Lesson 13: Supporting Windows Flashcards
A user brings in a laptop that does not boot. Based on the user’s description, the assistant suggests running chkdsk. How can the user do this?
A.System Restore
B.WinRE
C.UEFI
D.BCD
B. WinRE
Drop into the Windows Recovery Environment (WinRE) command prompt, where the user could run commands such as diskpart, sfc, chkdsk, bootrec, bcdedit, or regedit to try to repair the installation manually.
Other options
A. System Restore or restore from an image backup, performs a refresh, or reset reinstallation of Windows. This will not allow running commands though.
C. The basic input/output system (BIOS) or the Unified Extensible Firmware Interface (UEFI) setup allows users to configure the recovery media as the priority boot device. This does not typically allow commands to run.
D. The BOOTMGR and the boot configuration data (BCD) file are normally installed to a hidden System Reserved partition.
A graphics artist is starting to get into 3D animation and wants to ensure their computer can adequately handle the work. What should the graphics artist use?
A.Hardware token
B.LPL
C.Integrated graphics
D.Dedicated graphics
D. Dedicated Graphics
A demanding application, such as graphic design software or a game, is likely to require a dedicated graphics card with its own video RAM, separate from the general system RAM.
Other options
A. An external hardware token is a smart card or USB form factor device that stores some cryptographic user identification data.
B. Microsoft maintains a Windows Logo’d Product List (LPL) catalog, previously called the Hardware Compatibility List (HCL). This is a catalog of tested devices and drivers.
C. A PC’s graphics subsystem can be implemented as a feature of either the central processing unit (CPU) or the motherboard chipset. This is referred to as integrated graphics.
A server administrator wants to create several virtual machines with a consistent set of software and configuration options. What should the administrator use for installation?
A.DirectAccess
B.BitLocker
C.Images
D.POSIX
C. Images
Unattended installations are also often completed using image deployment. Using image deployment means that machines use a consistent set of software and configuration options.
Other options
A. The Enterprise edition has several features that are not available in the Pro edition, such as support for Microsoft’s DirectAccess virtual private networking technology.
B. BitLocker enables the user to encrypt all the information on a disk drive. Encryption means that data on the device is protected even if someone steals it.
D. POSIX Compliance supports UNIX/Linux compatibility. Microsoft engineered the New Technology File System (NTFS) to support case-sensitive naming, hard links, and other key features required by UNIX/Linux applications.
A user experiences a slow desktop load, so they want to try to rebuild their local user profile. Which of the following is NOT one of the three files that need to be excluded when rebuilding a profile?
A.NTUSER.MSI
B.NTUSER.DAT
C.NTUSER.DAT.LOG
D.NTUSER.INI
A. NTUSER.MSI
NTUSER.MSI is not a valid Windows file and if a user sees it then it is most likely malware.
Other options
B. Rebuilding a local user profile means creating a new account and then copying files from the old, corrupt profile to the new one, but excluding three files. NTUSER.DAT is the first file.
C. NTUSER.DAT.LOG is another file that should be excluded when rebuilding a local user profile. Delays affecting the system prior to sign-in are caused by loading drivers and services.
D. NTUSER.INI is the last file that should be excluded when rebuilding a local user profile.
A server administrator tests an application migration from a 32-bit server to a 64-bit server, but the application is still 32-bit. Where will Windows run the application?
A.PXE
B.SED
C.WOW64
D.OEM
C. WOW64
In 64-bit Windows, the applications run within a special application environment called WOW64 (Windows on Windows 64-bit). This environment replicates the 32-bit environment expected by the application and translates its requests into ones that can be processed by the 64-bit CPU, memory, and file subsystems.
Other options
A. Most computers now come with a Preboot eXecution Environment (PXE)–compliant firmware and network adapter to support booting from a network with a suitably configured server.
B. Instant Secure Erase (ISE)/Crypto Erase uses the capabilities of self-encrypting drives (SEDs) as a reliable sanitization method for both HDDs and SSDs.
D. An original equipment manufacturer (OEM) license means that the OS is pre-installed to a PC or laptop and is valid for that device only. The computer vendor is responsible for support.
A project manager implements a new ticketing system that allows the helpdesk to record knowledge, streamline efficiencies, and automate solutions. Which of the following is the least concern for the support team?
A.Licensing
B.Distribution method
C.Support
D.Training
B. Distribution method
A distribution method is normally not a major concern. Distribution is fairly standardized for Windows, Mac, and Linux computers.
Other options
A. Licensing is one of the three primary concerns. Commercial software must be used within the constraints of its license. This is likely to restrict either the number of devices on which the software can be installed or the number of users that can access it.
C. Support is a big consideration. Software might be available with paid-for support to obtain updates, monitor and fix security issues, and provide technical assistance.
D. Training is another concern. Complex apps can have a substantial and expensive user-training requirement.
A client administrator at a local university runs a computer lab and decides they want to image the machines nightly due to the high risk of having everything available and open to use. The administrator orders new computers which are compatible with the ability to use Preboot eXecution Environment (PXE). What type of boot would this be?
A.Network
B.Hard drive
C.Optical
D.USB
A. Network
Network boot setup means connecting to a shared folder containing the installation files, which could be slipstreamed or use image deployment.
Other options
B. Once the OS has been installed, the administrator will usually want to set the internal hard drive as the default (highest priority) boot device and disable any other boot devices.
C. Historically, most attended installations and upgrades were run by booting from optical media (CD-ROM or DVD). The optical drive must be set as the priority boot device.
D. When using an external/hot-swappable hard drive or solid-state flash drive as boot media, the boot method should be set to use the USB-connected device as the priority option.
A student considers upgrading their system but has many custom drivers and hardware in their Windows-driven rig. Where can the student look for a catalog of tested devices and drivers for this platform?
A.HCL
B.PXE
C.NIST
D.SED
A. HCL
Microsoft maintains a Windows Logo’d Product List (LPL) catalog, also called the Hardware Compatibility List (HCL). This is a catalog of tested devices and drivers. If a device has not passed Windows logo testing, users should check the device vendor’s website to confirm whether there is a driver available.
Other options
B. Most computers now come with a Preboot eXecution Environment (PXE)–compliant firmware and network adapter to support this boot option.
C. Frameworks for security controls are established by organizations such as the National Institute of Standards and Technology (NIST).
D. Instant Secure Erase (ISE)/Crypto Erase uses the capabilities of self-encrypting drives (SEDs) as a reliable sanitization method for both HDDs and SSDs. A SED encrypts its contents by using a media encryption key (MEK).
A support operator helps a user who is complaining about latency and sluggish performance for a modern computer. Which of the following will be the least helpful in troubleshooting?
A.Perform a system file check (SFC).
B.Use Task Manager.
C.Reboot.
D.Run fewer programs.
A. Perform a system file check (SFC)
In modern systems, checking file integrity will not improve sluggish performance. In most instances, it will have no effect.
Other options
B. Use Task Manager to determine if any resources are at 90–100% utilization, and then note which process is most active.
C. If ending the process does not restore system performance, try rebooting the computer. The problem could be transitory and might not reoccur.
D. If Windows displays an error message such as low memory, try running fewer programs, and see if the issue can be isolated to one process.
A user calls in about an invalid boot disk error. What is the most common cause of this issue?
A.Floppy disk left in the drive on a restart
B.OS loader not found
C.USB set as the primary boot method
D.Driver corruption
C. USB set as the primary boot method
Check for any removable disks, and change the boot device priority/boot order if necessary. If the system firmware returns an error message such as invalid boot disk, then the system has completely failed to boot.
Other options
A. The most common cause of this error used to be leaving a floppy disk in the drive on a restart. Most computers do not use a floppy disk anymore.
B. A no OS found type message can appear when a disk drive is identified as the boot device but does not report the location of the OS loader.
D. If Windows appears to boot but does not display the sign-in screen, the likely causes are malware infection or corruption of drivers or other system files.
A user finds that their home computer fails to boot. The user believes part of the operating system (OS) is corrupted. They want to recover it but do not want to lose any personal documents. What should the user do?
A.Use a factory recovery partition.
B.Use the full reset option.
C.Format the drive.
D.Use refresh.
D. Use Refresh
Using refresh recopies the system files and reverts most system settings to the default but can preserve user personalization settings, data files, and apps installed via the Windows Store.
Other options
A. A factory recovery partition is a tool used by original equipment manufacturers (OEMs) to restore the OS environment to its ship state.
B. Using the full reset option deletes the existing OS plus apps, settings, and data ready for the OS to be reinstalled.
C. Formatting a drive will completely wipe everything on it, or at least the links in the partition tables to the files.
A cyber intern is tasked with installing a Windows 32-bit program on a company computer which is running a 64-bit version of Windows. To confirm it is installed correctly, what folder can the intern view to ensure all files are present?
A.Program Files (x86)
B.Program Files
C.%SystemRoot%\system32
D.%SystemRoot%\syswow64
A. Program Files (x86)
For this scenario, the intern will ensure the files are found within the Program Files (x86) folder as this is where 32-bit applications files are installed.
Other options
B. The Program Files folder is normally used with 64-bit applications when installing environments onto a device.
C. Windows’ 64-bit shared system files (DLLs and EXEs) are stored in %SystemRoot%\system32.
D. Shared system files for the 32-bit versions are stored in %SystemRoot%\syswow64
A curious IT professional investigates the hidden System Reserved partition. What does the BOOTMGFW.EFI read to identify whether to show a boot menu and to find the location of WINLOAD.EFI?
A.RMM
B.MSDS
C.NLA
D.BCD
D. BCD
BOOTMGFW.EFI reads the BCD to identify whether to show a boot menu and to find the location of WINLOAD.EFI. From this point, the Windows boot loader continues the boot process by loading the kernel, as described previously.
Other options
A. Remote monitoring and management (RMM) tools are principally designed for use by managed service providers (MSPs). An MSP is an outsourcing company that specializes in handling all IT support for its clients.
B. Some hazard information will be provided on labels, but the supplier must also provide more detailed information on a material safety data sheet (MSDS).
C. Network Level Authentication (NLA) protects the Remote Desktop Protocol (RDP) server against denial of service attacks. Without NLA, the system configures a desktop before the user logs on.
A user boots a Windows device into the basic input/output system (BIOS) but recognizes no bootable disks. What is most likely the problem?
A.It is using MBR partitioning.
B.It is using GPT partitioning.
C.It is using APFS.
D.It is using ext3.
B. It is using GPT partioning
When the disk uses GPT partitioning, the system firmware must be set to use the Unified Extensible Firmware Interface (UEFI) boot method. If the boot method is set to BIOS, the disk will not be recognized as a boot device.
Other options
A. When the disk uses master boot record (MBR) partitioning, the system firmware must be set to use the legacy BIOS boot method. If the boot method is set to UEFI, the disk will not be recognized as a boot device.
C. macOS uses the Apple File System (APFS). A Windows machine was not likely partitioned using APFS since it is not part of the Windows installation options.
D. Linux can use ext3/ext4 or a variety of other file system types. A Windows machine was not likely partitioned using ext3 or ext4.
A security administrator is concerned about the introduction of new software to the environment. What security considerations should be made when allowing new software in the environment? (Select the best two options.)
A.Vendor reputation
B.Trusted sources
C.Digital signature
D.User reviews
B. trusted sources and C. Digital Signature
B. Ensuring that software is only installed from trusted sources minimizes the risk of introducing malware, Trojan horses, or other malicious software into the environment.
C. Digital signatures provide a way to verify the integrity and authenticity of software. They ensure that the software hasn’t been tampered with since being signed by a reputable software publisher.
Other options
A. While it’s beneficial to know the reputation of a software vendor, this alone doesn’t guarantee that the software is secure or hasn’t been tampered with after its release.
D. While user reviews can provide insights into the software’s functionality and reliability, they are not a reliable security measure. Users might be unaware of underlying security issues, or reviews can be manipulated.