methods for protecting the electronic devices on your company’s network. Which of the following devices will protect the equipment to which it is attached by directing power surges to the path of least resistance?

A

surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a surge protector?

A

a device that re-directs power surges through an alternate path of least resistance (or to “ground”), protecting valuable electronic equipment. Surge protectors should be installed on any equipment that contains a microprocessor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Read / Write errors are occurring intermittently on your PC. Which of the following actions would you MOST likely take?

Low level format the drive

Run FDISK on the drive

Update definitions and run a virus scan

Run CHKDSK on the drive

A

Run CHKDSK on the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You are installing a wireless router in your home. What are the two most important actions you could perform to ensure that your network is secured from access by unauthorized users? Select two.

Change the default login name and password on the new router

Verify that the router firmware has the latest updates installed

Modify the encryption settings on each workstation’s wireless adapter

Enable encryption on the new router

Harden all workstations on your network

A

Change the default login name and password on the new router

Enable encryption on the new router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A network administrator is unable to install programs on a workstation. Which of the following is most likely the reason the administrator is not able to install applications?

the username is not part of the local administrator group

the workstation is the victim of a denial of service attack

the username is not authenticating on the network

the administrator has not applied appropriate security patches

A

the username is not part of the local administrator group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which Control Panel path would you use to review and correct the issue of a user’s computer that keeps producing a low virtual memory alert and experiences a degradation of performance shortly after?

System > System Restore

System > Advanced

System > Hardware

System > Remote

A

System > Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following descriptions best describes a botnet?

a security hole which can be exploited by hackers before the vendor becomes aware if the problem and fixes it

attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication

an interconnected network of computers infected with malware without the user’s knowledge and controlled by cybercriminals

an attack which secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other

A

an interconnected network of computers infected with malware without the user’s knowledge and controlled by cybercriminals

They’re typically used to send spam emails, transmit viruses and engage in other acts of cybercrime. They are sometimes known as a zombie army.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following commands cannot be completed using IPCONFIG?

determine if the computer is configured to be a DHCP client

find the MAC address assigned to a network interface card

find the assigned default gateway for a computer

send an ICMP packet to determine if a remote computer is accessible from the local computer

A

send an ICMP packet to determine if a remote computer is accessible from the local computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the PING command?

A

used to demonstrate connectivity between two computers

send an ICMP packet to determine if a remote computer is accessible from the local computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following Windows operating system features is used to manage offline file activity?

Control Panel

Windows Updates

Sync Center

One Drive

A

Sync Center

Sync Center allows you to check the results of your recent sync activity if you’ve set up your computer to sync files with a network server. This allows you to access copies of your network files even when your computer isn’t connected to the network. Sync Center can tell you if the files synced successfully or if there are any sync errors or warnings.

If you’ve ever needed to access important files stored in a shared folder on your network but couldn’t because your laptop was disconnected from the network, then you can understand the need for offline files. With offline files, you can access copies of your network files even when your computer isn’t connected to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which tool, included as a part of the Windows operating system, will you be prompted to use if Windows detects possible problems with your computer’s memory?

Event Viewer

Computer Management

Windows Memory Diagnostic

Component Services

A

Windows Memory Diagnostic

If Windows detects possible problems with your computer’s memory, it will prompt you to run the Memory Diagnostics Tool. The Memory Diagnostics Tool will run automatically when you restart Windows. It might take several minutes for the tool to finish checking your computer’s memory. Once the test is completed, Windows will restart automatically. If the tool detects errors, you should contact your computer manufacturer for information about fixing them, since memory errors usually indicate a problem with the memory chips in your computer or other hardware problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A new user calls the help desk in tears. She reports that she accidentally kicked the power strip under her desk which cut power to her desktop computer. Now when she boots the machine, it takes a very long time to start and all her applications seem to be running much slower.

You examine the Event Viewer files on her computer and find several messages stating that the file system is corrupt.

What action should you take next to help resolve this problem?

run chkdsk with the /r switch and reboot the PC

convert the hard drive to the FAT32 file system

replace the hard drive in the computer

reinstall the operating system

A

run chkdsk with the /r switch and reboot the PC

Chkdsk creates and displays a status report for a disk based on the file system. Chkdsk also lists and corrects errors on the disk. Used without parameters, chkdsk displays the status of the disk in the current drive.

When run with the /r parameter, chkdsk locates bad sectors and recovers readable information. If the improper shutdown causes a file system corruption, this would be the least invasive way to try and recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Your company wants to replace the current user workstations with new computers that will run Windows 10. You have been given three new computers. Each computer has a slightly different hardware configuration from the other two. All three computers run Windows.

You install a critical application that was written for Windows 7 on the new computers. What feature or function could you use to help ensure that the application will run on Windows 10?

Microsoft Store

Control Panel / Programs and Features

Right click the application file in File Explorer / Properties / Compatibility tab

Windows Settings / Apps / Default Apps

A

Right click the application file in File Explorer / Properties / Compatibility tab

The Properties dialog box for executable files and the shortcuts to these programs have a Compatibility tab. It allows you to configure the program’s original operating system environment and force it to use compatible display settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

You have configured a hard drive so that it can boot into more than one operating system based on a selection made by a user at startup. The drive can best be described as a:

Virtual drive

Core drive

Mirrored drive

Dual boot drive

A

Dual boot drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the average operating range of a Class 2 Bluetooth device?

5 meters (16.4 feet)

100 meters (328 feet)

1 meters (3.28 feet)

10 meters (32.8 feet)

A

10 meters (32.8 feet)

Bluetooth technology functions by creating a wireless personal area network (PAN), also known as a piconet, which Bluetooth-enabled devices can connect to. Once two devices are connected to the same piconet, they can communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are troubleshooting a Windows computer from a command prompt window. As you navigate through the file system, you find that a new folder was recently created on the computer. You need to see what files have been saved to the new folder.

Which of the commands shown below would you use to display the folder contents?

md

cd

dir

rd

A

dir

The directory command (dir) is used to display the contents of the current folder or directory.

The other commands are used to move from one folder or directory to another (cd or change directory), create new folders or directories (md or make directory), or to delete directories from a drive (rd or remove directory).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the statements shown below are NOT true regarding the similarities and difference between the Windows 32-bit and Windows 64-bit operating systems.

Windows 64-bit operating systems can address larger amounts of RAM than Windows 32-bit operating systems can.

Windows 32-bit operating system typically contain the same security features found in 64-bit versions of the same Windows operating systems.

Windows 32-bit operating systems typically do not use the same device drivers used by Windows 64-bit operating systems.

Any processor that supports a Windows 32-bit operating system can also support a Windows 64-bit operating system.

A

Any processor that supports a Windows 32-bit operating system can also support a Windows 64-bit operating system.

In fact, a Windows 32-bit operating system is written to run specifically on a 32-bit processor. Windows 64-bit operating systems are written to take advantage of the processing power that is unique to 64-bit processors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

You need to obtain a list of all the active IP ports on a specific computer. Which of the following commands could you use to gather this information?

MSCONFIG

NETSTAT

PING

NBTSTAT

A

NETSTAT

NETSTAT displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). When used without parameters, netstat displays active TCP connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following actions can you perform using Task Manager? Choose all that apply.

Close programs that are not responding

Monitor the computer’s performance

Display processes currently running on a Windows computer

Create a redundant hard disk configuration

Schedule an action to occur at a specific time

A

Close programs that are not responding
Monitor the computer’s performance
Display processes currently running on a Windows computer

If you’re connected to a network, you can also use Task Manager to view network status and see how your network is functioning. If more than one person is connected to your computer, you can see who’s connected and what they’re working on, and you can send them a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Task Scheduler?

A

used to launch programs, scripts and batch files based on a trigger – such as time – that is specified by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How much RAM is required to install Windows 7 32-bit on a PC?

1GB

2GB

16GB

512MB

A

1GB

According to Microsoft, the minimum hardware requirements needed to run Windows 7 are:
* 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
* 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
* 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
* DirectX 9 graphics device with WDDM 1.0 or higher driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A customer has recently installed several applications on a Windows workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?

diskpart

msconfig

factory restore

SecureBoot

A

msconfig

MSConfig is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software and Windows services that run at startup, or change boot parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Joe is in charge of formatting hard drives for a new deployment. His supervisor specifies that each drive must be formatted using the file system with the broadest compatibility.

Which file system should Joe use?

FAT16

FAT32

NTFS

CDFS

A

FAT32

FAT32 is most commonly used with portable drives. FAT32 avoids the problems that NTFS permissions and EFS can introduce when moving between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A Trojan horse is a piece of malicious software that __________________________ .

is self-replicating and self-propagating

attaches to a legitimate computer program

attaches to an incoming email

monitors Internet surfing habits

A

attaches to a legitimate computer program

A Trojan horse, or Trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s computer system. The term comes from the Trojan Horse story in Greek mythology. Trojan horses are not self-replicating, which distinguishes them from viruses and worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following is the fastest way for a user to synchronize data between an iPhone and a work PC?

Copy the data from the phone to a MicroSD card.

Use Bluetooth to share data from the phone.

Connect the iPhone’s USB cable and use iTunes.

Transfer data via WiFi Direct to the user’s laptop.

A

Connect the iPhone’s USB cable and use iTunes.

Of the four different connectivity solutions proposed, data transfer using USB will be the fastest.

Bluetooth data transfer speeds average 25 Mbps
WiFi Direct data transfer speeds average 250 Mbps
MicroSD cards can support data transfer speeds of 30 Mbps

Assuming that the cable and connectors support the USB V3.0 standard, data can be transferred at speeds of 640MBps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Your company supports a variety of mobile devices, including Android and iOS phones and tablets.

You have been asked to identify which elements from the employees outlook accounts can be synced across all possible platforms supported by the company.

Which the items shown below will appear on your preliminary list of items that can be synced to mobile devices via outlook email? Choose all that apply.

Calendar

Mail

Free//Busy

Programs

Social media

Contacts

Favorites

A

Calendar
Mail
Free//Busy
Contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Under which circumstances would you perform a factory reset on an android mobile phone? Select all that apply.

Before a upgrading the phone’s firmware

If you have forgotten the password to unlock the system

When the system has become slow or unresponsive and you have tried all other know remedies to fix the problem

After removing a number apps that you no longer use

A

If you have forgotten the password to unlock the system

When the system has become slow or unresponsive and you have tried all other know remedies to fix the problem

Factory resets can often fix many chronic performance issues such as freezing. Common reasons to perform a factory reset include:

  • to fix a malfunctioning electronic device
  • to remove a file or virus that is difficult to remove
  • to clear the configuration and settings of the electronic device to the default settings
  • to clear the memory space on the electronic device
  • to recover from a lost password or passcode
  • to remove personal information from the device before selling or giving away the device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Joe needs to purchase an application for use in company classroom. Although there are over 1,000 employees in the company, there will only be 15 students attending class at any one time.

What type of license should Joe consider to help control costs while ensuring that the students are in compliance with the end user licensing agreement (EULA)?

Commercial license

Seat license

Open source license

Enterprise license

A

Seat license

a software license based on the number of seats (actually computers) at which the software can be installed. In this model, many computers are licensed to run the software that is installed using a single product key. The number of users becomes irrelevant. For example, if a company buys an application with a per seat license for 20 seats, the software can be installed 20 times. There may be over 100 people who actually use the software, but only 20 users can work with it at any given moment in time. That would be the 20 people sitting at the 20 computers on which the software is installed. This can be less expensive than a commercial license, but is generally more expensive than an enterprise license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is Enterprise license?

A

a software site license that is issued to a large company. It typically allows unlimited use of the program throughout the organization, although there may be restrictions and limitations. In this model, many users are licensed to use the software installed on many computers through a single product key. This is often the most cost-effective way to buy software for employee use. A single Enterprise license usually costs less than the price of a commercial license multiplied by the number of users that need access to the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is open-source license?

A

type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions. Open source software is not the same as freeware. You could pay for an open source license. The difference between open source and commercial licensing is that you have the freedom to modify the software under an open source license that you would not have under a standard commercial license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is commercial license?

A

any software or program that is designed and developed for licensing or sale to end users or that serves a commercial purpose. In this model, one user (the buyer) is licensed to install the software on one computer using an installation process that is tied to one product key. This is usually the most expensive way to buy software as you are paying for one license per user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A technician needs to remove the ability of standard users to shut down or restart a shared computer. Which of the following commands can be used to accomplish this task?

gpedit.msc

shutdown.exe

bootrec.exe

services.msc

A

gpedit.msc

GPEDIT.MSC is the Local Group Policy Editor – a Microsoft Management Console (MMC) snap-in that provides a single user interface through which all the settings of Local Group Policy objects can be managed.

Among the settings that can be configured, the administrator can disable user or computer settings in the Local Group Policy. This would include disabling the ability for users to shut down or restart a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Sam is currently logged on to a Linux computer with his standard user account. He is not a member of any group that has administrative or system level access to the operating system.

Sam needs to update an application. He knows the command to use to run the update, but he needs to be able to run it with elevated privileges.

Which two commands, of those shown below, would give Sam the elevated privilege needed to update his application? Select two.

chown

yum

pwd

apt-get

su

sudo

A

su

sudo

Whenever a user tries to install, remove and change any piece of software, the user has to have the root privileges to perform such tasks. Sudo (Debian) or su (RHET) are the linux commands used to give such permissions to any particular command that a user wants to execute.

In addition to using sudo/su, the user must also know the password for the root or system account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A new user is attempting to logon to her company-issued computer for the first time. She has been given a smart card and uses that during the logon process. However, the system still won’t let her logon.

What other piece of information must she have in order to use her smart card to logon to the laptop?

a password generated by the administrator

a PIN

a user logon name

the name of her company’s domain

A

a PIN

Smart cards use personal identification numbers (PINs) rather than passwords. The smart card is protected from misuse by the PIN, which is known only to the smart card’s owner. To use the smart card, the user inserts the card in a smart card reader that is attached to a computer and, when prompted, enters the PIN. The smart card can be used only by someone who possesses the smart card and knows the PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

You need to launch the windows Start menu on a computer running Windows. Which key or key combination can you press on a Windows computer to complete this task? Choose two.

Windows key

F1

Ctrl + Esc

Ctrl+S

F8

A

Windows key

Ctrl+Esc

56
Q

Which versions of Windows cannot provide full support for BitLocker?

Windows 8 Professional

Windows 7 Enterprise

Windows Vista

Windows 7 Ultimate

A

Windows Vista

BitLocker is only available in Window 7 and up.

57
Q

You are creating a SOHO network for a customer. You have been asked to ensure that all employees have the ability to read from and write to a shared directory on the network. Users should have the ability to modify their own documents, but not have the ability to modify documents created in the shared folder by other users.

Which of the following tools would best help you achieve this goal?

VPN

ACL

LPI

RDP

A

ACL

You would use the ACL (access control list) associated with the shared folder to grant appropriate permissions to the office employees to use that directory.

Any individual who is not granted explicit permission to access the shared folder is considered to have been implicitly denied those permissions.

58
Q

You have been asked to troubleshoot a PC. As you examine the disk configuration, you find that the system uses three volumes. Before you continue, you need to verify all active and assigned drive letters for that computer.

Which command should use with the LIST function to accomplish this task?

bootrec

extract

chkdsk

diskpart

A

diskpart

59
Q

You have been asked to troubleshoot a PC. As you examine the disk configuration, you find that the system uses three volumes. Before you continue, you need to verify all active and assigned drive letters for that computer.

Which command should use with the LIST function to accomplish this task?

bootrec

extract

chkdsk

diskpart

A

diskpart

Before you can use DiskPart commands on a disk, partition, or volume, you must first list and then select the object to give it focus. When an object has focus, any DiskPart commands that you type act on that object.

You can list the available objects and determine an object’s number or drive letter by using the list disk, list volume, and list partition commands. The list disk and list volume commands display all disks and volumes on the computer. However, the list partition command displays only partitions on the disk that have focus. When you use the list commands, an asterisk (*) appears next to the object with focus. You select an object by its number or drive letter, such as disk 0, partition 1, volume 3, or volume C.

60
Q

A user reports that she cannot use her Android phone since the operating system was upgraded by Tech Support. She really needs this phone and wants to know how quickly the problem could be resolved.

Which of the following actions would you take to solve the problem as quickly as possible?

Perform a hard reset

Perform a factory reset

Rollback the operating system update

Replace the SID card

A

Perform a hard reset

Hard reset is one of the forms of factory reset, wherein only the hardware is rebooted. The intention of a hard reset is to put as many settings as possible back to their original, normal state.

In this scenario, the problem with the phone began after the operating system was updated. This suggests that the upgrade introduced a bad setting which caused the operating system to fail. When a device does not function properly, it means the setting in the device needs to be changed, so only that part of the device is reset, or rebooted in the hard reset. It clears all the memory associated with the hardware and updates the hardware with the latest updated version. After the hard reset, the CPU or the processor restarts the application.

61
Q

Henry is a remote service technician who uses the GPS feature on his cellphone as he drives to see his customers.

Each time that Henry drives out to see his customers, he finds that an icon will appear on the phone stating that “additional information is required to log in”.

What is happening on the smartphone to cause this to happen?

An unintended WiFi connection has been initiated

The phone is picking up cellular data roaming notifications

The smartphone is picking up weak cellular signals

An unintended Bluetooth connections has been initiated

A

An unintended WiFi connection has been initiated

62
Q

What file system is best suited for optical media?

EXT3

CDFS

NTFS

FAT32

A

CDFS

The CD File System (CDFS or ISO 9660) is a legacy file system used for CD optical disc media (CD-ROM and CD-R). UDF is an updated file system for optical media with support for multisession writing.

63
Q

You need to find the PID assigned to an application. What tool is best used for this task?

MSCONFIG

Local Security Policy

Task Manager

Computer Management

A

Task Manager

Running processes can be found on the Processes tab. But, you will find the Process IDs (PID) on the Services tab. This is true of all mainstream Windows operating systems.

The PID (Process ID) is a unique identification of an individual running application. It identifies the order an application spawned from the Windows Kernel. This information can provide clues to where system slowdowns or unauthorized processes and services might be occurring.

64
Q

A SOHO user needs to share files across a network without using a server. Which of the following network configurations would best meet the user’s needs?

WAN

PAN

WorkGroup

Domain

A

WorkGroup

A workgroup is most often used when you need to connect a small number of computers and you don’t need or want any one computer to take control of the network or network communications.

Domains are used to share information between a large number of computers and you must manage both user accounts and computers from a central location.
Wide area networks or WANs are used when you want to connect users on networks that exist in different geographic locations.
PANs or personal area networks are used to share information between devices that are owned and managed by a single user, usually within close proximity to each other. PANs can also be used to provide connections between a mobile personal device and a larger network such as the Internet.

65
Q

You are working on a tablet at a local airport while waiting for a flight. In order to connect to the Internet, you have connected your tablet to a personal hotspot device. As you work, you notice that there are three devices connected to the hotspot.

What action could you take to remove the unauthorized intruders from your hotspot device immediately?

shut down the intruder’s device remotely and
change the SSID to a different broadcast name

install a WiFi analyzer to identify the intruding device and
add the intruding device to a blocked access list

set up a WiFi analyzer to identify the intruding device and
shut down the device until the intruder is no longer in the area

change the SSID to a different broadcast name and
add the intruding devices to a blocked access list

A

change the SSID to a different broadcast name and
add the intruding devices to a blocked access list

66
Q

You are working on a tablet at a local airport while waiting for a flight. In order to connect to the Internet, you have connected your tablet to a personal hotspot device. As you work, you notice that there are three devices connected to the hotspot.

What action could you take to remove the unauthorized intruders from your hotspot device immediately?

shut down the intruder’s device remotely and
change the SSID to a different broadcast name

install a WiFi analyzer to identify the intruding device and
add the intruding device to a blocked access list

set up a WiFi analyzer to identify the intruding device and
shut down the device until the intruder is no longer in the area

change the SSID to a different broadcast name and
add the intruding devices to a blocked access list

A

change the SSID to a different broadcast name and
add the intruding devices to a blocked access list

67
Q

Which of the following is an example of Personally Identifiable Information (PII)?

vendor sales records

corporate passwords

employee social security numbers

customer purchasing preferences

A

employee social security numbers

Personally identifiable information (PII) is any data that could potentially identify a specific individual.

While all of the data shown is important, and should be protected, only the employee social security numbers could be used to uniquely identify an individual AND has the potential to cause that person harm.

68
Q

Your company has just created a new space in the basement of the building for the IT department to accept computer shipments and perform system repairs. You notice that when you work in the new area for any length of time that your phone reception becomes very poor and the battery in your phone drains very quickly.

What is the most likely reason for the problems you experience?

Working in the basement weakens the wireless signals from your network devices

The system has been infected by malware

Too much data is written to an external SD card

Too many apps are installed on your phone

A

Working in the basement weakens the wireless signals from your network devices

The transceiver circuit in a smartphone is engineered with power saving in mind and will reduce sending power as much as possible if the reception is good. This also reduces the SAR value which is a measurement for exposure of the human body to radiation.

If the reception is bad sending signal strength has to be adjusted accordingly. As the sending power is increased, the battery is drained more quickly.

69
Q

You recently cleaned malware from a user’s computer. Now the user is seeing error messages about the Windows system files.

Which of the tools show below would you use to verify that all system files are undamaged and in their original versions?

FIXMBR

RD

SFC

CHKDSK

A

SFC

The System File Checker or sfc.exe is a utility in Microsoft Windows located in C:\Windows\System32 folder. This utility allows users to scan for and restore corrupt Windows system files.

In Windows 10/8/7/Vista, the System File Checker is integrated with Windows Resource Protection, which protects registry keys and folders as well as critical system files. If any changes are detected to a protected system file, the modified file is restored from a cached copy located in the Windows folder itself.

There are several events that could cause a corrupted Windows system file. Power issues and disk issues could cause file corruption. A system file might be overwritten during a service pack or hotfix update or overwritten during the installation of a new application or device driver. If you find that one or more of these events may have affected a Windows computer, and now that system is not working properly, consider running SFC first, before trying a System Restore.

70
Q

A user calls you, desperate, because they can’t install a program that they really need for the big meeting in five minutes. What group is the user most likely associated with?

Guest user

Power user

Standard user

Administrator

A

Standard user

A Standard User has limited permissions regarding the installation of programs. In this scenario, since the user is most likely a permanent employee, we can assume they are NOT using a Guest User account which has no install permissions. They are almost certainly not using an account which is part of the Administrators group, or else they would not likely be prevented from doing the installation. They are most likely using an account which is a member of the Standard User group, and are trying to install a program which Windows 7 detects as potentially damaging to the computer, not because of sinister intent but because the program could make changes to the computer and render it inoperable if installed improperly.

71
Q

An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the most likely cause of this issue?

content-filtering

Internet connectivity issues

ransomware infection

antivirus software

A

content-filtering

On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.

72
Q

A junior technician is trying to disable the User Account Control (UAC) feature on a computer that is running Windows Vista. So far, he has not been successful and has asked you for help.
You start by instructing him to open Control Panel. What actions would you tell him to perform in order to complete this task?

Click User Account Control > Click Disable User Account Control > Click Continue > Clear the check box > Click OK

Click User Accounts > Click Turn User Account off > Click Continue

Click User Accounts and Family Settings > Click one of the User Accounts > Click on Change security setting link > Click umselect the User Account Control then Continue > Clear the check box > Click OK

Click User Accounts > Click Disable User Account off > Click Continue

A

Click User Accounts and Family Settings > Click one of the User Accounts > Click on Change security setting link > Click umselect the User Account Control then Continue > Clear the check box > Click OK

The only correct sequence of actions are to:

  1. Open Control Panel
  2. Click User Accounts and Family Settings
  3. Click on one of the User Accounts
  4. Under Make changes to your use Account click on Change security settings link
  5. Click unselect the Use User Account Control then click Ok button
  6. You will be prompted to reboot your computer.

The options Disable user Account Control, Disable User Account off, Turn User Account off are not valid selections.

73
Q

You have been asked to upgrade 75 computers to the most current version of Windows. Each client is currently able to boot from the network.

These clients exist on a fast Ethernet network and a server has already been configured as a Windows deployment server.

Which of the methods listed below would allow you to upgrade an operating system on each client with a minimal amount of work?

USB flash drive

PXE

Windows Image file

Windows Installation DVD

A

PXE

PXE (Preboot eXecution Environment) allows computers to boot over network even without hard disk. You can create a Windows operating system image to support PXE installations for Windows XP, 2003, Vista, Windows 7 and Windows Server 2008.

When the PXE boot server is set up, it is configured as a DHCP and TFTP server. Configure the client to boot from the network in BIOS. The client will get an IP address from the PXE DHCP server. Then the PXE server will push NBP (Network Bootstrap Program) and an operating system image stored in that server to the client using TFTP.

74
Q

You are troubleshooting a remote computer and would like to use Remote Desktop Connection to access the system directly. Because you are currently working in a Command Prompt window, you would like to open the Remote Desktop Connection from the command line.

Which of the commands shown below will allow you to start a Remote Desktop Connection from the Command Prompt window?

msconfig

msinfo32

services.msc

mstsc

A

mstsc

(Note: “mstsc” stands for Microsoft Terminal Services Connection, the previous name for Remote Desktop Services.)

Instead of starting Remote Desktop Connection from the Start menu, you can start it from the search box, from the Run dialog box, or from a command line using the command mstsc.exe (found in the Windows\System32 folder). You can use additional command line parameters to control how Remote Desktop Connection looks or behaves.

75
Q

You want to protect the Linux systems on your network from zero day attacks.

Which of the following best practices would offer you the best way to address this need?

Apply new patches to the operating system as soon as they become available

Establish local firewalls on all clients

Perform full backups each week

Harden the operating system

A

Apply new patches to the operating system as soon as they become available

A zero day vulnerability refers to a hole in software that is unknown to the vendor. When this security hole is exploited by hackers before the vendor becomes aware of the weakness, the attack is referred to as a zero day attack.

76
Q

Which of the following is a Microsoft service that’s used to provide updates like service packs and patches for the Windows operating system and other Microsoft software?

Firmware updates

Application updates

Driver updates

Windows updates

A

Windows updates

Windows Update is a Microsoft service that’s used to provide updates like service packs and patches for the Windows operating system and other Microsoft software. Windows Update can also be used to update drivers for popular hardware devices.

Windows Update is used to keep Microsoft Windows and several other Microsoft programs updated. Updates often include feature enhancements and security updates to protect Windows from malware and malicious attacks.

77
Q

You successfully install Windows 7 on a new computer. Now you must join the workstation to the company network. Which Windows utility will best allow you to add the workstation to the company domain?

System Properties

System Update

Network Management

Network Properties

A

System Properties

The fastest way to join a Windows workstation to a domain is to right-click on the Computer icon. From the pop-up or context menu that appears, select System Properties.

This will open a dialog box that provides you with the ability to either rename the workstation or join the workstation to an Active Directory domain.

78
Q

Which of the following is not a standard permission assigned to a file?

Change

Read

Full Control

Write

A

Change

79
Q

You have been given a computer without a CD/DVD-ROM drive and have been asked to install Windows on this machine. You have verified that the system components will support the version of Windows you were given to install.

Of the methods listed below, which would be the most effective method of installing Windows?

Create a floppy disk

Make a Bluetooth connection to another computer hosting the installation files

Place the installation files on a USB flash drive

Use the System Restore CD

A

Place the installation files on a USB flash drive

Of the methods given, the most efficient would be to use a USB flash drive to install Windows. A System Restore disk does not contain the full set of installation files. A floppy disk isn’t big enough to hold the installation files needed for the operating system. Creating a Bluetooth connection to another system, even if it were possible, would not offer the same transfer speeds as working from a USB flash drive.

80
Q

How many primary partitions are allowed on a hard drive formatted in FAT32 assuming that no extended partitions will be created?

3

4

1

2

A

4

Primary Partitions are used to support bootable operating systems. Extended partitions are not bootable. A basic disk can support three primary partitions and one extended partition.

If no extended partition is used, you can have a maximum of four primary partitions.

81
Q

A highly-placed employee recently lost a company-issued laptop while on a business trip. The laptop held sensitive information about the company that has since been published on the Internet.

The IT Security department has compiled a list of best practices. They would like your advice regarding which step to take first.

Which of the actions shown below would you recommend to help prevent another data leak like the one that just occurred?

All laptop users must have strong passwords

All laptop users must change their password at frequent intervals

All laptops must require biometric identification to logon.

All laptops must require multifactor authentication to logon.

All laptops hard drives must be encrypted

A

All laptops hard drives must be encrypted

All of these actions are important and should be taken. However, the first task should be to demand that the hard drives on all mobile devices (laptops) be encrypted. This action can be taken immediately without having to buy additional hardware or software.

This makes encrypting the hard drive, a) fast, b) inexpensive, c) and accomplishes the goal of helping to secure data.

82
Q

Jon, a system administrator, must upgrade multiple workstations with a new image to be deployed using Windows Deployment Services.

Which of the following client-side boot methods would provide the best way to deploy the new image?

USB flash drive

PXE

CD-ROM

GRUB

A

PXE

The Preboot eXecution Environment (PXE, sometimes pronounced as pixie) specification describes a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. On the client side it requires only a PXE-capable network interface controller (NIC), and uses a small set of industry-standard network protocols such as DHCP and TFTP.

83
Q

A client asks for your help with a PC problem. She states that the computer has begun behaving very erratically. The biggest problem is that when she tries to access certain sites on the Internet, the system either reports that those sites cannot be found or completely locks up.

What action should you take first to resolve the issue?

Identify the type of malware affecting the computer

Update the computer’s operating system

Install a different anti-malware software

Revert to a previous restore point

A

Identify the type of malware affecting the computer

The best practice procedure for malware removal, as given by CompTIA, is:

  1. Identify malware symptoms
  2. Quarantine infected system
  3. Disable system restore (in Windows)
  4. Remediate infected systems
    a. Update anti-malware software
    b. Scan and removal techniques (safe mode, pre-installation environment)
  5. Schedule scans and run updates
  6. Enable system restore and create restore point (in Windows)
  7. Educate end user
84
Q

What is the procedure to remove malware?

A
  1. Identify malware symptoms
  2. Quarantine infected system
  3. Disable system restore (in Windows)
  4. Remediate infected systems
    a. Update anti-malware software
    b. Scan and removal techniques (safe mode, pre-installation environment)
  5. Schedule scans and run updates
  6. Enable system restore and create restore point (in Windows)
  7. Educate end user
85
Q

Sam, the owner of a small business, believes in leadership by walking around. He routinely walks through the office to see what his employees are working on and to provide direction as needed. During those times, it is critical that no one has the ability to walk up and look at the sensitive material which might be open on his computer.

Sam also works long hours. On those instances when he expects to be back in the office before 6:00am, he does not want to turn off his computer when he leaves for the day.

How could you best configure his computer to ensure that the data on it is secure? Select two options.

Configure the computer’s screensaver to start after one minute of inactivity

Configure the screen to lock after five minutes of inactivity

Use a fingerprint lock when the computer must be left on overnight

Enable login time restrictions to occur after regular working hours

Force the use of a strong password

A

Configure the screen to lock after five minutes of inactivity

Enable login time restrictions to occur after regular working hours

86
Q

You need to prepare a hard drive before it can be used in a new computer. Which actions, of those shown below, must you perform before the drive can be used? Chose two.

Format the disk

Defragment the drive

Cleanup old and unused files from the disk

Partition the disk

Check the disk for bad sectors

A

Format the disk

Partition the disk

A hard drive must be partitioned and formatted before it can be used for any other purpose.

While the other actions shown can be performed on a new drive, they will not make the drive usable.

87
Q

Which of the following protocols will allow a user to access email from multiple devices?

IMAP

POP3

EWS

MAPI

SMTP

A

IMAP

IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user’s computing device(s). This allows users to organize messages into folders, have multiple client applications know which messages have been read, flag messages for urgency or follow-up and save draft messages on the server.

Most implementations of IMAP support multiple logins; this allows the end user to simultaneously connect to the email server with different devices. For example, the end user could connect to the mail server with his Outlook iPhone app and his Outlook desktop client at the same time. The details for how to handle multiple connections are not specified by the protocol but are instead left to the developers of the mail client.

88
Q

Which of the following is a benefit or advantage to using PXE? Select all the answers that are true

It is an efficient way to install an operating system on many computers in a short period of time

It can take advantage of protocols that are a native part of the Windows operating system

It is virtually impossible to find a network card without PXE firmware already installed

It is a very secure way for a client to obtain access to the boot image

A

It is an efficient way to install an operating system on many computers in a short period of time

It can take advantage of protocols that are a native part of the Windows operating system

It is virtually impossible to find a network card without PXE firmware already installed

The Preboot eXecution Environment (PXE, sometimes pronounced as pixie) specification describes a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. On the client side it requires only a PXE-capable network interface controller (NIC), and uses a small set of industry-standard network protocols such as DHCP and TFTP.

PXE uses protocols such as TFTP. Security concerns may arise from unauthorized PXE
servers and clients because of the open and “trusting” nature of the PXE boot process.

89
Q

You are cleaning malware from a company computer. Which feature would you use to help verify that all traces of the malware are removed from the computer?

System > Advanced system settings

File History > Advanced settings

Display > Adjust resolution

Folder Options > View hidden files

A

Folder Options > View hidden files

Microsoft Windows hides system files by default. This makes it less likely that a user would accidentally attempt to edit or delete a needed file.

In this case, you want to see all files - especially those flagged as hidden - to be sure that you have removed all files associated with the malware attack from the computer.

90
Q

Which of the following statements is true in regard to the way EFS is different from BitLocker?

BitLocker encrypts an entire volume; EFS encrypts individual files

BitLocker uses NTFS to support encryption; EFS uses TPM hard to support encryption

BitLocker requires users to enable encryption for each file or folder; EFS will encrypt all files added to a volume once the feature is enabled.

BitLocker was released with Windows 2000; EFS was released with Vista

A

BitLocker encrypts an entire volume; EFS encrypts individual files

91
Q

You work for a government supplier. Earlier this week, your company’s data systems were hacked. Security forensics have determined that some of the data accessed contained information about company employees including their names, photos, and rates of pay.

Why is this information considered to be sensitive?

Because revealing employee salaries could be detrimental to employer/employee relations

The data could be used to reveal company employees and their roles within the company

Information such as photos can be used to uniquely identify individuals resulting in a breach of privacy

Because it provides evidence that the attack was performed by one or more employees

A

Information such as photos can be used to uniquely identify individuals resulting in a breach of privacy

The information accessed is considered to be sensitive because it is personally identifiable information.

Personally identifiable information (PII) is any data that could potentially identify a specific individual.

PII can be sensitive or non-sensitive. Non-sensitive PII is information that can be transmitted in an unencrypted form without resulting in harm to the individual. Non-sensitive PII can be easily gathered from public records, phone books, corporate directories and websites.

Sensitive PII is information which, when disclosed, could result in harm to the individual whose privacy has been breached. Sensitive PII should therefore be encrypted in transit and when data is at rest. Such information includes biometric information, medical information, personally identifiable financial information (PIFI) and unique identifiers such as passport or Social Security numbers.

92
Q

You are creating a drive mapping for a user to a shared folder on another computer. You need to be sure that the drive mapping will persist after the user has restarted the computer. Which of the following actions should you take? Note: There are two correct answers. Select two.

include the parameter /persistent: yes with the Net Use command

do nothing; the mapped network drive will automatically reconnect at relogon

replace the hard drives on the file server hosting the shared files

run the command diskpart /p to create a persistent connect.

check the “reconnect at logon” checkbox the Map Network Drive dialog box

A

include the parameter /persistent: yes with the Net Use command

check the “reconnect at logon” checkbox the Map Network Drive dialog box

Users can create persistent drive mappings by using the option “reconnect at logon” in the Map Network Drive window or by using the command “net use x: \servername\shared drive name /persistent: yes”.

93
Q

You are configuring email on a client’s iPad. The client must be able to synchronize all changes with a PC-based server.

Which protocol should you use to complete this task?

MAPI

SMTP

IMAP

EWS

A

IMAP

94
Q

You are designing a network for a small business. For security reasons, you must be able to manage user accounts and computers from a central location. Based on this criteria, which of the following network models would be most appropriate to meet the company’s needs?

PAN

WAN

Domain

WorkGroup

A

Domain

Domains are used to share information between a large number of computers and you must manage both user accounts and computers from a central location.

95
Q

You are configuring a new Windows computer for use on a SOHO network. You want to make the new computer more secure.

Which of the following steps should you take to secure the workstation? Select two.

disable Windows Update

add the local user account to the local Administrators group

disable the guest account

rename the default user accounts

disable Windows firewall

share the C:\\ directory

A

disable the guest account

rename the default user accounts

Both of these actions would make it harder for an attacker to logon using a commonly known name.

96
Q

You are configuring a new Windows computer for use on a SOHO network. You want to make the new computer more secure.

Which of the following steps should you take to secure the workstation? Select two.

disable Windows Update

add the local user account to the local Administrators group

disable the guest account

rename the default user accounts

disable Windows firewall

share the C:\\ directory

A

disable the guest account

rename the default user accounts

Both of these actions would make it harder for an attacker to logon using a commonly known name.

97
Q

Recently, you find that it takes longer and longer for those technical drawings to open on the desktop. You worry that the hard drive might be going bad, so you make it a point to backup all your files at least once per day

Today, the files load so slowly that you cannot get started on your work at all. You call the company Help Desk to see if they can resolve this problem. What is the first task that the support technician would most likely perform solve this problem?

create a new partition and move the drawings to the new location

restore all technical drawings from the most recent backup

add a larger external drive to your computer and ask you to move the files to the new location

analyze the disk for file fragmentation

A

analyze the disk for file fragmentation

Disk defragmentation is the process of consolidating fragmented data on a volume (such as a hard disk or a storage device) so it will work more efficiently.

Fragmentation happens to a volume over time as you save, change, or delete files. The changes that you save to a file are often stored in a different place on the volume than the original file. This doesn’t change where the file appears in Windows—only where the bits of information that make up the file are stored on the actual volume. Over time, both the file and the volume itself become fragmented, and your computer slows down as it has to look in different places to open a single file.

The least costly and most efficient way to get your computer working as expected would be to see if the large technical drawing files had become fragmented.. If that is the case, the technician could run defrag and defragment the files on the hard drive.

98
Q

You need to remove an application from a computer running Windows 8.1. Which one of the following Control Panel applets would best meet your needs?

Folder Options

Administrator Tools

Add/Remove Programs

Programs and Features

A

Programs and Features

Windows Vista, Windows 7 and Windows 8/8.1 use Control Panel > Programs and Features to remove or modify applications installed on the computer.

99
Q

You need to map a network drive on a computer running Windows. Which of the following examples shows the correct path that you would use?

\servername/usershare

\servername\usershare

//servername/usershare

//servername\usershare

A

\servername\usershare

The UNC syntax for Windows systems has the generic form:
\ComputerName\SharedFolder\Resource
Microsoft often refers to this as a “network path”

100
Q

Which of the following partitioning technologies will allow you to create partitions that are larger than 2TB in size?

Logical

GPT

Extended

MBR

A

GPT

Master boot record (MBR) disks use the standard BIOS partition table. GUID partition table (GPT) disks use unified extensible firmware interface (UEFI). One advantage of GPT disks is that you can have more than four partitions on each disk. GPT is also required for disks larger than 2 terabytes.

101
Q

What is the maximum amount of RAM that can be used by a computer running Windows Professional 32-bit?

512G

2GB

4GB

1GB

A

4GB

All versions of Window client operating systems are limited in the amount of RAM they can support when installed on a system with a 32-bit processor. The physical maximum on any x86 system is 4GB of RAM. That limit may be even lower depending on the version of Windows installed.

When Windows is installed on a system using a 64-bit processor (x64), the maximum amount of supported RAM usually starts at 8GB and - depending on the version of Windows installed - can go up to 512GB RAM.

102
Q

Jean, a user, states that there are too many applications running each time she logs in to her Windows computer.

Which command line tool would provide you with the fastest way to stop these applications from running?

SERVICES.MSC

MSINFO32

REGEDIT

MSCONFIG

A

MSCONFIG

System Configuration (msconfig) is a tool that can help identify problems that might prevent Windows from starting correctly. You can start Windows with common services and startup programs turned off and then turn them back on, one at a time. If a problem doesn’t occur when a service is turned off, but does occur when that service is turned on, then the service could be the cause of the problem.

MSCONFIG contains several tabs. These are:

  • General: Lists choices for startup configuration modes
  • Boot: Shows configuration options for the operating system and advanced debugging settings
  • Services: Lists all of the services that start when the computer starts, along with their current status (Running or Stopped). Use the Services tab to enable or disable individual services at startup to troubleshoot which services might be contributing to startup problems.
  • Startup: Lists applications that run when the computer starts up, along with the name of their publisher, the path to the executable file, and the location of the registry key or shortcut that causes the application to run.
  • Tools: Provides a convenient list of diagnostic tools and other advanced tools that you can run.
103
Q

Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs running Windows 10 Enterprise?

NTFS

BitLocker drive encryption

Windows Defender

EFS

A

BitLocker drive encryption

104
Q

You work from a computer running Windows. You are trying to access a shared file on another computer which also runs Windows. You can connect to other computers on the same network and you can connect to the Internet.

You ask a fellow technician to examine the permissions assigned to the file. He reports that they are set in such a way that you should have all the access you need to work with the remote file.

Finally, you use the PING command to test the connection to the remote computer, but receive a response that the remote computer cannot be found.

You verify that the remote Windows workstation is turned on and connected to the network. Of the issues listed below, which is the most likely cause of the problem?

Windows firewall is enabled

Local Security Policy settings are disabled

The user’s computer is not connected to the network

You do not have permission to access the Windows 7 workstation remotely

A

Windows firewall is enabled

Of the answers given, only Windows firewall is enabled would explain the problems encountered by the user.

  • If the user can connect to other computers and the Internet, she has network connectivity.
  • There are no settings in the Local Security Policy utility that would cause the reported trouble.
  • You did not attempt to access the remote shared file, you simply tried to ping the remote computer.

However, if the Windows Firewall is enabled on the remote computer, it will block ICMP responses and ICMP is the protocol used to support PING.

105
Q

A user named Mary reports that she is unable to start her computer. When she tries to start the system, she receives a message that reads “Bootmgr is Missing”.

Which of the commands shown below could you use to troubleshoot this problem?

BOOTCFG

BOOTREC

FIXMBR

DISKPART

A

BOOTREC

When you use the Recovery Environment (Windows RE) to troubleshoot startup issues, first try the Startup Repair option in the System Recovery Options dialog box. If this does not resolve the issue, or if you have to manually troubleshoot additional issues, use the Bootrec.exe tool.

The Bootrec.exe tool in the Windows RE can be used to troubleshoot and repair the following items in Windows:
* A master boot record (MBR)
* A boot sector
* A Boot Configuration Data (BCD) store

106
Q

What is often perceived of as the weakest link in system security?

naive or uneducated end users

poorly managed file and folder permissions

lack of firewalls and other security appliances

failure to use strong passwords

A

naive or uneducated end users

End user ignorance is often cited as the weakest link in system security. Uneducated users are more likely to fall for social engineering attacks, click on questionable links and websites, and download suspect applications.

All other potential failures can be easily remedied by a well-designed policies and procedures.

107
Q

An intern calls you to ask how he can best see all the users that are signed in to a specific computer. Which tool of those shown below would you advise him to use?

MSCONFIG

Administrative Tools

Disk Management

Task Manager

A

Task Manager

Task Manager shows you the programs, processes, and services that are currently running on a computer. You can use Task Manager to monitor your computer’s performance or to close a program that is not responding.

From the Application tab, you can exit existing programs or start new programs
From the Processes tab, you can observe resource use per process and end a process that is not performing correctly
From the Services tab, you can observe services that are running on the computer
From the Performance tab, you can watch CPU, memory, network interface and disk read/write resource use in real time
From the Networking tab, you can monitor network utilization from each active network interface on the computer
From the Users tab, you can obtain a list of all users with active connections to the system

108
Q

Joe, a user, must remove a static IP address on a client’s iPhone. What is the general series of steps to take to complete the change?

Wi-Fi > SSID Name > Network > IP Address

Settings > Wi-Fi > SSID Name > IP Address

General > SSID Name > IP Address

Location Services > Wi-Fi > IP Address

A

Settings > Wi-Fi > SSID Name > IP Address

General Steps to Set a Static IP Address and Manual DHCP in iOS

  1. Tap on “Settings”
  2. Tap “Wi-Fi” and look for the network name you are connected to, then choose the little (i) button or arrow next to it to get more information about that network
  3. Tap the “Static” tab
  4. The “Static” section is where you enter network appropriate DHCP info and static IP address information*
  5. Close out of Settings, and launch Safari or another network app to confirm connectivity

Settings are applied automatically after all the information is input.

109
Q

You have been asked to re-install Windows on a user’s computer. Unfortunately, you did not expect to perform this task today and you do not have a Windows installation disk with you.

Upon examining the computer’s hard drive, you find that a small 200MB partition also exists. Based on your finding, what technique would you MOST likely be able to use to re-install the operating system?

system partition

backup partition

recovery partition

partition restore

A

recovery partition

Many computers ship without Windows installation discs. Instead they come with recovery partitions and/or discs that can be used restore the PC to its “factory original” state.

110
Q

You need to suggest strategies for preventing the spread of malware between computers on the company network. Which action could you take to achieve this goal?

Disable all attachment filters on company email servers

Disable Windows Update

Disable AutoRun

Disable client firewalls

A

Disable AutoRun

AutoRun allows manufacturers of removable storage media to incorporate an autorun.inf file within the device. This file instructs the operating system which application (or executable) to call when the storage device is inserted in the computer.

AutoRun was released with the early versions of Windows. It has since been replaced by AutoPlay which provides the same service as AutoRun.

Disabling AutoRun/AutoPlay makes it much harder for a virus or other malware to jump from a removable device, such as a thumb drive, to a user’s computer and then on to the network. The user would have to physically access the infected file before the malware could be transferred.

The other actions shown will all weaken network security and make your systems more vulnerable to attack.

111
Q

You plan to install Windows 7 on a new computer. The key system components are listed below. Which of the components listed below would prevent you from installing a 64-bit version of Windows?

2 GB RAM

DirectX 9 graphics device with WDDM 1.0 or higher driver

16 GB available hard disk space

1 gigahertz (GHz) or faster 64-bit processor

A

16 GB available hard disk space

The hardware requirements which must be met in order to install Windows 7 are:

  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver

Based on the hardware specifications listed in the question, the only component that will limit which version of Windows 7 you install is the amount of available free space on the hard drive. You need at least 20GB of free space on the hard drive to install the 64-bit version of Windows 7 on the computer.

112
Q

You need to implement HomeGroup on three computers. Which version or versions of Windows could you install that will support this feature? Select all that apply.

Windows Server 2008

Windows Vista

Windows 7 Professional

Windows XP Professional x64 Edition

Windows 8.1 Enterprise

A

Windows 7 Professional

Windows 8.1 Enterprise

113
Q

You work for a company that is replacing over 200 employee computers with new computers that will run Windows 8.1. You create a single image that is customized to meet the needs of your employer. Now, you need to install this image on every new computer purchased by the company before it is joined to the network.

Which of the Windows tools listed below would best help you meet your goal?

RDP

chkdsk

SYSPREP

Windows Update

A

SYSPREP

The System Preparation (Sysprep) tool prepares an installation of Windows 8 for duplication, auditing, and customer delivery. Duplication, also called imaging, enables you to capture a customized Windows image that you can reuse throughout an organization. Audit mode enables you to add additional device drivers or applications to a Windows installation. After you install the additional drivers and applications, you can test the integrity of the Windows installation. Sysprep also enables you to prepare an image to be delivered to a customer. When the customer boots Windows, Windows Welcome starts.

Sysprep must be used only to configure new installations of Windows. You can run Sysprep as many times as required to build and to configure your installation of Windows. However, you can reset Windows activation no more than three times. You must not use Sysprep to reconfigure an existing installation of Windows that has already been deployed.

114
Q

A user, Anne, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced?

virus infection

malware infection

phishing attack

man-in-the-middle attack

A

virus infection

The differences between “viruses” and “malware” is, in short, viruses are a specific type of malware (designed to replicate and spread), while malware is a broad term used to describe all sorts of unwanted or malicious code. Malware can include viruses, spyware, adware, nagware, trojans, worms, and more. In this case the virus is using Anne’s email account to try and infect other computers on the network by attacking her address book.

115
Q

What permission must be assigned to a user in order to permit that user to save a file to a folder?

the user must have read and write permission to the folder

the user requires write permissions to the folder

the user must have write permission to the file

the user required read permission to the folder

A

the user requires write permissions to the folder

116
Q

A fellow technician is searching the Control Panel on a Windows 7 computer to find the applet that he can use to easily transfer large files such as streaming video to the other four computers on the network. Which applet is he looking for?

HomeGroup

AutoPlay

Sync Center

Ease of Access Center

A

HomeGroup

HomeGroup is used to simplify home networking, especially file and printer sharing. HomeGroup was introduced with Windows 7 and is also offered in Windows 8.

117
Q

What purpose or function does the TASKKILL command serve?

It is used to remove files from a directory or folder.

It is used to end one or more tasks or processes, either by name or by PID.

It is used to clear the screen of all recently executed commands.

It is used to either shut down or restart the local computer.

A

It is used to end one or more tasks or processes, either by name or by PID.

118
Q

An employee has used his company-issued computer in a manner that directly violates the company’s acceptable use policy. You need to preserve digital evidence of the activity in case the event leads to a criminal investigation.

Under such a circumstance, which of these protocols would be the most important?

Chain of custody

MSDS documents

Channel escalation

Change control management

A

Chain of custody

The chain of custody is defined as the witnessed, written record of all of the individuals who maintained unbroken control over the items of evidence. It establishes the proof that the items of evidence collected at the crime scene is the same evidence that is being presented in a court of law.

119
Q

A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tools would be used to troubleshoot this problem?

appwiz.cpl

gpedit

msconfig

regsrv32

A

msconfig

120
Q

Jenny, a user, reports that unwanted icons have started popping up on her desktop. She is using a computer that runs Windows 8.1.

You respond to Jenny’s report and determine the computer has a malware infection.

What action should you take next?

Educate the end user

Disable System Restore

Quarantine Jenny’s computer

Run anti-malware signature updates

Report the issue to the information security officer

A

Quarantine Jenny’s computer

121
Q

Which of the following statements is false concerning the Windows Start menu?

The overall appearance, purpose, and contents of the Desktop has remained the same through much of Windows’ existence.

The user has no control over what links or other objects appear in the Start menu.

Not all versions of Windows have a Start menu.

The Start menu serves the function of providing quick access to important features and programs.

A

The user has no control over what links or other objects appear in the Start menu.

122
Q

You just purchased an application to manage video and audio files on your home theater PC. What type of license did you most likely purchase to remain compliant with the end user licensing agreement (EULA)?

Commercial license

Open source license

Seat license

Enterprise license

A

Commercial license

123
Q

You are downloading a security hotfix for a Windows computer. You want to create a new folder to store the file. Which of the following commands could you use to create that new folder?

rd

md

cd

pushd

A

md

124
Q

What type of files are stored by default in the directory \Program Files (x86) on a computer running Windows?

32-bit program files installed on a Windows 64-bit operating system

32-bit program files installed on a Windows 32-bit operating system

all program files installed on a Windows 32-bit operating system

all program files installed on a Windows 64-bit operating system

A

32-bit program files installed on a Windows 64-bit operating system

125
Q

You are configuring the wireless router on a SOHO network for a client. The customer runs a small business with only five employees. You have been asked to configure the network in such a way that after the five employees connect to the network, no other connections will be accepted.

You configure WEP on the router. What other settings should you configure on the router to accomplish this task?

Update router firmware

Enable MAC filtering

Disable SSID broadcast

Install a firewall application on the router

A

Enable MAC filtering

126
Q

Sally is working on a computer running Windows. Earlier today, a co-worker from a branch office sent Sally a large data file on a CD. Sally inserts the disc in her CD/DVD drive and is able to retrieve the files successfully. At the end of the day, Sally shuts down her computer and leaves the office.

The next morning, Sally starts the computer which returns the following error message:

“Invalid boot disk error.”

What happened to Sally’s computer?

The system is trying to boot from the CD/DVD drive. It fails because the disc in the drive is a non-bootable device.

Nothing. Sally just needs to restart the computer

The system is trying to boot from the CD/DVD drive. It fails because the disc in the drive contains a nasty piece of malware.

The system is trying to boot from the active partition. It fails because the files on the CD corrupted the boot partition.

A

The system is trying to boot from the CD/DVD drive. It fails because the disc in the drive is a non-bootable device.

The Windows boot process, regardless of version, requires the computer to be able to read specific files stored in the boot partition or system drive for that computer.

When the error message, “Invalid boot disk error.” appears during start up, it means that the disk that the computer is reading from does not contain the files needed to start the boot process for Windows. The most common cause for this problem is that the user left a non-bootable floppy disk or non-bootable CD-ROM in a drive and the computer is trying to find the files it needs on that device. Once the floppy or CD is removed from the computer, the system will be able to find the files it needs from the hard drive or other device specified in CMOS as the bootable device.

127
Q

You are troubleshooting a Windows computer that fails to boot. Instead, the user sees the following message each time she attempts to start the computer:

Invalid Partition Table

You believe that the Master Boot Record partition (MBR) has become corrupted. You place a copy of the Windows operating system installation CD in the optical drive. Then you run the Bootrec command. Which of the following options would you select fix this problem?

DXDIAG

MSCONFIG

FIXMBR

FIXBCD

FIXBOOT

A

FIXMBR

MBR errors can have three different causes: a virus infection, a drive failure or an MBR overwrite caused by a program. Virus infections happen when a virus is loaded onto your computer. Many viruses target the master boot record, since this is the most important part of your hard drive. Drive failures are also a major cause of MBR errors. If the area of the hard drive where the MBR is located contains a few defective clusters, the master boot record is rendered unreadable. Finally, some programs sometimes accidentally overwrite part of the MBR, causing it to become corrupt.

If your main hard drive suffers from a corrupt or missing MBR, you are usually not able to start Windows. Instead, after the BIOS screen, an error message such as “Missing operating system,” “Error loading operating system” or “Invalid partition table” is displayed and remains on the screen until you reboot your computer.

128
Q

Shortly after purchasing and registering a new router for a SOHO network, you receive notice from the router manufacturer that several new vulnerabilities have been discovered. These issues affect the router you just purchased and installed.

You verify that all connections and settings are configured as recommended by the manufacturer and that they are appropriate for your network needs.

What action should you take next to best protect your router from a potential attack based on these new vulnerabilities?

Change all router user-names and passwords

Reconfigure firewall settings on the router

Add another router to the network to create a DMZ

Check with the manufacturer for new firmware updates and apply them to your router

A

Check with the manufacturer for new firmware updates and apply them to your router

129
Q

In order to make a local computer more secure, you want to modify Windows 7 so that any time a user enters a bad password, the user’s account is locked out for 30 minutes.

Which Windows utility would you use to enforce the desired behavior?

Windows Security Center

User Account Properties

Local Security Policy

Activity Center

A

Local Security Policy

The Local Security Policy is used to help protect your computer by defining the maximum number of times an incorrect password can be entered before an account is locked out, how long an account should be locked out before the user can attempt to login again, and when the account lockout counter should be reset.

Account lockout policy disables a user account if an incorrect password is entered a specified number of times over a specified period. These policy settings help you to prevent attackers from guessing users’ passwords, and they decrease the likelihood of successful attacks on your network.

130
Q

A co-worker in a different building on your company’s campus is having trouble installing a local printer driver. You have been asked to log into the co-worker’s computer and resolve the problem.

Which of the following connectivity tools would best help you connect to the user’s computer?

virtual private network

remote assistance

computer management

remote desktop

A

remote assistance

131
Q

Your computer has begun to display pop-ups each time you connect to the Internet. You verify that your anti-malware software is using the latest signature file and you run a complete system scan on the computer, but the anti-malware reports that nothing is wrong.

After further research, you find that there is a process running on the computer that you cannot kill. You want to use System Configuration (msconfig) to restart your computer without starting any unnecessary apps or services.

Which of the following start up modes would allow you to accomplish this goal?

Normal startup

Diagnostic startup

Minimal startup

Selective startup

A

Selective startup

To start Windows in Selective startup mode

  1. On the General tab, tap or click Selective startup, and then clear the Load system services and Load startup items check boxes.
  2. Select the Load system services check box, tap or click OK, and then tap or click Restart.
  3. If the problem occurs after restarting, do one or both (if necessary) of the following tasks:

Identify the system service that’s causing the problem.
* Tap or click the Services tab, tap or click Disable all, select the check box for the first service that’s listed, and then restart your PC. If the problem doesn’t occur, then you can eliminate the first service as the cause of the problem.
* With the first service selected, select the second service check box, and then restart the PC.
* Repeat this process until you reproduce the problem. If you can’t reproduce the problem, then you can eliminate system services as the cause of the problem.

Identify the startup item that’s causing the problem.
* Tap or click the Startup tab, and tap or click Open Task Manager.
* Turn off all startup items except the first one by tapping or clicking each startup item, and then tapping or clicking Disable. Restart your PC. If the problem doesn’t occur, then you can eliminate the first startup item as the cause of the problem.
* With the first startup item selected, tap or click the second startup item, and then tap or click Enable. Restart your PC. Repeat this process until you reproduce the problem.

132
Q

A user has reported that their computer running very slowly. You would like to see which applications are consuming resources.

Which of the following tools should you use to observe system performance?

netmon

Event Viewer

msconfig

Task Manager

A

Task Manager

133
Q

Joe is a member of the company’s marketing team. He reports that he has recently stopped receiving email from a team member in another location.

You need to resolve Joe’s problem. What aspect of his current computer configuration would you look at first?

Examine the local firewall to see if it is blocking messages from the sender’s email domain

Examine his antimalware software to see if it is configured to block messages from the sender’s address

Examine the ACL for the email application to see if it is set to deny messages from the sender’s address

Examine his email software for any filters that might be placing messages from the team member into quarantine

A

Examine his email software for any filters that might be placing messages from the team member into quarantine

134
Q

The CEO states that the flickering of his screen is making him nauseous and asks if you can stop the flickering.

Which Control Panel path would you take to resolve the issue?

Display > Settings > Resolution

Display > Settings > Advanced > General > DPI

Display > Appearance > Effects > Transition

Display > Settings > Advanced > Adapter > Refresh

A

Display > Settings > Advanced > Adapter > Refresh

135
Q

A user was prompted to change her password. When she did, she found that she was required to enter a password that was 10 characters long and that used strong password characteristics.

The user reports that this behavior occurred shortly after her workstation was joined to the company’s Active Directory domain. You examine the settings on her PC and find that the password management options are grayed out on the computer and cannot be changed.

What has happened to make her password policy settings unavailable to you?

Domain-level group policies were applied when her workstation was joined to the company domain

The company-mandated antivirus software has disabled the password management feature on her workstation

The user is the victim of a malware attack that has corrupted her password Registry settings

You should have logged on to her computer with her standard user account and not as an administrator.

A

Domain-level group policies were applied when her workstation was joined to the company domain