RG: Practice Exam 2 Flashcards
What is the minimum RAM requirement for 32-bit Windows 8.1?
A. 32 MB
B. 64 MB
C. 512 MB
D. 1 GB
D. 1 GB
The minimum RAM requirement for 32-bit Windows 8.1 is 1 GB.
Into which tool was the Security Center rolled in Windows 7?
A. Windows Firewall
B. Programs and Features
C. HomeGroup
D. Action Center
D. Action Center
With Windows 7, the Security Center was rolled into the Action Center. You can access it by choosing Action Center in the Control Panel or by typing Security Center in the Start button’s search box. The Windows Firewall is a personal firewall included on Windows system. Programs and Feature is a utility used to install and remove applications. Homegroup is an alternative to a workgroup in Windows 7.
What utility is started with MSTSC.EXE?
A. Remote Desktop Connection
B. System Configuration Tool
C. Windows Defender
D. Duplex Manager
A. Remote Desktop Connection
Remote Desktop Connection is the MSTSC.EXE utility. System Configuration Tool is another name for MSConfig utility. Windows Defender is a Microsoft anti-malware tool. There is no utility called Duplex Manager.
Which tool can be used to configure the size of the Security log file in Windows 7?
A. Task Manager
B. Performance
C. Event Viewer
D. MSConfig
C. Event Viewer
You can set maximum log size by right-clicking the log in the Event Viewer and selecting Properties. By default, when a log fills to its maximum size, old entries are deleted in FIFO order. Task Manager is used to manage processes running on the system. Performance is a tool used to monitor the performance of the system. MSConfig is used to manage the startup process.
What should be the first solution attempted after a blue screen of death (BSOD)?
A. Reinstall the operating system.
B. Reboot.
C. Restart in safe mode.
D. Run a system restore.
B. Reboot.
In the majority of cases, a reboot solves a blue screen of death. There is no need to attempt other approaches unless the blue screen reappears after rebooting.
Which of the following is not a built-in account in Windows 8.1 with HomeGroup enabled?
A. Administrator
B. Guest
C. Initial user
D. Power User
D. Power User
The four built-in accounts are Administrator, Guest, the initial user, and the HomeGroup user. Power User is not a built-in account in Windows 8.1 with HomeGroup enabled.
Which of the following is used instead of the Control Panel to make direct changes to the system?
A. System recovery
B. MSConfig
C. MSN
D. Regedit
D. Regedit
Regedit is used to change the configuration directly rather than using the Control Panel applets. System recovery is an option for reverting to an earlier operating system state. MSConfig is used to manage the startup process. MSN is a Microsoft website.
In Windows 10, which System Recovery Options menu choice is used to fix problems with startup, such as missing operating system files?
A. System Restore
B. Startup Repair
C. Windows Complete PC Restore
D. Windows Diagnostic Tool
B. Startup Repair
The Startup Repair choice is used to fix problems with startup, such as missing operating system files. System Restore requires and uses a saved image of the system from an earlier point in time. Windows Complete PC Restore and Windows Diagnostic Tool are not options in the Windows 10 recovery options menu.
What is the term for electrical tripping that should not be happening but routinely does?
A. Exp tripping
B. Nuisance tripping
C. False negative
D. Faraday tripping
B. Nuisance tripping
Nuisance tripping is the phrase used if tripping occurs often and isn’t a result of a serious condition. A false negative describes an alert system that does not alert you when a security condition exists. Exp tripping and Faraday tripping are not valid electrical terms.
As you are disassembling a computer, what should you use to protect sensitive electronic devices from stray static charges?
A. Antistatic bags
B. Moist tissues
C. Denatured alcohol
D. Fuser boards
A. Antistatic bags
What type of backup stores only the information that has been changed since the last full or incremental backup?
A. Full
B. Copy
C. Incremental
D. Differential
C. Incremental
An incremental backup is a partial backup that stores only the information that has been changed since the last full or incremental backup. If a full backup were performed on a Sunday night, an incremental backup done on Monday night would contain only the information that changed since Sunday night. A full backup backs up everything. A copy backup backs up files without changing the status of the archive bit. A differential backup backs up everything that had changed since the last full backup.
What command is used in Windows 8 to remove all data from a volume?
A. Diskpart> clean
B. Diskpart> format
C. Diskpart> wipe
D. Diskpart> delete
A. Diskpart> clean
The Diskpart> clean command will remove all data from the volume. Diskpart> format formats the selected drive. Diskpart>wipe is not a valid Diskpart switch. Diskpart>delete deletes the selected dynamic disk from the disk list.
In Windows 10, which System Recovery Options menu choice requires and uses a saved image of the system from an earlier point in time?
A. System Restore
B. Startup Repair
C. Windows Complete PC Restore
D. Windows Diagnostic Tool
A. System Restore
System Restore requires and uses a saved image of the system from an earlier point in time. The Startup Repair choice is used to fix problems with startup, such as missing operating system files. Windows Complete PC Restore and Windows Diagnostic Tool are not options in the Windows 10 Recovery Options menu.
Which of the following commands can be used to find the MAC address of a Linux client connected to your Windows network?
A. ipconfig
B. ifconfig
C. idconfig
D. config
B. ifconfig
If you don’t know a workstation’s MAC address, use ipconfig /all to find it in the Windows-based world and ifconfig in Unix/Linux. In Linux, ldconfig creates the necessary links and cache to the most recent shared libraries found in the directories specified on the command line. In Windows, use the config command to change or check the configuration of the system.
You do a full backup every Sunday and an incremental backup at 6 a.m. all the other days. Your system crashes at 9 a.m. on Thursday. How many restore operations will you need to do?
A. 1
B. 2
C. 5
D. 7
C. 5
You will need to restore the full backup first. After that, you will need to restore the incremental from Monday, Tuesday, Wednesday, and Thursday.
Retinal scanners and fingerprint scanners fall into the category of which type of devices?
A. Single sign-on
B. SSID
C. Biometric
D. Least privilege
C. Biometric
Biometric devices are those that authenticate an individual based on a physical characteristic. Single sign-in is authentication system that requires only a single logon to access all resources. SSID is a network name for a WLAN. Least privilege is a concept used to restrict what users can do to only what is required to do their job.
Which NTFS permission allows the user to view the contents of a directory and to navigate to its subdirectories?
A. Write
B. Read
C. List Folder Contents
D. Modify
C. List Folder Contents
The List Folder Contents permission allows the user to view the contents of a directory and to navigate to its subdirectories. It does not grant the user access to the files in these directories unless that is specified in file permissions. Read allows reading of the contents. Write allows reading and writing, and Modify allows making changes and reading the content.
When answering telephones and providing remote support, what is the most important skill you can have?
A. The ability to listen
B. Technical expertise
C. Multiple degrees
D. None of the above
A. The ability to listen
The most important skill you can have is the ability to listen. While technical expertise and multiple degrees are desirable, they are not the most important skill.
Which class of fire extinguisher is meant for flammable liquids?
A. Class A
B. Class B
C. Class C
D. None of the above
B. Class B
Three major classes of fire extinguishers are available, one for each type of flammable substance: A for wood and paper fires, B for flammable liquids, and C for electrical fires.
Which of the following tools provides comprehensive information about the system’s resource usage, hardware, and software environments?
A. Device Manager
B. MSINFO32
C. Dr. Watson
D. Task Manager
B. MSINFO32
MSINFO32 provides comprehensive information about the system’s resource usage, hardware, and software environments. Device Manager is used to configure and troubleshot device issues. Dr. Watson is an application debugger. Task Manager is used to manage processes running on the system.