Exam A Flashcards

1
Q

Where is the notification area located in windows?

A) in the system properties dialog box
B) in the system32 folder
C) on the taskbar
D) within the start menu

A

C
The notification area toward the bottom right of your screen within the taskbar. It contains the time and any application currently running and memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One of the computers in your Warehouse often requires the replacement of power supplies, cpu, and other internal devices. Which tool can help prevent these types of hardware faults?

A) compressed air
B) anti-static wrist straps
C) rescue desk
D) multimeter

A

A

Compressed air, if used periodically inside a computer, can help prevent Hardware faults from occurring. Most likely, the warehouse is not the cleanest, and the computer is sucking in dirt 24 hours a day. If you take the computer outside, remove the cover, and carefully blow out the dust bunnies with compressed air, you might increase the lifespan of the hard work components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following features is used to both start and stop services? Select the two best answers.

A) services.msc
B) task manager
C) performance monitor
D) MMC
E) Msconfig

A

A, B
You can start, stop, and restart services within the services window. By going to run and then typing services.msc.

MSconfig is used to enable, disabled services but not start them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One of your customers cannot access any websites but can access the company FTP site and can access internal email with an outlook. Which of the following will fix the problem?

A) reconfigure the proxy settings
B) disabled the firewall
C) deactivate and reactivate the network interface card
D) remove and reinstall the web browser

A

A
Chances are that the customer uses a proxy server for HTTP and https website connections. Without the properly configured proxy settings, the user might not be able to access the websites but would be able to access other networking services, such as FTP and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following can be used to keep storage drives free of errors and ensure that Windows runs efficiently? Select the two best answers.

A) disc management
B) disc defragmenter
C) chkdsk
D) system restore
E) task scheduler

A

B, C
Disc defragmenter keeps Windows running more efficiently by making files contiguous and reducing the amount of physical work the storage drive has to do. The check disk command checks the storage drive for errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A SOHO wireless network has been compromised by an attacker who brute forced a PIN to gain Wireless access. Once the attacker had access, he modified the DNS settings on the Soho router, and malware was spread throughout the network. Which of the following most likely allowed the attack to occur? Select the two best answers.

A) TKIP
B) latest WPA version
C) default login
D) old firmware
E) WPS
F) guest Network enabled

A

C, E
The attack was most likely successful because the Soho router was configured with a default login and wps. A default login means that the Soho router is using the original username often admin and password typically a stock password selected by the manufacturer of the device which anyone can look up on the internet. A default login makes it extremely easy for an attacker to log into a device. Always be sure to change the password of a Soho router right after installing it. WPS stands for Wi-Fi protected setup, and for a long time was based on an eight digit PIN code that is somewhat easy to Brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which log file contains information about Windows setup errors?

A) setupact.log
B) setuperr.log
C) unattend.xml
D) diskmgmt.msc

A

B
Set up error log contains information about set up errors during an installation of windows. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A customer’s device manager shows an arrow pointing down over one of the devices. What does this tell you?

A) the devices driver has not been installed
B) the device is not recognized
C) the device is disabled
D) the device is in the queue to be deleted

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A co-worker just installed a second storage Drive in his windows computer. However, he does not see the drive and file explorer. What did he forget to do? Select the three best answers.

A) format the drive
B) partition the drive
C) run fdisk
D) initialize the drive
E) set up the drive in UEFI and bios

A

A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would you create a restore point in windows?

A) run disk defragmenter from the MMC
B) run Powershell
C) run the system restore program from the system properties
D) run the disc cleanup program from system properties

A

C
System restore is the tool used to create restore points. You can find it within the search utility or by going to control panel then all control panel icons then system and then clicking the system protection link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following tasks cannot be performed from the printer properties screen?

A) modifying spool settings
B) adding ports
C) pausing printing
D) enable sharing

A

C
To pause printing in general and pause individual documents, double click on the printer in question and make modifications in the window that appears

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are setting up auditing on a Windows computer. If it is set up properly, which of the following logs should contain entries?

A) application log
B) system log
C) security log
D) maintenance log

A

C
After auditing is turned on and specific resources are configured for auditing, you need to check the event viewers security log for entries. These could be successful logons or misfired attempts at deleting files, there are literally hundreds of options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are working as a computer technician for a mid-sized company. A user calls and tells you that ransomware has been detected on a pc. You verify that the system indeed has ransomware on it. Of the listed answers, what should you now do first?

A) disconnect the PC from the network
B) run anti-malware scan
C) educate the user
D) back up the data on the PC

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of software helps protect against viruses that are attached to email?

A) firewall software
B) antivirus software
C) Edge
D) Hardware firewall

A

B
Antivirus software updates automatically to protect you against the latest viruses, whether they are attached to emails or lying and wait on removable media. You might also choose to use the built-in Microsoft defender or Windows security on newer versions of windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where are software-based firewalls most commonly implemented?

A) on routers
B) on servers
C) on clients
D) on switches

A

C
Software based firewalls, such as Windows Defender firewall, normally run on client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Making data appear as if it is coming from somewhere other than it’s original source is known as which of the following terms?

A) impersonation
B) phishing
C) zero day
D) spoofing

A

D
With spoofing, a malicious user makes web pages, data or email appear to be coming from somewhere else

17
Q

Which of the following offers Hardware based authentication?

A) NTFS
B) smart card
C) strong password
D) encrypted password

A

B
Smart cards are physical cards that let you use as Authentication tools. They are sometimes referred to as tokens and have built-in processors. Examples of smart cards include the personal identity verification card used by US government employees and the common access card used by the Department of Defense personnel

18
Q

Which protocol encrypts transactions through a website?

A) HTTP
B) TLS
C) PuTTY
D) Kerberos

A

B
Transport layer security encrypts transactions through a website. TLS certificates are often accompanied by the protocol https. Note that TLS certificates are sometimes referred to as SSL certificates. SSL stands for the older protocol secure sockets layer

19
Q

Which Windows system recovery option attempts to automatically fix problems?

A) system restore
B) startup repair
C) file history
D) command prompt

A

B
Startup repair attempts to fix issues automatically. It is available in the windows re system recovery options. You might also attempt a reset this PC procedure in WinRE or from within windows

20
Q

You are working at your organization’s help desk. A user contacts you because the battery in a company provided smartphone last only a short period of time. Which of the following tasks should you do to increase the battery life in the smartphone? Select the two best answers.

A) increase the time until the screen automatically dims
B) set the smartphones display to maximum brightness
C) connect to the organization’s Wi-Fi network automatically
D) disable 802.11 AC and instead use 4G mobile data exclusively
E) close applications when tasks are completed
F) increase email synchronization from every 5 minutes to every minute

A

C, E
You should configure the smartphone to connect to the Wi-Fi network automatically and have the user close applications when tasks are completed. If the smartphone is not configured to connect to the Wi-Fi network automatically, it will default to the mobile internet data connection which is often slower than wi-fi. You do not want to rely on the user connecting to Wi-Fi every time, so make it automatic. Also train the user on how to close apps when they are done with their tasks, it only requires a quick swipe.

Using mobile data requires more battery power because the cellular radio typically has to work harder than the Wi-Fi radio would

21
Q

A blue screen is most often caused by a?

A) driver failure
B) memory failure
C) storage drive failure
D) LED monitor failure

A

A
The second most common reason for a blue screen of death is memory processor related errors. Storage drives and led monitors themselves do not have stopped errors but their drivers might

22
Q

You and a coworker are running network cables above the drop ceiling. The coworker accidentally touches the live AC power line and is thrown off the ladder onto the ground. He is dazed and cannot stand. He is no longer near the AC power line. Which of the following statements best describes the first step you should take?

A) cut the power at the breaker
B) move the coworker farther down the hall
C) begin CPR
D) call 911

A

D
Because the immediate danger has passed, call 911 right away. After calling, you would first apply CPR and Aid as necessary. The next step would be to shut off the power at the electrical panel or call the building supervisor or facilities Department to have the power shut off. However it is important to be aware of and comply with the company policies before taking certain actions

23
Q

Which of the following tools is used when setting a computer to boot with the selective startup feature?

A) task manager
B) safe mode
C) Windows RE
D) MSconfig

A

D
This enables you to modify the startup selection. You can boot the computer into different modes. You can also enable and disable services

24
Q

Which tool is used to analyze and diagnose a video card, including its DirectX version?

A) device manager
B) Dxdiag.exe
C) services.msc
D) disc management

A

B
This utility is used to analyze a video card and it’s DirectX version and to check whether drivers are digitally signed.

25
Q

Which of the following statements best describes a common risk when installing Windows drivers that are unsigned?

A) system stability may be compromised
B) files might be cross-linked
C) the drive might become fragmented
D) physical damage to devices might occur

A

A

26
Q

Which of the following settings must be established when you want to make a secure Wireless connection? Select all that apply.

A) the brand of access point
B) the wireless standard used
C) the encryption standard used
D) the SSID of the access point

A

C, D
To make a secure connection, you need to know the service that identifier SSID of the AP and the encryption being used. For example WPA2 or wpa3. The SSID takes care of the connection portion and the encryption takes care of the secure portion. After all computers are connected considered disabling the SSID for increased security

27
Q

In windows, when does a computer dump the physical memory?

A) when the wrong processor is installed
B) when a device is missing drivers
C) when the computer is shut down improperly
D) when the computer detects a condition from which it cannot recover

A

D
If the computer fails and cannot recover, you usually see some type of critical or stop error. At this point, you must restart the computer to get back into the operating system, which is the default setting in windows. The reason for the physical dump of memory is for later debugging. The physical writes the contents of memory, when the computer failed, to a file on the storage Drive

28
Q

When a person takes control of a session between a server and a client, it is known as which type of attack?

A) DDoS
B) Brute Force
C) session hijacking
D) malicious software

A

C
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server. For example, an FTP or HTTP session. An example of this would be an on path attack, also known as a man in the middle attack.

29
Q

Which tool is used to backup data on the C: drive and windows?

A) Nano
B) BitLocker
C) time machine
D) File History

A

D
The Windows File history utility, accessible in setting and the control panel, enables a user to backup files or an entire pc.