Test 2 Flashcards

1
Q

T/F there is no undo feature in the registry editor

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What windows utility is used to control third party services installed on a system

A

Services console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows service console startup types include automatic (delayed start) automatic, manual, and

A

Disables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What windows utility can be used to find out what processes are launched at startup?

A

System Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Executive services are contained where?

A

Ntoskrnl.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shows only warning and error events intended for administrator

A

Administrator events log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Events triggered by windows components

A

System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Includes successful and unsuccessful logins to a user account

A

Security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Events when applications are installed

A

Setup log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of events are logged by Windows and can be viewed using the Event Viewer

A

Warning, information and Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a user logs into windows what registry key is created

A

HKEY_Current_User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A custom view filter in event viewer can be saved to a file using what extension

A

.evtx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Win32 security _____ provides logon to the system and other security functions including privileges for file access.

A

Subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Task manager tab that lists currently installed services with status

A

Services tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Displays how heavily network being used by a computer

A

Networking tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Provides graphs to show how system resources are used

A

Performance tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Shows all users currently logged on

A

User tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

After Registry is built in memory it is organized into five treelike structures called what?

A

Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command can you run to view DirectX information

A

Dxdiag.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A computer assigns ___ level for determine is position in the queue for CPU resources

A

Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Use ______ to change the level of an open application

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A process is also called what?

A

Instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What two steps can be done to disable the Aero interface in Windows 7

A
  1. Right click the desktop and select personalize from the shortcut menu
  2. Scroll down to and click Windows 7 Basic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What performance counter tracks the percentage of time the hard drive is in use?

A

% Disk Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What Windows Utility is particularly useful in identifying software and hardware bottlenecks and provides the ability to monitor in real time?

A

Performance Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

If you need to find the model and speed of the installed processor and hard drive and the amount of memory installed what utility should you open?

A

Misinfo32.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

T/F the home editions of Windows 7 do not include the Local Security Policy or Print Management

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Five files stored in the C:\Windows\system32\____ colder are used to build registry. These five files are called ______

A

A. Config

B. Hives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What task can’t be performed by using task manager?

A

Restart a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A windows utility to build customized console Windows

A

Microsoft Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Shell subsystems operate in what mode?

A

User mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The windows kernel includes what two main components

A

Executive services

HAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Request made to the Win32 subsystem is called what?

A

Thread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When baking up the full registry use _______ to create a restore point

A

System protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Can be set to launch a task or program at a future time including a start up

A

Task scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Windows tool useful for troubleshooting hardware or network failures

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Uses a flash drive or secure digital memory card to boost hard drive performances

A

Windows ReadyBoost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Let’s you view the application and processes running on your computer

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A database designed with a treelike structure contains configuration information for windows

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The core of the OS that is responsible for interacting hardware

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The portion of an OS that relates to the user and to applications

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A windows that consolidates several windows administrative tools that you can use to manage the local pc or other computers on the network

A

Computer Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A program that runs in the background and is called by other programs to perform a background task

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A component of the kernel which makes up the layer closest to the hardware

A

HAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

T/F changes made to the registry are implemented after rebooting

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Contains hardware, software and security data

A

HKEY_LOCAL_Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Used to identify each hardware device

A

HKEY_Current_Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Used to determine which application opens

A

HKEY_Classes_Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Contains data about all users

A

HKEY_Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Contains data about the current user

A

HKEY_Current_User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Six steps of trouble shooting

A
  1. Interview the user and back up data
  2. Examine the system and make your best guess
  3. test your theory
  4. Plan your solution and then fix the problem
  5. Verify the fix and take preventative action
  6. Document what happened
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Command prompt that opens memory diagnostics utility

A

Mdsched.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

If you cannot boot from the hard drive boot from where?

A

The Windows setup DVD and click repair your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Can repair a damaged file

A

System file checker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What taskkill parameter forcefully kills a process

A

/f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What can you do if you suspect an application requires more privileges than the currently logged on account

A

Use the run as administrator shortcut menu option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Command returns the process identify

A

Tasklist command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Command uses the process ID to kill the process

A

Taskkill

59
Q

A program associated with a file extension is called what?

A

Default program

60
Q

Software that is designed and written to help solve problems

A

Expert system

61
Q

What should be entered at a command prompt in order to scan all system files?

A

sfc/scannow

62
Q

A cold boot is also known as what?

A

Hard boot

63
Q

A hard boot initializes the processor and clears ____

A

Memory

64
Q

To restart a PC without turning off the power

A

Soft boot aka Warm boot

65
Q

Stores device drivers and information about secure boot on a nonvolatile RAM and in a hidden partition on the hard drive called ESP

A

Secure Boot UEFI

66
Q

A bootable partition in a GPT HD used to boot the OS

A

EFI system partition

67
Q

The program responsible for loading windows or any other OS.

A

Boot Manager.

68
Q

Startup option moves system boot logs from the failing computer to another computer for evaluation.

A

Enable debugging

69
Q

Windows RE command that repairs the BCD and boot sectors

A

Bootrec

70
Q

Manually edit the BCD

A

Bcdedit

71
Q

Repair a dual boot system

A

Bootsect

72
Q

Enable networking

A

Wpeinit

73
Q

Repair a drive

A

Chkdsk

74
Q

What events can occur during BootMGR’s role in a startup?

A

Dual-boot menu is displayed

The settings in the BCD are read

75
Q

What do you press to enable boot log in windows 8/10

A

Press 2 or F2

76
Q

Enable safe mode within networking

A

Press 5 or F5

77
Q

If you suspect corrupted system files are causing issues what command can be run to search for and replace the corrupted files

A

SFC/scannow

78
Q

T/F a windows system repair disc can be created using the back up and restore utility

A

True

79
Q

What are some of the responsibilities of the kernel during the startup process

A

Starts critical services
Starts the Session Manager
Activates the HAL

80
Q

What Windows process is responsible for authenticating users

A

Lsass.exe

81
Q

Windows 8 __________ feature automatically launched diagnostics if you restart your computer at least three times within a few minutes

A

Self healing

82
Q

What is responsible for getting a system up and going and finding an OS to load

A

Startup BIOS

83
Q

Where is the Windows system registry hive?

A

C:\Windows\System32\Config

84
Q

When you enable boot logging all files used for the load are recorded in what file?

A

Ntbtlog.txt

85
Q

A Windows 8 recovery drive is what?

A

Bootable USB flash drive

86
Q

Tool that can be used to find and replace corrupted windows system files

A

SFC tool

87
Q

What command can be used to check for file system errors?

A

Chkdsk/r

88
Q

What is the file name given to the Windows kernel?

A

Ntoskrnl.exe

89
Q

Open source alternative to Windows RE

A

Hiren’s BootCD PE

90
Q

Check to see if it has reported a hardware failure

A

Event Viewer

91
Q

What two protocols are used for remote access to a server using unencrypted and encrypted transmissions respectively?

A

Telnet

SSH

92
Q

What functions as the name of a wireless network

A

SSID

93
Q

Data is encrypted in a VPN using a technique called what?

A

Tunneling

94
Q

The Remote Desktop application utilizes what port for remote access

A

3389

95
Q

IPV6 uses how many bit addresses to identify a network?

A

128

96
Q

The name that Identifies a network

A

Domain name

97
Q

The letters after the period of a domain name are called what?

A

Top level domain

98
Q

What devices handles access to another network for a client computer if it does not have a better option?

A

Default gateway

99
Q

Reserved IP addresses

A
  1. 255.255.255
  2. 0.0.0
  3. 0.0.1
100
Q

Protocol that is used by a DNS server to find an IP address for a computer when the fully qualified domain name is know.

A

Domain name system protocol

101
Q

Identifies a computer and the network to which it belongs to

A

Fully qualified domain name

102
Q

Packets are delivered to a single node on a network when using what type of IPv6 address?

A

Unicast address

103
Q

The name of a computer and can be used in place of its IP address

A

Host Name

104
Q

How are IP Addresses available to the internet classified?

A

Public

105
Q

What does WiFi stand for?

A

Wireless fidelity

106
Q

Used to identify the network portion and the host portion of an IP address

A

Subnet mask

107
Q

Manually and permanently signed to a computer or device

A

Static IP addresses

108
Q

What TCP port is utilized by an SSH server listening for connections

A

22

109
Q

Uses SSH encryption

A

Secure FTP

110
Q

Allows one computer to take control of another computer

A

Remote Desktop Protocol

111
Q

The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term

A

Full duplex

112
Q

What command can be used to flush the local DNS cache?

A

Ipconfig/flushdns

113
Q

If a device does not receive an IP address from a DHCP server the device may resort to what kind of IP address?

A

APIPA

114
Q

What protocol makes a connection, checks whether the data is received

A

TCP

115
Q

Cell phone technology most popular in the US

A

CDM

116
Q

What type of IP address is configured by a server when a device first initiates a connection to the network

A

Dynamic

117
Q

What protocols are used to deliver mail messages

A

POP3
IMAP4
SMTP

118
Q

DHCP server all computer receive their IP address from that router

A

SOHO Router

119
Q

Verified an application

A

Digital signature

120
Q

When a firewall opens a port because a computer behind the firewall initiates communication on another port

A

Port triggering

121
Q

A command that can be used to display the TCP/IP configuration

A

Ipconfig

122
Q

A protocol used by various client applications when the application needs to query a database

A

Lightweight Directory Access Protocol (LDAP)

123
Q

Assigns an IP Address to a computer and. It first attempts to initiate a connection to the wireless

A

DHCP server

124
Q

A group of computers on a peer to peer network that are sharing resources

A

Workgroup

125
Q

Protocol used to pass login information to a remote computer and control that computer over a network

A

Secure shell

126
Q

Designed to make it easier for users to connect their computers to a wireless network when a hard to remember ssid wnd security key are used

A

WPS

127
Q

A security technique that uses encrypted data packets between a private network and a computer on the internet

A

Virtual private network

128
Q

A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the internet

A

NAT network address translation

129
Q

Where is windows Re normally stored

A

On a hidden partition

130
Q

T/F you should take ownership of a customers problem as if it’s your own

A

True

131
Q

When working with a computer illiterate user over the phone what is not a good practice?

A

Tell the customer to put someone else on the line

132
Q

Some older applications may not run properly on new windows versions what can you do?

A

Run the application in compatibility mode

133
Q

What taskkill parameter forcefully kills a process?

A

/F

134
Q

What is defined as a record of a call for help with a computer problem?

A

Ticket

135
Q

When you cannot solve a problem you are working on what can you do?

A

Escalate the problem

136
Q

What command will open the memory diagnostics utility?

A

Mdsched.exe

137
Q

What should be done first before any changes are made to a system?

A

Backup data

138
Q

Software that records the progress and resolution of a problem ticket

A

Call tracking

139
Q

Another name for a stop error which happens when processes run in in kernel mode encounter a problem and windows must stop the system

A

Blue screen of death

140
Q

A windows utility that protects the system files and keeps cache of current system files in case it needs to refresh a damaged file

A

System file checker

141
Q

Assignment of a problem to someone higher in the support chain

A

Escalate

142
Q

A tool that can be used to register components

A

Component services

143
Q

A utility that is used to register component services

A

Regsvr32

144
Q

What does HAL stand for?

A

Hardware Extraction Layer