Operating Systems Flashcards

1
Q

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?
A. Privacy
B. Advanced
C. Content
D. Connections
E. Security

A

D. Connections

Explanation:
To configure a proxy server in Windows, use the “Connections” tab in Internet Options. This tab includes the LAN settings where proxy server details can be entered.

Breakdown of Each Choice:
* A. Privacy: Manages cookie settings and tracking protection. Not for proxy settings.
* B. Advanced: Contains advanced browser settings. Not for proxy
configurations.
* C. Content: Handles parental controls and certificates. Not for proxy
settings.
* D. Connections: Manages internet connections and LAN settings, including proxy configuration. Correct choice.
* E. Security: Manages security settings for different internet zones. Not for proxy settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely
reason?
A. The computer is running Windows Home.
B. The user did not sign the end user license agreement.
C. The user disabled the User Account Control.
D. An antivirus application is blocking access.

A

A. The computer is running Windows Home.

Explanation:
Windows Home editions do not include the Local Security Policy Editor (secpol.msc),
which is used to update local security policies. This feature is only available in
Windows Professional, Enterprise, and Education editions.

Breakdown of Each Choice:
* A. The computer is running Windows Home.
o Correct: Windows Home editions lack the Local Security Policy Editor,
so the snap-in cannot be launched.
* B. The user did not sign the end user license agreement.
o Incorrect: Signing the end user license agreement is typically required
during installation and doesn’t affect the availability of the Local
Security Policy Editor.
* C. The user disabled the User Account Control.
o Incorrect: Disabling User Account Control (UAC) affects permissions
and elevation prompts but does not directly prevent the launch of the
Local Security Policy Editor.
* D. An antivirus application is blocking access.
o Incorrect: While antivirus applications can sometimes interfere with
system operations, they typically do not block access to the Local
Security Policy Editor specifically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Linux technician needs a filesystem type that meets the following requirements:

  • All changes are tracked.
  • The possibility of file corruption is reduced.
  • Data recovery is easy.

Which of the following filesystem types best meets these requirements?
A. ext3
B. FAT32
C. exFAT
D. NTFS

A

A. Ext3

Breakdown of Each Choice:
* A. ext3:
o Correct: Offers journaling for tracking changes, reducing corruption,
and easy recovery.
* B. FAT32:
o Incorrect: Lacks journaling, making it less reliable for tracking changes
and recovering data.
* C. exFAT:
o Incorrect: Doesn’t support journaling, so it’s not optimal for data
integrity and recovery.
* D. NTFS:
o Incorrect: While it supports journaling, it’s not native to Linux and may
not offer optimal compatibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to
find the BitLocker Drive Encryption menu item in Control Panel. Which of the
following explains why the technician is unable to find this menu item?
A. The hardware does not meet BitLocker’s minimum system requirements.
B. BitLocker was renamed for Windows 10.
C. BitLocker is not included on Windows 10 Home.
D. BitLocker was disabled in the registry of the laptop.

A

c. BitLocker is not included on Windows 10 Home.

Explanation:
BitLocker is only available in Windows 10 Pro, Enterprise, and Education editions,
not in the Home edition. This is why the technician cannot find it in the Control
Panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following features can be used to ensure a user can access multiple
versions of files?
A. Multiple desktops
B. Remote Disc
C. Time Machine
D. FileVault

A

c. Time Machine

Time machine will allow a Mac computer to go back “in time” to view the state of
machine at any given time.
File Vault is Mac’s version of full disk encryption
Remote Disc allows you to access optical drives on other computers over a
network.
Multiple desktops allows you to create separate virtual desktops to organize your
open windows and apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following commands can a technician use to get the MAC address of a
Linux distribution?
A. net use
B. ifconfig
C. netstat
D. ping

A

B. Ifconfig

Explanation:
The ifconfig command in Linux is used to display network configuration details,
including the MAC address of network interfaces.
Breakdown of Each Choice:
* A. net use:
o Incorrect: This is a Windows command used to manage network
connections, not applicable to Linux for finding the MAC address.
* B. ifconfig:
o Correct: Displays network configuration, including the MAC address,
on Linux systems.
* C. netstat:
o Incorrect: Used for network statistics and connections, not specifically
for displaying MAC addresses.
* D. ping:
o Incorrect: Used to test network connectivity, does not display MAC
addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user recently purchased a second monitor and wants to extend the Windows
desktop to the new screen. Which of the following Control Panel options should a
technician adjust to help the user?
A. Color Management
B. System
C. Troubleshooting
D. Device Manager
E. Administrative Tools

A

Explanation:
To extend the Windows desktop to a second monitor, the technician needs to
adjust the display settings, which can be accessed through the “System” option in
the Control Panel. From there, the technician can configure multiple displays.

Breakdown of Each Choice:
* A. Color Management:
o Incorrect: Used to adjust color profiles, not for configuring multiple
monitors.
* B. System:
o Correct: Contains the settings to adjust display configurations,
including extending the desktop to a second monitor.
* C. Troubleshooting:
o Incorrect: Used for diagnosing and resolving problems, not for
configuring display settings.
* D. Device Manager:
o Incorrect: Used to manage hardware devices, but not directly for
extending the desktop to another monitor.
* E. Administrative Tools:
o Incorrect: Contains various system management tools, but not
specifically for display settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following file extensions should a technician use for a PowerShell
script?
A. .ps1
B. .py
C. .sh
D. .bat
E. .cmd

A

a. .ps1

.py = python
.sh = bash
.bat = batch
.cmd = command script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following file types allows a user to easily uninstall software from
macOS by simply placing it in the trash bin?
A. .exe
B. .dmg
C. .app
D. .rpm
E. .pkg

A

C. .app

Explanation:
The .app file type represents macOS application bundles. Users can uninstall these
applications by simply dragging them to the trash bin.

Breakdown of Each Choice:
* A. .exe: Used for executable files in Windows, not macOS.
* B. .dmg: Disk image file used for installing software on macOS but not the
application itself.
* C. .app: Represents an application on macOS, which can be uninstalled by placing it
in the trash bin.
* D. .rpm: Package manager format used in Linux, not macOS.
* E. .pkg: Used for macOS installation packages, not the application itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue. Which of the following should the technician do before modifying the registry keys?
A. Update the anti-malware software.
B. Create a restore point.
C. Run the PC in safe mode.
D. Roll back the system updates.

A

B. Create a restore point.

Explanation:
Creating a restore point ensures that the system can be reverted to its previous
state if any issues arise from modifying the registry.

Breakdown of Each Choice:
* A. Update the anti-malware software: Important for security but not
directly related to modifying the registry.
* B. Create a restore point: Allows reverting changes if something goes
wrong, ensuring system stability.
* C. Run the PC in safe mode: Helpful for troubleshooting but not specifically
for registry changes.
* D. Roll back the system updates: Unnecessary unless updates are causing
the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the most likely to use NTFS as the native filesystem?
A. macOS
B. Linux
C. Windows
D. Android

A

C.Windows

AFP = macOS
Ext3/4 = Linux
NTFS = Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?
A. NC
B. RMM
C. RDP
D. SSH

A

B. RMM

Explanation:
RMM (Remote Monitoring and Management) tools typically support graphical remote access across various operating systems (Windows, Linux, macOS) and can operate entirely within a local network without requiring an external internet connection.

Breakdown of Each Choice:
* A. NC: Netcat is used for network communication and debugging, not for graphical remote access.
* B. RMM: Provides comprehensive remote access and management,
supporting multiple operating systems.
* C. RDP: Primarily for Windows, not suitable for Linux and macOS without additional setup.
* D. SSH: Provides secure command-line access, not graphical remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A customer has a USB-only printer attached to a computer. A technician is
configuring an arrangement that allows other computers on the network to use the printer. In which of the following locations on the customer’s desktop should the technician make this configuration?
A. Printing Preferences/Advanced tab
B. Printer Properties/Sharing tab
C. Printer Properties/Security tab
D. Printer Properties/Ports tab

A

B. Printer Properties/Sharing tab

Explanation:
To share a USB printer with other computers on the network, the technician needs
to enable printer sharing. This configuration is done in the Printer Properties under
the Sharing tab.

Breakdown of Each Choice:
* A. Printing Preferences/Advanced tab: Used for configuring print settings
and advanced options, not for sharing.
* B. Printer Properties/Sharing tab: Where you configure the printer to be
shared with other network users.
* C. Printer Properties/Security tab: Used to set permissions for who can use
and manage the printer, not for sharing.
* D. Printer Properties/Ports tab: Used to manage which port the printer is
connected to, not for sharing the printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

A. Keyboard
B. Touch pad
C. Ease of Access Center
D. Display settings

A

C. Ease of Access Center

Explanation:
The Ease of Access Center in Windows allows users to adjust various accessibility settings, including changing the cursor color and other visual aids to help individuals with disabilities, such as visual impairments.

Why the Other Options Are Incorrect:
A. Keyboard:

The keyboard is for typing input and does not offer options for changing the cursor color.
B. Touch pad:

The touchpad controls the mouse pointer’s movement but does not affect its color.
D. Display settings:

Display settings focus on screen resolution, brightness, and other display-related features, not on changing the cursor color.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

A. Right-click the Windows button, then select Run… entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin.
B. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run.
C. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup.
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

A

D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Explanation:
Using the Startup tab in Task Manager allows the technician to disable programs selectively, reboot, and identify which one is causing slow boot times.

Why Other Options Are Incorrect:
A: Moving items to the Recycle Bin is too drastic and risks losing important files.
B: Editing the registry can cause instability.
C: Disabling all startup tasks at once makes it hard to isolate the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?
A. Professional
B. Home
C. Enterprise
D. Embedded

A

A. Professional

Explanation:
Windows 10 Professional includes BitLocker, which is the feature required to encrypt the hard drive. It is the most appropriate edition for a single user who wants to use encryption.

Why the Other Options Are Incorrect:
B. Home: The Home edition does not include BitLocker.
C. Enterprise: While Enterprise includes BitLocker, it is designed for large organizations, not individual users.
D. Embedded: The Embedded edition is tailored for specialized devices, not general use.

17
Q

A user wants to back up a Windows 10 device. Which of the following should the user select?
A. Devices and Printers
B. Email and Accounts
C. Update and Security
D. Apps and Features

A

C. Update and Security

In Windows 10, the Update and Security section in the Settings menu includes the options for backup, such as “Backup using File History” and creating system images.

Why Others Are Incorrect:
A. Devices and Printers: Manages connected hardware but has no backup options.
B. Email and Accounts: Manages user accounts and email settings, not backups.
D. Apps and Features: Used for managing installed apps, not backups.

18
Q

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should
the technician use to configure the setting?
A. System
B. Power Options
C. Devices and Printers
D. Ease of Access

A

B. Power Options.

The Power Options utility in the Control Panel allows the technician to configure power settings, including the “USB selective suspend” feature. Disabling this setting ensures USB devices remain active and are not suspended by the operating system to save power.

Why the other options are incorrect:
A. System: Used for system settings like performance, remote settings, and device management but not USB power settings.
C. Devices and Printers: Allows management of connected devices but doesn’t provide power management settings for USB devices.
D. Ease of Access: Designed for accessibility settings, unrelated to USB power management.

19
Q

A user requested that the le permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user’s request?
A. cat
B. chmod
C. pwd
D. cacls

A

B. chmod

chmod (Change Mode): The chmod command is used to change the permissions of files and directories on a Linux system. It allows you to set permissions for the owner, group, and others. In this case, you can use chmod to allow access to a file or directory only for a specific group of users by setting group permissions.

Why the other options are incorrect:

A. cat: This command is used to display the contents of a file, not to modify permissions.

C. pwd: This command prints the current working directory. It does not deal with permissions.

D. cacls: This is a Windows-specific command for managing access control lists (ACLs). It is not used in Linux.

20
Q

Which of the following lesystem types does macOS use?
A. ext4
B. exFAT
C. NTFS
D. APFS

A

D. APFS

Explanation:
APFS (Apple File System): This is the default file system used by macOS starting with macOS High Sierra (10.13). It is optimized for SSDs and provides features like encryption, space sharing, and improved performance.

Why the other options are incorrect:
A. ext4: This is a Linux file system, not used by macOS.
B. exFAT: A cross-platform file system for external drives but not the primary file system for macOS.
C. NTFS: A Windows file system; macOS can only read NTFS by default, not use it natively.

21
Q

Which of the following is used as a password manager in the macOS?
A. Terminal
B. FileVault
C. Privacy
D. Keychain

A

D. Keychain

Keychain is the built-in password manager in macOS. It securely stores passwords, account details, and other sensitive information, allowing users to access them when needed.

A. Terminal: A command-line interface for managing the system, not for storing passwords.
B. FileVault: Used for full-disk encryption to protect data, not for managing passwords.
C. Privacy: A section in System Preferences to manage permissions and data privacy, not a password manager.

22
Q
A