Operating systems (7) Flashcards

1
Q

You have just installed a second hard drive into a Windows 7 workstation. The drive is properly recognized by the BIOS when the system boots, but you are unable to see it in Windows Explorer. What do you need to do?

Mount the drive.

Assign a drive letter.

Initialize the drive.

A

Initialize the drive.

New hard drives appear as not initialized in Windows. To use the disk, go into Disk Management and initialize the disk. Then you can create partitions, assign drive letters, and perform other disk management tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Windows user interface was the first one to have translucent windows and provides the ability to create a three-dimensional stack of open windows for users to cycle through?

Metro

Aero

WinPE

A

Aero

An acronym for Authentic, Energetic, Reflective, and Open, Aero differs from previous GUIs in that its windows are translucent and it provides the ability to create a 3D stack of open windows and cycle through them (known as Flip 3D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have a Windows 7 workstation with four hard disks. You want to take advantage of having multiple disks by creating a disk array. What types of arrays can you create in Windows that will combine the disks into one volume? (Choose two.)

Simple

Spanned

Mirrored

Extended

A

Spanned

Mirrored

There are three types of volumes you can create in Disk Management: simple, spanned, striped, and mirrored. Simple volumes are on one disk. Spanned, striped, and mirrored will be made up of multiple physical disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which versions of Windows 7 support BitLocker? (Choose two.)

Enterprise

Professional

Ultimate

Home Premium

A

Enterprise

Ultimate

BitLocker is available only for Windows 7 in the Enterprise and Ultimate editions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are working on a Windows 8.1 workstation that you believe has cross-linked files. At a command prompt, you want to check for these files and automatically fix any problems. Which command should you run to do this?

chkdsk /f

chkdsk /c

chkdsk /scan

A

chkdsk /f

You can use the Windows chkdsk command to create and display status reports for the hard disk. chkdsk can also correct file system problems (such as cross-linked files) and scan for and attempt to repair disk errors. The correct switch to automatically fix any issues is /f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are configuring a secondary hard drive using Disk Management in Windows Vista. When setting up basic storage, which two types of partitions can you create? (Choose two.)

Primary

Simple

Extended

Spanned

A

Primary

Extended

Windows supports both basic and dynamic storage. Basic storage can have a primary partition and an extended partition, while dynamic storage can be simple, spanned, or striped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are installing Windows 8.1 on a new workstation. Before you format the drive with NTFS, your manager tells you to perform a full format. Which of the following statements best describes what a full format does?

Remove files from the partition, create a new file allocation table, and scan the hard disk for bad sectors.

Remove files from the partition and create a new file allocation table.

Create a new file allocation table and scan the hard disk for bad sectors.

A

Remove files from the partition, create a new file allocation table, and scan the hard disk for bad sectors.

When formatting a hard drive, you can usually choose between a quick format or a full format. With a quick format, a new file table is created on the hard disk, but files are not fully overwritten or erased from the disk. A full format removes old files, creates a new file allocation table, and scans the hard drive for bad sectors. The scan is what takes so long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are at a Windows 8.1 command prompt. Which command should you use to create and manage partitions?

fdisk

diskpart

sfc

A

diskpart

The diskpart utility shows the partitions and lets you manage them on the computer’s hard drives. Because of the enormous power it holds, membership in the Administrators local group (or equivalent) is required to run diskpart. diskpart replaced the older fdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to install Windows 8.1 on 30 identical workstations. You do not want to manually input information into each of the workstations. What type of installation should you perform?

Upgrade

Unattended

Deployment

A

Unattended

An unattended installation, as the name implies, is one in which you don’t need to be sitting in front of the machine to complete the operation. The heart of an unattended installation is utilizing image deployment, which is sort of like copying an ideal image over from one machine to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are working at a Windows Vista command prompt. Which command should you use to copy directories and subdirectories but not empty directories?

xcopy /e

xcopy /s

xcopy /h

A

xcopy /s

The xcopy command is a more powerful version of copy. It lets you copy directories and also will copy file ownership and NTFS permissions. The /s switch is used to copy directories and subdirectories, except for empty ones. To copy those as well, use /e. The /h switch copies hidden and system files, and the /a switch copies only files with the Archive attribute set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You need to configure Internet connections on a Windows 7 workstation. In which tabs of Internet options do you set the home page and enable the pop-up blocker?

General, Security

General, Privacy

Connections, Privacy

A

General, Privacy

The Internet options in the Windows Control Panel utility allow you to configure Internet connections. It has six tabs: General, Security, Privacy, Connections, Programs, and Advanced. (Some versions of Windows also have a Content tab.) The home page is set from the General tab, and the pop-up blocker is enabled on the Privacy tab. Proxy settings are configured here as well, in the Connections tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have a user who just purchased a Windows Phone. He wants to know what the name of the virtual assistant is on his phone. What do you tell him?

Windy

Siri

Cortana

A

Cortana

Nearly all mobile operating systems now come with a virtual assistant. Cortana is the name of the Windows Phone (and Windows 10) virtual assistant. Windy is not currently the name of one. iOS uses Siri, and Amazon devices use Alexa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of server on your network will utilize UDP ports 67 and 68 to communicate with other computers?

Authentication server

Print server

DHCP server

A

DHCP server

DHCP servers provide TCP/IP configuration information to client computers. Clients will broadcast, searching for the DHCP server. The server will respond and provide the client with its IP address, subnet mask, default gateway, and other information. DHCP uses UDP ports 67 and 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Linux command is used to copy and convert files from one format to another?

dd

cp

mv

A

mv

The dd (data definition) command is used to copy files and can also be used to convert files from one format to another. It can also be used to copy blocks of data from a file and to back up the boot sector of the hard drive. The cp command will copy files but is not used for file conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are consulting with a mobile phone company. You are told that for a new usage tracking program, the company wants to use the 15-digit number that identifies a user and their network. Which number is the company looking for?

IMEI

IMSI

PRI

A

IMSI

The International Mobile Subscriber Identity (IMSI) is a unique 15-digit identifier that describes a specific mobile user and their network. It’s composed of three elements: a mobile country code, a mobile network code, and a mobile station identifier. The International Mobile Equipment Identity (IMEI) is also a 15-digit serial number, but it identifies the specific phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command-line utility allows you to check network connectivity by simply relaying a ICMP message to the IP address provided?

netstat

ping

ifconfig

A

ping

The command-line utility ping will send a short ICMP packet to the destination IP address you designate. Assuming the endpoint accepts and responds to the ICMP ping request, the source machine will receive a ping response. This in effect helps verify network connectivity

17
Q

Which type of server maintains a database called a zone file, which it uses to provide clients with requested information?

DNS server

DHCP server

Proxy server

A

DNS server

DNS has one function on the network, and that is to resolve hostnames to IP addresses. For a computer or phone to open a website, it needs to know the IP address of that website. Each DNS server has a database, called a zone file, which maintains records of hostname to IP address mappings

18
Q

You have just joined a new network team, and one of your coworkers reports that he is frustrated from working on a legacy system. Which of the following might he be referring to? (Choose two.)

The sales management software that was created in the 1980s

The file server that runs on a Windows NT 4.0 server

The accounting software that runs on a Linux server

The graphic arts package that runs on an iMac

A

The sales management software that was created in the 1980s

The file server that runs on a Windows NT 4.0 server

Legacy means that the system is old and hopelessly outdated by today’s computing standards. Legacy systems are usually defined as those using old technology in one or more of the following areas: hardware, software (applications or OS), or network protocols

19
Q

What command-line utility displays statistics related to the network interfaces?

nbtstat

nslookup

netstat

A

netstat

The command-line utility netstat presents statistics related to the installed network interfaces. By default, on a Windows machine, running the command will display a list of connections and the associated protocol, the source and target address, and the current state of that connection

20
Q

On your MacBook Pro, what is the name of the utility used to browse through files and folders?

Spotlight

iCloud

Finder

A

Finder

To use an analogy, Finder is to MacOS what Windows Explorer is to Windows 7. It lets you browse through folders and find files, disks, apps, and so on. You can change the view to see the entries with images, a list view, a column view, and so on

21
Q

While using your mobile phone, you want to set up a secure connection over a Wi-Fi network. What type of connection do you need to enable?

VPN

IMEI

IMSI

A

VPN

A virtual private network (VPN) is a secured network connection made over an unsecure network. For example, if you wanted to connect your phone to your corporate network over the Internet in order to read email but you also wanted to secure the connection, you could use a VPN. IMEI and IMSI are identifier numbers, and PRI and PRL are configuration lists the phone uses

22
Q

A user is concerned that the connection to an external server seems to take a long time. The user asks if it is possible to identify the path through the network from her workstation to the end server. What command-line utility would be helpful here?

netstat

nslookup

tracert

A

tracert

The utility tracert would list the path by successive connections or hops through the network

23
Q

You need to start a new shell on a Linux workstation, with root permissions. Which command should you use to do this?

su

sudo

vi

A

su

The su command (switch user, substitute user, or super user) is used to start another shell on a Linux computer. Without specifying the username, it’s assumed you are trying to start a shell with super user (or root) authority