Exam B Flashcards
Which of the following statements best describes how to restart The Print Spooler service? Select the best two answers.
A) enter net stop spooler and then net start spooler at the command line
B) enter net stop Print Spooler and then net start Print Spooler at the command line
C) go to run > services.msc and > restart The Print Spooler service
D) go to computer management > system tools > Event Viewer and restart the print spool service
A, C
In computer management, you can find The Print Spooler service in services and applications > services. From there, you can start, stop, pause, resume, or restart services and also their startup type to automatic, manual or disabled
Where is registry Hive Davis stored?
A) \%systemroot%\Windows
B) \%systemroot%\Windows\System32\Config
C) \%systemroot%\System32
D) \%systemroot%\System32\Config
D
Remember that \%systemroot%\ is a variable. It takes the place of whatever folder contains the operating system. This is usually the path windows. For example if you were to run a default installation of windows, the path to the registry Hive would be C:\Windows\System32\Config.
The main hives are SAM, charity, software, system and default. You can access and configure them by opening the registry editor and opening the HKEY_LOCAL_MACHINE subtree. Other Hive information is stored in the user profile folders
Tom has an older laptop with a magnetic based disc drive. He has been trying to speed up the computer by doing the following:
> upgrading the memory
> removing old applications
Unfortunately, the memory upgrade does not seem to be having any effect, and removing the old applications actually makes the laptop even slower. Which of the following should you do?
A) defragment the drive
B) rebuild the user profile
C) end tasks in the task manager
D) update the laptop
A
defrag.exe - f
You are using WSUS and testing new updates on PCs. What is this an example of?
A) host based firewall
B) application baselining
C) patch management
D) virtualization
C
Patch management is the patching of many systems from a central location. It includes the planning, testing, implementing and auditing stages. There are various software packages you can use to perform patch management. Windows server update services WSUS is an example of Microsoft Patch management software. Other Microsoft examples include the configuration manager which is part of the Microsoft endpoint manager, and there are plenty of third-party offerings as well
In windows, where can you configure devices like the display and storage drives to turn off after a certain amount of time?
A) power plans
B) display properties
C) computer management
D) task manager
A
To turn off devices after a specified period of time and windows, access control panel then power options. Then click change plan settings for the appropriate power plan.
Which of the following procedures best describes how to find out which type of connection a printer is using?
A) right click the printer, select properties, and click the sharing tab
B) right click the printer, select properties, and click the advanced tab
C) right click the printer, select properties, and click the separator page button
D) right click the printer, select properties, and click the ports tab
D
On the ports tab, you can find how the printer is connected to the computer. It might be via usb, COM, lpt, or tcp/ip port. You might get to this tab by selecting Properties or printer properties, depending on the printer
One of your customers is asking for recommendations on how to prevent potential data and Hardware loss during a natural disaster. Of the following, what should you recommend? Select the two best answers.
A) cloud storage
B) data recovery
C) backup testing
D) waterproof smartphones
E) hot/warm site
F) local backups
A, E
Of the listed answers, you should recommend cloud storage and a hot or warm sight. The cloud storage acts as an off-site storage of data, away from the customer’s building. The hot or warm site acts as a secondary office that is ready to go, or close to ready to go, if the main building is compromised. Depending on the company’s budget, it might be able to afford a hot site, but a warm site can work well if there is an efficient Disaster Recovery plan and place, and if the cloud-based data is quickly accessible
Which utility enables you to implement auditing on a single windows computer?
A) local security policy
B) Group Policy editor
C) AD DS
D) services.msc
A
Because there is only one computer you can Implement auditing only locally. This is done with the local security policy. This policy is not available on all editions of windows.
AD DS = active directory domain services
Where are restore points stored after they are created?
A) the recycler folder
B) the system32 folder
C) the \%systemroot%\ folder
D) the system volume information folder
D
After a restore point is made, it is stored in the system of volume information folder. To view this folder, you must log on as an administrator, show hidden files and folders, and assign permissions to the account that wants to view that folder. The system volume information folder is located in the root of the volume that the restore point was created for
Which of the following is considered government regulated data?
A) DRM
B) EULA
C) PII
D) DMCA
C
Personally identifiable information is regulated by many laws, such as the Privacy Act of 1974 and several others, including GDPR and PCI DSS
A month ago, you set up a wireless access point/router for a small business that is a customer of yours. Now, the customer calls and complains that the internet access is getting slower and slower. As you look at the WAP/router, you noticed that it was reset at some point and is now set for open access. You suspect that neighboring companies are using the service connection. Which of the following statements best describes how you can restrict access to your customers Wireless connection? Select the best two answers
A) configure the wireless access point to use the latest version of WPA
B) configure MS-CHAPv2 on the WAP/router
C) disable SSID broadcasting
D) move the WAP/router to another corner of the office
A, C
If the WAP router was reset, any security settings that you originally set up are most likely gone. If you backed up the settings previously, you could restore them. Either way some type of encryption protocol, preferably wpa3 is necessary. The passphrase or network key generated by the WAP router needs to be installed on each client before it can be recognized on the network. This password phrase he should be kept secret, of course. After all the clients have been associated with the WAP router, disable SSID broadcasting so that no one else can see the router.
Megan’s laptop runs perfectly when she is at work, but when she takes it on the road, it cannot get on the internet. Internally, the company uses static IP addresses for all computers. What should you do to fix the problem?
A) tell Megan to get a wireless cellular card and service
B) tell Megan to use DHCP
C) tell Megan to configure the alternate configuration tab of tcpip properties
D) configure a static IP address in the alternate configuration tab of the user’s tcp/ip properties and enable dchp in the general tab
D
The issue is that Megan needs to obtain an IP address through dchp when on the road. But setting the network adapter to obtain an IP address automatically is not enough. To connect to the internal company network, the alternate configuration tab must be configured as a user configured static IP address. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address
John’s computer has two storage drives, each one terabyte. The first one, the system drive, is formatted as ntfs. The second one, the data drive, is formated as FAT32. Which of the following statements are true? Select the best two answers.
A) files on the system Drive can be secured
B) larger logical drives can be made on the Data Drive
C) the cluster size is larger, and storage is more efficient on the system Drive
D) the cluster size is smaller, and storage is more efficient on the system Drive
A, D
NTFS can use the NTFS file level security, whereas FAT32 cannot. NTFS clusters are smaller than FAT32 clusters. NTFS partitions are therefore more efficient than FAT32 partitions
Which of the following commands can help you modify the startup environment?
A) msconfig.exe
B) ipconfig
C) boot config editor
D) registry editor
A
The msconfig command enables you to modify the startup environment via the general and boot tabs
Which of the following provides the lowest level of wireless security protection?
A) disabling the SSID broadcast
B) using RADIUS
C) using the latest version of WPA
D) enabling WEP on the wireless access point
A