Test C Flashcards
- Which of the following protects confidential information from being disclosed publicly?
A. Classification
B. Social engineering
C. RAS
D. Hard drive wipe
A. Classification
- Programs that run when Windows starts are stored in which of the following registry hives?
A. HKEY_CURRENT_CONFIG
B. HKEY_USERS
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
C. HKEY_LOCAL_MACHINE
- Typically, which of the following Windows tools enables you to configure a SOHO router?
A. Internet Explorer
B. Device Manager
C. Msconfig
D. Windows Explorer/
A. Internet Explorer
- Which of the following steps is performed first when running a clean install of Windows Professional on a new hard drive?
A. Format the partition.
B. Partition the drive.
C. Configure Windows settings.
D. Load RAID drivers.
D. Load RAID drivers.
- A co-worker maps a network drive for a user, but after rebooting, the drive is not seen within Explorer. Which of the following steps should be taken first to ensure that the drive remains mapped?
A. Check Reconnect at Logon when mapping the drive.
B. Select the drive letter needed to connect each time the co-worker logs on.
C. Check the Folder connection when mapping the drive.
D. Use the net use command instead.
A. Check Reconnect at Logon when mapping the drive.
- Based on the physical hardware address of the client’s network device, which of the following is commonly used to restrict access to a network?
A. WPA key
B. DHCP settings
C. MAC filtering
D. SSID broadcast
C. MAC filtering
- A print job fails to leave the print queue. Which of the following services may need to be restarted?
A. Print driver
B. Print Spooler
C. Network adapter
D. Printer
B. Print Spooler
- After installing a network application on a computer running Windows, the application does not communicate with the server. Which of the following actions should be taken first?
A. Uninstall the service pack. B. Reinstall the latest security update.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
D. Add the port number to the network firewall.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
- A customer reports a problem with a PC located in the same room as cement testing equipment. The room appears to have adequate cooling. The PC will boot up but locks up after 5– 10 minutes of use. After a lockup it will not reboot immediately. Which the following statements best describes the most likely problem?
A. The PC has a virus.
B. The PC air intakes are clogged with cement dust.
C. The CPU heat sink is underrated for the CPU.
D. The power supply is underrated for the electrical load of the PC.
B. The PC air intakes are clogged with cement dust.
- When accessing an NTFS shared resource, which of the following is required? (Select the two best answers.)
A. An active certificate
B. Correct user permissions C. Local user access
D. Correct share permissions
B. Correct user permissions
D. Correct share permissions
- Which of the following protocols should be set up in order to establish the most secure wireless connection?
A. WEP
B. WPA
C. WPA2
D. WAP
C. WPA2
- You are contracted to recover data from a laptop. In which two locations might you find irreplaceable, valuable data? (Select the two best answers.)
A. Ntoskrnl.exe
B. Windows folder
C. Pictures
D. E-mail E. System32 folder
C. Pictures
D. E-mail E. System32 folder
- Which utility enables auditing at the local level?
A. Group Policy
B. Local Security Policy
C. Active Directory Policy
D. Site Policy
B. Local Security Policy
- Which of the following statements best describes how NAT provides additional security for users who are behind a gateway?
A. It sets the hours that users can access the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
C. It limits users from accessing particular websites.
D. It blocks computers on the LAN from accessing computers on the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
- A customer plugs in a new USB barcode reader and the computer recognizes it, but the reader is unable to work properly. Which of the following statements best describes the most likely reason?
A. Faulty USB cable.
B. The operating system needs to be updated.
C. Software drivers need to be updated.
D. Too many USB devices are plugged in.
C. Software drivers need to be updated
- A customer has forgotten his password. He can no longer access his company e-mail address. Which of the following statements best describes the recommended course of action?
A. Tell him to remember his password.
B. Ask him for information confirming his identity.
C. Tell him that the password will be reset in several minutes.
D. Tell him that he shouldn’t forget his password.
B. Ask him for information confirming his identity.
- Which of the following can help locate a lost or stolen mobile device?
A. Passcode
B. Auto-erase
C. GPS
D. Encryption
C. GPS
- Which the following can be disabled to help prevent access to a wireless network?
A. MAC filtering
B. SSID broadcast
C. WPA2 passphrase
D. WPA key
B. SSID broadcast
- Which of the following commands sets the time on a workstation?
A. Time
B. Net time
C. Net timer
D. Net time set
A. Time
- In Windows, which utility enables you to select and copy characters from any font?
A. Language bar
B. Sticky keys
C. Control Panel > Fonts
D. Character map
D. Character map
- Which of the following can be described as removing the limitations of Apple iOS?
A. Rooting
B. Jailbreaking
C. VirusBarrier
D. Super-admin powers
B. Jailbreaking
- Which of the following built-in applets should be used by a technician to configure offline files and folders in Windows?
A. File History
B. USMT
C. Robust file copy
D. Sync Center
D. Sync Center
- Which language support for representing characters is built in to Windows?
A. Unicode
B. EBCDIC
C. ASCII
D. ITU-T
A. Unicode
- Which of the following is the best source of information about malicious software detected on a computer?
A. Operating system documentation
B. Anti-spyware software website
C. Readme.txt file included with the anti-spyware software installation
D. The user of a previously infected computer
B. Anti-spyware software website
- Viruses have been detected and removed on a customer’s computer several times during the course of several weeks. Which of the following methods will best help prevent future occurrences?
A. Delete temporary files, cookies, and browser history. B. Defragment the hard drive. C. Install antivirus software that uses manual updates.
D. Discuss safer web browsing habits with the customer.
D. Discuss safer web browsing habits with the customer.
- Which of the following sends an invitation by e-mail asking for help?
A. Remote Desktop Connection
B. Service call
C. VNC
D. Remote Assistance
D. Remote Assistance
- When performing a clean installation, which of the following is the default location for the system files of Windows?
A. C:\ Windows
B. C:\ Windows\ System32\ Config
C. C:\ System Files
D. C:\ Windows\ System32
D. C:\ Windows\ System32
- You are required to set up a remote backup solution for music and photos stored on an Android tablet. The files cannot be stored at any company location. Which technology should be used?
A. iCloud
B. Google Cloud Platform
C. Microsoft OneDrive
D. Local NAS device
B. Google Cloud Platform
- You need to copy and paste information from a web page, but you want to remove all formatting so that it can be pasted cleanly into Word. Which program should be used as an intermediary?
A. CMD
B. Excel
C. Notepad
D. MMC
C. Notepad
- A computer is responding slowly and the Windows Task Manager shows that spoolsv.exe is using 95 percent of system resources. Which of the following is most likely the cause of this problem?
A. Windows Update is running.
B. A virus infection has occurred.
C. Hyper-Threading has been disabled.
D. The printing subsystem.
D. The printing subsystem.
- Which of the following descriptions classifies the protocol IMAP?
A. A protocol that allows real-time messaging
B. An e-mail protocol that allows users to selectively download messages
C. An e-mail protocol that allows users to send but not to receive messages
D. A protocol that authenticates users who are sending e-mail
B. An e-mail protocol that allows users to selectively download messages
- Which of the following is a user-defined collection of folders that acts as logical representations of the user’s content?
A. Metadata
B. My Documents
C. Libraries
D. Public Documents
C. Libraries
- From which of the following locations could you disable a hardware component on a laptop in Windows?
A. Device Manager
B. Task Manager
C. Computer
D. Services console
A. Device Manager
- A customer’s Android smartphone was running a third-party VNC application that froze. Which of the following statements best describes the recommended course of action? (Select the two best answers.)
A. You should initiate a soft reset
B. You should initiate a hard reset
C. You should pull the battery D. You should remove the memory card
A. You should initiate a soft reset
C. You should pull the battery
- Which command-line tool in Windows finds all of the unsigned drivers in the computer?
A. sigverif
B. dxdiag
C. ping
D. msconfig
A. sigverif
- Users are reporting to you that a Windows feature asks them for confirmation before running certain applications or when making system changes. What is the name of this Windows feature, and where should you direct users to turn the functionality off?
A. Security Center; it can be turned off in the services MMC snap in.
B. User Account Control; it can be turned off under Security in the Control Panel. C. Windows Firewall; it can be turned off under System Properties.
D. User Account Control; it can be turned off under User Accounts in the Control Panel.
D. User Account Control; it can be turned off under User Accounts in the Control Panel.
- James is a LAN administrator in charge of printers. Which of the following should he check first when a Windows user is trying to print a document and gets the error message “Print sub-system not available”?
A. Correct printer driver is installed.
B. Printer has been added.
C. Spooler service is running. D. Printer has power from the jack.
C. Spooler service is running.
- Your manager’s Windows computer locks up after the graphical user interface starts to load up. However, the computer will boot in Safe Mode. When you access the Event Viewer, you see an entry that states that a driver failed. Which of the following steps will help you further diagnose the problem?
A. Running sigverif.
B. Enabling Boot Logging. Then, in Safe Mode analyze the ntbtlog.txt file.
C. Disabling Driver Signature Enforcement.
D. Accessing Debugging Mode.
B. Enabling Boot Logging.
- Which of the following commands is used to fix errors on the system disk?
A. Xcopy
B. Tracert /w
C. Diskpart
D. Chkdsk /F
D. Chkdsk /F
- A new program is crashing and causing the computer to lock up. What is the best location to check for further information about the cause of the crash?
A. System log
B. Security log
C. Application log
D. Setup log
C. Application log
- Which of the following versions of Windows 7 can run in Windows XP mode, join domains, and utilize BitLocker encryption?
A. Starter
B. Home Premium
C. Ultimate
D. Professional
C. Ultimate
- A customer’s computer is running Windows Vista Ultimate 32-bit. The customer would like to upgrade to Windows 7. Which of the following operating systems can the customer’s computer be upgraded directly to?
A. Windows 7 Professional 32-bit
B. Windows 7 Professional 64-bit
C. Windows 7 Ultimate 32-bit D. Windows 7 Ultimate 64-bit
C. Windows 7 Ultimate 32-bit
- You are tasked with copying the entire Users folder and subfolders to a new computer. Which command should be used?
A. Xcopy
B. Expand
C. Copy
D. Move
A. Xcopy
- You are tasked with disabling services from starting up on a Windows PC. Which command should be run to bring up a window to make these changes?
A. SFC
B. Chkdsk
C. Msconfig
D. gpupate
C. Msconfig
- Which of the following is an executable that checks the integrity of an NTFS volume in Windows?
A. SFC
B. Autochk.exe
C. Convert
D. Regedit.exe.
B. Autochk.exe
- In Windows, which of the following folders might be stored in a hidden partition by default?
A. \Boot
B. \Windows
C. \Documents and Settings D. \Bootmgr
A. \Boot
- One of your customers has a wireless network that is secured with WEP. The customer wants to improve data encryption so that the transmission of data has less of a chance of being compromised. Which of the following statements best describes the recommended course of action?
A. Reconfigure the network to use WPA2.
B. Use MAC address filtering.
C. Modify the WEP key every week.
D. Disable the SSID broadcast.
A. Reconfigure the network to use WPA2.
- Which of the following commands is used to display hidden files?
A. dir /o
B. dir /a
C. dir /d
D. dir /?
B. dir /a
- After installing a new video card, the PC loads Windows and continuously reboots. Which of the following statements best describes the first course of action?
A. Go into Safe Mode.
B. Run Chkdsk.
C. Run Msconfig.
D. Check the System log.
A. Go into Safe Mode.
- You get a complaint from a customer that her computer started receiving pop-up ads after she installed an application within Windows. Which of the following statements best describes the most likely problem?
A. The installed application contains a logic bomb.
B. The installed application is a worm.
C. The installed application is a Trojan horse.
D. The installed application included adware.
D. The installed application included adware.
- Which of the following statements best describes how to prepare a mobile device in case it is stolen or lost? (Select the three best answers.)
A. Disable Bluetooth. B. Configure remote backup. C. Enable Wi-Fi encryption. D. Enable GPS. E. Enable Wi-Fi tethering. F. Configure a pattern screenlock.
B. Configure remote backup.
D. Enable GPS.
F. Configure a pattern screenlock.
- Two co-workers share the same file inside a folder. User A works on the file, makes changes, and saves the file. User B then works on the file, makes changes, and saves the file as well. The next time User A attempts to open the file, she receives an access denied error. Which of the following statements best describes the most likely cause of this error message?
A. The NTFS permissions were changed on the file to allow only execute.
B. The file was set with the system and hidden attributes.
C. The file was set to read only by the Accounts Receivable administrator.
D. The file was moved before being modified and then moved back to the share.
D. The file was moved before being modified and then moved back to the share.
- In Windows, which of the following commands should be used to verify that a previous system shutdown was completed successfully?
A. ipconfig
B. chkntfs
C. chkdsk
D. sfc
B. chkntfs
- Logging on to a network with a username and password is an example of which of the following?
A. Authorization
B. Identification
C. Identity proofing
D. Authentication
D. Authentication
- Your boss asks you to install a new wireless network. Which of the following should be implemented on the wireless network to help prevent unauthorized access? (Select the two best answers.)
A. Install additional wireless access points. B. Use WPA2. C. Broadcast the SSID. D. Use MAC filtering. E. Install a signal booster
B. Use WPA2.
D. Use MAC filtering.
- In Windows, which of the following enables administrators to perform administrative tasks that integrate scripts over a network?
A. PowerShell
B. Command Prompt
C. Command-line
D. Windows Script Host
A. PowerShell
57. Which of the following tools should be used in Windows to migrate user files and settings for multiple computers? A. xcopy B. Windows Easy Transfer C. User State Migration Tool D. Profile Transfer Tool
C. User State Migration Tool
- Which of the following can be used to kill a running process?
A. Task Manager
B. Computer Management
C. Control Panel
D. Tasklist
A. Task Manager
- Which of the following file systems is suited specifically for USB flash drives?
A. FAT32
B. exFAT
C. NTFS
D. FAT16
B. exFAT
- A program has been detected collecting information such as the computer name and IP address and sending that information to a specific IP address on the Internet. Which kind of threat is this an example of?
A. Spyware
B. Virus
C. Rootkit
D. Spam
A. Spyware
- You are required to stop the Windows Firewall service. Which of the following statements best describes how to accomplish this? (Select 3)
A. In Performance Monitor B. with the net stop mpssvc command. C. Within Msconfig D. Within the Task Manager E. In System Information F. With Gpedit.exe G. In Services.msc
B. with the net stop mpssvc command.
D. Within the Task Manager
G. In Services.msc
- You spill a chemical on your hands. It does not appear to be life threatening. Which of the following statements best describes the recommended course of action?
A. Call 911.
B. Call the building super.
C. Consult the MSDS for the chemical.
D. Ignore it.
C. Consult the MSDS for the chemical.
- Which command allows a user to change a file’s permissions in Linux?
A. chown
B. passwd
C. ls
D. chmod
D. chmod
- While you are working on a computer at a customer’s home, the customer informs you that he needs to leave for about 10 mins and that his 8 yr old can help you with anything if you need it. Which of the following statements best describes the recommended course of action?
A. Tell the customer to get back home ASAP.
B. Tell the customer that you are not responsible for the child.
C. Tell the customer that na adult must be home while you work.
D. Tell the customer that the child must be removed.
C. Tell the customer that na adult must be home while you work.
- You want a cloud provider that will offer you service which is quickly scalable. Which of the following should be requested when you contact potential cloud providers?
A. Measured services
B. Rapid Elasticity
C. On demand service
D. Resource pooling
B. Rapid Elasticity
- A customer experiences a server crash. When you arrive, the manager is upset about this problem. Which of the following statements best describes the recommended course of action?
A. Stay calm and do the job as efficiently as possible.
B. Take the customer out for a cup of coffee.
C. Avoid the customer and get the job done quickly.
D. Refer the customer to your supervisor.
A. Stay calm and do the job as efficiently as possible.
- Which type of web server is designed to resolve host names to IP addresses?
A. DHCP server
B. Web server
C. Proxy server
D. DNS server
D. DNS server
As you are servicing a manager’s PC at your company, you run across a list of names of employees who are supposedly about to be let go from the company. Some of these people are co-workers. Which of the following statements best describes the recommended course of action?
A. Turn the sheet over.
B. Act as if you never saw the list
C. In secret, tell everyone who was on the list.
D. Yell at the manager for having that list out.
B. Act as if you never saw the list
- Which OS X utility is most like Windows’ “end task” feature?
A. Time Machine
B. Finder
C. Taskkill
D. Force quit
D. Force quit
- Which of the following statements best describes how to reduce the chance of ESD? (select 3 best).
A. Use an antistatic strap. B. Use an antistatic mat. C. Raise the temperature. D. Raise the humidity E. Lower the humidity F. Work in a carpeted area.
A. Use an antistatic strap.
B. Use an antistatic mat.
D. Raise the humidity
- While you explain a technical concept to a customer, which of the following statements best describes the recommended course of action?
A. Recommended a training class.
B. Sit next to the customer
C. Use acronyms so that the customer feels comfortable about your knowledge.
D. Tell the customer to read the manual.
B. Sit next to the customer
You are viewing the contents of an ipconfig/all on a windows computer. You see the name abcminerals.com toward the beginning of the results. Which type of network is this Windows computer most likely a part of?
A. Workgroup
B. Homegroup
C. Domain
D. VPN
C. Domain
- Which of the following should be used to clean a monitor’s screen when you are not sure how to do so?
A. Isopropyl alcohol
B. Mild detergent
C Water
D. Boric acid
C Water
- You are required to register an ActiveX control in the Command Prompt. Which utility should be used?
A. Regsvr32
B. Regedit.exe
C. MMC
D. MSTSC
A. Regsvr32
- You have an Intel Core i7 system with a UEFI-enabled motherboard. Which of the following types of hard drive partitioning schemes should be selected?
A. MBR
B. FAT32
C. Dynamic drive
D. GPT
D. GPT
Which of the following statements best describes the recommended course of action to take prior to attempting to remediate infected Windows systems of malware?
A. Educate the end user.
B. Disable System Restore.
C. Schedule scans.
D. Update the anti-malware program.
B. Disable System Restore.
- A customer’s mobile device cannot connect to Wi-Fi. According to the customer it was working fine yesterday. Troubleshoot? Which of the following statements best describes the recommended course of action? (select 3)
A. Power cycle the device. B. Re-pair the device. C. Hard reset. D. Forget the WiFi network. E. Check if the correct SSID was entered. F. Change the IP address.
A. Power cycle the device.
D. Forget the WiFi network.
E. Check if the correct SSID was entered.
Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes wher the user returns back to the office?
A. Sync Center
B. Windows Aero
C. Windows Defender
D. HomeGroup
A. Sync Center
A help desk phone support technician is finding it difficult to understand the customer due to a heavy accent. Which of the following statements best describes the first course of action the tech should take to help the customer resolve the problem?
A. Repeat the problem back to the customer.
B. Have the customer call back at a later time.
C. Ask the customer to not speak with an accent.
D. Tell the customer that her accent is preventing the problem from being solved.
A. Repeat the problem back to the customer.
You are troubleshooting a networking problem with Windows and you can’t seem to fix it using the typical Windows GUI-based troubleshooting tools or with the Command Prompt. You have identified the problem, and established a theory of probable cause (in fact you are on you fourth theory). Which tool should be used to troubleshoot the problem and in what stage of the troubleshooting process should you do so?
A. Regsvr32–Conduct external or internal research based on symptoms.
B. Gpupdate–Perform backups before making any changes.
C. USMT–Verify full system functionality.
D. Regedit–Test the theory to determine cause.
E. Boot Camp–Document findings, actions and outcomes.
D. Regedit–Test the theory to determine cause.