SG: Assessment Test: 220-1002 Flashcards
Which Windows 10 feature replaces Internet Explorer?
A. Spotlight
B. Edge
C. Cortana
D. UWP
B. Edge
Although Internet Explorer is still installed in Windows 10, the Edge browser has largely replaced it’s functionality in Windows 10. The Spotlight feature will display a random wallpaper on the login screen from Bing.com. Cortana is a digital person assistant. The Universal Windows Platform (UWP) is a development platform.
What is the last step that should be performed when removing malware?
A. Identify the malware
B. Enable System Protection
C. Educate the end user
D. Schedule a scan
C. Educate the end user
The last step in the malware-removal process is the education of the end user to prevent future occurrences of infection. Identifying the malware is the first step in the malware-removal process. Enabling System Protection is one of the last steps, but it is not the last step. Scheduling a scan should be performed after you have remediated the malware.
Which tool will allow you to ready the operating system for imaging?
A. Microsoft Deployment Toolkit
B. Windows Assessment and Deployment Kit
C. sysprep.exe
D. Windows Imaging
C. sysprep.exe
The sysprep.exe utility will allow you to ready the operating system for imaging, by resetting specific information, such as the computer name. The Microsoft Deployment Toolkit can assist in creating the steps, but it calls on the sysprep tool. The Windows Assessment and Deployment Kit allows you to customize the Windows operating system for imaging, but it does not ready the operating system for imaging. Windows Imaging (WIM) is a file format to contain the image.
Which line would be used to comment Windows batch script code?
A. //comment
B. ‘comment
C. REM comment
D. # comment
C. REM comment
The line REM comment is used to comment Windows batch script code. The line //comment is used to comment JavaScript code. The line ‘comment is used to comment VBScript code. The line # comment is used to comment Bash script code and PowerShell code.
While installing a new network card, you accidentally broke a component off of the card. What should you do?
A. Explain that the card was broken out of the box
B. Install the card anyway
C. Inform the customer of the situation
D. Leave everything as-is until you can locate a new card
C. Inform the customer of the situation
You should be honest and inform the customer of the situation. Explaining that the card was broken out of the box is untruthful and deceptive. Installing the card anyway will cause new problems. Leaving everything as-is until you can locate a new card does not help the customer, since you’ve created a new dilemma.
You need to configure an IP address for Windows 7 to use in the event that the DHCP server is down. Which of the following will allow you to perform this task?
A. The Configuration tab for the network adapter properties
B. The Alternate Configuration tab of the IPv4 Properties dialog box
C. The Set Up a New Connection or Network wizard
D. The Remote tab of the System Properties dialog box
B. The Alternate Configuration tab of the IPv4 Properties dialog box
You can use the Alternate Configuration tab of the IPv4 Properties dialog box to configure an IP address for Windows 7 to use in the event the DHCP server is down. The Configuration tab for the network adapter properties will allow you change the driver and settings for the adapter itself. The Set Up a New Connection or Network wizard is used for the initial setup of the network. The Remote tab of the System Properties dialog box allows you to select Remote Assistance and Remote Desktop settings.
Which element of the boot process holds the information that instructs the operating system to load from a specific partition?
A. winload.exe
B. Bootmgr
C. winresume.exe
D. BCD
D. BCD
The Boot Configuration Data (BCD) holds the information that instructs the Windows Boot Manager (bootmgr) to load the operating system from a specific partition. Winload.exe loads the operating system kernel. Bootmgr is the initial bootstrap program that reads the BCD. Winresume.exe is used when resuming a previous session that has been suspended.
Which filesystem performs on-the-fly defragmentation?
A. FAT
B. NTFS
C. ext4
D. FAT32
C. ext4
The ext4 filesystem does not suffer from fragmentation, because it performs on-the-fly defragmentation. FAT is a 16-bit filesystem that suffers from fragmentation. NTFS is a journaled filesystem that suffers from fragmentation. FAT32 is a 32-bit filesystem that suffers from fragmentation.
You need to change a computer’s name and join it to a domain. Which tool should you use?
A. Device Manager
B. User Accounts
C. System Properties
D. Credential Manager
C. System Properties
The System Properties applet (sysdm.cpl) allows you to change a computer’s name and join the system to a domain. Device Manager is used to manage hardware resources. The User Accounts applet is used to manage user accounts. Credential Manager is used to manage stored credentials.
A server in your network has stopped responding to legitimate request from users due to a malicious influence. Which type of attack has occurred?
A. DoS
B. Keylogger
C. Botnet
D. Social engineering
A. DoS
A denial-of-service (DoS) attack is used to disrupt legitimate requests from being answered. A keylogger is used to steal credentials by recording keystrokes. A botnet is a group of computers that are under the control of a threat agent. Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization.
Which network protocol and port does RDP operate on?
A. TCP port 3389
B. TCP port 22
C. TCP port 23
D. TCP port 443
A. TCP port 3389
The Remote Desktop Protocol (RDP) operates on TCP port 3389. The SSH protocol operates on TCP port 22. The Telnet service operates on TCP port 23, and HTTPS operates on TCP port 443.
Which macOS feature is similar to Windows File Explorer?
A. Keychain
B. iCloud
C. Spotlight
D. Finder
D. Finder
The macOS Finder is the equivalent to Windows File Explorer. The Keychain is a password-management system for the operating system. iCloud is a cloud-based storage and backup service. Spotlight helps you find applications, documents, and other files.
Which network feature allows a computer to resume operation when it receives a special network signal?
A. WoL
B. PoE
C. QoS
D. DNS
A. WoL
Wake-on-LAN (WoL) allows a computer to awake from sleep when it receives a special WoL packet over the network. Power over Ethernet (PoE) is a standard of running power for a device over the network connection. Quality of Service (QoS) is a mechanism used by network protocols to give certain network protocols priority through the network. Domain Name System (DNS) is a naming system used by the Internet and Microsoft that translates domain names to IP addresses.
Which of the following screwdrivers has a splined head?
A. Flat-tipped
B. Phillips
C. Axial
D. Torx
D. Torx
A Torx screwdriver has a splined head, which is used for greater gripping of the screw. A flat-tipped screwdriver, as the name suggests, has a flat tip. A Phillips screwdriver has a cross, which is used for better gripping over a normal flat-tip screwdriver. An axial screwdriver is not a type of screwdriver.
Which feature allows you to create a simple local network, secured by a single password, to share files and printers with other Windows 7 clients?
A. Domain
B. Workgroup
C. Libraries
D. HomeGroup
D. HomeGroup
HomeGroup allows sharing of files and printers with other Windows 7 clients, secured with a single password. Domains require domain controllers and individual accounts. Workgroups require user accounts to be set up on each workstation in the network. Libraries are components of the Windows 7 operating system and HomeGroups that allow for the logical grouping of files.