Lesson 13: Supporting Windows Flashcards

1
Q

A user brings in a laptop that does not boot. Based on the user’s description, the assistant suggests running chkdsk. How can the user do this?

A.System Restore
B.WinRE
C.UEFI
D.BCD

A

B. WinRE

Drop into the Windows Recovery Environment (WinRE) command prompt, where the user could run commands such as diskpart, sfc, chkdsk, bootrec, bcdedit, or regedit to try to repair the installation manually.

Other options

A. System Restore or restore from an image backup, performs a refresh, or reset reinstallation of Windows. This will not allow running commands though.

C. The basic input/output system (BIOS) or the Unified Extensible Firmware Interface (UEFI) setup allows users to configure the recovery media as the priority boot device. This does not typically allow commands to run.

D. The BOOTMGR and the boot configuration data (BCD) file are normally installed to a hidden System Reserved partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A graphics artist is starting to get into 3D animation and wants to ensure their computer can adequately handle the work. What should the graphics artist use?

A.Hardware token
B.LPL
C.Integrated graphics
D.Dedicated graphics

A

D. Dedicated Graphics

A demanding application, such as graphic design software or a game, is likely to require a dedicated graphics card with its own video RAM, separate from the general system RAM.

Other options

A. An external hardware token is a smart card or USB form factor device that stores some cryptographic user identification data.

B. Microsoft maintains a Windows Logo’d Product List (LPL) catalog, previously called the Hardware Compatibility List (HCL). This is a catalog of tested devices and drivers.

C. A PC’s graphics subsystem can be implemented as a feature of either the central processing unit (CPU) or the motherboard chipset. This is referred to as integrated graphics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A server administrator wants to create several virtual machines with a consistent set of software and configuration options. What should the administrator use for installation?

A.DirectAccess
B.BitLocker
C.Images
D.POSIX

A

C. Images

Unattended installations are also often completed using image deployment. Using image deployment means that machines use a consistent set of software and configuration options.

Other options

A. The Enterprise edition has several features that are not available in the Pro edition, such as support for Microsoft’s DirectAccess virtual private networking technology.

B. BitLocker enables the user to encrypt all the information on a disk drive. Encryption means that data on the device is protected even if someone steals it.

D. POSIX Compliance supports UNIX/Linux compatibility. Microsoft engineered the New Technology File System (NTFS) to support case-sensitive naming, hard links, and other key features required by UNIX/Linux applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user experiences a slow desktop load, so they want to try to rebuild their local user profile. Which of the following is NOT one of the three files that need to be excluded when rebuilding a profile?

A.NTUSER.MSI
B.NTUSER.DAT
C.NTUSER.DAT.LOG
D.NTUSER.INI

A

A. NTUSER.MSI

NTUSER.MSI is not a valid Windows file and if a user sees it then it is most likely malware.

Other options

B. Rebuilding a local user profile means creating a new account and then copying files from the old, corrupt profile to the new one, but excluding three files. NTUSER.DAT is the first file.

C. NTUSER.DAT.LOG is another file that should be excluded when rebuilding a local user profile. Delays affecting the system prior to sign-in are caused by loading drivers and services.

D. NTUSER.INI is the last file that should be excluded when rebuilding a local user profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A server administrator tests an application migration from a 32-bit server to a 64-bit server, but the application is still 32-bit. Where will Windows run the application?

A.PXE
B.SED
C.WOW64
D.OEM

A

C. WOW64

In 64-bit Windows, the applications run within a special application environment called WOW64 (Windows on Windows 64-bit). This environment replicates the 32-bit environment expected by the application and translates its requests into ones that can be processed by the 64-bit CPU, memory, and file subsystems.

Other options

A. Most computers now come with a Preboot eXecution Environment (PXE)–compliant firmware and network adapter to support booting from a network with a suitably configured server.

B. Instant Secure Erase (ISE)/Crypto Erase uses the capabilities of self-encrypting drives (SEDs) as a reliable sanitization method for both HDDs and SSDs.

D. An original equipment manufacturer (OEM) license means that the OS is pre-installed to a PC or laptop and is valid for that device only. The computer vendor is responsible for support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A project manager implements a new ticketing system that allows the helpdesk to record knowledge, streamline efficiencies, and automate solutions. Which of the following is the least concern for the support team?

A.Licensing
B.Distribution method
C.Support
D.Training

A

B. Distribution method

A distribution method is normally not a major concern. Distribution is fairly standardized for Windows, Mac, and Linux computers.

Other options

A. Licensing is one of the three primary concerns. Commercial software must be used within the constraints of its license. This is likely to restrict either the number of devices on which the software can be installed or the number of users that can access it.

C. Support is a big consideration. Software might be available with paid-for support to obtain updates, monitor and fix security issues, and provide technical assistance.

D. Training is another concern. Complex apps can have a substantial and expensive user-training requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A client administrator at a local university runs a computer lab and decides they want to image the machines nightly due to the high risk of having everything available and open to use. The administrator orders new computers which are compatible with the ability to use Preboot eXecution Environment (PXE). What type of boot would this be?

A.Network
B.Hard drive
C.Optical
D.USB

A

A. Network

Network boot setup means connecting to a shared folder containing the installation files, which could be slipstreamed or use image deployment.

Other options

B. Once the OS has been installed, the administrator will usually want to set the internal hard drive as the default (highest priority) boot device and disable any other boot devices.

C. Historically, most attended installations and upgrades were run by booting from optical media (CD-ROM or DVD). The optical drive must be set as the priority boot device.

D. When using an external/hot-swappable hard drive or solid-state flash drive as boot media, the boot method should be set to use the USB-connected device as the priority option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A student considers upgrading their system but has many custom drivers and hardware in their Windows-driven rig. Where can the student look for a catalog of tested devices and drivers for this platform?

A.HCL
B.PXE
C.NIST
D.SED

A

A. HCL

Microsoft maintains a Windows Logo’d Product List (LPL) catalog, also called the Hardware Compatibility List (HCL). This is a catalog of tested devices and drivers. If a device has not passed Windows logo testing, users should check the device vendor’s website to confirm whether there is a driver available.

Other options

B. Most computers now come with a Preboot eXecution Environment (PXE)–compliant firmware and network adapter to support this boot option.

C. Frameworks for security controls are established by organizations such as the National Institute of Standards and Technology (NIST).

D. Instant Secure Erase (ISE)/Crypto Erase uses the capabilities of self-encrypting drives (SEDs) as a reliable sanitization method for both HDDs and SSDs. A SED encrypts its contents by using a media encryption key (MEK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A support operator helps a user who is complaining about latency and sluggish performance for a modern computer. Which of the following will be the least helpful in troubleshooting?

A.Perform a system file check (SFC).
B.Use Task Manager.
C.Reboot.
D.Run fewer programs.

A

A. Perform a system file check (SFC)

In modern systems, checking file integrity will not improve sluggish performance. In most instances, it will have no effect.

Other options

B. Use Task Manager to determine if any resources are at 90–100% utilization, and then note which process is most active.

C. If ending the process does not restore system performance, try rebooting the computer. The problem could be transitory and might not reoccur.

D. If Windows displays an error message such as low memory, try running fewer programs, and see if the issue can be isolated to one process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user calls in about an invalid boot disk error. What is the most common cause of this issue?

A.Floppy disk left in the drive on a restart
B.OS loader not found
C.USB set as the primary boot method
D.Driver corruption

A

C. USB set as the primary boot method

Check for any removable disks, and change the boot device priority/boot order if necessary. If the system firmware returns an error message such as invalid boot disk, then the system has completely failed to boot.

Other options

A. The most common cause of this error used to be leaving a floppy disk in the drive on a restart. Most computers do not use a floppy disk anymore.

B. A no OS found type message can appear when a disk drive is identified as the boot device but does not report the location of the OS loader.

D. If Windows appears to boot but does not display the sign-in screen, the likely causes are malware infection or corruption of drivers or other system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user finds that their home computer fails to boot. The user believes part of the operating system (OS) is corrupted. They want to recover it but do not want to lose any personal documents. What should the user do?

A.Use a factory recovery partition.
B.Use the full reset option.
C.Format the drive.
D.Use refresh.

A

D. Use Refresh

Using refresh recopies the system files and reverts most system settings to the default but can preserve user personalization settings, data files, and apps installed via the Windows Store.

Other options

A. A factory recovery partition is a tool used by original equipment manufacturers (OEMs) to restore the OS environment to its ship state.

B. Using the full reset option deletes the existing OS plus apps, settings, and data ready for the OS to be reinstalled.

C. Formatting a drive will completely wipe everything on it, or at least the links in the partition tables to the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A cyber intern is tasked with installing a Windows 32-bit program on a company computer which is running a 64-bit version of Windows. To confirm it is installed correctly, what folder can the intern view to ensure all files are present?

A.Program Files (x86)
B.Program Files
C.%SystemRoot%\system32
D.%SystemRoot%\syswow64

A

A. Program Files (x86)

For this scenario, the intern will ensure the files are found within the Program Files (x86) folder as this is where 32-bit applications files are installed.

Other options

B. The Program Files folder is normally used with 64-bit applications when installing environments onto a device.

C. Windows’ 64-bit shared system files (DLLs and EXEs) are stored in %SystemRoot%\system32.

D. Shared system files for the 32-bit versions are stored in %SystemRoot%\syswow64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A curious IT professional investigates the hidden System Reserved partition. What does the BOOTMGFW.EFI read to identify whether to show a boot menu and to find the location of WINLOAD.EFI?

A.RMM
B.MSDS
C.NLA
D.BCD

A

D. BCD

BOOTMGFW.EFI reads the BCD to identify whether to show a boot menu and to find the location of WINLOAD.EFI. From this point, the Windows boot loader continues the boot process by loading the kernel, as described previously.

Other options

A. Remote monitoring and management (RMM) tools are principally designed for use by managed service providers (MSPs). An MSP is an outsourcing company that specializes in handling all IT support for its clients.

B. Some hazard information will be provided on labels, but the supplier must also provide more detailed information on a material safety data sheet (MSDS).

C. Network Level Authentication (NLA) protects the Remote Desktop Protocol (RDP) server against denial of service attacks. Without NLA, the system configures a desktop before the user logs on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user boots a Windows device into the basic input/output system (BIOS) but recognizes no bootable disks. What is most likely the problem?

A.It is using MBR partitioning.
B.It is using GPT partitioning.
C.It is using APFS.
D.It is using ext3.

A

B. It is using GPT partioning

When the disk uses GPT partitioning, the system firmware must be set to use the Unified Extensible Firmware Interface (UEFI) boot method. If the boot method is set to BIOS, the disk will not be recognized as a boot device.

Other options

A. When the disk uses master boot record (MBR) partitioning, the system firmware must be set to use the legacy BIOS boot method. If the boot method is set to UEFI, the disk will not be recognized as a boot device.

C. macOS uses the Apple File System (APFS). A Windows machine was not likely partitioned using APFS since it is not part of the Windows installation options.

D. Linux can use ext3/ext4 or a variety of other file system types. A Windows machine was not likely partitioned using ext3 or ext4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security administrator is concerned about the introduction of new software to the environment. What security considerations should be made when allowing new software in the environment? (Select the best two options.)

A.Vendor reputation
B.Trusted sources
C.Digital signature
D.User reviews

A

B. trusted sources and C. Digital Signature

B. Ensuring that software is only installed from trusted sources minimizes the risk of introducing malware, Trojan horses, or other malicious software into the environment.

C. Digital signatures provide a way to verify the integrity and authenticity of software. They ensure that the software hasn’t been tampered with since being signed by a reputable software publisher.

Other options

A. While it’s beneficial to know the reputation of a software vendor, this alone doesn’t guarantee that the software is secure or hasn’t been tampered with after its release.

D. While user reviews can provide insights into the software’s functionality and reliability, they are not a reliable security measure. Users might be unaware of underlying security issues, or reviews can be manipulated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are supporting a home user with upgrading a computer from Windows 10 to Windows 11. You have run Microsoft’s PC Health Check tool, and it verifies that the computer meets the hardware requirements. Should you now proceed with the in-place upgrade?

A

No.

You must backup user data and settings first. A backup is essential as a security precaution.

17
Q

You are writing some work instructions to assist technicians with deploying new user desktops via cloning. What type of installation and boot method is this process most likely to use, and what are the boot requirements?

A

Cloning refers to the image deployment installation method

An image is a copy of an existing installation saved as a single file. Image deployment could use USB boot media (or even optical discs), but network boot is more likely. Network boot requires a PXE-compatible network adapter and motherboard in the computer and the boot device priority set to network/PXE. The network requires a Dynamic Host Configuration Protocol (DHCP) server plus a remote network installation server to run unattended setup and apply the image.

18
Q

You are repurposing an old computer. You perform a clean OS install using optical media. During setup, you configured the partition manager to apply GPT style. After the file copy stage, the new installation fails to boot. What is the likely cause?

A

The PC is set to boot using the legacy BIOS method

This is not compatible with GPT-style partitioning. If supported by system firmware setup, switch to UEFI boot. If the firmware is BIOS only, change the boot method back to optical disc, run setup again, and choose MBR partitioning.

19
Q

You are writing work instructions for third-party app deployments using the CompTIA A+ objectives to guide you. In the section on system requirements for applications, you have covered the following topics:

  • 32-bit- vs. 64-bit-dependent application requirements
  • Dedicated graphics card vs. integrated (VRAM requirements)
  • RAM requirements
  • CPU requirements
  • External hardware tokens

What additional topic should you include, if any?

A

Storage requirements.

Each app takes up a certain amount of space when installed to the fixed disk. Also, you must plan for user-generated file storage, temp files, log files, and other data generated through use of the app.

20
Q

You have downloaded an installer for a third-party app from the vendor’s website. What should you do before proceeding with setup?

A

Verify the integrity of the download using a hash value or the vendor’s digital certificate.

21
Q

You are writing guidance for departmental managers to request new software installs. You want each manager to consider impacts to the business, operation, network, and devices as part of their request. In terms of impacts to business, you have written guidance to consider support and training requirements. What other topic should you include?

A

To consider licensing requirements, such as number of users or devices. There also needs to be a system for monitoring license compliance and ensuring there are no unauthorized installs

22
Q

A user calls saying that their screen occasionally goes blue, and the system shuts down. What should you advise the user to do?

A

Record as much information from the user’s blue screen as possible, especially the STOP error number, so that you can research the error.

23
Q

A program is continually using 99–100% of processor time. What should you do?

A

Try to end the application or the process using Task Manager, and then contact the application vendor to find out why the problem is occurring.

24
Q

A computer is caught in a reboot loop. It starts, shows a BSoD, and then reboots. What should you do?

A

Boot using a recovery tool, such as the product disc, and attempt startup repair and/or repair of the Windows installation using sfc or Windows reset.

24
Q

If you suspect improper handling during installation has caused damage to a RAM module, how could you test that suspicion?

A

Run a Memory Diagnostic. Because this tests each RAM cell, it should uncover any fault.