Exam A Flashcards
When you are performing a clean windows installation, which of the following is the default location for the Windows system files?
A) C:\Windows
B) C:\Windows\System32\Config
C) C:\Windows\System32
D) C:\System Files
C
A customer browses to a company’s intranet page and receives an invalid certificate message. After analysis, you discover that the certificate has expired. You install a new certificate on the user’s computer. However, the user still received the same message when going to the intranet page. You try again with a different web browser, and it connects without error. You figure out that you need to make sure the old certificate is no longer used in the browser. Which of the following internet options settings should you use to ensure that the old certificate is removed?
A) certificates
B) advanced
C) clear SSL state
D) publishers
A
To get to this tab, go to control panel then internet options then content tab. This is where you can remove old browser certificates. This holds true for the older Internet Explorer and Microsoft Edge. You can also access internet options in Edge by typing edge://settings in the address bar and searching for manage certificates
Users are reporting to you that a Windows feature asks them for confirmation before running certain applications or when making system changes. What is the name of this windows feature, and where should you direct users to turn off the functionality?
A) security center, it can be turned off in the services console window
B) user account control, it can be turned off under security and the control panel
C) Windows Defender firewall, it can be turned off under system properties
D) user account control, it can be turned off under user accounts in the control panel
D
You are a l a n administrator in charge of printers. Which of the following should you check first when a Windows user is trying to print a document and get the error message ‘print subsystem not available?’
A) the correct printer driver is installed
B) the printer has been added
C) the spooler service is running
D) the printer has power from the jack
C
If a print subsystem not available or similar message appears, it most likely means the Spooler has stalled. You can turn the spooler back on and the services section of computer management or by issuing the command net start spooler in the command prompt
Your managers Windows computer locks up after the graphical user interface starts to load. However, the computer will boot in a safe mode. When you access the event viewer, you see an entry stating that a driver failed. Which of the following steps will help you further diagnose the problem?
A) run sigverif
B) enable boot logging and then, and safe mode, analyze the ntbtlog.txt file
C) disable driver signature enforcement
D) access debugging mode
B
Boot logging can be enabled from the Windows recovery environment in startup settings. After this option is enabled, the system automatically creates a file called ntbtlog.txt. afterwards, you can access the system by booting into safe mode, once again from the recovery environment
You are troubleshooting a computer that has a web browser issue. The end user says that multiple browser Pages open by themselves when she surfs the internet. Also, You observe that the computer is running slowly. Which of the following actions should you perform first?
A) install anti-malware software
B) update antivirus definitions
C) reboot the computer
D) enable a pop-up blocker
A
The first thing you should do is install anti-malware software. It would be surprising if the computer doesn’t have any, but it is a possibility.
You are tasked with disabling services from starting on a Windows pc. Which command should be run to bring up a window to make these changes?
A) sfc.exe
B) chkdsk
C) msconfig
D) gpupdate
C
This is the only option listed with which you can disable services. The key and the question is the phrase bring up a window. This runs in a window, whereas the rest of the answers run as text at the command line. This can also be used to modify how the system boots. The services console window can also be used to disable services, as well as start and stop them.
You are tasked with creating a laptop naming convention that will make a customers laptops easier to track and identify while in use. Which of the following naming conventions should you use?
A) asset ID and Mac address
B) location and RFID
C) domain name, location, and asset ID
D) domain name, location, and IP address
A
Use the asset ID and Mac address naming convention to help you track and identify laptops while in use. And asset ID is an identification code that helps track computers or other Assets in the organization. Many Asset Management Systems use them. However, the system still needs to find the computer in the scenario. Because they are laptops and they could move from place to place, one good option is to locate the laptops by their Mac address. A MAC address is a physical address that is programmed into a chip on the network interface card, it is outside of and not affected by the operating system. Normally, the MAC address does not change, making it a good way to locate laptops that might move from place to place.
Which of the following commands is used to display hidden files?
A) dir /o
B) dir /a
C) dir /d
D) dir /?
B
dir /ah
can be used to show hidden files only
Which of the following statements best describes how to prepare a mobile device to be protected in the event that it is lost or stolen? Select the three best answers.
A) disable Bluetooth
B) configure remote backup
C) enable Wi-Fi encryption
D) enable GPS
E) enable Wi-Fi tethering
F) configure a pattern screen lock
B, D, F
First, you should configure some kind of remote backup. This way, if the device is compromised, you have the confidential data backed up outside of the device at another location. The other half of this solution is remote wipe. If you are positive that the device is lost or stolen, and you know the data was backed up at some point, trigger a remote wipe to remove all data from the device. Also, enabled GPS on the device so it can be tracked if it is lost or stolen. In addition, configure a screen lock of some sort, whether it is a pattern that is drawn on the display, a pin, or a password. A strong password is usually the best form of screen lock and the hardest to crack.
Two accounting coworkers share the same file inside a folder. User A works on the file, makes changes, and saves the file. User B then works on the file, makes changes, and saves the file as well. The next time user A attempts to open the file, she receives an access denied error. Which of the following statements best describes the most likely cause of this error message?
A) the NTFS permissions were changed on the file to allow only execute
B) the file was set with the system and hidden attributes
C) the file was set to read only by the accounts receivable administrator
D) the file was moved before being modified and then moved back to the share
D
Most likely user B moved the file to another location outside the current partition, made the changes which is possible sent user B is the one who moved it, and then moved it back to the original location. Whenever a file is moved to another partition or volume, the file takes on the permissions of the parent folder. However if the file had been moved within the volume, the permissions would have been retained. Remember, if the file is moved within the same volume, it retains permissions, so the permissions don’t change. But if the file is moved to another volume, it takes on the permissions of the folder it is moved into. As for copying, they files copy always takes on the permissions of the parent regardless of where that copy is placed
Which of the following are the best options for securing a data center? Select the two best answers.
A) bollard
B) badge reader
C) cable lock
D) USB based hardware token
E) biometric lock
F) privacy shade
B, E
The badge reader and biometric lock are the best of the listed answers. Although all kinds of other security methods are possible. This scenario is an example of multi-factor authentication. And RFID based badge reader relies on something the person has, and the biometric lock relies on something the user is. Multi-factor authentication systems are more secure because they layer security
Which of the following is the best Windows utility to use if an administrator wants to perform administrative tasks that integrate scripts over a network?
A) Powershell
B) command prompt
C) Mission Control
D) Bash
A
Windows Powershell enables administrators to perform administrative tasks that integrate scripts and executables and can be run over a network. For even more power and flexibility, use Visual Studio code VSC or the older Powershell integrated scripting environment.
You are working in the console of a Linux server. What command should you type to find out the type of file system used by the servers storage drives?
A) diskpart
B) rm
C) df -T
D) pwd
C
Use this command to find out what file systems are used by each of the storage Drive partitions. Note that the T option is needed to see the file system types. The console is simply the name of the command line terminal in Linux if you are working on the server locally
You are required to stop the Windows Defender Firewall service. Which of the following best describes how to accomplish this? Select the three best answers.
A) in performance monitor
B) with the net stop mpssvc command
C) within MSconfig
D) within the task manager
E) in system information
F) with gpegit.exe
G) in services.msc
B, D, G
The name of the Windows Defender Firewall service is mpssvc. So, the Third Way of the listed answers is to use the ‘net stop mpsspc’ command and Powershell or the command prompt