Exam A Flashcards
Where is the notification area located in windows?
A) in the system properties dialog box
B) in the system32 folder
C) on the taskbar
D) within the start menu
C
The notification area toward the bottom right of your screen within the taskbar. It contains the time and any application currently running and memory
One of the computers in your Warehouse often requires the replacement of power supplies, cpu, and other internal devices. Which tool can help prevent these types of hardware faults?
A) compressed air
B) anti-static wrist straps
C) rescue desk
D) multimeter
A
Compressed air, if used periodically inside a computer, can help prevent Hardware faults from occurring. Most likely, the warehouse is not the cleanest, and the computer is sucking in dirt 24 hours a day. If you take the computer outside, remove the cover, and carefully blow out the dust bunnies with compressed air, you might increase the lifespan of the hard work components.
Which of the following features is used to both start and stop services? Select the two best answers.
A) services.msc
B) task manager
C) performance monitor
D) MMC
E) Msconfig
A, B
You can start, stop, and restart services within the services window. By going to run and then typing services.msc.
MSconfig is used to enable, disabled services but not start them
One of your customers cannot access any websites but can access the company FTP site and can access internal email with an outlook. Which of the following will fix the problem?
A) reconfigure the proxy settings
B) disabled the firewall
C) deactivate and reactivate the network interface card
D) remove and reinstall the web browser
A
Chances are that the customer uses a proxy server for HTTP and https website connections. Without the properly configured proxy settings, the user might not be able to access the websites but would be able to access other networking services, such as FTP and email
Which of the following can be used to keep storage drives free of errors and ensure that Windows runs efficiently? Select the two best answers.
A) disc management
B) disc defragmenter
C) chkdsk
D) system restore
E) task scheduler
B, C
Disc defragmenter keeps Windows running more efficiently by making files contiguous and reducing the amount of physical work the storage drive has to do. The check disk command checks the storage drive for errors
A SOHO wireless network has been compromised by an attacker who brute forced a PIN to gain Wireless access. Once the attacker had access, he modified the DNS settings on the Soho router, and malware was spread throughout the network. Which of the following most likely allowed the attack to occur? Select the two best answers.
A) TKIP
B) latest WPA version
C) default login
D) old firmware
E) WPS
F) guest Network enabled
C, E
The attack was most likely successful because the Soho router was configured with a default login and wps. A default login means that the Soho router is using the original username often admin and password typically a stock password selected by the manufacturer of the device which anyone can look up on the internet. A default login makes it extremely easy for an attacker to log into a device. Always be sure to change the password of a Soho router right after installing it. WPS stands for Wi-Fi protected setup, and for a long time was based on an eight digit PIN code that is somewhat easy to Brute force.
Which log file contains information about Windows setup errors?
A) setupact.log
B) setuperr.log
C) unattend.xml
D) diskmgmt.msc
B
Set up error log contains information about set up errors during an installation of windows. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation
A customer’s device manager shows an arrow pointing down over one of the devices. What does this tell you?
A) the devices driver has not been installed
B) the device is not recognized
C) the device is disabled
D) the device is in the queue to be deleted
C
A co-worker just installed a second storage Drive in his windows computer. However, he does not see the drive and file explorer. What did he forget to do? Select the three best answers.
A) format the drive
B) partition the drive
C) run fdisk
D) initialize the drive
E) set up the drive in UEFI and bios
A, B, D
How would you create a restore point in windows?
A) run disk defragmenter from the MMC
B) run Powershell
C) run the system restore program from the system properties
D) run the disc cleanup program from system properties
C
System restore is the tool used to create restore points. You can find it within the search utility or by going to control panel then all control panel icons then system and then clicking the system protection link.
Which of the following tasks cannot be performed from the printer properties screen?
A) modifying spool settings
B) adding ports
C) pausing printing
D) enable sharing
C
To pause printing in general and pause individual documents, double click on the printer in question and make modifications in the window that appears
You are setting up auditing on a Windows computer. If it is set up properly, which of the following logs should contain entries?
A) application log
B) system log
C) security log
D) maintenance log
C
After auditing is turned on and specific resources are configured for auditing, you need to check the event viewers security log for entries. These could be successful logons or misfired attempts at deleting files, there are literally hundreds of options
You are working as a computer technician for a mid-sized company. A user calls and tells you that ransomware has been detected on a pc. You verify that the system indeed has ransomware on it. Of the listed answers, what should you now do first?
A) disconnect the PC from the network
B) run anti-malware scan
C) educate the user
D) back up the data on the PC
A
Which type of software helps protect against viruses that are attached to email?
A) firewall software
B) antivirus software
C) Edge
D) Hardware firewall
B
Antivirus software updates automatically to protect you against the latest viruses, whether they are attached to emails or lying and wait on removable media. You might also choose to use the built-in Microsoft defender or Windows security on newer versions of windows.
Where are software-based firewalls most commonly implemented?
A) on routers
B) on servers
C) on clients
D) on switches
C
Software based firewalls, such as Windows Defender firewall, normally run on client computers