final Flashcards
You need to conduct a drill to determine the effectiveness of your disaster recovery plan. Which of the following items would you include in that drill? Surge protector testing // Image-level recovery // Backup testing // UPS testing —
Image-level recover // Backup testing // UPS testing
Ever since Daniel upgraded his operating system to Windows 7, some of his programs from Windows XP do not load properly. What does he need to do? —
Set up Windows XP Mode.
A user has a Windows 7 computer with 512 MB of RAM and two hard drives, named drive C and drive D. The paging file is located on drive C. The user complains that his computer does not perform well after running for a couple hours. What should you tell the user to do? —
Move the paging file to drive D.
Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem? —
Her device is in discoverable mode.
A user that has a Windows 7 laptop is frequently away from the office. During that time, he needs access to several files that are on the network. What should you do? —
enable offline files
Lee is complaining that his Windows 7 computer is having performance issues and is running slower. He wants to clean it up so it will run faster and more efficient. Which built-in tools would you recommend he use first? —
Disk Cleanup, Add/Remove Programs, and DEFRAG
A____________________, also known as a Blue Screen of Death (BSOD), is a proprietary crash screen for the Windows operating system. —
STOP error
Windows ___ Ultimate will provide multilingual support for both the operating systems and applications. All editions of Windows 8, Windows 8.1, and Windows 10 support MUI. —
7
The ______________________utility is used to register and unregister dll and ActiveX files in the registry. —
REGSVR32
______________________________is a set of business rules that protect data in use, data in motion, and data at rest. DLP is the general term for the technology used to protect a company’s information from accidental or intentional leaks. —
Data Loss Prevention (DLP)
Port security and firewalls would only protect data _______________ —
in motion
Which of the following is based on the security concept of “something you have”? —
Door lock // Server lock // Hardware token
The ___________________ file replaced the NTLDR file —
bootmgr
The only way an application can fully utilize a dual-core processor is to support multithreading. The solution is usually as simple as___________________________________________________. You do not need to upgrade the operating system. This would only ensure that the operating system fully utilizes the dual-core processor, not the application. —
upgrading to a version of the application that supports multithreading