RG: Practice Exam 2 Flashcards

1
Q

What is the minimum RAM requirement for 32-bit Windows 8.1?

A. 32 MB

B. 64 MB

C. 512 MB

D. 1 GB

A

D. 1 GB

The minimum RAM requirement for 32-bit Windows 8.1 is 1 GB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Into which tool was the Security Center rolled in Windows 7?

A. Windows Firewall

B. Programs and Features

C. HomeGroup

D. Action Center

A

D. Action Center

With Windows 7, the Security Center was rolled into the Action Center. You can access it by choosing Action Center in the Control Panel or by typing Security Center in the Start button’s search box. The Windows Firewall is a personal firewall included on Windows system. Programs and Feature is a utility used to install and remove applications. Homegroup is an alternative to a workgroup in Windows 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What utility is started with MSTSC.EXE?

A. Remote Desktop Connection

B. System Configuration Tool

C. Windows Defender

D. Duplex Manager

A

A. Remote Desktop Connection

Remote Desktop Connection is the MSTSC.EXE utility. System Configuration Tool is another name for MSConfig utility. Windows Defender is a Microsoft anti-malware tool. There is no utility called Duplex Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tool can be used to configure the size of the Security log file in Windows 7?

A. Task Manager

B. Performance

C. Event Viewer

D. MSConfig

A

C. Event Viewer

You can set maximum log size by right-clicking the log in the Event Viewer and selecting Properties. By default, when a log fills to its maximum size, old entries are deleted in FIFO order. Task Manager is used to manage processes running on the system. Performance is a tool used to monitor the performance of the system. MSConfig is used to manage the startup process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should be the first solution attempted after a blue screen of death (BSOD)?

A. Reinstall the operating system.

B. Reboot.

C. Restart in safe mode.

D. Run a system restore.

A

B. Reboot.

In the majority of cases, a reboot solves a blue screen of death. There is no need to attempt other approaches unless the blue screen reappears after rebooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not a built-in account in Windows 8.1 with HomeGroup enabled?

A. Administrator

B. Guest

C. Initial user

D. Power User

A

D. Power User

The four built-in accounts are Administrator, Guest, the initial user, and the HomeGroup user. Power User is not a built-in account in Windows 8.1 with HomeGroup enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is used instead of the Control Panel to make direct changes to the system?

A. System recovery

B. MSConfig

C. MSN

D. Regedit

A

D. Regedit

Regedit is used to change the configuration directly rather than using the Control Panel applets. System recovery is an option for reverting to an earlier operating system state. MSConfig is used to manage the startup process. MSN is a Microsoft website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Windows 10, which System Recovery Options menu choice is used to fix problems with startup, such as missing operating system files?

A. System Restore

B. Startup Repair

C. Windows Complete PC Restore

D. Windows Diagnostic Tool

A

B. Startup Repair

The Startup Repair choice is used to fix problems with startup, such as missing operating system files. System Restore requires and uses a saved image of the system from an earlier point in time. Windows Complete PC Restore and Windows Diagnostic Tool are not options in the Windows 10 recovery options menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term for electrical tripping that should not be happening but routinely does?

A. Exp tripping

B. Nuisance tripping

C. False negative

D. Faraday tripping

A

B. Nuisance tripping

Nuisance tripping is the phrase used if tripping occurs often and isn’t a result of a serious condition. A false negative describes an alert system that does not alert you when a security condition exists. Exp tripping and Faraday tripping are not valid electrical terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As you are disassembling a computer, what should you use to protect sensitive electronic devices from stray static charges?

A. Antistatic bags

B. Moist tissues

C. Denatured alcohol

D. Fuser boards

A

A. Antistatic bags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of backup stores only the information that has been changed since the last full or incremental backup?

A. Full

B. Copy

C. Incremental

D. Differential

A

C. Incremental

An incremental backup is a partial backup that stores only the information that has been changed since the last full or incremental backup. If a full backup were performed on a Sunday night, an incremental backup done on Monday night would contain only the information that changed since Sunday night. A full backup backs up everything. A copy backup backs up files without changing the status of the archive bit. A differential backup backs up everything that had changed since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What command is used in Windows 8 to remove all data from a volume?

A. Diskpart> clean

B. Diskpart> format

C. Diskpart> wipe

D. Diskpart> delete

A

A. Diskpart> clean

The Diskpart> clean command will remove all data from the volume. Diskpart> format formats the selected drive. Diskpart>wipe is not a valid Diskpart switch. Diskpart>delete deletes the selected dynamic disk from the disk list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Windows 10, which System Recovery Options menu choice requires and uses a saved image of the system from an earlier point in time?

A. System Restore

B. Startup Repair

C. Windows Complete PC Restore

D. Windows Diagnostic Tool

A

A. System Restore

System Restore requires and uses a saved image of the system from an earlier point in time. The Startup Repair choice is used to fix problems with startup, such as missing operating system files. Windows Complete PC Restore and Windows Diagnostic Tool are not options in the Windows 10 Recovery Options menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following commands can be used to find the MAC address of a Linux client connected to your Windows network?

A. ipconfig

B. ifconfig

C. idconfig

D. config

A

B. ifconfig

If you don’t know a workstation’s MAC address, use ipconfig /all to find it in the Windows-based world and ifconfig in Unix/Linux. In Linux, ldconfig creates the necessary links and cache to the most recent shared libraries found in the directories specified on the command line. In Windows, use the config command to change or check the configuration of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You do a full backup every Sunday and an incremental backup at 6 a.m. all the other days. Your system crashes at 9 a.m. on Thursday. How many restore operations will you need to do?

A. 1

B. 2

C. 5

D. 7

A

C. 5

You will need to restore the full backup first. After that, you will need to restore the incremental from Monday, Tuesday, Wednesday, and Thursday.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Retinal scanners and fingerprint scanners fall into the category of which type of devices?

A. Single sign-on

B. SSID

C. Biometric

D. Least privilege

A

C. Biometric

Biometric devices are those that authenticate an individual based on a physical characteristic. Single sign-in is authentication system that requires only a single logon to access all resources. SSID is a network name for a WLAN. Least privilege is a concept used to restrict what users can do to only what is required to do their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which NTFS permission allows the user to view the contents of a directory and to navigate to its subdirectories?

A. Write

B. Read

C. List Folder Contents

D. Modify

A

C. List Folder Contents

The List Folder Contents permission allows the user to view the contents of a directory and to navigate to its subdirectories. It does not grant the user access to the files in these directories unless that is specified in file permissions. Read allows reading of the contents. Write allows reading and writing, and Modify allows making changes and reading the content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When answering telephones and providing remote support, what is the most important skill you can have?

A. The ability to listen

B. Technical expertise

C. Multiple degrees

D. None of the above

A

A. The ability to listen

The most important skill you can have is the ability to listen. While technical expertise and multiple degrees are desirable, they are not the most important skill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which class of fire extinguisher is meant for flammable liquids?

A. Class A

B. Class B

C. Class C

D. None of the above

A

B. Class B

Three major classes of fire extinguishers are available, one for each type of flammable substance: A for wood and paper fires, B for flammable liquids, and C for electrical fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following tools provides comprehensive information about the system’s resource usage, hardware, and software environments?

A. Device Manager

B. MSINFO32

C. Dr. Watson

D. Task Manager

A

B. MSINFO32

MSINFO32 provides comprehensive information about the system’s resource usage, hardware, and software environments. Device Manager is used to configure and troubleshot device issues. Dr. Watson is an application debugger. Task Manager is used to manage processes running on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which switch can be used with IPCONFIG to relinquish an IPv4 address?

A. /RELEASE

B. /NEW

C. /IP

D. /RENEW

A

A. /RELEASE

The /RELEASE switch can be used with the IPCONFIG command to relinquish an IP address. The /RENEW switch is used to renew an IP address lease. The other options are not valid IPCONFIG switches.

22
Q

Which switch is used with DEFRAG to print the progress of the operation on the screen?

A. /U

B. /F

C. /V

D. /Z

A

A. /U

The /U switch is used with DEFRAG to print the progress of the operation on the screen. The other switches do not work with the / in Windows 7.

23
Q

Which switch is used with DEFRAG in Windows 7 to determine the degree of fragmentation only?

A. /A

B. /F

C. /V

D. /Z

A

A. /A

The /A switch is used with DEFRAG to analyze the state of fragmentation without running the operation. The other switches do not work with the / in Windows 7.

24
Q

Which of the following groups has read/write permission to the system?

A. Guests

B. Power Users

C. Administrators

D. Assistants

A

C. Administrators

Only members of the Administrators group have read and write permission to the system.

25
Q

Which of the following operating systems can participate in a HomeGroup?

A. Only Windows 7

B. Only Windows Vista and Windows 7

C. Only Windows 8, Windows Vista, and Windows 7

D. Only Windows 8.1, Windows Vista, and Windows 7

A

A. Only Windows 7

All computers participating in the HomeGroup must be running Windows 7, and the network can never grow beyond a limited size. While all editions of Windows 7 can join a HomeGroup, not all can create a HomeGroup.

26
Q

Which wireless technology is also known as WiMax?

A. 802.11a

B. Bluetooth

C. DSSS

D. 802.16

A

D. 802.16

802.16 or WiMax can transmit up to 10 miles and is often used to cover parts of a city. 802.11a is an amendment to the 802.11 WLAN standard. Bluetooth is a short-range wireless technology. DSSS is a modulation technique used in 802.11 WLAN.

27
Q

What command is used to establish a connection to a shared resource?

A. NET USE

B. TRACERT

C. NSLOOKUP

D. NET SHARE

A

A. NET USE

The NET USE command is used to establish network connections via a command prompt. For example, to connect to a shared network drive and make it your M drive, you would use the syntax net use m: \server\share. The TRACERT command displays the route taken to a destination. MSLOOKUP is used to troubleshoot DNS. NET SHARE is used to share a resource.

28
Q

Which SFC option reports any issues but makes no changes?

A. /Y

B. /VERIFYONLY

C. /ENABLE

D. /GO

A

B. /VERIFYONLY

The /VERIFYONLY option tells SFC to report any issues but make no changes. None of the other options is a valid SFC switch.

29
Q

You’ve been told to “destroy” a hard drive for one of the old servers. What are the platters made of?

A. Aluminum

B. Plastic

C. Glass

D. Rubber

A

A. Aluminum

While the platters resemble CDs or DVDs, they are not made of plastic and are much more difficult to destroy. They are made of an aluminum alloy.

30
Q

You are trying to find the MAC address of a host running Windows. You run ipconfig /all and see numerous entries. Which entry is the MAC address?

A. Link-local address

B. DHCP IAID address

C. Physical address

D. NetBIOS over TCP/IP address

A

C. Physical address

If you don’t know a workstation’s MAC address, use ipconfig /all to find it in the Windows-based world. It will appear as the physical address. A link local address is self-generated IPv6 address. A DHCP IAD is a part of a DHCPv6 address that identifies the interface on that system. A NetBIOS over TCP/IP address identifies the serves available on the device.

31
Q

As a weak form of security for your wireless SOHO network, which of the following can you attempt?

A. Turn off MAC filtering.

B. Turn off WPA2.

C. Turn off discovery.

D. Turn off the SSID broadcast.

A

D. Turn off the SSID broadcast.

One method of “protecting” the network that is often recommended is to turn off the SSID broadcast. The access point is still there and can still be accessed by those who know of it, but it prevents those who are just scanning from finding it. Turning off MAC filtering or WPA2 will reduce security. There is no option to turn off discovery of other devices.

32
Q

Serial ATA (SATA) drives typically include which utility for erasing the hard drive’s contents?

A. Wiper

B. Hdderase

C. Clearall

D. Format

A

B. Hdderase

SATA drives typically include the Hdderase utility for erasing hard drives. Format is a command used to format a drive. Wiper and Clearsall are not valid utility names.

33
Q

What is the minimum RAM requirement for Windows 10 64-bit?

A. 32 MB

B. 2 GB

C. 512 MB

D. 1 GB

A

B. 2 GB

The minimum RAM requirement for Windows 7 64-bit is 2 GB.

34
Q

Which type of image includes all the drives required for Windows to run as well as default system settings, programs, and files?

A. Development

B. Advanced

C. Renewal

D. Recovery

A

D. Recovery

A recovery image is an image that includes all the drives required for Windows to run as well as default system settings, programs, and files. The other options are not valid image types.

35
Q

Which technology is used to transmit electrical power over twisted-pair cabling?

A. Half duplex

B. Wake-on-LAN

C. QoS

D. PoE

A

D. PoE

The purpose of Power over Ethernet (PoE) is pretty much described in its name: electrical power is transmitted over twisted-pair Ethernet cable (along with data). Half duplex refers to transmission that allows sending and receiving but not at the same time. Wake-on-LAN is a capability of some NICs to be turned on remotely. QoS is used to prioritize traffic for delivery.

36
Q

You need to manually assign an IP address to a Windows 8.1 computer. What should you access to make this change?

A. The Network page from the Settings charm

B. The Network Adapters page from the PC Settings page

C. The Ethernet applet in the Control Panel

D. The Network Connections page from the Network And Sharing Center

A

D. The Network Connections page from the Network And Sharing Center

The Network Connections page is accessible from the Network And Sharing Center and shows all adapters on the computer. The Network page from the Settings charm allows you to turn sharing on or off, but it doesn’t give direct access to the network adapter. The PC Settings page does not have a Network Adapters page. The Control Panel does not include an Ethernet adapter.

37
Q

What is the ideal humidity level to strive for to protect equipment?

A. 80 percent

B. 60 percent

C. 50 percent

D. 35 percent

A

C. 50 percent

Care should be taken to maintain the relative humidity at around 50 percent. If it is too high, moisture starts to condense on the equipment. If it is too low, ESD can result.

38
Q

Where enabled, AutoRun will work on newly installed media by looking for and running which file?

A. start.exe

B. setup.bat

C. autorun.inf

D. win.exe

A

C. autorun.inf

Where enabled, AutoRun will work on newly installed media by looking for and running the autorun.inf file. The start.exe file is a software component of Sandboxie by Invincea. Setup.bat is a file sometimes used to install something. WinExe is software that allows administrator users to execute commands remotely.

39
Q

Many of the newer SOHO router solutions, and some of the personal firewall solutions on end-user workstations, close down which port (or ports) by default?

A. SNMP

B. ICMP

C. UDP

D. DNS

A

B. ICMP

Many of the newer SOHO router solutions (and some of the personal firewall solutions on end-user workstations) close down the ICMP ports by default. SNMP, DNS, and UDP are not usually closed by default.

40
Q

Which of the following settings are optional?

A. IP address

B. DNS server

C. Subnet mask

D. Default gateway

A

B. DNS server

D. Default gateway

While usually configured, the DNS server address and the default gateway are optional. You cannot configure an IP address without a subnet mask, however. The DNS server and the default gateway settings are important but optional.

41
Q

What is the minimum video requirement for Windows 10?

A. VGA

B. SuperVGA

C. XGA

D. LGA

A

B. SuperVGA

The minimum video requirement for Windows 10 is SuperVGA.

42
Q

Your network uses IPv6 addresses. Of the following choices, which is a valid IPv6 address?

A. 2000: 0021: 4137: 0000: 006C: 0000: 01E5

B. 2000: 0021: 0: 4137: 0: 6C: 0: 0: 1E5

C. 2000: 21: 4137: 0: 6C:: 1E5

D. 2000: 21: 4137:: 6C:: 1E5

A

C. 2000: 21: 4137: 0: 6C:: 1E5

An IPv6 address includes eight groups of four hexadecimal characters but can be shortened by eliminating leading zeros and using zero compression with a single set of double colons. Only seven sets of hexadecimal characters without double colons are not valid. Nine sets of characters are not valid. An IPv6 address cannot use two double colons. 2000: 0021: 4137: 0000: 006C: 0000: 01E5 is seven groups.. 2000: 0021: 0: 4137: 0: 6C: 0: 0: 1E5 is nine groups. 2000: 21: 4137:: 6C:: 1E5 has a double colon twice.

43
Q

Any software that is built into a hardware device is called _______:

A. Firmware

B. Driver

C. Stub

D. Module

A

A. Firmware

Any software that is built into a hardware device is called firmware. Firmware is typically in flash ROM and can be updated as newer versions become available. Drivers are used to communicate with a hardware device. A stub is a piece of code used to stand in for some other programming functionality. Modules are groups of code used in object-oriented programming.

44
Q

In the call center in which you are an administrator, operators handle a great deal of personal data. What can be used to prevent those in the aisles from reading the information on an operator’s screen?

A. Firewall

B. Screensaver

C. RSA

D. Privacy filter

A

D. Privacy filter

Privacy filters are either film or glass add-ons that are placed over a monitor that prevent the data on the screen from being readable when viewed from the sides. Firewalls are used to control traffic flows between networks. A screensaver is a dynamic screen use to prevent a burn-in on the monitor. RSA is an organization that creates encryption algorithms.

45
Q

Which of the following are software programs that have the ability to hide certain things from the operating system?

A. Leeches

B. Rootkits

C. Worms

D. Lesions

A

B. Rootkits

Rootkits are software programs that have the ability to hide certain things from the operating system. Worms are malware that can spread without help from humans. The other options are not software programs.

46
Q

What is the software that allows the virtual machines in a network to exist?

A. PoE

B. Hypervisor

C. QoS

D. WWAN

A

B. Hypervisor

The hypervisor is the software that allows the virtual machines to exist. PoE is a standard for power over Ethernet. QoS is used to prioritize traffic types. Wireless WAN (WWAN) refers to a form of wireless network.

47
Q

What is the term used for when an attacker attempts to acquire information about your network and system by talking to people in the organization?

A. Biometric

B. Social engineering

C. Trojan horse

D. Polymorphic

A

B. Social engineering

Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. Biometric systems allow for authentication based on a physical feature. A Trojan horse is malware disguised as a legitimate application. Polymorphic viruses are those that keep changing.

48
Q

What is WinPE?

A. An enterprise-only operating system

B. A pre-installation platform

C. A troubleshooting tool

D. A configuration utility

A

B. A pre-installation platform

Windows Preinstallation Environment (WinPE) was designed as a pre-installation platform to be used for deploying Microsoft Windows operating systems.

49
Q

Which of the following occurs when the breaker on a device such as a power supply, surge protector, or UPS turns off the device because it received a spike?

A. Flopping

B. Flapping

C. Tripping

D. Diving

A

C. Tripping

Electrical tripping occurs when the breaker on a device such as a power supply, surge protector, or UPS turns off the device because it received a spike. Flapping describes an interface that cycles back and forth between on and off. Flopping and diving are not terms used when describing surge protectors.

50
Q

What is the final step in the CompTIA troubleshooting model?

A. Test the theory to determine cause.

B. Identify the problem.

C. Verify full system functionality and, if applicable, implement preventive measures.

D. Document findings, actions, and outcomes.

A

D. Document findings, actions, and outcomes.

You should always document findings, actions, and outcomes after resolution. The order of steps is:

Identify the problem.

Establish a theory of probable cause.

Test the theory to determine cause.

Establish a plan of action to resolve the problem and implement the solution.

Verify full system functionality and if applicable implement preventative measures.

Document findings, actions, and outcomes.