SG: Assessment Test: 220-1002 Flashcards

1
Q

Which Windows 10 feature replaces Internet Explorer?

A. Spotlight

B. Edge

C. Cortana

D. UWP

A

B. Edge

Although Internet Explorer is still installed in Windows 10, the Edge browser has largely replaced it’s functionality in Windows 10. The Spotlight feature will display a random wallpaper on the login screen from Bing.com. Cortana is a digital person assistant. The Universal Windows Platform (UWP) is a development platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the last step that should be performed when removing malware?

A. Identify the malware

B. Enable System Protection

C. Educate the end user

D. Schedule a scan

A

C. Educate the end user

The last step in the malware-removal process is the education of the end user to prevent future occurrences of infection. Identifying the malware is the first step in the malware-removal process. Enabling System Protection is one of the last steps, but it is not the last step. Scheduling a scan should be performed after you have remediated the malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which tool will allow you to ready the operating system for imaging?

A. Microsoft Deployment Toolkit

B. Windows Assessment and Deployment Kit

C. sysprep.exe

D. Windows Imaging

A

C. sysprep.exe

The sysprep.exe utility will allow you to ready the operating system for imaging, by resetting specific information, such as the computer name. The Microsoft Deployment Toolkit can assist in creating the steps, but it calls on the sysprep tool. The Windows Assessment and Deployment Kit allows you to customize the Windows operating system for imaging, but it does not ready the operating system for imaging. Windows Imaging (WIM) is a file format to contain the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which line would be used to comment Windows batch script code?

A. //comment

B. ‘comment

C. REM comment

D. # comment

A

C. REM comment

The line REM comment is used to comment Windows batch script code. The line //comment is used to comment JavaScript code. The line ‘comment is used to comment VBScript code. The line # comment is used to comment Bash script code and PowerShell code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While installing a new network card, you accidentally broke a component off of the card. What should you do?

A. Explain that the card was broken out of the box

B. Install the card anyway

C. Inform the customer of the situation

D. Leave everything as-is until you can locate a new card

A

C. Inform the customer of the situation

You should be honest and inform the customer of the situation. Explaining that the card was broken out of the box is untruthful and deceptive. Installing the card anyway will cause new problems. Leaving everything as-is until you can locate a new card does not help the customer, since you’ve created a new dilemma.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You need to configure an IP address for Windows 7 to use in the event that the DHCP server is down. Which of the following will allow you to perform this task?

A. The Configuration tab for the network adapter properties

B. The Alternate Configuration tab of the IPv4 Properties dialog box

C. The Set Up a New Connection or Network wizard

D. The Remote tab of the System Properties dialog box

A

B. The Alternate Configuration tab of the IPv4 Properties dialog box

You can use the Alternate Configuration tab of the IPv4 Properties dialog box to configure an IP address for Windows 7 to use in the event the DHCP server is down. The Configuration tab for the network adapter properties will allow you change the driver and settings for the adapter itself. The Set Up a New Connection or Network wizard is used for the initial setup of the network. The Remote tab of the System Properties dialog box allows you to select Remote Assistance and Remote Desktop settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which element of the boot process holds the information that instructs the operating system to load from a specific partition?

A. winload.exe

B. Bootmgr

C. winresume.exe

D. BCD

A

D. BCD

The Boot Configuration Data (BCD) holds the information that instructs the Windows Boot Manager (bootmgr) to load the operating system from a specific partition. Winload.exe loads the operating system kernel. Bootmgr is the initial bootstrap program that reads the BCD. Winresume.exe is used when resuming a previous session that has been suspended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which filesystem performs on-the-fly defragmentation?

A. FAT

B. NTFS

C. ext4

D. FAT32

A

C. ext4

The ext4 filesystem does not suffer from fragmentation, because it performs on-the-fly defragmentation. FAT is a 16-bit filesystem that suffers from fragmentation. NTFS is a journaled filesystem that suffers from fragmentation. FAT32 is a 32-bit filesystem that suffers from fragmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to change a computer’s name and join it to a domain. Which tool should you use?

A. Device Manager

B. User Accounts

C. System Properties

D. Credential Manager

A

C. System Properties

The System Properties applet (sysdm.cpl) allows you to change a computer’s name and join the system to a domain. Device Manager is used to manage hardware resources. The User Accounts applet is used to manage user accounts. Credential Manager is used to manage stored credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A server in your network has stopped responding to legitimate request from users due to a malicious influence. Which type of attack has occurred?

A. DoS

B. Keylogger

C. Botnet

D. Social engineering

A

A. DoS

A denial-of-service (DoS) attack is used to disrupt legitimate requests from being answered. A keylogger is used to steal credentials by recording keystrokes. A botnet is a group of computers that are under the control of a threat agent. Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which network protocol and port does RDP operate on?

A. TCP port 3389

B. TCP port 22

C. TCP port 23

D. TCP port 443

A

A. TCP port 3389

The Remote Desktop Protocol (RDP) operates on TCP port 3389. The SSH protocol operates on TCP port 22. The Telnet service operates on TCP port 23, and HTTPS operates on TCP port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which macOS feature is similar to Windows File Explorer?

A. Keychain

B. iCloud

C. Spotlight

D. Finder

A

D. Finder

The macOS Finder is the equivalent to Windows File Explorer. The Keychain is a password-management system for the operating system. iCloud is a cloud-based storage and backup service. Spotlight helps you find applications, documents, and other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which network feature allows a computer to resume operation when it receives a special network signal?

A. WoL

B. PoE

C. QoS

D. DNS

A

A. WoL

Wake-on-LAN (WoL) allows a computer to awake from sleep when it receives a special WoL packet over the network. Power over Ethernet (PoE) is a standard of running power for a device over the network connection. Quality of Service (QoS) is a mechanism used by network protocols to give certain network protocols priority through the network. Domain Name System (DNS) is a naming system used by the Internet and Microsoft that translates domain names to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following screwdrivers has a splined head?

A. Flat-tipped

B. Phillips

C. Axial

D. Torx

A

D. Torx

A Torx screwdriver has a splined head, which is used for greater gripping of the screw. A flat-tipped screwdriver, as the name suggests, has a flat tip. A Phillips screwdriver has a cross, which is used for better gripping over a normal flat-tip screwdriver. An axial screwdriver is not a type of screwdriver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which feature allows you to create a simple local network, secured by a single password, to share files and printers with other Windows 7 clients?

A. Domain

B. Workgroup

C. Libraries

D. HomeGroup

A

D. HomeGroup

HomeGroup allows sharing of files and printers with other Windows 7 clients, secured with a single password. Domains require domain controllers and individual accounts. Workgroups require user accounts to be set up on each workstation in the network. Libraries are components of the Windows 7 operating system and HomeGroups that allow for the logical grouping of files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have found that several employees are using the organization’s email system to solicit personal business. What policy would define the abuse of this system?

A. Acceptable use policy (AUP)

B. Mobile device management (MDM)

C. Data loss prevention (DLP)

D. Email filtering

A

A. Acceptable use policy (AUP)

The acceptable use policy (AUP) defines the appropriate use of email and other organizational systems and resources. Mobile device management (MDM) helps an administrator control mobile devices so that data is not exposed. Data loss prevention (DLP) is used to prevent personal and confidential information from being emailed outside of the organization. Email filtering filters email coming into the organization.

17
Q

While working on a user’s system, you discover a sticky note attached to the bottom of the keyboard that has their username and password written on it. The user is not around, and you need to verify that the network connection is working. What should you do?

A. Log in, verify access, and then log out

B. Log in and stay logged in when you are finished

C. Text the user

D. Log in and change the user’s password

A

C. Text the user

You should text the user and let them know that you need to verify their network connection. You should not log in as another person, with their username and password. You should not log in and stay logged in when you are finished. You should definitely not log in and change the user’s password.

18
Q

Your mobile device is suffering from an intermittent wireless connection. What is recommended to alleviate signal drops?

A. Shorten the SSID

B. Use the 5 GHz band

C. Reduce power on the WAP

D. Use the 2.4 GHz band

A

B. Use the 5 GHz band

By using the 5 GHz wireless band, you can limit the amount of interference from external devices, such as microwave ovens and Bluetooth devices. Shortening the SSID will have no effect on intermittent signal drops, nor will reducing power on the WAP. Using the 2.4 GHz band will probably make signal drops worse.

19
Q

Which edition of Microsoft Windows 10 does not include Cortana?

A. Home

B. Pro

C. Education

D. Enterprise

A

C. Education

For privacy issues, Windows 10 Education does not include Cortana, since this edition is used for academic organizations. Windows 10 Home, Pro, and Enterprise all contain Cortana.

20
Q

Where can you find updates for Apple operating systems?

A. iTunes

B. App Store

C. Keychain

D. Mission Control

A

B. App Store

The App Store is where you can find updates for the Apple operating system. iTunes is used to purchase and download music, videos, and other content. The Keychain is used to store credentials on behalf of the user. Mission Control is used to view all the currently running applications.

21
Q

You need to manage a remote Windows operating system. Which tool can you use to perform this task?

A. msinfo32

B. mstsc

C. msconfig

D. telnet

A

B. mstsc

The Microsoft Terminal Services Client (mstsc) is used to allow remote connections to Window operating systems. Msinfo32 is used to collect information from the Windows operating system. Msconfig is used to configure startup and services. Telnet is not used to connect to Windows; it is normally used with Linux/UNIX.

22
Q

Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsuccessful to this point. What type of attack are you most likely experiencing?

A. Dictionary password attack

B. Rootkit attack

C. Worm attack

D. TCP/IP hijacking

A

A. Dictionary password attack

A dictionary password attack occurs when a user account is repeatedly attacked using a variety of passwords. A rootkit attack would not be immediately seen and would not show as an ongoing effort. A worm attack would not be visible as an ongoing attempt to gain access. TCP/IP hijacking is a form of a man-in-the-middle attack.

23
Q

Which regulation is enforced by Health & Human Services (HHS) to regulate the privacy of patient information related to health services?

A. SOX

B. FERPA

C. HIPAA

D. GLBA

A

C. HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) affects health-care providers and providers that process health records. The Sarbanes-Oxley Act (SOX) is enforced by the Securities and Exchange Commission (SEC) and regulates sensitive financial information and financial records. The Family Educational Rights and Privacy Act (FERPA) affects education providers and organizations that process student records. The Gramm-Leach-Bliley Act (GLBA) affects providers of financial services and safeguards customer information.

24
Q

Which RAID system requires three or more disks to provide fault tolerance?

A. Mirroring

B. Striping

C. RAID-1

D. Striping with parity

A

D. Striping with parity

Striping with parity, also known as RAID-5, requires three or more disks and provides fault tolerance. Mirroring, also known as RAID-1, requires only two disks. Striping, also known as RAID-0, provides no fault tolerance.

25
Q

Which Windows Update branch will allow you to install preview releases of updates for Windows 10?

A. Semi-Annual Channel

B. Semi-Annual Channel (Targeted)

C. Long-Term Servicing Channel

D. Insider Program

A

D. Insider Program

The Insider Program allows for the installation of brand new features before they are publicly released. The Semi-Annual Channel is normally delayed by three to four months. The Semi-Annual Channel (Targeted) branch will install updates as they are released to the general public. The Long-Term Servicing Channel never installs new features during the life of the version of Windows.

26
Q

Which operating system is a cloud-based operating system?

A. Linux

B. Android

C. Windows 10

D. Chrome OS

A

D. Chrome OS

The Google Chrome OS is a true cloud-based operating system, because all the data is stored in the cloud. Cloud-based operating systems require an Internet connection to access information. Android and Windows 10 use cloud storage but are not considered cloud-based operating systems. Linux is strictly a workstation operating system.

27
Q

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation?

A. Rename default accounts

B. Configure single sign-on

C. Disable Windows Update

D. Disable Action Center pop-ups

A

A. Rename default accounts

Renaming the default accounts on a new Windows computer is the easiest way to secure the operating system. Configuring single sign-on should only be performed if a resource is required that only uses SSO as authentication. Disabling Windows Update will do the opposite of securing the operating system. Disabling Action Center pop-ups will also do the opposite of securing the operating system.

28
Q

A user wants to ensure that all contacts from her mobile device are copied onto her computer before migrating to a new device. Which of the following processes can accomplish this?

A. Mirroring

B. Synchronization

C. Calling each contact

D. Attaching the contacts to an email

A

B. Synchronization

Synchronization can copy all contacts, programs, email messages, pictures, music, and videos between a mobile device and a computer. Mirroring is a term reserved for when devices replicate themselves to similar devices. Calling the contacts won’t achieve the desired result, and emailing contacts is inefficient and does not immediately result in placing the contacts on the computer.

29
Q

Which critical system generally requires third-party tools to troubleshoot performance problems?

A. RAM

B. CPU

C. Graphics

D. Network

A

C. Graphics

Graphics cards usually require third-party tools to diagnosis performance problems. RAM problems, CPU problems, and network problems can be diagnosed inside the operating system from Task Manager.

30
Q

Which type of software licensing agreement usually provides free trial software, with the expectation that you will pay for it if you decide to keep it?

A. Freeware

B. Shareware

C. Open-source

D. Single-user

A

B. Shareware

Shareware often provides a free trial of a program, with the expectation that you will pay for it if you keep it. Freeware and open-source applications are generally totally free, although the developers may ask for donations. Single-user software is licensed for one user.

31
Q

Which of the following are good measures to take to help to prevent ESD? (Choose two.)

A. Decrease the humidity

B. Tie back long hair

C. Take off your shoes

D. Perform self-grounding

A

B. Tie back long hair

D. Perform self-grounding

Long hair or neckties can very easily hold a static charge and damage computer parts. In addition, if you don’t have an ESD strap or mat, you should perform self-grounding before you touch sensitive computer equipment. Lower humidity actually increases the risk of ESD. Taking off your shoes will not limit ESD.

32
Q

You need to check the status of your User Account Control (UAC) and Windows Activation on Windows 8/8.1. Which tool will display both of these?

A. User Settings

B. Action Center

C. Firewall with Advanced Security

D. Windows Update

A

B. Action Center

The Action Center will allow you to see the status of both the UAC and Windows Activation. User Settings will show only the UAC status. Firewall with Advanced Security and Windows Update will not show either of these.

33
Q

Which of the following will accomplish a specific task for the user?

A. Driver

B. Application

C. Operating system

D. Filesystem

A

B. Application

An application is written to perform a specific task for the user, such as word processing and data analysis. Drivers allow for the operating system to communicate with the hardware. The operating system and the filesystem assist in running applications.

34
Q

With which mobile operating system is typically associated with the .ipa extension?

A. Android

B. iOS

C. Windows Phone

D. BlackBerry OS

A

B. iOS

The .ipa file extension is for iOS App Store package files. Android apps have an extension of .apk. The Windows Phone OS is typically associated with the .xap extension. Blackberry OS uses .jad. The latter of the two phone types were not discussed in detail in this book.