redo 8 Flashcards
When troubleshooting a problem for a user, what type of questioning is best to use in order to gather more details about the problem?
open
You are installing a 32-bit application on a Windows 10 64-bit computer. What is the special environment where a 32-bit application runs on a 64-bit system?
WOW64 (Windows on Windows 64-bit)
Which of the following Windows user groups is used to support legacy applications but has been deprecated?
Power Users
By using Windows Device Manager, a user can view a device and see configuration information that is used for proper communication with the CPU (Central Processing Unit). Which of the following is NOT a viewable hardware resource?
device driver
An incident has happened with a user’s workstation. Several technicians have been investigating the problem and have used the system and tampered with possible evidence. Nothing has been documented. What has been compromised?
forensics
Which of the following file extensions is NOT associated with a popular scripting language?
dll
Which of the following is required for membership in a Windows Active Directory (AD) domain (choose two)?
computer account and user account
Which computer virus type is usually targeted at Microsoft Office documents?
macro
A user is receiving an error when trying to run a newly installed application on a Windows 10 PC. You decide to look at the application installation directory. At minimum, which two permissions does the user need to run the application from this directory?
read and execute
You are looking to implement power saving features on an older Windows PC. You know that three compatible components are required for power management to work as defined by the ACPI (Advanced Configuration Power Interface) specification. Which of the below is NOT one of the three components?
drivers
You would like to create a new user account on a Mac computer. Which one of the below is NOT an account type option?
guest
Which of the following Windows networking technologies pertains to the security control of authentication?
active directory
Mobile device security has two principal challenges: portability and capacity. What does capacity refer to in this context?
data storage
A user needs to download a file from a website. The site displays as unsecure in the web browser. Which of the following may be the problem (choose all that apply)?
didital certificate and certificate authority
Which of the following is put in place to reduce the risk of service disruption?
change management