Exam Cram B - CompTIA A+ 1002 Flashcards

1
Q
  • Which of the following statements best describes how to restart the Print Spooler Services? (Select the Two Best Answers)

Enter net stop spooler and then net start spooler on the command line
Enter net stop print spooler and then net start print spooler on the command line
Goto Computer Management > Services and Restart the Print Spooler Service
Goto Computer Management > System Tools > Event Viewer and Restart Print Spooler Service

A

Enter net stop spooler and then net start spooler on the command line
Goto Computer Management > System Tools > Event Viewer and Restart Print Spooler Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Where is Registry hive data stored?

\%systemroot%\Windows
\%systemroot%\Windows\System32\Config
\%systemroot%\System32
\%systemroot%\System32\Config

A

\%systemroot%\System32\Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clinton needs a more secure partition on his hard drive. Currently, the only partition on the drive (C:) is formatted as FAT32. He cannot lose the data on the drive but must have a higher level of security, so he is asking you to change the drive to NTFS. Which of the following is the proper syntax for this procedure?

change C: /FS:NTFS
change C: NTFS /FS
convert C: /FS:NTFS
convert C: NTFS /FS

A

convert C: /FS:NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Tom has a 200 GB hard drive partition (Known as C:) on a Windows Computer. He has 15 GB free space on the partition. Which of the following statements best describes how he can defrag the partition?

He can run the Disk Defragmenter in Computer Management
He can run defrag.exe -f on the command line.
He can run defrag.exe -v on the command line.
He can run defrag.exe -A on the command line.

A

He can run defrag.exe -f on the command line.

Explanation:
Use defrag.exe -f. You need to have 15 percent free space on your partition to defrag it in the Disk Defragmenter GUI-based utility. In the scenario, Tom would need 30 GB free on the 200 GB drive. However, you can force a defrag on a partition even if you don’t have enough free space by using the -f switch in the command line. (-f may not be necessary in some versions of Windows.)

Incorrect answers:
Because there is only 15 GB of free space on the 200 GB drive (7.5 percent free), the defrag probably won’t work properly from within the Disk Defragmenter utility.

The -v switch gives you verbose (or wordy) output.

The -a switch gives analysis only and does not perform defragmentation.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 193). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are utilizing WSUS and are testing new updates on the PCs. What is this an example of?

Host-Based Firewall
Application baselining
Patch Management
Virtualization

A

Patch Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which versions of Windows 8 allow for joining domains? (Select the Two Best Answers)

Standard
Pro
Ultimate
Enterprise

A

Pro

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One of your customers reports that there is a large amount of spam in her email inbox. Which of the following statements describes the best course of action to recommend to her?

Advise her to create a new email account
Advise her to add the senders to the junk email senders list
Advise her to find a new ISP
Advise her to reply to all spam and opt out of future emails

A

Advise her to add the senders to the junk email senders list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Windows, where can devices like the display and hard drives be configured to turn off after a certain amount of time?

Power Plans
Display Properties
Computer Management
Task Manager

A

Power Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following procedures best describes how to find out which type of connection the printer is using?

Right-Click the Printer, Select Properties, and Click Sharing Tab
Right-Click the Printer, Select Properties, and Click the Advanced Tab
Right-Click the Printer, Select Properties, and Click the Separator Page button.
Right-Click the Printer, Select Properties, and select the Ports Tab.

A

Right-Click the Printer, Select Properties, and select the Ports Tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your customer is having problems printing from an application. You attempt to send a test page to the printer. Which of the following statements best describes why a test page should be used to troubleshoot the issues?

It allows you to see the quality of the printer output
The output of the test page allows you to initialize diagnostic routines on the printer.
It verifies the connectivity and illuminates possible application problems.
It clears the print queue and resets the printer memory

A

It verifies the connectivity and illuminates possible application problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user’s hard drive seems very slow in its reaction to when opening applications. Which of the following statements best describes the most likely cause of this?

The drive needs to be initialized
The temporary files need to be deleted
The drive is fragmented
The drive’s SATA data connector is lose.

A

The drive is fragmented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following actions will NOT secure a functioning computer workstation?

Setting a Strong Password
Changing Default Usernames
Disabling the Guest Account
Sanitizing the Hard Drive

A

Sanitizing the Hard Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which utility enables you to implement auditing on a single Windows Computer?

Local Security Policy
Group Policy Editor
AD DS
Services.msc

A

Local Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements best describes the main function of a device driver?

Modifies Applications
Works with Memory more efficiently
Improves device performance
Allows the OS to talk to the devices

A

Allows the OS to talk to the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Where are restore points stored after they are created?

The Recycler Folder
The System32 Folder
The %systemroot% Folder
The System Volume Information Folder

A

The System Volume Information Folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is considered to be government-regulated data?

DRM
EULA
PII
DMCA

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following are types of social engineering? (Select the Two Best Answers)

Malware
Shoulder Surfing
Tailgating
Rootkits

A

Shoulder Surfing

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the service that controls the printing of documents in a Windows Computer?

Printer
Print Server
Print Spooling
Print Spooler

A

Print Spooler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is the best way to ensure that a hard drive is secure for disposal?

Magnetically erase the drive
Format the drive
Run bootrec /fixmbr
Convert the drive to NTFS

A

Magnetically erase the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A month ago, you set up a wireless access point/router for a small business that is a customer of yours. Now, the customer calls and complains that Internet access is getting slower and slower. As you look at the WAP/router, you notice that it was reset at some point and is now set for Open Access. You then guess that neighboring companies are using the service connection. Which of the following statements best describes how you can restrict access to your customer’s wireless connection? (Select the Two Best Answers)

Configure the wireless access point to use WPA2
Configure MS-CHAPv2 on the WAP/Router
Disable SSID Broadcasting
Move the WAP/Router to another corner of the office

A

Configure the wireless access point to use WPA2

Disable SSID Broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A first-level help desk support technician receives a call from a customer and works with the customer for several minutes to resolve the call, but the technician is unsuccessful. Which of the following steps should the technician perform next?

The tech should explain to the customer that he will receive a callback when someone more qualified is available.
The tech should escalate the call to another tech.
The tech should explain to the customer that the problem cannot be resolved and end the call.
The tech should continue working with the customer until the problem is resolved.

A

The tech should escalate the call to another tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A customer complains that there is nothing showing on the display of his laptop. Which of the following should you attempt FIRST on the computer?

You should replace the inverter
You should reinstall the Video Drivers
You should boot into Safe Mode
You should check whether the laptop is in Standby or Hibernate mode.

A

You should check whether the laptop is in Standby or Hibernate mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • During an installation of Windows, you are given an opportunity to load alternative third-party drivers. Which device are you most likely loading drivers for?

CD-ROM
SCSI Drive
USB Mouse
BIOS/UEFI

A

SCSI Drive

Explanation:
The SCSI hard drive is the most likely answer. SCSI hard drives (such as SAS SCSI) and RAID controllers need special drivers during the Windows installation process if they are not recognized automatically. Click the option for loading third-party drivers when the installation begins.

Incorrect answers:
Optical drives and USB devices do not require third-party drivers.

The BIOS/UEFI doesn’t use a driver; it is firmware.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 198). Pearson Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Windows 10 Computer in a Windows Workgroup can have how many concurrent connections?

10 or Fewer
15 or fewer
20 or fewer
25 or fewer

A

20 or fewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Megan’s laptop runs perfectly when she is at work, but when she takes it on the road, it cannot get on the Internet. Internally, the company uses static IP Address for all computers. What should you do to fix the problem?

Tell Megan to get a wireless cellular card and service
Tell Megan to use DHCP
Tell Megan to configure the alternate configuration tab of TCP/IP properties.
Configure a static IP address in the Alternate Configuration tab of the user’s TCP/IP properties and enable DHCP in the General Tab.

A

Configure a static IP address in the Alternate Configuration tab of the user’s TCP/IP properties and enable DHCP in the General Tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which power saving mode enables the best power saving, while still allowing the session to be reactivated later?

Standby
Suspend
Hibernate
Shutdown

A

Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • John’s computer has two hard drives, each 1 TB. The first is the system drive and is formatting as NTFS. The second is the data drive and is formatted as FAT32. Which of the following statements are true? (Select the Two Best Answers)

Files on the system drive can be secured
Larger logical drives can be made on the data drive
The cluster size is larger, and storage is more efficient on the system drive.
The cluster size is smaller, and storage is more efficient on the system drive.

A

Files on the system drive can be secured

The cluster size is smaller, and storage is more efficient on the system drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When using the command line, a switch _______?

enables the command to work across any operating system
is used in application icons
changes the core behavior of a command, forcing the command to perform unrelated actions
alters the actions of a command, such as widening or narrowing the function of the command

A

alters the actions of a command, such as widening or narrowing the function of the command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You need to view any application errors that have occurred today. Which tool should be used?

Event Viewer
Local Security Policy
Msconfig
sfc /scannow

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following commands can help you modify the startup environment?

Msconfig
Ipconfig
Boot Config Editor
Registry Editor

A

Msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following log files references third-party software error messages?

Security Log
System Log
Application Log
Setuperr.log

A

Application Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following provides the lowest level of wireless security protection?

Disable the SSID Broadcast
Use RADIUS
Use WPA2
Enable WEP on the Wireless Access Point

A

Disable the SSID Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  • A Customer uses an encrypted wireless network. One of the users has shared a folder for access by any computer. The customer complains that the files sometimes appear and disappear from the shared folder. Which of the following statements best describes how to fix this problem? (Select the Two Best Answers)

Enable encryption on the Router and the Clients
Encrypt the Drive that has the share using EFS (Encrypting File System)
Increase the level of security on the NTFS folder by changing the Permissions
Change the Share-Level Permissions on the Shared Folder

A

Enable encryption on the Router and the Clients

Increase the level of security on the NTFS folder by changing the Permissions

34
Q

A customer is having difficulties with his hard drive, and the system won’t boot. You discover that the operating system has to be reloaded. Which of the following statements best describes how to explain this to the customer?

“I need to rebuild the computer.”
“I need to format the hard drive and reload the software.”
“I need to run a bootrec /fixmbr on the Computer.”
“I need to restore the system, data loss might occur.”

A

“I need to restore the system, data loss might occur.”

35
Q

Users in your accounting department are prompted to provide usernames and passwords to access the payroll system. Which type of authentication method is being requested in this scenario?

MFA
Single-Factor
TACACS+
RADIUS

A

Single-Factor

36
Q

Which of the following commands makes a duplicate of a file?

Move
Copy
Dir
LS

A

Copy

37
Q

Which tool in Windows enables a user to easily see how much memory a particular process uses?

System Information Tool
Registry
Task Manager
Performance Monitor

A

Task Manager

38
Q

Windows was installed on a computer with two hard drives: a C: drive and a D: drive. Windows is installed to C:, and it works normally. The user of this computer complains that this applications are drive intensive and that they slow down the computer. Which of the following statements best describes how to resolve the problem?

Move the Paging File to the D: Drive
Reinstall Windows on the D: Drive rather than the C: drive.
Defrag the D: Drive.
Decrease the Paging File Size.

A

Move the Paging File to the D: Drive.

39
Q

Which of the following tools should be used to protect a computer form electrostatic discharge (ESD) while you are working inside it?

Multimeter
Crimper
Antistatic Wrist Strap
PSU Tester

A

Antistatic Wrist Strap

40
Q

You are running some cable from an office to a computer located in a warehouse. As you are working in the warehouse, a 55-gallon drum falls from a pallet and spills what smells like ammonia. Which of the following statements best describes the first step you should take in your efforts to resolve this problem?

Call 911
Call the building supervisor
Get out of the area
Save the computer

A

Get out of the area

41
Q

While you are upgrading a customer’s sever hard drives, you notice looped network cables lying all around the server room floor. Which of the following statements best describes how to resolve this issue?

Ignore the problem
Tell the customer about safer alternatives
Call the building supervisor
Notify the administrator

A

Tell the customer about safer alternatives

42
Q

Which of the following statements best describes the recommended solution for a lithium-ion battery that won’t hold a charge any longer?

Throw it in the trash
Return it to the battery manufactuer
Connect the local municipality and inquire as to their disposal methods
Open the batter and remove the deposits

A

Connect the local municipality and inquire as to their disposal methods

43
Q

Which of the following statements is NOT assertive communication?

“I certainly know how you feel, losing data is a terrible thing.”
“Could you explain again exactly what you would like done?”
“Do your employees always cause issues on computers like these?”
“What can I do to help you?”

A

“Do your employees always cause issues on computers like these?”

44
Q

A customer has a malfunctioning PC, and as you are about to begin repairing it, the customer proceeds to tell you about the problem with the Server. Which of the following statements best describes how to respond to the customer?

“Wait until I finish with the PC.”
“I’m sorry, but I don’t know how to fix servers.”
“Is the server problem related to the PC Problem?”
“I have to call my supervisor.”

A

“Is the server problem related to the PC Problem?”

45
Q

Which of the following could be described as the chronological paper trail of evidence?

First Response
Chain of Custody
Setting and meeting expectations
Data preservation

A

Chain of Custody

46
Q

Which of the following statements best describes what NOT to do when moving servers and server racks?

Remove Jewelry
Move a 70-pound wire rack by yourself
Disconnect power to the servers before moving them.
Bend at the knees and lift with your legs

A

Move a 70-pound wire rack by yourself

47
Q

Active communication includes which of the following?

Filtering out unnecessary information
Declaring that the customer doesn’t know what he or she is doing
Clarifying the customer’s statements
Mouthing off

A

Clarifying the customer’s statements

48
Q

You are troubleshooting a tablet PC that has a frozen application. You have attempted to end the underlying Task of the application but have not succeeded. Which of the following statements best describes the next recommended course of action?

Hard reset
Force quit the app
Soft reset
Bring the tablet to an authorized service center

A

Soft reset

49
Q

Which of the following statements best describes the first course of action to removing malware?

Schedule scans and run updates
Enable system restore
Identify malware symptoms
Educate the end user
Disable system restore
Quarantine infected systems
Remediate infected systems
A

Identify malware symptoms

50
Q

You are working on a Windows computer that is performing slowly. Which of the following commands should you use to resolve the problem? (Select the Two Best Answers)

Format
Dism
Ipconfig
chkdsk
Dir
diskpart
A

dism

chkdsk

51
Q

A customer reports that an optical drive in a PC is no longer responding. Which of the following statements best describes the first question you should ask the customer?

“What has changed since the optical drive worked properly?”
“Did you log in with your administrator account?”
“What did you modify since the optical drive worked?”
“Have you been to any inappropriate websites?”

A

“What has changed since the optical drive worked properly?”

52
Q

A coworker is traveling to Europe and is bringing her desktop computer. She asks you what concerns there might be. Which of the following statements best describes how to respond to the customer? (Select the Two Best Answers)

Advise her that the computer is not usable in other countries.
Advise her to check for a compatible power adapter for that Country
Advise her to use a line conditioner for the correct voltage
Advise her to check the voltage selector on the power supply

A

Advise her to check for a compatible power adapter for that Country
Advise her to check the voltage selector on the power supply

53
Q

After you remove malware/spyware from a customer’s PC for the third time, which of the following steps should be taken next?

Tell him you can’t fix the system again
Do nothing; the customer pays every time
Show him how to avoid the problem
Change his user permission

A

Show him how to avoid the problem

54
Q

You are asked to fix a problem with a customer’s Active Directory Domain Service domain controller that is outside the scope of your knowledge. Which of the following statements best describes the recommended course of action?

Learn on the job by trying to fix the problem
Tell the customer that the problem should be reported to another technician
Assure the customer that the problem will be fixed very soon
Help the customer find the appropriate channels to fix the problem

A

Help the customer find the appropriate channels to fix the problem

55
Q

When you are working on a computer, which of the following should be disconnected to prevent electrical shock? (Select the Two Best Answers)

Printer
Mouse
Telephone Cord
Power Cord

A

Telephone Cord

Power Cord

56
Q

You are troubleshooting a Windows Server computer that you have little knowledge about. The message on the screen says there is a “DHCP Partner Down” error. No other technicians are available to help you, and your manager wants the server fixed ASAP or you are fired. Which of the following statements best describes the recommended course of action? (Select the Two Best Answers)

Identify the problem.
Escalate the problem.
Establish a plan of action.
Call tech support.
Verify full system functionality
Test the theory to determine cause.
Tell your boss to kick rocks and quit and go find a job that has a more supportive, positive environment.
A

Identify the Problem

Call Tech Support

57
Q

Which of the following protects confidential information from being disclosed publicly?

Classification
Social Engineering
HTTP
Hard Drive Wipe

A

Classification

58
Q

Programs that run when Windows starts are stored in which of the following registry hives?

HKEY_CURRENT_CONFIG
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT

A

HKEY_LOCAL_MACHINE

59
Q

Typically, which of the following Windows tools enables you to configure a SOHO router?

Web Browser
Device Manager
Msconfig
File Explorer

A

Web Browser

60
Q
  • Which of the following steps is performed first when running a clean install of Windows on a Brand New SAS hard drive?

Format the Partition
Partition the Drive
Configure Windows Settings
Load RAID Drivers

A

Load RAID Drivers

Explanation:
The first thing you need to supply is the driver for any special drives, such as new SCSI drives, SAS drives, or RAID controllers. That, of course, is optional. If you have a typical SATA drive, Windows should recognize it automatically.

Incorrect answers:
Once Windows knows which hard drive to install to, partitioning, then formatting, and then configuration of settings can commence, in that order.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 206). Pearson Education. Kindle Edition.

61
Q

A coworker maps a network drive for a user, but after boot, the drive is not seen within Explorer. Which of the following steps should be taken first to ensure that the drive remains mapped?

Check Reconnect at Sign-In when Mapping the Drive
Select the Drive Letter needed to connect each time the coworker logs on.
Check the Folder connection when mapping the drive
Use the net use command instead

A

Check Reconnect at Sign-In when mapping the drive

62
Q

Based on the physical hardware address of the client’s network device, which of the following is commonly used to restrict access to a network?

WPA Key
DHCP Settings
MAC Filtering
SSID Broadcast

A

MAC Filtering

63
Q

A Print job fails to leave the print queue. Which of the following services may need to be restarted?

Print Driver
Print Spooler
Network Adapter
Printer

A

Print Spooler

64
Q

After installing a network application on a computer running Windows 10, the application does not communicate with the server. Which of the following actions should be taken first?

Uninstall the latest service pack
Reinstall the latest security update
Add the port number and name of the services to the Exceptions list of Windows Defender Firewall
Add the port number to the network firewall

A

Add the port number and name of the services to the Exceptions list of Windows Defender Firewall

65
Q

A customer reports a problem with a PC located in the same room as cement testing equipment. The room appears to have adequate cooling. The PC will boot up but locks up after 5-10 minutes of use. After a lockup, it will not reboot immediately. Which of the following statements best describes the most likely problem?

The PC has a Virus
The PC Air Intakes are clogged with cement dust
The CPU heat sink is underrated for the CPU
The power supply is underrated for the electrical load of the PC

A

The PC Air Intakes are clogged with cement dust

66
Q

One of your Windows users is trying to install a local printer and is unsuccessfully based on the permissions for the user account. Which of the following types best describes this user account?

Power User
Administrator
Guest
Domain Account

A

Guest

67
Q
  • When accessing an NTFS shared resource, which of the following are required? (Select the Two Best Answers)

An active certificate
Correct user permissions
Local user access
Correct share permissions

A

Local user access
Correct Share Permissions

Explanation:
The share-level permissions must first be set to enable access to the user. Then the NTFS file-level “user” permissions must also be set; the most restrictive of the two will take precedence (usually this is configured as NTFS being more restrictive).

Incorrect answers:
Certificates are normally used in Internet or VPN sessions.

Local user access is somewhat vague but doesn’t apply here; the reason is that when a user connects to a shared resource, that person does so over the network to a remote computer.

L., Prowse David. CompTIA A+ Practice Questions Exam Cram Core 1 (220-1001) and Core 2 (220-1002) (p. 208). Pearson Education. Kindle Edition.

68
Q

You are contracted to recover data from a laptop. In which two locations might you find irreplicable, valuable data? (Select the Two Best Answers)

ntoskrnl.exe
Windows Folder
Pictures
Email
System32 Folder
A

Pictures

Email

69
Q

Which utility enables auditing at the Local Level?

OU Group Policy
Local Security Policy
Active Directory Policy
Site Policy

A

Local Security Policy

70
Q

A customer has forgotten his password. He can no longer access his company email address. Which of the following statements best describes the recommended course of action?

Tell him to remember his password
Ask him for information confirming his identity
Tell him that the password will be reset in several minutes
Tell him that he shouldn’t forget his password

A

Ask him for information confirming his identity

71
Q

Which of the following can help locate a lost or stolen mobile device?

Passcode
Auto-erase
GPS
Encryption

A

GPS

72
Q

Which of the following can be disabled to help prevent access to a wireless network?

MAC Filtering
SSID Broadcast
WPA2 Passphrase
WPA Key

A

SSID Broadcast

73
Q
  • Which of the following commands sets the time on a workstation?

Time
Net Time
Net Timer
Net Time Set

A

Time

74
Q

In Windows, which utility enables you to select and copy characters from any font?

Language Bar
Sticky Keys
Control Panel > Fonts
Character Map

A

Character Map

75
Q

Which of the following can be described as removing the limitations of Apple iOS?

Rooting
Jailbreaking
VirusBarrier
Super-Admin Powers

A

Jailbreaking

76
Q

In Windows, which of the following built-in applets should be used by a Tech to enable and manage offline files, view conflicts and partnerships, and ensure locally stored files match those stored on an external device or server?

File History
USMT
Robust File Copy
Sync Center

A

Sync Center

77
Q
  • Which language support for representing characters is built into Windows?
Unicode
EBCDIC
ASCII
ITU-T
PS1
A

Unicode

78
Q

Which of the following is the best source of information about malicious software detected on a computer?

Operating system documentation
Anti-spyware software website
Readme.txt file included with the anti-spyware software installation
The user of a previously infected computer

A

Anti-spyware software website

79
Q
  • You are working for a computer as a roaming PC tech and have been assigned work by a Network Admin. The admin notifies you that the company is experiencing a DDoS attack. Half a dozen internal Windows PCs are the source of the traffic. The admin gives you the Windows Computer names and tells you that they must be scanned and cleaned Immediately. Which of the following effects to the PCs should you as the PC tech focus on fixing? (Select the Two Best Answers)
Zombies
Spyware
Ransomware
Worm
Virus
Botnet
A

Zombie

Worm

80
Q

You are troubleshooting a network problem with Windows, and you can’t seem to fix it using the typical Windows GUI-based troubleshooting tools or with the Command Prompt. You have identified the problem and established a theory of probable cause. (In fact, you are on your fourth Theory) Which tool should be used to troubleshoot the problem, and in what stage of the troubleshooting process should you do so?

Regsvr32; Conduct external or internal resource based on symptoms.
GPUpdate; Perform backups before making any changes.
USMT; Verify System Functionality
Regedit; Test the Theory to Determine Cause
Boot Camp; Document findings, actions, and outcomes

A

Regedit; Test the Theory to Determine Cause