Operating System 3 revision Flashcards

Functions and Definition

1
Q

You decide to edit the boot order for your Windows 10 computer using the MSCONFIG utility. To which file is this edit saved?

A)boot.ini
B)BCD
C)bootmgr
D)Ntoskrnl.exe

A

When you edit the boot order for a Windows 10 computer using the MSCONFIG utility, the changes are saved in the Boot Configuration Data (BCD) file. You can select the boot order on the Boot tab of the System Configuration utility (note that the OS you want to select must already be installed):

The BCD file is the file that replaced the boot.ini file. The boot.ini file was used in Windows XP and earlier, and the BCD file is used in Windows Vista and later. The BCD holds configuration data about which operating systems are installed. You cannot copy a BCD file from another computer and expect it to work properly. The MSCONFIG utility is used to edit the BCD file. You can also use Advanced Recovery Options and the BCDEdit.exe tool in Windows 7 and later to change the boot options. You can use the BCDBoot command to set up or repair the boot menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to upgrade a computer running Windows 8.1 Core to Windows 10. To which editions of Windows 10 can this computer be upgraded? (Choose all that apply.)

A)Windows 10 Education
B)Windows 10 Enterprise
C)Windows 10 Pro
D)Windows 10 Home

A

Windows 8.1 Core can be upgraded to Windows 10 Home, Pro, or Education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You need to view the contents of a Windows 10 update. Which command-line tool should you use?

A)XCOPY
B)EXPAND
C)COPY
D)EXTRACT

A

You can view the contents of a Windows 10 update file by using the EXPAND command.

EXTRACT allowed you to pull one or more files out of a CAB file. This command was deprecated in Windows XP and above.

COPY allows you to duplicate a file or folder.

XCOPY duplicates a folder, including subfolders and files.

To use the EXPAND command, run the CMD command to open the command-line prompt, and then type EXPAND. The command line options are as follows:

-r – renames expanded files
-D – displays the list of files in the source file
Source – specifies the source file to use
-F:filename – specifies the name of the files to expand from the source file
Destination – specifies the destination location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements is true about an in-place upgrade and a clean installation?

A )An in-place upgrade can always be used when upgrading from a previous operating system version.

B) An in-place upgrade installs the operating system files and retains user settings.

C) A clean installation installs the operating system files and retains user settings.

D) A clean installation does not require the reinstallation of applications.

A

The difference between an in-place upgrade and a clean installation is that an in-place upgrade installs the operating system files and retains user settings, while a clean installation installs the operating system files and does not retain user settings. An in-place upgrade can only be used when the operating systems are closely related, and must follow a certain upgrade path. A clean installation will require the reinstallation of applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Christine, a member of the IT department, has contacted you saying she wants to organize the contents of her My Documents folder into subfolders. She wants to do it from the command prompt. Which command should she use?

A) cd
B) dir
C) ren
D) md

A

The md command should be used to create new folders and subfolders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You need to check the startup configuration for several services. From which tools can you access the Services console? (Choose all that apply.)

A) System Properties
B) Device Manager
C) Computer Management
D) Administrative Tools

A

You can access the Services console from the Computer Management console or the Administrative Tools console. All of these tools have a console called Services. You can also access the Services console using the Microsoft Management Console (MMC) by typing services.msc in the Run dialog box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should be your primary consideration when upgrading from a previous version of Windows to Windows 10?

A)Load alternate third-party drivers when necessary
B)Prerequisites/hardware compatibility
C)Time/date/region/language settings
D)OS compatibility/upgrade path

A

Your primary consideration when upgrading from a previous version of Windows to Windows 10 should be the OS compatibility/upgrade path. For example, if you want to upgrade from Windows 8 to Windows 10, you must install Windows 8.1 first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are the desktop support technician for your company. You are working on a computer running Windows 10 that has two hard disk drives, named HDD1 and HDD2. You want to copy the entire file and folder structure from HDD1 to HDD2 in the most efficient manner.

Which command-line tool should you use?

A)copy.exe
B)diskcopy.exe
C)move.exe
D)xcopy.exe

A

You should use the xcopy.exe command-line tool. Xcopy.exe allows you to copy files and folders, including subfolders. Xcopy.exe is useful when you want to efficiently duplicate multiple files and folders from one location to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to run Disk Defragmenter, but several other applications are running. Why should you shut down all running applications first?

A)I f the other applications are running, Disk Defragmenter offers to run at the next bootup time.

B) Running other applications may result in disk write operations forcing Disk Defragmenter to restart continually.

C) Disk Defragmenter requires exclusive access to drives.

D) Running applications prevent Disk Defragmenter from being launched.

A

Running other applications may result in disk write operations, forcing Disk Defragmenter to restart continually. Disk Defragmenter reorders file contents on the disk in an attempt to store each file in a contiguous sequence of disk storage blocks. Any application that is running and writing data to the disk may disrupt the ordering carried out by Disk Defragmenter and force the defragmentation process to be restarted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are installing an operating system on a drive that appears to have sector issues. Which formatting option should you use?

A)ExFAT
B)Full Format
C)NTFS
D)Quick Format

A

When you are installing an operating system on a drive that appears to have sector issues, you should use full format. A full format will take much longer than a quick format because a full format checks for bad sectors. It is critically important that the boot drive be properly formatted with the correct partitions and format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You run the systeminfo command on a Windows 10 computer. What will NOT be displayed?

A) virtual memory statistics
B) domain name
C) boot options
D) installed hotfixes

A

Boot options are not displayed when you run the systeminfo command on a Windows 10 computer. Boot options are displayed on the Boot tab of the System Configuration utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you start Windows 10, an error message is displayed that indicates that a service failed to load.

Which utility can you use to determine why the service failed to load?

A)Event Viewer
B) Network Monitor
C) Resource Meter
D) System Configuration

A

In Windows 10, a service that fails to load generates an event. You can use the Event Viewer utility (eventvwr.msc) to view the event and help you determine why the service failed to load. Any event that generates a message can be located in Event Viewer, which is helpful when a user cannot remember the exact wording of an error message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are working at a client site and need to connect securely to the network at your home office. Which secondary network connection will allow you to do that?

A)WWAN
B)VPN
C)Wireless
D)Dial-up

A

A VPN connection, which is a secondary network connection, will allow you to securely connect to the network at your home office. A VPN requires that you first have an Internet connection. Once the Internet connection is established, you can then launch a secure VPN connection to your home office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your organization has several computers that are currently operating on Windows 8.1. You have been tasked with upgrading these computers to Windows 10. What are the hardware requirements needed to install Windows 10 64-bit on these devices? (Choose all that apply.)

A) DirectX 8-compatible graphics card
B) 1 GHz processor
C) 2 GB of RAM
D) 16GBs of hard drive space

A

To install Windows 10 64-bit onto a computer, it needs a minimum of a 1-GHz processor and 2 GB (gigabytes) of RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Microsoft utility provides drive-level encryption?

A) BitLocker
B) TrueCrypt
C) Symantec Drive Encryption
D) DiskCryptor

A

BitLocker is Microsoft’s utility that provides drive-level encryption. It is available in Windows 10 Pro and Pro for Workstations, Windows 10 Enterprise, and Windows 10 Education, but not Windows 10 Home. BitLocker provides administrators with the ability to encrypt the contents of an entire drive. BitLocker To Go allows administrators to encrypt the contents of flash drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are connecting to a wireless network at a coffee shop. How should you classify that connection when prompted?

A)Work
B)Public
C)Private
D)Home

A

When you are connecting to a wireless network at a coffee shop, you should classify that connection as Public when prompted. When in doubt, choose Public, unless you need to share files or printers.

17
Q

You need to schedule several disk maintenance tasks on a Windows computer. Where should you go to schedule these tasks?

A)Open Task Manager
B)Open Task Scheduler
C)Right-click the commands for the tasks
D)Double-click the commands for the tasks

A

You should go to the Actions pane in Task Scheduler to schedule disk maintenance tasks. To get to the Task Scheduler, type Task Scheduler in the search bar. This will open the Task Scheduler console. You can also type taskschd.msc in the Run command prompt

18
Q

You have installed several 32-bit and 64-bit applications on a Windows 10 64-bit computer. What is the installation folder for the 64-bit applications?

A)C:\Program Files (x86)
B)C:\Program Files
C)C:\Program Files (x64)
D)C:\Windows\System32

A

The default installation folder for 64-bit applications in any edition of Windows is C:\Program Files, regardless of whether it is running a 32-bit or 64-bit version of the operating system.

19
Q

You want to install Windows 10 32-bit edition on a new computer. Which hardware is NOT a minimum requirement?

A) DirectX 9 graphics card
B) 2 gigabytes RAM
C) 16 GB available hard drive space
D) 1 gigahertz processor

A

To install Windows 10 32-bit on a user’s computer, you do not need 2 GB of RAM. This amount of hard drive space is needed for the 64-bit versions of Windows 10. The 64-bit versions need 2 GB of RAM.

20
Q

A user has connected a second monitor to his Windows 10 computer. The new monitor is detected. However, the dual-monitor configuration is not configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors?

A) Right-click the desktop and select Gadgets.
B) Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution\Advanced Settings.
C) Right-click the desktop and select Personalize.
D) Right-click the desktop and select Display Settings.

A

The user should right-click the desktop and select Display Settings. From there the user can adjust and display orientation and detect different display options. The Display Settings is shown in the following exhibit:

21
Q

Which security considerations should you take into account when installing and configuring applications on Windows desktops? (Choose all that apply.)

A) User privileges
B) Turning Windows features on or off
C) Remote PC access
D) Impact to device

A

You should consider the impact to the device, user privileges, and whether Windows features will be enabled or disabled as a result of the installation.

You should consider the impact to the device, specifically the application’s access to the device’s files, settings, and user accounts. If, for example, the application accesses information in the cloud, you might be vulnerable to an attack. You should also consider whether the application is allowed to make changes to the underlying operating system settings, registry keys, or inbound connections.

You might also want to consider which user privileges are required to install and run the application. User Account Control (UAC) will limit the users that will be able to install applications on a Windows computer. An administrative-level account is required to do this.

You should consider whether the application will enable or disable Windows features. If you have to disable Windows Firewall to install an application, what vulnerabilities does this expose?

22
Q

A user contacts you asking if she should run the chkdsk command on her computer. Why would you use this command?

A) To repair the master boot record (MBR) on the boot partition
B) To check the specified drive and repair possible problems
C) To write new boot sector code on the system partition
D) To manage hard drive partitions

A

command checks the specified drive and repairs possible problems

23
Q

You know you saved a file named FILECHK in the D:\MYDOCS directory, but you do not remember the location or the extension. You run the dir D:\MYDOCS\FILECHK.* /S command. What would this command accomplish?

A) It locates all files that have names starting with FILECHK on the default drive.

B) It locates a file named FILECHK.* on the default drive.

C) It locates all files that have names starting with FILECHK in the MYDOCS directory of drive D, including the subdirectories.

D) It locates all the files and directories that have the name FILECHK with any file extension in the MYDOCS directory of drive D, including the subdirectories.

A

The dir command locates all the files and directories that belong to the specified path and match the file name specified as part of the command. The D:\MYDOCS\FILECHK.* specification matches any file or directory that has the name FILECHK and any extension. The search starts with the D:\MYDOCS directory and searches all the subdirectories, as specified by the /s switch.

24
Q

A user that has a Windows 10 laptop is frequently away from the office. During that time, he needs access to several files that are on the network. What should you do?

A) Enable BitLocker To Go.
B) Enable BitLocker.
C) Create a Windows 10 library.
D) Enable offline files.

A

You should enable offline files. The offline files feature allows users to access network files even when the network is unavailable. When the network is available, the files are synced to ensure that both the online and offline versions are the same. In Windows 10, you enable offline files using the Sync Center in Control Panel.

25
Q

You need to connect to the Internet at a client site. The system administrator gives you an SSID of Workplace 1 and a password. Which network type are you going to use to connect to the Internet?

A) wireless
B) dial-up
C) broadband
D) VPN

A

You are going to use a wireless network to connect to the Internet. The SSID identifies the name of the network to which you are trying to connect.

26
Q

An IT technician reports that he ran the sfc utility on a user’s computer. Why would this utility be used?

A) It detects signed and unsigned device drivers on a computer.
B) It monitors changes to protected system files.
C) It repopulates the dllcache folder when contents are corrupted.
D) It lists information about drivers running on a computer.

A

The System File Checker (sfc) utility repopulates the dllcache folder when the contents are corrupt.

27
Q

Gloria is holding free computer maintenance classes in her community. In her class, she emphasizes tools anyone can access and use. She spends a lot of time discussing the DEFRAG tool. What should she tell them is the minimum free disk space needed to run this tool?

A) 800 MB
B )15% of hard drive space
C) 25% of hard drive space
D) 200 MB

A

The Disk Defragmenter (DEFRAG) utility requires a minimum free disk space of 15% of the hard drive space to run. This utility rearranges a file to enable it to occupy contiguous space on a drive.

28
Q

ou need to locally install Windows 10 on a new computer. Which installation method is most likely?

A) USB
B) DVD
C) CD
D) Network

A

The installation method that you will most likely use to locally install Windows 10 on a new computer is an installation USB.

29
Q

You are responsible for purchasing new Windows 10 computers for your company. The computers must be able to utilize Remote Desktop to connect to other hosts. Which versions of Windows 10 could you implement? (Choose all that apply.)

A) Windows 10 Pro
B) Windows 10 Home
C) Windows 10 Enterprise
D) Windows 10 Education

A

Windows 10 Pro, Pro for Workstations, Enterprise, and Education editions are all capable of using the Remote Desktop protocol to connect to other hosts. However, Windows 10 Home is not. This chart details the various features that each Windows 10 edition is capable of utilizing:

30
Q

You are a new member of a workgroup, and you need to print a document. You do not have a printer attached to your computer, but a co-worker does. Other employees can print to that printer. What is the easiest way to print your document on the coworker’s printer?

A )Disconnect the printer from the co-worker’s machine, and connect it to yours.
B) Create a network shared printer by connecting the printer to the network, and assign an IP address to the printer.
C) Email the document to your co-worker.
D) Ask the co-worker to give you permissions to print to the printer.

A

The easiest way to print your document and solve similar issues in the future is to ask the co-worker to give you permissions to print to the printer. A shared printer is one that is attached to a local machine. The local machine owner can choose with whom to share the printer. This is an ideal situation for printing in a workgroup.

31
Q

You need to connect to the network at a client site. The systems administrator hands you a cable where the connectors have 8 pins each. Which type of network are you about to use?

A) dial-up
B) VPN
C) wired
D) WWAN

A

You about to use a wired network. The cable described is an Ethernet cable.

32
Q

You need to reinstall Windows 10 on a client computer. The old hard drive crashed, and you are using the original installation media from 2018. You have an Internet connection. What is the best way to make sure you have the most current drivers and updates?

A) Do nothing. No driver or patch updates are necessary.
B) Download all the drivers and patches on another machine, create a reference image on DVD, and update from the reference DVD when OS installation is complete.
C) Accept the option to download updates and new driver packages.
D) Proceed with the installation, and update drivers and patches via the Internet when installation is complete.

A

In this scenario, the best way to make sure you have the most current drivers and updates is to accept the option to download updates and new driver packages. This will allow the drivers and updates to be processed during the installation.

33
Q

You find a solution to a problem that directs you to edit a value in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies. Which system tool will allow you to accomplish this?

A) REGEDIT
B) MMC
C) MSTSC
D) MSINFO32

A

To edit a value in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies, you would use the Registry Editor (regedit.exe), also referred to as REGEDIT. REGEDIT can also be accessed by opening the command prompt window and typing regedit. All HKEY values are registry entries and can be edited with the system tool REGEDIT. Use extreme caution when editing registry entries, as changes cannot be undone. Always save a copy of the current registry settings before editing them.

34
Q

Which of the following tablet operating systems typically follows a yearly schedule for major version updates?

A) Android
B) Microsoft Windows
C) iOS
D) Chrome OS

A

The Android operating system versions are typically updated on a yearly basis. While there are version numbers, the updates are normally referred to by their names. The most recent versions are Marshmallow, Nougat, Oreo, and Pie. They are all named after some type of confection or food. The next version after Pie will start with the letter Q.

35
Q

You wish to assign a drive letter to a network shared folder so that the user does not have to type in the full path \FileSrv1\Admin\HumanResources\Forms\Policies\LeaveRequests.

How would you do this?

A) Map the network drive.
B) Create a network share.
C) Create an administrative share.
D) This cannot be done.

A

To assign a drive letter to a network shared folder, so that the user does not have to type in the full path \FileSrv1\Admin\HumanResources\Forms\Policies\LeaveRequests, you should map a network drive. Mapping a drive allows you to assign a drive letter to a network share. This saves the user from typing long, complicated, and prone-to-error paths to the network share.

36
Q

Windows is reporting that a system file is corrupt on a Windows computer. You have already run chkdsk /f and rebooted the machine, but the error message shows that the file is still corrupt.

Which command-line tools would you use next?

A) dism
B) diskpart
C) sfc
D) nslookup

A

System File Checker (SFC) is the tool that fixes corrupt system files. To identify which system files need repair, open an elevated command prompt and run sfc /verifyonly. To repair those files, run sfc /scannow.

37
Q

You are an IT technician. A user contacts you to report that they are having issues with their laptop’s wireless mouse becoming nonresponsive in meetings. When you investigate, you find the mouse appears to be working correctly. The user comes back the next week to report the same issue. Which setting would you open in Control Panel to fix the issue?

A) Power Options > Create a power plan
B) Power Options > Choose what the power buttons do > Disable Hibernate
C) Power Options > Change plan settings > Change advanced plan settings
D) Power Options > Change when the computer sleeps

A

Power Options > Change plan settings > Change advanced plan settings