Operating Systems Flashcards
A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?
A. Privacy
B. Advanced
C. Content
D. Connections
E. Security
D. Connections
Explanation:
To configure a proxy server in Windows, use the “Connections” tab in Internet Options. This tab includes the LAN settings where proxy server details can be entered.
Breakdown of Each Choice:
* A. Privacy: Manages cookie settings and tracking protection. Not for proxy settings.
* B. Advanced: Contains advanced browser settings. Not for proxy
configurations.
* C. Content: Handles parental controls and certificates. Not for proxy
settings.
* D. Connections: Manages internet connections and LAN settings, including proxy configuration. Correct choice.
* E. Security: Manages security settings for different internet zones. Not for proxy settings.
A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely
reason?
A. The computer is running Windows Home.
B. The user did not sign the end user license agreement.
C. The user disabled the User Account Control.
D. An antivirus application is blocking access.
A. The computer is running Windows Home.
Explanation:
Windows Home editions do not include the Local Security Policy Editor (secpol.msc),
which is used to update local security policies. This feature is only available in
Windows Professional, Enterprise, and Education editions.
Breakdown of Each Choice:
* A. The computer is running Windows Home.
o Correct: Windows Home editions lack the Local Security Policy Editor,
so the snap-in cannot be launched.
* B. The user did not sign the end user license agreement.
o Incorrect: Signing the end user license agreement is typically required
during installation and doesn’t affect the availability of the Local
Security Policy Editor.
* C. The user disabled the User Account Control.
o Incorrect: Disabling User Account Control (UAC) affects permissions
and elevation prompts but does not directly prevent the launch of the
Local Security Policy Editor.
* D. An antivirus application is blocking access.
o Incorrect: While antivirus applications can sometimes interfere with
system operations, they typically do not block access to the Local
Security Policy Editor specifically.
A Linux technician needs a filesystem type that meets the following requirements:
- All changes are tracked.
- The possibility of file corruption is reduced.
- Data recovery is easy.
Which of the following filesystem types best meets these requirements?
A. ext3
B. FAT32
C. exFAT
D. NTFS
A. Ext3
Breakdown of Each Choice:
* A. ext3:
o Correct: Offers journaling for tracking changes, reducing corruption,
and easy recovery.
* B. FAT32:
o Incorrect: Lacks journaling, making it less reliable for tracking changes
and recovering data.
* C. exFAT:
o Incorrect: Doesn’t support journaling, so it’s not optimal for data
integrity and recovery.
* D. NTFS:
o Incorrect: While it supports journaling, it’s not native to Linux and may
not offer optimal compatibility.
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to
find the BitLocker Drive Encryption menu item in Control Panel. Which of the
following explains why the technician is unable to find this menu item?
A. The hardware does not meet BitLocker’s minimum system requirements.
B. BitLocker was renamed for Windows 10.
C. BitLocker is not included on Windows 10 Home.
D. BitLocker was disabled in the registry of the laptop.
c. BitLocker is not included on Windows 10 Home.
Explanation:
BitLocker is only available in Windows 10 Pro, Enterprise, and Education editions,
not in the Home edition. This is why the technician cannot find it in the Control
Panel.
Which of the following features can be used to ensure a user can access multiple
versions of files?
A. Multiple desktops
B. Remote Disc
C. Time Machine
D. FileVault
c. Time Machine
Time machine will allow a Mac computer to go back “in time” to view the state of
machine at any given time.
File Vault is Mac’s version of full disk encryption
Remote Disc allows you to access optical drives on other computers over a
network.
Multiple desktops allows you to create separate virtual desktops to organize your
open windows and apps.
Which of the following commands can a technician use to get the MAC address of a
Linux distribution?
A. net use
B. ifconfig
C. netstat
D. ping
B. Ifconfig
Explanation:
The ifconfig command in Linux is used to display network configuration details,
including the MAC address of network interfaces.
Breakdown of Each Choice:
* A. net use:
o Incorrect: This is a Windows command used to manage network
connections, not applicable to Linux for finding the MAC address.
* B. ifconfig:
o Correct: Displays network configuration, including the MAC address,
on Linux systems.
* C. netstat:
o Incorrect: Used for network statistics and connections, not specifically
for displaying MAC addresses.
* D. ping:
o Incorrect: Used to test network connectivity, does not display MAC
addresses.
A user recently purchased a second monitor and wants to extend the Windows
desktop to the new screen. Which of the following Control Panel options should a
technician adjust to help the user?
A. Color Management
B. System
C. Troubleshooting
D. Device Manager
E. Administrative Tools
Explanation:
To extend the Windows desktop to a second monitor, the technician needs to
adjust the display settings, which can be accessed through the “System” option in
the Control Panel. From there, the technician can configure multiple displays.
Breakdown of Each Choice:
* A. Color Management:
o Incorrect: Used to adjust color profiles, not for configuring multiple
monitors.
* B. System:
o Correct: Contains the settings to adjust display configurations,
including extending the desktop to a second monitor.
* C. Troubleshooting:
o Incorrect: Used for diagnosing and resolving problems, not for
configuring display settings.
* D. Device Manager:
o Incorrect: Used to manage hardware devices, but not directly for
extending the desktop to another monitor.
* E. Administrative Tools:
o Incorrect: Contains various system management tools, but not
specifically for display settings.
Which of the following file extensions should a technician use for a PowerShell
script?
A. .ps1
B. .py
C. .sh
D. .bat
E. .cmd
a. .ps1
.py = python
.sh = bash
.bat = batch
.cmd = command script
Which of the following file types allows a user to easily uninstall software from
macOS by simply placing it in the trash bin?
A. .exe
B. .dmg
C. .app
D. .rpm
E. .pkg
C. .app
Explanation:
The .app file type represents macOS application bundles. Users can uninstall these
applications by simply dragging them to the trash bin.
Breakdown of Each Choice:
* A. .exe: Used for executable files in Windows, not macOS.
* B. .dmg: Disk image file used for installing software on macOS but not the
application itself.
* C. .app: Represents an application on macOS, which can be uninstalled by placing it
in the trash bin.
* D. .rpm: Package manager format used in Linux, not macOS.
* E. .pkg: Used for macOS installation packages, not the application itself
A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue. Which of the following should the technician do before modifying the registry keys?
A. Update the anti-malware software.
B. Create a restore point.
C. Run the PC in safe mode.
D. Roll back the system updates.
B. Create a restore point.
Explanation:
Creating a restore point ensures that the system can be reverted to its previous
state if any issues arise from modifying the registry.
Breakdown of Each Choice:
* A. Update the anti-malware software: Important for security but not
directly related to modifying the registry.
* B. Create a restore point: Allows reverting changes if something goes
wrong, ensuring system stability.
* C. Run the PC in safe mode: Helpful for troubleshooting but not specifically
for registry changes.
* D. Roll back the system updates: Unnecessary unless updates are causing
the problem.
Which of the following is the most likely to use NTFS as the native filesystem?
A. macOS
B. Linux
C. Windows
D. Android
C.Windows
AFP = macOS
Ext3/4 = Linux
NTFS = Windows
A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?
A. NC
B. RMM
C. RDP
D. SSH
B. RMM
Explanation:
RMM (Remote Monitoring and Management) tools typically support graphical remote access across various operating systems (Windows, Linux, macOS) and can operate entirely within a local network without requiring an external internet connection.
Breakdown of Each Choice:
* A. NC: Netcat is used for network communication and debugging, not for graphical remote access.
* B. RMM: Provides comprehensive remote access and management,
supporting multiple operating systems.
* C. RDP: Primarily for Windows, not suitable for Linux and macOS without additional setup.
* D. SSH: Provides secure command-line access, not graphical remote access.
A customer has a USB-only printer attached to a computer. A technician is
configuring an arrangement that allows other computers on the network to use the printer. In which of the following locations on the customer’s desktop should the technician make this configuration?
A. Printing Preferences/Advanced tab
B. Printer Properties/Sharing tab
C. Printer Properties/Security tab
D. Printer Properties/Ports tab
B. Printer Properties/Sharing tab
Explanation:
To share a USB printer with other computers on the network, the technician needs
to enable printer sharing. This configuration is done in the Printer Properties under
the Sharing tab.
Breakdown of Each Choice:
* A. Printing Preferences/Advanced tab: Used for configuring print settings
and advanced options, not for sharing.
* B. Printer Properties/Sharing tab: Where you configure the printer to be
shared with other network users.
* C. Printer Properties/Security tab: Used to set permissions for who can use
and manage the printer, not for sharing.
* D. Printer Properties/Ports tab: Used to manage which port the printer is
connected to, not for sharing the printer.
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?
A. Keyboard
B. Touch pad
C. Ease of Access Center
D. Display settings
C. Ease of Access Center
Explanation:
The Ease of Access Center in Windows allows users to adjust various accessibility settings, including changing the cursor color and other visual aids to help individuals with disabilities, such as visual impairments.
Why the Other Options Are Incorrect:
A. Keyboard:
The keyboard is for typing input and does not offer options for changing the cursor color.
B. Touch pad:
The touchpad controls the mouse pointer’s movement but does not affect its color.
D. Display settings:
Display settings focus on screen resolution, brightness, and other display-related features, not on changing the cursor color.
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?
A. Right-click the Windows button, then select Run… entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin.
B. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run.
C. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup.
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
Explanation:
Using the Startup tab in Task Manager allows the technician to disable programs selectively, reboot, and identify which one is causing slow boot times.
Why Other Options Are Incorrect:
A: Moving items to the Recycle Bin is too drastic and risks losing important files.
B: Editing the registry can cause instability.
C: Disabling all startup tasks at once makes it hard to isolate the issue.