Exam B Flashcards

1
Q

Which of the following statements best describes how to restart The Print Spooler service? Select the best two answers.

A) enter net stop spooler and then net start spooler at the command line
B) enter net stop Print Spooler and then net start Print Spooler at the command line
C) go to run > services.msc and > restart The Print Spooler service
D) go to computer management > system tools > Event Viewer and restart the print spool service

A

A, C
In computer management, you can find The Print Spooler service in services and applications > services. From there, you can start, stop, pause, resume, or restart services and also their startup type to automatic, manual or disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where is registry Hive Davis stored?

A) \%systemroot%\Windows
B) \%systemroot%\Windows\System32\Config
C) \%systemroot%\System32
D) \%systemroot%\System32\Config

A

D
Remember that \%systemroot%\ is a variable. It takes the place of whatever folder contains the operating system. This is usually the path windows. For example if you were to run a default installation of windows, the path to the registry Hive would be C:\Windows\System32\Config.
The main hives are SAM, charity, software, system and default. You can access and configure them by opening the registry editor and opening the HKEY_LOCAL_MACHINE subtree. Other Hive information is stored in the user profile folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tom has an older laptop with a magnetic based disc drive. He has been trying to speed up the computer by doing the following:
> upgrading the memory
> removing old applications
Unfortunately, the memory upgrade does not seem to be having any effect, and removing the old applications actually makes the laptop even slower. Which of the following should you do?

A) defragment the drive
B) rebuild the user profile
C) end tasks in the task manager
D) update the laptop

A

A
defrag.exe - f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are using WSUS and testing new updates on PCs. What is this an example of?

A) host based firewall
B) application baselining
C) patch management
D) virtualization

A

C
Patch management is the patching of many systems from a central location. It includes the planning, testing, implementing and auditing stages. There are various software packages you can use to perform patch management. Windows server update services WSUS is an example of Microsoft Patch management software. Other Microsoft examples include the configuration manager which is part of the Microsoft endpoint manager, and there are plenty of third-party offerings as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In windows, where can you configure devices like the display and storage drives to turn off after a certain amount of time?

A) power plans
B) display properties
C) computer management
D) task manager

A

A
To turn off devices after a specified period of time and windows, access control panel then power options. Then click change plan settings for the appropriate power plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following procedures best describes how to find out which type of connection a printer is using?

A) right click the printer, select properties, and click the sharing tab
B) right click the printer, select properties, and click the advanced tab
C) right click the printer, select properties, and click the separator page button
D) right click the printer, select properties, and click the ports tab

A

D
On the ports tab, you can find how the printer is connected to the computer. It might be via usb, COM, lpt, or tcp/ip port. You might get to this tab by selecting Properties or printer properties, depending on the printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One of your customers is asking for recommendations on how to prevent potential data and Hardware loss during a natural disaster. Of the following, what should you recommend? Select the two best answers.

A) cloud storage
B) data recovery
C) backup testing
D) waterproof smartphones
E) hot/warm site
F) local backups

A

A, E
Of the listed answers, you should recommend cloud storage and a hot or warm sight. The cloud storage acts as an off-site storage of data, away from the customer’s building. The hot or warm site acts as a secondary office that is ready to go, or close to ready to go, if the main building is compromised. Depending on the company’s budget, it might be able to afford a hot site, but a warm site can work well if there is an efficient Disaster Recovery plan and place, and if the cloud-based data is quickly accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which utility enables you to implement auditing on a single windows computer?

A) local security policy
B) Group Policy editor
C) AD DS
D) services.msc

A

A
Because there is only one computer you can Implement auditing only locally. This is done with the local security policy. This policy is not available on all editions of windows.

AD DS = active directory domain services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where are restore points stored after they are created?

A) the recycler folder
B) the system32 folder
C) the \%systemroot%\ folder
D) the system volume information folder

A

D
After a restore point is made, it is stored in the system of volume information folder. To view this folder, you must log on as an administrator, show hidden files and folders, and assign permissions to the account that wants to view that folder. The system volume information folder is located in the root of the volume that the restore point was created for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is considered government regulated data?

A) DRM
B) EULA
C) PII
D) DMCA

A

C
Personally identifiable information is regulated by many laws, such as the Privacy Act of 1974 and several others, including GDPR and PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A month ago, you set up a wireless access point/router for a small business that is a customer of yours. Now, the customer calls and complains that the internet access is getting slower and slower. As you look at the WAP/router, you noticed that it was reset at some point and is now set for open access. You suspect that neighboring companies are using the service connection. Which of the following statements best describes how you can restrict access to your customers Wireless connection? Select the best two answers

A) configure the wireless access point to use the latest version of WPA
B) configure MS-CHAPv2 on the WAP/router
C) disable SSID broadcasting
D) move the WAP/router to another corner of the office

A

A, C
If the WAP router was reset, any security settings that you originally set up are most likely gone. If you backed up the settings previously, you could restore them. Either way some type of encryption protocol, preferably wpa3 is necessary. The passphrase or network key generated by the WAP router needs to be installed on each client before it can be recognized on the network. This password phrase he should be kept secret, of course. After all the clients have been associated with the WAP router, disable SSID broadcasting so that no one else can see the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Megan’s laptop runs perfectly when she is at work, but when she takes it on the road, it cannot get on the internet. Internally, the company uses static IP addresses for all computers. What should you do to fix the problem?

A) tell Megan to get a wireless cellular card and service
B) tell Megan to use DHCP
C) tell Megan to configure the alternate configuration tab of tcpip properties
D) configure a static IP address in the alternate configuration tab of the user’s tcp/ip properties and enable dchp in the general tab

A

D
The issue is that Megan needs to obtain an IP address through dchp when on the road. But setting the network adapter to obtain an IP address automatically is not enough. To connect to the internal company network, the alternate configuration tab must be configured as a user configured static IP address. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

John’s computer has two storage drives, each one terabyte. The first one, the system drive, is formatted as ntfs. The second one, the data drive, is formated as FAT32. Which of the following statements are true? Select the best two answers.

A) files on the system Drive can be secured
B) larger logical drives can be made on the Data Drive
C) the cluster size is larger, and storage is more efficient on the system Drive
D) the cluster size is smaller, and storage is more efficient on the system Drive

A

A, D
NTFS can use the NTFS file level security, whereas FAT32 cannot. NTFS clusters are smaller than FAT32 clusters. NTFS partitions are therefore more efficient than FAT32 partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following commands can help you modify the startup environment?

A) msconfig.exe
B) ipconfig
C) boot config editor
D) registry editor

A

A
The msconfig command enables you to modify the startup environment via the general and boot tabs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following provides the lowest level of wireless security protection?

A) disabling the SSID broadcast
B) using RADIUS
C) using the latest version of WPA
D) enabling WEP on the wireless access point

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A customer uses an unencrypted Wireless network. One of the users has shared a folder for Access by any computer. The customer complains that files sometimes appear and disappear from the shared folder. Which of the following statements best describes how to fix the problem? Select the two best answers.

A) enable encryption on the router and the clients
B) encrypt the drive that has the share by using EFS encrypting file system
C) increase the level of security on the NTFS folder by changing the permissions
D) change the share level permissions on the shared folder

A

A, C
Use the latest version of WPA encryption on the router and clients to deny War drivers and other stragglers access to the customer’s Network and ultimately any shared folders on the network. Increase the level of NTFS security by changing the permissions in the security tab of the shared folder

17
Q

Windows was installed on a computer with two storage drives, a C drive and a D drive. Windows is installed to C, and it works normally. The user of this computer complains that his applications are Drive intensive and that they slow down the computer. Which of the following statements best describes how to resolve the problem?

A) move the paging files to the D drive
B) reinstall Windows on the D drive rather than on the C drive
C) defragment the D drive
D) decrease the size of the paging file

A

A
By moving the paging file or swap file, AKA virtual memory, to the D drive, you are freeing up C to deal with those Drive intensive programs

18
Q

One of your vendors needs to access a server in your data center for maintenance of a software package. The security policy for your organization restricts the use of Port 3389. However, command line Protocols are allowed. Which of the following would be the most secure solution?

A) FTP
B) SSH
C) RDP
D) SCP

A

B
The best answer is to have the vendor use secure shell ssh. This allows for a command line based connection to the server. SSH provides for encrypted Communications between a client and server, it is an industry standard

Example ssh vendor@10.0.2.143
Would connect the username vendor to the server with the IP address as follows.

19
Q

You are working on a Windows computer that is performing slowly. Which of the following commands should you use to resolve the problem? Select the two best answers.

A) format
B) dism
C) ipconfig
D) chkdsk
E) dir
F) dispart

A

B, D
For a computer that is running slowly, try using the check disk and sfc commands. Then, if those run into problems, try using the deployment Imaging service and management command dism. Check disk and sfc can repair problems with the drive and with system files. Dism can repair problems with the system image