ITE PART 2 FINAL EXAM Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which two tools are available to transfer user data and settings from an old Windows computer to a Windows operating system on a new computer? (Choose two.)

Windows Easy Transfer
Windows User Manager
Windows Upgrade Assistant
Windows Upgrade Advisor
User State Migration tool

A

User State Migration tool
Windows Easy Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A user wants to extend a primary partition formatted with the NTFS file system with the unallocated space on the hard disk. What must the user do after the primary partition is extended to make it usable?

Convert the disk type to dynamic.
Ensure that the disk type is basic.
Format the disk with the FAT64 file system.
Partition the new space as a basic disk.

A

Convert the disk type to dynamic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Why is a full format more beneficial than a quick format when preparing for a clean OS installation?
    A full format is the only method of installing Windows 8.1 on a PC that has an operating system currently installed.

A full format will delete files from the disk while analyzing the disk drive for errors.
A full format will delete every partition on the hard drive.
A full format uses the faster FAT32 file system, whereas a quick format uses the slower NTFS file system.

A

A full format will delete files from the disk while analyzing the disk drive for errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A technician wishes to prepare the computers in the network for disaster recovery. The network consists of a variety of desktops and laptops from different vendors. All the computers are running either a 32-bit version of Windows 10 Pro or a 64-bit version of Windows 10 Pro. How would the technician prepare the recovery media?

Prepare one 64-bit recovery disc for all the computers.
Prepare one 32-bit recovery disc for all the computers.
Prepare individual recovery discs for all the computers.
Prepare one image restore for all the computers.

A

Prepare individual recovery discs for all the computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A technician wishes to deploy Windows 10 Pro to multiple PCs through the remote network installation process. The technician begins by connecting the new PCs to the network and booting them up. However, the deployment fails because the target PCs are unable to communicate with the deployment server. What is the possible cause?

The wrong network drivers are loaded in the image file.
The SID has not been changed in the image file.
The NIC cards on the new PCs are not PXE-enabled.
Sysprep was not used before building the image file.

A

The NIC cards on the new PCs are not PXE-enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which condition is required when planning to install Windows on a GPT disk?

The computer must be UEFI-based.
Only one primary partition can contain an OS.
The maximum partition size cannot exceed 2 TB.
The maximum number of primary partitions that can co-exist is 4.

A

The computer must be UEFI-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A technician wishes to perform a customized unattended network installation of Windows 10 on a PC. The requirements include the installation of specific applications and device drivers through the use of an answer file. What would the technician use to create the answer file?

Recovery partition
Windows SIM
disk cloning
System Restore

A

Windows SIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. An organization has purchased a custom application for the sales staff that can only be installed on a 64-bit Windows operating system. Each member of the sales staff has a Windows 8.1 32-bit PC. What must the IT department do in order to install and run the application on the sales staff computers?

Downgrade the 32-bit Windows 8.1 to 64-bit Windows 7.
Upgrade the 32-bit Windows 8.1 to 64-bit Windows 10.
Perform a clean installation of 64-bit Windows 10.
Download and install 64-bit hardware drivers in the current OS.

A

Perform a clean installation of 64-bit Windows 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)

Upgrade the processor.
Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure.
Access the BIOS and change the boot order options.
Run chkdsk /F /R from the recovery console.
Upgrade the video card.
Reset the hard drive jumpers.

A

Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure.
Run chkdsk /F /R from the recovery console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A technician uses Microsoft Deployment Image Servicing and Management (DISM) tool to create a Windows image file on one of the workstations running Windows 10. When the technician tries to clone another workstation with the image file, the workstation exhibits network connectivity issues on completion. What could cause this?

The SID of the original PC is not cleared when creating the image with DISM.
The technician used the wrong tool to create the image file.
The network drivers were not added to the image file.
The Sysprep utility should have been turned off prior to the creation of the image file.

A

The SID of the original PC is not cleared when creating the image with DISM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A user complains that user files cannot be synced with the network file server while the user is traveling out of the office. The user had access to the internet but no access to the company network server. How can this be addressed?

Ensure that the user only uses a single device and not multiple devices when accessing networked files.
Turn off the activation of Offline Files feature in the Sync Center.
Setup a Sync partnership with the networked file location.
Setup a Sync partnership between the network server, Microsoft OneDrive, and the user.

A

Setup a Sync partnership between the network server, Microsoft OneDrive, and the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. A technician has connected a new internal hard drive to a Windows 10 PC. What must be done in order for Windows 10 to use the new hard drive?

Initialize the new hard drive.
Extend the partition on an existing hard drive to the new hard drive.
Run chkdsk on the new hard drive.
Mount the new hard drive.

A

Initialize the new hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. A user reports that a Windows 10 PC displays the error message “Invalid Boot Disk” during the boot process. The IT technician attempts to boot the computer and finds that the error message occurs immediately after the POST. What could be the possible cause?

A recently installed device driver is incompatible with the boot controller.
BOOTMGR is corrupted.
The MBR/GPT is corrupted.
A service failed to start during the booting process.

A

The MBR/GPT is corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What service does PRINT$ provide?

It provides a network share for accessing shared printers.
It provides printer drivers for printer administrators.
It provides a group of hidden printers that only administrative users have permissions to send print jobs to.
It provides an administrative Printer share accessible by all local user accounts.

A

It provides printer drivers for printer administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. A technician is troubleshooting a Windows 10 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which command can the technician use to repair the corrupt master boot record?

bootrec /fixmbr
chkdsk
msconfig
sfc /scannow

A

bootrec /fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which feature is included with macOS and provides the ability for a remote user to view and change files, folders, and applications on the local computer?

Screen Sharing
Remote Assistance
Virtual Network Computing
Remote Desktop

A

Screen Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which port number is used by Virtual Network Computing (VNC) to provide remote screen sharing between devices?

22
23
389
3389
5900

A

5900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Which area of concern falls under the operations and planning category in IT documentation?

inventory management
disaster recovery policies and procedures
logical and physical network topology diagrams
end-user manual for hardware and software

A

inventory management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)

Confront the customer immediately.
Remove and destroy the hard drive.
Contact a first responder.
Shut down the computer until authorities arrive.
Document as much information as possible.

A

Contact a first responder.
Document as much information as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. What are three pieces of information a level one technician should gather from a customer? (Choose three.)

contact information
description of the problem
details of any recent changes to the computer
output from diagnostic software
output from a remote connection to the customer computer
current CMOS settings

A

contact information
description of the problem
details of any recent changes to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.)

Interrupt customers if they start to solve their own problems.
Comfort a customer by minimizing the customer problem.
Let a customer finish talking before asking additional questions.
If you have to put the customer on hold, ask the customer for permission.
As soon as you detect customer anger, pass the angry customer to the next level.

A

Let a customer finish talking before asking additional questions.
If you have to put the customer on hold, ask the customer for permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. A support desk technician is dealing with an angry customer. Which two approaches should the technician take in dealing with the customer? (Choose two.)

Ask socially related questions to direct the customer away from the problem.
Work to redirect the conversation to solving the problem.
Immediately transfer the customer to a higher level technician.
Reply to the customer with the same level of anger.
Let the customer explain the problem without interrupting.

A

Work to redirect the conversation to solving the problem.
Let the customer explain the problem without interrupting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

The IT technician should have researched the company policy about personal communication with customers on company time.
The IT technician should have used encryption to hide the purpose of the emails.
The IT technician should have added the customer to a chain letter with many recipients instead.
The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products.
The IT technician should have requested permission from a supervisor to send the customer emails.

A

The IT technician should have researched the company policy about personal communication with customers on company time.
The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. What two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.)

problems that require rebooting the equipment
problems that can be solved in a short time
problems that are complicated and will take a long time to resolve
problems that do not fit into the “down call” category
problems that are beyond the scope of the knowledge of the level one technician

A

problems that are beyond the scope of the knowledge of the level one technician
problems that are complicated and will take a long time to resolve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

The IT technician should have researched the company policy about personal communication with customers on company time.
The IT technician should have used encryption to hide the purpose of the emails.
The IT technician should have added the customer to a chain letter with many recipients instead.
The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products.
The IT technician should have requested permission from a supervisor to send the customer emails.

A

The IT technician should have researched the company policy about personal communication with customers on company time.
The IT technician should have asked the customer if the customer was interested in receiving information regarding other new services and products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. A third-party security firm is performing a security audit of a company and recommends the company utilize the Remote Desktop Protocol. What are two characteristics of the Microsoft Remote Desktop Protocol (RDP)? (Choose two.)

RDP connects on TCP port 22.
RDP requires a Windows client.
RDP uses an encrypted session.
RDP is a command-line network virtual terminal protocol.
RDP connects on TCP port 3389.

A

RDP uses an encrypted session.
RDP connects on TCP port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity?

cyber law
computer forensics
cryptography
disaster recovery

A

computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer?

data stored on magnetic disks
data stored on an internal drive
data in transit between RAM and the CPU
data stored on an external drive

A

data in transit between RAM and the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. Refer to the exhibit. During the troubleshooting of software that is installed on a computer system, a level one technician requires help from a level two technician. The file shown in the exhibit must be sent to the level two technician. How should the level one technician deliver this file?

This file should not be shared with the level two technician.
Replace all passwords in the file with <password> before emailing the file and then supply the passwords by secure means, if required.
Send the file as it is to the level two technician.
Deliver the file in printed format only.</password>

A

Replace all passwords in the file with <password> before emailing the file and then supply the passwords by secure means, if required.</password>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. What skill is essential for a level one technician to have?

the ability to gather relevant information from the customer and pass it to the level two technician so it can be entered into the work order
the ability to ask the customer relevant questions, and as soon as this information is included in the work order, escalate it to the level two technician
the ability to translate a description of a customer problem into a few succinct sentences and enter it into the work order
ability to take the work order prepared by the level two technician and try to resolve the problem

A

the ability to translate a description of a customer problem into a few succinct sentences and enter it into the work order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. What is used to control illegal use of software and content?
    chain of custody
    service level agreement
    End User License Agreement
    digital rights management
A

digital rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. What determines the level of support that a call center technician will provide to an individual customer?

Support is based on the SLA for that customer.
All customers receive the same level of support by the call center.
A level one technician will provide a higher level of support than a level two technician.
An individual call center technician chooses the level of support based on the time available to assist the customer.

A

Support is based on the SLA for that customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. What is the difference between a scripting language and a compiled language?

Scripting languages need to be converted into executable code using a compiler, while compiled languages are interpreted as they are executed.
Compiled languages are executed by the operating system, while scripting languages are executed by the CPU.
Scripting languages are interpreted and executed line by line when a script is run, while compiled languages need to be converted into executable code.
Compiled languages are executed by a command interpreter, while scripting languages are executed by the CPU.

A

Scripting languages are interpreted and executed line by line when a script is run, while compiled languages need to be converted into executable code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. A bench technician enters the server room and finds the backup server computer case open. The hard drives containing patient medical data are all physically disconnected from the motherboard and the SATA data cables are hanging outside the case. Which step should the technician immediately take?

Reconnect the SATA data cables to ensure continued data backup.
Disconnect the SATA power cables to prevent the loss of persistent data.
Place the hard drives in an external enclosure and begin backing up the data before releasing the drives to first responders.
Locate an employee qualified to collect evidence.
Dust the server computer case for fingerprints.

A

Locate an employee qualified to collect evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. Which methods can be used to implement multifactor authentication?

VPNs and VLANs
IDS and IPS
passwords and fingerprints
tokens and hashes

A

passwords and fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. When responding to a call from a customer who is experiencing problems with a computer, the technician notices that a number of system files on the computer have been renamed. Which two possible solutions could the technician implement to resolve the problem? (Choose two.)

Use antivirus software to remove a virus.
Restore the computer from a backup.
Change the folder and file permissions of the user.
Reset the password of the user.
Upgrade the file encryption protocol.

A

Use antivirus software to remove a virus.
Restore the computer from a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. A technician suspects that a security issue is causing problems with a computer. What two actions could be performed to test theories of probable cause when troubleshooting the PC? (Choose two.)

Log in as a different user.
Disconnect the computer from the network.
Search helpdesk repair logs for more information.
Discuss solutions with the customer.
Ask the customer open-ended questions about the problem.

A

Log in as a different user.
Disconnect the computer from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)

at least two volumes
USB stick
password management
TPM
EFS
backup

A

at least two volumes
TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  1. Which type of security threat can be transferred through email and is used to gain sensitive information by recording the keystrokes of the email recipient?

adware
Trojan
worm
virus
grayware

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  1. What is an accurate description of asymmetric encryption technology?

Asymmetric encryption is an encryption process that compares traffic on both ends to make sure the traffic has not been altered.
It is an encryption process that uses identical keys on both ends to establish the VPN.
It is an encryption protocol that is used to encrypt data as the data is sent over the VPN.
It is an encryption process that uses a public and private key pair to encrypt/decrypt data.

A

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  1. A manager reports that unusual things are happening on a Windows computer. The technician determines that malware is the culprit. What can the technician do to remove stubborn malware?

Ensure that the computer is connected to the wired network so that antimalware updates can be installed.
Enter Safe Mode and do a system restore.
Install adware protection.
Train the user on identifying trusted and untrusted sources.

A

Enter Safe Mode and do a system restore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  1. An employee that has worked at the company for many years has started a home-based business selling crafts. While leaving an office meeting, a company supervisor notices the employee buying supplies for the personal crafting business of the employee. What section of the security policy should the supervisor review when determining how to handle this situation?

acceptable use policies
identification and authentication policies
incident handling policies
remote access policies

A

acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
  1. A customer brings in a computer that is asking for a password as soon as it powers on, even before the operating system boots. Which type of password is enabled?

BIOS
login
multifactor
network
synchronous

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
  1. What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

Event Viewer security log
Local Security Policy tool
Active Directory Security tool
Computer Management

A

Local Security Policy tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
  1. When attempting to improve system performance for Linux computers with a limited amount of memory, why is increasing the size of the swap file system not considered the best solution?

A swap file system only supports the ex2 file system.
A swap file system does not have a specific file system.
A swap file system cannot be mounted on an MBR partition.
A swap file system uses hard disk space to store inactive RAM content.

A

A swap file system uses hard disk space to store inactive RAM content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  1. What are three features of GPS on mobile devices? (Choose three.)

phone number lookup
navigation
specialized search results
device tracking
remote wipe
gas mileage calculations

A

navigation
specialized search results
device tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  1. A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?

The user has downloaded a virus.
The widget is corrupt.
The security settings of the Android OS have been compromised.
The widget is associated with the app and this is the normal behavior.

A

The widget is associated with the app and this is the normal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  1. Which three components are used to assign file and directory permissions in Linux systems? (Choose three.)

root
group
owner
all users
super group
admin group

A

group
owner
all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  1. What is the purpose of running mobile device apps in a sandbox?
    to enable the phone to run multiple operating systems
    to prevent malicious programs from infecting the device
    to enable separate app icons to be displayed on the home screen
    to bypass phone carrier restrictions that prevent access to unauthorized apps
A

to prevent malicious programs from infecting the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
  1. Which built-in tool is available on a Mac OS X machine to perform disk backups?

Disk Utility
Deja Dup
Finder
Time Machine

A

Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  1. A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause this problem?

A driver has become corrupted.
GRUB or LILO has been deleted.
GRUB or LILO has been corrupted.
An application is using a resource that has become unavailable.

A

A driver has become corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
  1. A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem?

The touchscreen is not calibrated.
An app is not compatible with the device.
The operating system is corrupt.
A power-intensive app is running in the background.

A

A power-intensive app is running in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
  1. Which term describes a partition that is used to store and boot an operating system by default?

logical drive
active partition
basic disk
extended partition

A

active partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
  1. Which term describes a file system that supports a partition size up to 16 exabytes?

extended partition
NTFS
logical drive
active partition

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
  1. Which term describes a file system for USB flash drives that supports files larger than 4 GB?

extended partition
exFAT
logical drive
active partition

A

exFAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
  1. Which term describes a partition that supports up to 23 logical drives?

logical drive
extended partition
basic disk
active partition

A

extended partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
  1. Which term describes a file system for optical disk media?

extended partition
CDFS
logical drive
active partition

A

CDFS

60
Q
  1. Which term describes a type of partition that would only exist on a hard disk that has an MBR?

extended partition
logical drive
basic disk
active partition

A

logical drive

61
Q
  1. Which term describes a type of storage device that supports a partition to be extended into adjacent unallocated space as long as it is contiguous?

NTFS
basic disk
FAT32
formatting

A

basic disk

62
Q
  1. Which term describes a general name for physical areas on a hard drive?

NTFS
partition
FAT32
formatting

A

partition

63
Q
  1. Which term describes a partition scheme that takes a portion of disk space of 512 bytes long and that contains the boot loader?

NTFS
MBR
FAT32
formatting

A

MBR

64
Q
  1. Which term describes a type of storage device that supports a volume that can span across more than one disk?

NTFS
dynamic disk
FAT32
formatting

A

dynamic disk

65
Q
  1. A technician is booting a laptop that has Windows 10 installed with 2 GB RAM. The boot process is currently working on the following step: NTOSKRNL.EXE starts the login file called WINLOGON.EXE. What is the next step that will happen in the boot process?

WINLOGON.EXE displays the Windows Welcome screen.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
Winload uses the path specified in BOOTMGR to find the boot partition.

A

WINLOGON.EXE displays the Windows Welcome screen.

66
Q
  1. A user is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?

There are no more steps, the boot process is complete.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
Winload uses the path specified in BOOTMGR to find the boot partition.

A

There are no more steps, the boot process is complete.

67
Q
  1. A manager is booting a tablet that has Windows 8 installed. The boot process is currently working on the following step: POST. What is the next step that will happen in the boot process?

BIOS locates and reads the configuration settings that are stored in the CMOS memory.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
The Windows kernel takes over the boot process.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

A

BIOS locates and reads the configuration settings that are stored in the CMOS memory.

67
Q
  1. An accountant is booting a PC that has Windows 8 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?

The BIOS boots the computer using the first drive that contains a valid boot sector.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
The Windows kernel takes over the boot process.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

A

The BIOS boots the computer using the first drive that contains a valid boot sector.

68
Q
  1. A network analyst is booting a PC that has Windows 7 installed with 2 GB RAM. The boot process is currently working on the following step: The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager. What is the next step that will happen in the boot process?

WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
The Windows kernel takes over the boot process.
Winload uses the path specified in BOOTMGR to find the boot partition.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

A

Winload uses the path specified in BOOTMGR to find the boot partition.

69
Q
  1. An analyst is booting a desktop that has Windows 7 installed with 4 GB RAM. The boot process is currently working on the following step: Winload uses the path specified in BOOTMGR to find the boot partition. What is the next step that will happen in the boot process?

There are no more steps, the boot process is complete.
WINLOGON.EXE displays the Windows Welcome screen
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

A

WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

70
Q
  1. A gamer is booting a desktop that has Windows 7 installed on dynamic drives. The boot process is currently working on the following step: WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers. What is the next step that will happen in the boot process?

The Windows kernel takes over the boot process.
There are no more steps, the boot process is complete.
WINLOGON.EXE displays the Windows Welcome screen
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.

A

The Windows kernel takes over the boot process.

71
Q
  1. A technician is booting a laptop that has Windows 10 installed with 2 GB RAM. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

There are no more steps, the boot process is complete.
WINLOGON.EXE displays the Windows Welcome screen
The Windows kernel takes over the boot process.
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.

A

NTOSKRNL.EXE starts the login file called WINLOGON.EXE.

72
Q
  1. A user is booting a laptop that has Windows 10 installed. The boot process is currently working on the following step: WINLOGON.EXE displays the Windows Welcome screen What is the next step that will happen in the boot process?

WINLOGON.EXE displays the Windows Welcome screen
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.
There are no more steps, the boot process is complete.
The Windows kernel takes over the boot process.

A

There are no more steps, the boot process is complete.

73
Q
  1. A manager is booting a tablet that has Windows 8 installed. The boot process is currently working on the following step: The Windows kernel takes over the boot process. What is the next step that will happen in the boot process?

The Windows kernel takes over the boot process.
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
WINLOGON.EXE displays the Windows Welcome screen

A

NTOSKRNL.EXE starts the login file called WINLOGON.EXE.

74
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?

SYN flood
DDoS
DNS poisoning
zero-day

A

SYN flood

75
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a technique that compares hashed passwords to potential hashes the hacker has. What is the type of network attack?

rainbow table
DDoS
DNS poisoning
SYN flood

A

rainbow table

76
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the DNS server was sent with an enormous amount of false requests, thus overwhelming the server. What is the type of network attack?

DNS poisoning
SYN flood
zero-day
DoS

A

DoS

77
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a vulnerability that is known to the software vendor, but not patched yet. What is the type of network attack?

DDoS
DNS poisoning
zero-day
SYN flood

A

zero-day

78
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that zombies were used to attack the firewall. What is the type of network attack?

DDoS
DNS poisoning
SYN flood
zero-day

A

DDoS

79
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that zombies were used to attack the firewall. What is the type of network attack?

zero-day
dictionary
SYN flood
DDoS

A

DDoS

80
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a table of words that potentially could be used as passwords. What is the type of network attack?

SYN flood
zero-day
dictionary
DNS poisoning

A

dictionary

81
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker injected false records on the server that translates IP addresses to domain names. What is the type of network attack?

DNS poisoning
zero-day
dictionary
SYN flood

A

DNS poisoning

82
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker is using a technique that compares hashed passwords to potential hashes the hacker has. What is the type of network attack?

SYN flood
zero-day
DNS poisoning
rainbow table

A

rainbow table

83
Q
  1. Users in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?

zero-day
SYN flood
dictionary
DNS poisoning

A

SYN flood

84
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for a company that wants a device to monitor incoming and outgoing traffic and stop any malicious activity. Which security technique should the technician recommend?

Implement a RAID.
Provide security awareness training.
Use SSL.
Buy an IPS.

A

Buy an IPS.

85
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for a machine where the antimalware software cannot remove all of the malware. Which security technique should the technician recommend?

Use Windows Safe Mode.
Implement a RAID.
Provide security awareness training.
Use SSL.

A

Use Windows Safe Mode.

86
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for a machine where the antimalware software cannot remove all of the malware. Which security technique should the technician recommend?

Use Windows Safe Mode.
Implement a RAID.
Provide security awareness training.
Use encryption.

A

Use Windows Safe Mode.

87
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for preventing tailgating. Which security technique should the technician recommend?

Implement a RAID.
Use a mantrap.
Provide security awareness training.
Use encryption.

A

Use a mantrap.

88
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for drive redundancy. Which security technique should the technician recommend?

Provide security awareness training.
Disable ports.
Implement dual authentication.
Implement a RAID.

A

Implement a RAID.

89
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for drive redundancy. Which security technique should the technician recommend?

Implement a RAID.
Buy an ASA.
Use a VPN.
Implement dual authentication.

A

Implement a RAID.

90
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for phishing. Which security technique should the technician recommend?

Buy an ASA.
Use a VPN.
Provide security awareness training.
Employ ping sweeps.

A

Provide security awareness training.

91
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for protecting a computer used to log in at a dental clinic from someone using a bootable disk containing hacking tools. Which security technique should the technician recommend?

Buy an ASA.
Use a VPN.
Employ ping sweeps.
Disable ports.

A

Disable ports.

92
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for protecting a computer used to log in at a dental clinic from someone using a bootable disk containing hacking tools. Which security technique should the technician recommend?

Disable ports.
Buy an ASA.
Use a VPN.
Run vulnerability scanners.

A

Disable ports.

93
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for a manager traveling who needs access to internal corporate resources. Which security technique should the technician recommend?

Buy an ASA.
Use a VPN.
Disable ports.
Run vulnerability scanners.

A

Use a VPN.

94
Q
  1. Why would a gamer need to use the move command?

to relocate a file from one Windows directory to another one
to prepare a hard drive to accept Windows files
to manage a PCs drives, disks, partitions, volumes, and virtual drives
to copy files, directories, and subdirectories from one location to another

A

to relocate a file from one Windows directory to another one

95
Q
  1. Why would a gamer need to use the copy command?

to prepare a hard drive to accept Windows files
to manage a PCs drives, disks, partitions, volumes, and virtual drives
to copy files, directories, and subdirectories from one location to another
to move that file to a different Windows directory while also leaving the file in the current location

A

to move that file to a different Windows directory while also leaving the file in the current location

96
Q
  1. Why would a university student need to use the robocopy command?

to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to shutdown several remote computers one at a time
to copy a group of files from one Windows directory to another
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to copy a group of files from one Windows directory to another

97
Q
  1. Why would a university student need to use the xcopy command?

to copy files, directories, and subdirectories from one location to another
to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to shutdown several remote computers one at a time
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to copy files, directories, and subdirectories from one location to another

98
Q
  1. Why would a technical support representative need to use the format command?

to prepare a hard drive to accept Windows files
to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to shutdown several remote computers one at a time
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to prepare a hard drive to accept Windows files

99
Q
  1. Why would a technical support representative need to use the bootrec command?

to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to help to repair the MBR that is suspected of having issues
to shutdown several remote computers one at a time
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to help to repair the MBR that is suspected of having issues

100
Q
  1. Why would a technical support representative need to use the ipconfig command?

to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to shutdown several remote computers one at a time
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system
to display the IPv6 address of the PC

A

to display the IPv6 address of the PC

101
Q
  1. Why would a user need to use the netstat command?

to verify activity on the PC by displaying all active TCP connections on the device
to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to shutdown several remote computers one at a time
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to verify activity on the PC by displaying all active TCP connections on the device

102
Q
  1. Why would a user need to use the nslookup command?

to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to query the Domain Name Sysytem (DNS) to get domain names and mapping information
to shutdown several remote computers one at a time
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to query the Domain Name Sysytem (DNS) to get domain names and mapping information

103
Q
  1. Why would a manager need to use the ping command?

to change from the current working folder to another folder
to create a new Windows directory
to remove an empty directory
to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination

A

to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination

104
Q
  1. What are two probable causes of a user unable to access local resources such as file shares or printers on a wired network? (Choose two.)

bad cabling
ISP down
incorrect gateway address
DNS name resolution not working
poor Wi-Fi signal

A

bad cabling
DNS name resolution not working

105
Q
  1. The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices?

TACACS+
TKIP
RADIUS
WPA2-PSK

A

RADIUS

106
Q
  1. A technician is upgrading many PCs used within the company. How should the technician dispose of an old inkjet printer cartridge?

Give it to your neighbor.
Recycle following local regulations.
Take it home.
Seal in a plastic bag before putting in the garbage.

A

Recycle following local regulations.

107
Q
  1. A client packet is received by a server. The packet has a destination port number of 3389. What service application is the client requesting?

SSH
Telnet
SMTP
RDP

A

RDP

108
Q
  1. A client packet is received by a server. The packet has a destination port number of 67. What service application is the client requesting?

SSH
Telnet
DHCP
SMTP

A

DHCP

109
Q
  1. A client packet is received by a server. The packet has a destination port number of 443. What service application is the client requesting?

HTTPS
SSH
Telnet
SMTP

A

HTTPS

110
Q
  1. A client packet is received by a server. The packet has a destination port number of 69. What service application is the client requesting?

SSH
Telnet
SMTP
TFTP

A

TFTP

111
Q
  1. A client packet is received by a server. The packet has a destination port number of 445. What service application is the client requesting?

SSH
Telnet
SMB/CIFS
SMTP

A

SMB/CIFS

112
Q
  1. A client packet is received by a server. The packet has a destination port number of 548. What service application is the client requesting?

AFP
HTTP
TFTP
POP3

A

AFP

113
Q
  1. A client packet is received by a server. The packet has a destination port number of 80. What service application is the client requesting?

HTTP
POP3
TFTP
NetBIOS (NetBT)

A

HTTP

114
Q
  1. A client packet is received by a server. The packet has a destination port number of 3389. What service application is the client requesting?

HTTP
RDP
TFTP
POP3

A

RDP

114
Q
  1. A PC technician has been asked by a supervisor to recommend a security solution for a small company that wants stateful firewall services. Which security technique should the technician recommend?

Disable ports.
Use a VPN.
Setup footprinting.
Buy an ASA.

A

Buy an ASA.

115
Q
  1. A gamer is booting a desktop that has Windows 10 installed on dynamic drives. The boot process is currently working on the following step: WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers. What is the next step that will happen in the boot process?

WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
The Windows kernel takes over the boot process. *
Winload uses the path specified in BOOTMGR to find the boot partition

A

The Windows kernel takes over the boot process. *

116
Q
  1. A technician is working on a laptop and an error message about decryption appears when opening an email. What is a possible solution for this situation?

Install an appropriate certificate.
Check the screen refresh rate.
Ensure that only one app is open at a time.
Ensure that Wi-Fi is turned off.

A

Install an appropriate certificate.

117
Q
  1. A technician is working on a laptop and an error message about decryption appears when opening an email. What is a possible solution for this situation?

Install an appropriate certificate.
Replace the digitizer.
Ensure that only one app is open at a time.
Ensure that Wi-Fi is turned off.

A

Install an appropriate certificate.

118
Q
  1. A technician is working on a laptop and an error message about decryption appears when opening an email. What is a possible solution for this situation?

Replace the digitizer.
Check the screen refresh rate.
Install an appropriate certificate.
Check the display settings.

A

Install an appropriate certificate.

119
Q
  1. A technician is working on a laptop and a key on the keyboard is not responding as it should. What is a possible solution for this situation?

Update all security apps.
Check the screen refresh rate.
Check the display settings.
Clean with compressed air.

A

Clean with compressed air.

120
Q
  1. A technician is working on a laptop and a key on the keyboard is not responding as it should. What is a possible solution for this situation?

Ensure that Bluetooth is not activated.
Check the screen refresh rate.
Check the display settings.
Clean with compressed air. *

A

Clean with compressed air. *

121
Q
  1. A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

Verify that airplane mode is not activated.
Ensure that Bluetooth is not activated.
Check the screen refresh rate.
Check the display settings.

A

Verify that airplane mode is not activated.

122
Q
  1. A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

Check the fan on the GPU.
Check the screen refresh rate.
Verify that airplane mode is not activated.
Check the display settings.

A

Verify that airplane mode is not activated.

123
Q
  1. A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

Verify that airplane mode is not activated.
Ensure that Wi-Fi is turned off.
Check the screen refresh rate.
Check the display settings.

A

Verify that airplane mode is not activated.

124
Q
  1. A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

Ensure that Wi-Fi is turned off.
Check the screen refresh rate.
Verify the status of service.
Check the display settings.

A

Verify the status of service.

125
Q
  1. A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation?

Ensure that only one app is open at a time.
Recharge the battery.
Check the display settings.
Verify the status of service.

A

Verify the status of service.

126
Q
  1. Why would a manager need to use the tracert command?

to display a list of the near-side router interfaces between the source device and the destination device
to move that file to a different Windows directory while also leaving the file in the current location
to copy a group of files from one Windows directory to another
to relocate a file from one Windows directory to another one

A

to display a list of the near-side router interfaces between the source device and the destination device

127
Q
  1. Why would a manager need to use the sfc command?

to move that file to a different Windows directory while also leaving the file in the current location
to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions
to copy a group of files from one Windows directory to another
to relocate a file from one Windows directory to another one

A

to scan and verify the integrity of all protected system files and replace incorrect versions with correct versions

128
Q
  1. Why would a technician need to use the DISM command?

to move that file to a different Windows directory while also leaving the file in the current location
to copy a group of files from one Windows directory to another
to relocate a file from one Windows directory to another one
to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

A

to repair, prepare, and fix Windows images and the recovery image within an installation of the operating system

129
Q
  1. Why would a technician need to use the tasklist command?

to create a new Windows directory
to display a list of current processes running on a local or a remote computer
to remove an empty directory
to change from the current working folder to another folder

A

to display a list of current processes running on a local or a remote computer

130
Q
  1. Why would an analyst need to use the taskkill command?

to create a new Windows directory
to remove an empty directory
to change from the current working folder to another folder
to end one or more processes on a PC based on process ID or image name

A

to end one or more processes on a PC based on process ID or image name

131
Q
  1. Why would an analyst need to use the msconfig command?

to select some programs that will automatically run at startup
to remove an empty directory
to erase one or more files from a Windows directory
to create a new Windows directory

A

to select some programs that will automatically run at startup

132
Q
  1. Why would an analyst need to use the dir command?

to show all of the files in the current directory
to remove an empty directory
to erase one or more files from a Windows directory
to create a new Windows directory

A

to show all of the files in the current directory

133
Q
  1. Why would a bank manager need to use the gpupdate command?

to remove an empty directory
to erase one or more files from a Windows directory
to make the PC synchronize with new group policy settings
to create a new Windows directory

A

to make the PC synchronize with new group policy settings

134
Q
  1. Why would a bank manager need to use the gpresult command?

to verify the settings that are suspected to be incorrect
to remove an empty directory
to erase one or more files from a Windows directory
to create a new Windows directory

A

to verify the settings that are suspected to be incorrect

135
Q
  1. Why would a lawyer need to use the cd command?

to remove an empty directory
to erase one or more files from a Windows directory
to create a new Windows directory
to change from the current working folder to another folder

A

to change from the current working folder to another folder

136
Q
  1. The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the most secure and scalable wireless implementation. Which open source authentication method would perform authentication on behalf of all 15 wireless network devices?

TACACS+
TKIP
RADIUS
WPA2-PSK

A

RADIUS

137
Q
  1. Refer to the exhibit. What is true of this mobile device screen?

Tapping and holding the arrow at the bottom left will display the Home screen.
Text messages, news, photos and other content can be displayed in the different tiles.
Icons and buttons are used to represent the different apps on the phone.
Unpinning an app from this view will uninstall the app from the phone.
Tile sizes depend on the size of the app.

A

Text messages, news, photos and other content can be displayed in the different tiles.

138
Q
  1. An accountant is booting a PC that has Windows 10 installed. The boot process is currently working on the following step: BIOS locates and reads the configuration settings that are stored in the CMOS memory. What is the next step that will happen in the boot process?

Winload uses the path specified in BOOTMGR to find the boot partition.
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
The BIOS boots the computer using the first drive that contains a valid boot sector.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.

A

The BIOS boots the computer using the first drive that contains a valid boot sector.

138
Q
  1. What is a possible situation when it might be necessary to boot Windows 10 from a bootable recovery USB device?

to partition the hard drive
to delete registry keys
to repair the operating system
to disable background services

A

to repair the operating system

139
Q
  1. An analyst is booting a desktop that has Windows 10 installed with 4 GB RAM. The boot process is currently working on the following step: Winload uses the path specified in BOOTMGR to find the boot partition. What is the next step that will happen in the boot process?

There are no more steps, the boot process is complete.
NTOSKRNL.EXE starts the login file called WINLOGON.EXE.
WINLOGON.EXE displays the Windows Welcome screen
WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

A

WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.

139
Q
  1. Which statement is true regarding mobile devices using the Wireless Wide Area Network (WWAN)?

They require a 64-bit operating system.
They require an adapter to link to a cellular provider’s network through the nearest base station or transmitter.
They can only be connected through external WWAN USB adapters.
The bandwidth available over WWAN connections is fixed and is independent of the technologies supported by the adapter and the transmitter.

A

They require an adapter to link to a cellular provider’s network through the nearest base station or transmitter.

140
Q
  1. A Windows 10 computer locks up with a stop error during startup and then automatically reboots. The automatic restart setting is making it difficult to see any error messages. What can be done so that the error messages can be viewed?

Use the System Recovery options to restart the operating system.
View the error messages and recover the system using the System Image Recovery tool.
Access the System and Security options menu in the control panel and disable the auto restart function.
Use the Command Prompt option to research the stop error messages.

A

Access the System and Security options menu in the control panel and disable the auto restart function.

141
Q
  1. Which statement is true regarding libraries in Windows 10?

Libraries allow Windows 10 to link mutiple different directories.
Libraries allow Windows 10 to enforce the EFS file system.
Libraries allow Windows 10 to support file names longer than 20 characters.
Libraries allow Windows 10 to index files faster.

A

Libraries allow Windows 10 to link mutiple different directories.

142
Q
  1. A corporation would like to use three or more factors for the password authentication policy. How can this be achieved?

bitlocker
SFA
2FA
MFA

A

MFA

143
Q
  1. A system administrator has been asked to protect the sensitive data on Windows 10 computers of all management employees. Which Windows 10 feature can be used to selectively encrypt individual files within the user accounts of each manager?​

EFS
BitLocker
TPM
Windows Update

A

EFS

144
Q
  1. Which two statements are true regarding 64-bit processor architecture? (Choose two.)

It supports both 32-bit and 64-bit operating systems.
It has additional registers for 64-bit address space.
It only supports 64-bit operating systems.
It has only 64-bit registers.
It supports a maximum of 4GB RAM memory.

A

It supports both 32-bit and 64-bit operating systems.
It has additional registers for 64-bit address space.

144
Q
  1. A manager is booting a tablet that has Windows 10 installed. The boot process is currently working on the following step: POST. What is the next step that will happen in the boot process?

WinLoad loads two files that make up the core of Windows: NTOSKRNL.EXE and HAL.DLL.
The Windows kernel takes over the boot process.
WinLoad reads the registry files, chooses a hardware profile, and loads the device drivers.
BIOS locates and reads the configuration settings that are stored in the CMOS memory.

A

BIOS locates and reads the configuration settings that are stored in the CMOS memory.

145
Q
  1. A computer technician uses Windows tools to gather information such as system components, operating system, users, and disk drives on multiple systems within the company. Another technician suggests that the tasks would take less time if they were automated. Which two built-in scripting capabilities in Windows enable a technician to run a simple text file, created in Notepad, which contains the necessary commands and variables? (Choose two.)

Linux Bash shell script interpreter
PowerShell ISE script interpreter
JavaScript client-side scripting language
command line batch script interpreter
C++ and C# built-in compiler

A

PowerShell ISE script interpreter
command line batch script interpreter

146
Q
  1. Why would a lawyer need to use the tracert command?

to verify activity on the PC by displaying all active TCP connections on the device
to query the Domain Name Sysytem (DNS) to get domain names and mapping information
to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination
to display a list of the near-side router interfaces between the source device and the destination device

A

to display a list of the near-side router interfaces between the source device and the destination device