Test 2 Flashcards

1
Q

T/F there is no undo feature in the registry editor

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What windows utility is used to control third party services installed on a system

A

Services console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows service console startup types include automatic (delayed start) automatic, manual, and

A

Disables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What windows utility can be used to find out what processes are launched at startup?

A

System Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Executive services are contained where?

A

Ntoskrnl.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shows only warning and error events intended for administrator

A

Administrator events log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Events triggered by windows components

A

System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Includes successful and unsuccessful logins to a user account

A

Security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Events when applications are installed

A

Setup log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of events are logged by Windows and can be viewed using the Event Viewer

A

Warning, information and Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a user logs into windows what registry key is created

A

HKEY_Current_User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A custom view filter in event viewer can be saved to a file using what extension

A

.evtx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Win32 security _____ provides logon to the system and other security functions including privileges for file access.

A

Subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Task manager tab that lists currently installed services with status

A

Services tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Displays how heavily network being used by a computer

A

Networking tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Provides graphs to show how system resources are used

A

Performance tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Shows all users currently logged on

A

User tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

After Registry is built in memory it is organized into five treelike structures called what?

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command can you run to view DirectX information

A

Dxdiag.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A computer assigns ___ level for determine is position in the queue for CPU resources

A

Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Use ______ to change the level of an open application

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A process is also called what?

A

Instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What two steps can be done to disable the Aero interface in Windows 7

A
  1. Right click the desktop and select personalize from the shortcut menu
  2. Scroll down to and click Windows 7 Basic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What performance counter tracks the percentage of time the hard drive is in use?

A

% Disk Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What Windows Utility is particularly useful in identifying software and hardware bottlenecks and provides the ability to monitor in real time?
Performance Monitor
26
If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed what utility should you open?
Misinfo32.exe
27
T/F the home editions of Windows 7 do not include the Local Security Policy or Print Management
True
28
Five files stored in the C:\\Windows\system32\____ colder are used to build registry. These five files are called ______
A. Config | B. Hives
29
What task can’t be performed by using task manager?
Restart a process
30
A windows utility to build customized console Windows
Microsoft Management Console
31
Shell subsystems operate in what mode?
User mode
32
The windows kernel includes what two main components
Executive services | HAL
33
Request made to the Win32 subsystem is called what?
Thread
34
When baking up the full registry use _______ to create a restore point
System protection
35
Can be set to launch a task or program at a future time including a start up
Task scheduler
36
Windows tool useful for troubleshooting hardware or network failures
Event Viewer
37
Uses a flash drive or secure digital memory card to boost hard drive performances
Windows ReadyBoost
38
Let’s you view the application and processes running on your computer
Task Manager
39
A database designed with a treelike structure contains configuration information for windows
Registry
40
The core of the OS that is responsible for interacting hardware
Kernel
41
The portion of an OS that relates to the user and to applications
Shell
42
A windows that consolidates several windows administrative tools that you can use to manage the local pc or other computers on the network
Computer Management
43
A program that runs in the background and is called by other programs to perform a background task
Service
44
A component of the kernel which makes up the layer closest to the hardware
HAL
45
T/F changes made to the registry are implemented after rebooting
False
46
Contains hardware, software and security data
HKEY_LOCAL_Machine
47
Used to identify each hardware device
HKEY_Current_Config
48
Used to determine which application opens
HKEY_Classes_Root
49
Contains data about all users
HKEY_Users
50
Contains data about the current user
HKEY_Current_User
51
Six steps of trouble shooting
1. Interview the user and back up data 2. Examine the system and make your best guess 3. test your theory 4. Plan your solution and then fix the problem 5. Verify the fix and take preventative action 6. Document what happened
52
Command prompt that opens memory diagnostics utility
Mdsched.exe
53
If you cannot boot from the hard drive boot from where?
The Windows setup DVD and click repair your computer
54
Can repair a damaged file
System file checker
55
What taskkill parameter forcefully kills a process
/f
56
What can you do if you suspect an application requires more privileges than the currently logged on account
Use the run as administrator shortcut menu option
57
Command returns the process identify
Tasklist command
58
Command uses the process ID to kill the process
Taskkill
59
A program associated with a file extension is called what?
Default program
60
Software that is designed and written to help solve problems
Expert system
61
What should be entered at a command prompt in order to scan all system files?
sfc/scannow
62
A cold boot is also known as what?
Hard boot
63
A hard boot initializes the processor and clears ____
Memory
64
To restart a PC without turning off the power
Soft boot aka Warm boot
65
Stores device drivers and information about secure boot on a nonvolatile RAM and in a hidden partition on the hard drive called ESP
Secure Boot UEFI
66
A bootable partition in a GPT HD used to boot the OS
EFI system partition
67
The program responsible for loading windows or any other OS.
Boot Manager.
68
Startup option moves system boot logs from the failing computer to another computer for evaluation.
Enable debugging
69
Windows RE command that repairs the BCD and boot sectors
Bootrec
70
Manually edit the BCD
Bcdedit
71
Repair a dual boot system
Bootsect
72
Enable networking
Wpeinit
73
Repair a drive
Chkdsk
74
What events can occur during BootMGR’s role in a startup?
Dual-boot menu is displayed | The settings in the BCD are read
75
What do you press to enable boot log in windows 8/10
Press 2 or F2
76
Enable safe mode within networking
Press 5 or F5
77
If you suspect corrupted system files are causing issues what command can be run to search for and replace the corrupted files
SFC/scannow
78
T/F a windows system repair disc can be created using the back up and restore utility
True
79
What are some of the responsibilities of the kernel during the startup process
Starts critical services Starts the Session Manager Activates the HAL
80
What Windows process is responsible for authenticating users
Lsass.exe
81
Windows 8 __________ feature automatically launched diagnostics if you restart your computer at least three times within a few minutes
Self healing
82
What is responsible for getting a system up and going and finding an OS to load
Startup BIOS
83
Where is the Windows system registry hive?
C:\Windows\System32\Config
84
When you enable boot logging all files used for the load are recorded in what file?
Ntbtlog.txt
85
A Windows 8 recovery drive is what?
Bootable USB flash drive
86
Tool that can be used to find and replace corrupted windows system files
SFC tool
87
What command can be used to check for file system errors?
Chkdsk/r
88
What is the file name given to the Windows kernel?
Ntoskrnl.exe
89
Open source alternative to Windows RE
Hiren’s BootCD PE
90
Check to see if it has reported a hardware failure
Event Viewer
91
What two protocols are used for remote access to a server using unencrypted and encrypted transmissions respectively?
Telnet | SSH
92
What functions as the name of a wireless network
SSID
93
Data is encrypted in a VPN using a technique called what?
Tunneling
94
The Remote Desktop application utilizes what port for remote access
3389
95
IPV6 uses how many bit addresses to identify a network?
128
96
The name that Identifies a network
Domain name
97
The letters after the period of a domain name are called what?
Top level domain
98
What devices handles access to another network for a client computer if it does not have a better option?
Default gateway
99
Reserved IP addresses
255. 255.255.255 0. 0.0.0 127. 0.0.1
100
Protocol that is used by a DNS server to find an IP address for a computer when the fully qualified domain name is know.
Domain name system protocol
101
Identifies a computer and the network to which it belongs to
Fully qualified domain name
102
Packets are delivered to a single node on a network when using what type of IPv6 address?
Unicast address
103
The name of a computer and can be used in place of its IP address
Host Name
104
How are IP Addresses available to the internet classified?
Public
105
What does WiFi stand for?
Wireless fidelity
106
Used to identify the network portion and the host portion of an IP address
Subnet mask
107
Manually and permanently signed to a computer or device
Static IP addresses
108
What TCP port is utilized by an SSH server listening for connections
22
109
Uses SSH encryption
Secure FTP
110
Allows one computer to take control of another computer
Remote Desktop Protocol
111
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term
Full duplex
112
What command can be used to flush the local DNS cache?
Ipconfig/flushdns
113
If a device does not receive an IP address from a DHCP server the device may resort to what kind of IP address?
APIPA
114
What protocol makes a connection, checks whether the data is received
TCP
115
Cell phone technology most popular in the US
CDM
116
What type of IP address is configured by a server when a device first initiates a connection to the network
Dynamic
117
What protocols are used to deliver mail messages
POP3 IMAP4 SMTP
118
DHCP server all computer receive their IP address from that router
SOHO Router
119
Verified an application
Digital signature
120
When a firewall opens a port because a computer behind the firewall initiates communication on another port
Port triggering
121
A command that can be used to display the TCP/IP configuration
Ipconfig
122
A protocol used by various client applications when the application needs to query a database
Lightweight Directory Access Protocol (LDAP)
123
Assigns an IP Address to a computer and. It first attempts to initiate a connection to the wireless
DHCP server
124
A group of computers on a peer to peer network that are sharing resources
Workgroup
125
Protocol used to pass login information to a remote computer and control that computer over a network
Secure shell
126
Designed to make it easier for users to connect their computers to a wireless network when a hard to remember ssid wnd security key are used
WPS
127
A security technique that uses encrypted data packets between a private network and a computer on the internet
Virtual private network
128
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the internet
NAT network address translation
129
Where is windows Re normally stored
On a hidden partition
130
T/F you should take ownership of a customers problem as if it’s your own
True
131
When working with a computer illiterate user over the phone what is not a good practice?
Tell the customer to put someone else on the line
132
Some older applications may not run properly on new windows versions what can you do?
Run the application in compatibility mode
133
What taskkill parameter forcefully kills a process?
/F
134
What is defined as a record of a call for help with a computer problem?
Ticket
135
When you cannot solve a problem you are working on what can you do?
Escalate the problem
136
What command will open the memory diagnostics utility?
Mdsched.exe
137
What should be done first before any changes are made to a system?
Backup data
138
Software that records the progress and resolution of a problem ticket
Call tracking
139
Another name for a stop error which happens when processes run in in kernel mode encounter a problem and windows must stop the system
Blue screen of death
140
A windows utility that protects the system files and keeps cache of current system files in case it needs to refresh a damaged file
System file checker
141
Assignment of a problem to someone higher in the support chain
Escalate
142
A tool that can be used to register components
Component services
143
A utility that is used to register component services
Regsvr32
144
What does HAL stand for?
Hardware Extraction Layer