Test C Flashcards

1
Q
  1. Which of the following protects confidential information from being disclosed publicly?

A. Classification
B. Social engineering
C. RAS
D. Hard drive wipe

A

A. Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Programs that run when Windows starts are stored in which of the following registry hives?

A. HKEY_CURRENT_CONFIG
B. HKEY_USERS
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT

A

C. HKEY_LOCAL_MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Typically, which of the following Windows tools enables you to configure a SOHO router?

A. Internet Explorer
B. Device Manager
C. Msconfig
D. Windows Explorer/

A

A. Internet Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following steps is performed first when running a clean install of Windows Professional on a new hard drive?

A. Format the partition.
B. Partition the drive.
C. Configure Windows settings.
D. Load RAID drivers.

A

D. Load RAID drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A co-worker maps a network drive for a user, but after rebooting, the drive is not seen within Explorer. Which of the following steps should be taken first to ensure that the drive remains mapped?

A. Check Reconnect at Logon when mapping the drive.
B. Select the drive letter needed to connect each time the co-worker logs on.
C. Check the Folder connection when mapping the drive.
D. Use the net use command instead.

A

A. Check Reconnect at Logon when mapping the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Based on the physical hardware address of the client’s network device, which of the following is commonly used to restrict access to a network?

A. WPA key
B. DHCP settings
C. MAC filtering
D. SSID broadcast

A

C. MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A print job fails to leave the print queue. Which of the following services may need to be restarted?

A. Print driver
B. Print Spooler
C. Network adapter
D. Printer

A

B. Print Spooler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. After installing a network application on a computer running Windows, the application does not communicate with the server. Which of the following actions should be taken first?

A. Uninstall the service pack. B. Reinstall the latest security update.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
D. Add the port number to the network firewall.

A

C. Add the port number and name of the service to the Exceptions list of Windows Firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A customer reports a problem with a PC located in the same room as cement testing equipment. The room appears to have adequate cooling. The PC will boot up but locks up after 5– 10 minutes of use. After a lockup it will not reboot immediately. Which the following statements best describes the most likely problem?

A. The PC has a virus.
B. The PC air intakes are clogged with cement dust.
C. The CPU heat sink is underrated for the CPU.
D. The power supply is underrated for the electrical load of the PC.

A

B. The PC air intakes are clogged with cement dust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. When accessing an NTFS shared resource, which of the following is required? (Select the two best answers.)

A. An active certificate
B. Correct user permissions C. Local user access
D. Correct share permissions

A

B. Correct user permissions

D. Correct share permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following protocols should be set up in order to establish the most secure wireless connection?

A. WEP
B. WPA
C. WPA2
D. WAP

A

C. WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. You are contracted to recover data from a laptop. In which two locations might you find irreplaceable, valuable data? (Select the two best answers.)

A. Ntoskrnl.exe
B. Windows folder
C. Pictures
D. E-mail E. System32 folder

A

C. Pictures

D. E-mail E. System32 folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which utility enables auditing at the local level?

A. Group Policy
B. Local Security Policy
C. Active Directory Policy
D. Site Policy

A

B. Local Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following statements best describes how NAT provides additional security for users who are behind a gateway?

A. It sets the hours that users can access the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
C. It limits users from accessing particular websites.
D. It blocks computers on the LAN from accessing computers on the Internet.

A

B. It blocks computers on the Internet from accessing computers on the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A customer plugs in a new USB barcode reader and the computer recognizes it, but the reader is unable to work properly. Which of the following statements best describes the most likely reason?

A. Faulty USB cable.
B. The operating system needs to be updated.
C. Software drivers need to be updated.
D. Too many USB devices are plugged in.

A

C. Software drivers need to be updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A customer has forgotten his password. He can no longer access his company e-mail address. Which of the following statements best describes the recommended course of action?

A. Tell him to remember his password.
B. Ask him for information confirming his identity.
C. Tell him that the password will be reset in several minutes.
D. Tell him that he shouldn’t forget his password.

A

B. Ask him for information confirming his identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Which of the following can help locate a lost or stolen mobile device?

A. Passcode
B. Auto-erase
C. GPS
D. Encryption

A

C. GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Which the following can be disabled to help prevent access to a wireless network?

A. MAC filtering
B. SSID broadcast
C. WPA2 passphrase
D. WPA key

A

B. SSID broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Which of the following commands sets the time on a workstation?

A. Time
B. Net time
C. Net timer
D. Net time set

A

A. Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. In Windows, which utility enables you to select and copy characters from any font?

A. Language bar
B. Sticky keys
C. Control Panel > Fonts
D. Character map

A

D. Character map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which of the following can be described as removing the limitations of Apple iOS?

A. Rooting
B. Jailbreaking
C. VirusBarrier
D. Super-admin powers

A

B. Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Which of the following built-in applets should be used by a technician to configure offline files and folders in Windows?

A. File History
B. USMT
C. Robust file copy
D. Sync Center

A

D. Sync Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Which language support for representing characters is built in to Windows?

A. Unicode
B. EBCDIC
C. ASCII
D. ITU-T

A

A. Unicode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Which of the following is the best source of information about malicious software detected on a computer?

A. Operating system documentation
B. Anti-spyware software website
C. Readme.txt file included with the anti-spyware software installation
D. The user of a previously infected computer

A

B. Anti-spyware software website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Viruses have been detected and removed on a customer’s computer several times during the course of several weeks. Which of the following methods will best help prevent future occurrences?

A. Delete temporary files, cookies, and browser history. B. Defragment the hard drive. C. Install antivirus software that uses manual updates.
D. Discuss safer web browsing habits with the customer.

A

D. Discuss safer web browsing habits with the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Which of the following sends an invitation by e-mail asking for help?

A. Remote Desktop Connection
B. Service call
C. VNC
D. Remote Assistance

A

D. Remote Assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. When performing a clean installation, which of the following is the default location for the system files of Windows?

A. C:\ Windows
B. C:\ Windows\ System32\ Config
C. C:\ System Files
D. C:\ Windows\ System32

A

D. C:\ Windows\ System32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. You are required to set up a remote backup solution for music and photos stored on an Android tablet. The files cannot be stored at any company location. Which technology should be used?

A. iCloud
B. Google Cloud Platform
C. Microsoft OneDrive
D. Local NAS device

A

B. Google Cloud Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. You need to copy and paste information from a web page, but you want to remove all formatting so that it can be pasted cleanly into Word. Which program should be used as an intermediary?

A. CMD
B. Excel
C. Notepad
D. MMC

A

C. Notepad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. A computer is responding slowly and the Windows Task Manager shows that spoolsv.exe is using 95 percent of system resources. Which of the following is most likely the cause of this problem?

A. Windows Update is running.
B. A virus infection has occurred.
C. Hyper-Threading has been disabled.
D. The printing subsystem.

A

D. The printing subsystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Which of the following descriptions classifies the protocol IMAP?

A. A protocol that allows real-time messaging
B. An e-mail protocol that allows users to selectively download messages
C. An e-mail protocol that allows users to send but not to receive messages
D. A protocol that authenticates users who are sending e-mail

A

B. An e-mail protocol that allows users to selectively download messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Which of the following is a user-defined collection of folders that acts as logical representations of the user’s content?

A. Metadata
B. My Documents
C. Libraries
D. Public Documents

A

C. Libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. From which of the following locations could you disable a hardware component on a laptop in Windows?

A. Device Manager
B. Task Manager
C. Computer
D. Services console

A

A. Device Manager

34
Q
  1. A customer’s Android smartphone was running a third-party VNC application that froze. Which of the following statements best describes the recommended course of action? (Select the two best answers.)

A. You should initiate a soft reset
B. You should initiate a hard reset
C. You should pull the battery D. You should remove the memory card

A

A. You should initiate a soft reset

C. You should pull the battery

35
Q
  1. Which command-line tool in Windows finds all of the unsigned drivers in the computer?

A. sigverif
B. dxdiag
C. ping
D. msconfig

A

A. sigverif

36
Q
  1. Users are reporting to you that a Windows feature asks them for confirmation before running certain applications or when making system changes. What is the name of this Windows feature, and where should you direct users to turn the functionality off?

A. Security Center; it can be turned off in the services MMC snap in.
B. User Account Control; it can be turned off under Security in the Control Panel. C. Windows Firewall; it can be turned off under System Properties.
D. User Account Control; it can be turned off under User Accounts in the Control Panel.

A

D. User Account Control; it can be turned off under User Accounts in the Control Panel.

37
Q
  1. James is a LAN administrator in charge of printers. Which of the following should he check first when a Windows user is trying to print a document and gets the error message “Print sub-system not available”?

A. Correct printer driver is installed.
B. Printer has been added.
C. Spooler service is running. D. Printer has power from the jack.

A

C. Spooler service is running.

38
Q
  1. Your manager’s Windows computer locks up after the graphical user interface starts to load up. However, the computer will boot in Safe Mode. When you access the Event Viewer, you see an entry that states that a driver failed. Which of the following steps will help you further diagnose the problem?

A. Running sigverif.
B. Enabling Boot Logging. Then, in Safe Mode analyze the ntbtlog.txt file.
C. Disabling Driver Signature Enforcement.
D. Accessing Debugging Mode.

A

B. Enabling Boot Logging.

39
Q
  1. Which of the following commands is used to fix errors on the system disk?

A. Xcopy
B. Tracert /w
C. Diskpart
D. Chkdsk /F

A

D. Chkdsk /F

40
Q
  1. A new program is crashing and causing the computer to lock up. What is the best location to check for further information about the cause of the crash?

A. System log
B. Security log
C. Application log
D. Setup log

A

C. Application log

41
Q
  1. Which of the following versions of Windows 7 can run in Windows XP mode, join domains, and utilize BitLocker encryption?

A. Starter
B. Home Premium
C. Ultimate
D. Professional

A

C. Ultimate

42
Q
  1. A customer’s computer is running Windows Vista Ultimate 32-bit. The customer would like to upgrade to Windows 7. Which of the following operating systems can the customer’s computer be upgraded directly to?

A. Windows 7 Professional 32-bit
B. Windows 7 Professional 64-bit
C. Windows 7 Ultimate 32-bit D. Windows 7 Ultimate 64-bit

A

C. Windows 7 Ultimate 32-bit

43
Q
  1. You are tasked with copying the entire Users folder and subfolders to a new computer. Which command should be used?

A. Xcopy
B. Expand
C. Copy
D. Move

A

A. Xcopy

44
Q
  1. You are tasked with disabling services from starting up on a Windows PC. Which command should be run to bring up a window to make these changes?

A. SFC
B. Chkdsk
C. Msconfig
D. gpupate

A

C. Msconfig

45
Q
  1. Which of the following is an executable that checks the integrity of an NTFS volume in Windows?

A. SFC
B. Autochk.exe
C. Convert
D. Regedit.exe.

A

B. Autochk.exe

46
Q
  1. In Windows, which of the following folders might be stored in a hidden partition by default?

A. \Boot
B. \Windows
C. \Documents and Settings D. \Bootmgr

A

A. \Boot

47
Q
  1. One of your customers has a wireless network that is secured with WEP. The customer wants to improve data encryption so that the transmission of data has less of a chance of being compromised. Which of the following statements best describes the recommended course of action?

A. Reconfigure the network to use WPA2.
B. Use MAC address filtering.
C. Modify the WEP key every week.
D. Disable the SSID broadcast.

A

A. Reconfigure the network to use WPA2.

48
Q
  1. Which of the following commands is used to display hidden files?

A. dir /o
B. dir /a
C. dir /d
D. dir /?

A

B. dir /a

49
Q
  1. After installing a new video card, the PC loads Windows and continuously reboots. Which of the following statements best describes the first course of action?

A. Go into Safe Mode.
B. Run Chkdsk.
C. Run Msconfig.
D. Check the System log.

A

A. Go into Safe Mode.

50
Q
  1. You get a complaint from a customer that her computer started receiving pop-up ads after she installed an application within Windows. Which of the following statements best describes the most likely problem?

A. The installed application contains a logic bomb.
B. The installed application is a worm.
C. The installed application is a Trojan horse.
D. The installed application included adware.

A

D. The installed application included adware.

51
Q
  1. Which of the following statements best describes how to prepare a mobile device in case it is stolen or lost? (Select the three best answers.)
A. Disable Bluetooth. 
B. Configure remote backup. 
C. Enable Wi-Fi encryption. 
D. Enable GPS. 
E. Enable Wi-Fi tethering.
F. Configure a pattern screenlock.
A

B. Configure remote backup.
D. Enable GPS.
F. Configure a pattern screenlock.

52
Q
  1. Two co-workers share the same file inside a folder. User A works on the file, makes changes, and saves the file. User B then works on the file, makes changes, and saves the file as well. The next time User A attempts to open the file, she receives an access denied error. Which of the following statements best describes the most likely cause of this error message?

A. The NTFS permissions were changed on the file to allow only execute.
B. The file was set with the system and hidden attributes.
C. The file was set to read only by the Accounts Receivable administrator.
D. The file was moved before being modified and then moved back to the share.

A

D. The file was moved before being modified and then moved back to the share.

53
Q
  1. In Windows, which of the following commands should be used to verify that a previous system shutdown was completed successfully?

A. ipconfig
B. chkntfs
C. chkdsk
D. sfc

A

B. chkntfs

54
Q
  1. Logging on to a network with a username and password is an example of which of the following?

A. Authorization
B. Identification
C. Identity proofing
D. Authentication

A

D. Authentication

55
Q
  1. Your boss asks you to install a new wireless network. Which of the following should be implemented on the wireless network to help prevent unauthorized access? (Select the two best answers.)
A. Install additional wireless access points. 
B. Use WPA2. 
C. Broadcast the SSID. 
D. Use MAC filtering. 
E. Install a signal booster
A

B. Use WPA2.

D. Use MAC filtering.

56
Q
  1. In Windows, which of the following enables administrators to perform administrative tasks that integrate scripts over a network?

A. PowerShell
B. Command Prompt
C. Command-line
D. Windows Script Host

A

A. PowerShell

57
Q
57. Which of the following tools should be used in Windows to migrate user files and settings for multiple computers? 
A. xcopy 
B. Windows Easy Transfer 
C. User State Migration Tool 
D. Profile Transfer Tool
A

C. User State Migration Tool

58
Q
  1. Which of the following can be used to kill a running process?

A. Task Manager
B. Computer Management
C. Control Panel
D. Tasklist

A

A. Task Manager

59
Q
  1. Which of the following file systems is suited specifically for USB flash drives?

A. FAT32
B. exFAT
C. NTFS
D. FAT16

A

B. exFAT

60
Q
  1. A program has been detected collecting information such as the computer name and IP address and sending that information to a specific IP address on the Internet. Which kind of threat is this an example of?

A. Spyware
B. Virus
C. Rootkit
D. Spam

A

A. Spyware

61
Q
  1. You are required to stop the Windows Firewall service. Which of the following statements best describes how to accomplish this? (Select 3)
A. In Performance Monitor
B. with the net stop mpssvc command.
C. Within Msconfig
D. Within the Task Manager
E. In System Information
F. With Gpedit.exe
G. In Services.msc
A

B. with the net stop mpssvc command.
D. Within the Task Manager
G. In Services.msc

62
Q
  1. You spill a chemical on your hands. It does not appear to be life threatening. Which of the following statements best describes the recommended course of action?

A. Call 911.
B. Call the building super.
C. Consult the MSDS for the chemical.
D. Ignore it.

A

C. Consult the MSDS for the chemical.

63
Q
  1. Which command allows a user to change a file’s permissions in Linux?

A. chown
B. passwd
C. ls
D. chmod

A

D. chmod

64
Q
  1. While you are working on a computer at a customer’s home, the customer informs you that he needs to leave for about 10 mins and that his 8 yr old can help you with anything if you need it. Which of the following statements best describes the recommended course of action?

A. Tell the customer to get back home ASAP.
B. Tell the customer that you are not responsible for the child.
C. Tell the customer that na adult must be home while you work.
D. Tell the customer that the child must be removed.

A

C. Tell the customer that na adult must be home while you work.

65
Q
  1. You want a cloud provider that will offer you service which is quickly scalable. Which of the following should be requested when you contact potential cloud providers?

A. Measured services
B. Rapid Elasticity
C. On demand service
D. Resource pooling

A

B. Rapid Elasticity

66
Q
  1. A customer experiences a server crash. When you arrive, the manager is upset about this problem. Which of the following statements best describes the recommended course of action?

A. Stay calm and do the job as efficiently as possible.
B. Take the customer out for a cup of coffee.
C. Avoid the customer and get the job done quickly.
D. Refer the customer to your supervisor.

A

A. Stay calm and do the job as efficiently as possible.

67
Q
  1. Which type of web server is designed to resolve host names to IP addresses?

A. DHCP server
B. Web server
C. Proxy server
D. DNS server

A

D. DNS server

68
Q

As you are servicing a manager’s PC at your company, you run across a list of names of employees who are supposedly about to be let go from the company. Some of these people are co-workers. Which of the following statements best describes the recommended course of action?

A. Turn the sheet over.
B. Act as if you never saw the list
C. In secret, tell everyone who was on the list.
D. Yell at the manager for having that list out.

A

B. Act as if you never saw the list

69
Q
  1. Which OS X utility is most like Windows’ “end task” feature?

A. Time Machine
B. Finder
C. Taskkill
D. Force quit

A

D. Force quit

70
Q
  1. Which of the following statements best describes how to reduce the chance of ESD? (select 3 best).
A. Use an antistatic strap.
B. Use an antistatic mat.
C. Raise the temperature.
D. Raise the humidity
E. Lower the humidity
F. Work in a carpeted area.
A

A. Use an antistatic strap.
B. Use an antistatic mat.
D. Raise the humidity

71
Q
  1. While you explain a technical concept to a customer, which of the following statements best describes the recommended course of action?

A. Recommended a training class.
B. Sit next to the customer
C. Use acronyms so that the customer feels comfortable about your knowledge.
D. Tell the customer to read the manual.

A

B. Sit next to the customer

72
Q

You are viewing the contents of an ipconfig/all on a windows computer. You see the name abcminerals.com toward the beginning of the results. Which type of network is this Windows computer most likely a part of?

A. Workgroup
B. Homegroup
C. Domain
D. VPN

A

C. Domain

73
Q
  1. Which of the following should be used to clean a monitor’s screen when you are not sure how to do so?

A. Isopropyl alcohol
B. Mild detergent
C Water
D. Boric acid

A

C Water

74
Q
  1. You are required to register an ActiveX control in the Command Prompt. Which utility should be used?

A. Regsvr32
B. Regedit.exe
C. MMC
D. MSTSC

A

A. Regsvr32

75
Q
  1. You have an Intel Core i7 system with a UEFI-enabled motherboard. Which of the following types of hard drive partitioning schemes should be selected?

A. MBR
B. FAT32
C. Dynamic drive
D. GPT

A

D. GPT

76
Q

Which of the following statements best describes the recommended course of action to take prior to attempting to remediate infected Windows systems of malware?

A. Educate the end user.
B. Disable System Restore.
C. Schedule scans.
D. Update the anti-malware program.

A

B. Disable System Restore.

77
Q
  1. A customer’s mobile device cannot connect to Wi-Fi. According to the customer it was working fine yesterday. Troubleshoot? Which of the following statements best describes the recommended course of action? (select 3)
A. Power cycle the device.
B. Re-pair the device.
C. Hard reset.
D. Forget the WiFi network.
E. Check if the correct SSID was entered.
F. Change the IP address.
A

A. Power cycle the device.
D. Forget the WiFi network.
E. Check if the correct SSID was entered.

78
Q

Which of the following utilities enables a Windows 7 user to edit a file offline, and then automatically update the changes wher the user returns back to the office?

A. Sync Center
B. Windows Aero
C. Windows Defender
D. HomeGroup

A

A. Sync Center

79
Q

A help desk phone support technician is finding it difficult to understand the customer due to a heavy accent. Which of the following statements best describes the first course of action the tech should take to help the customer resolve the problem?

A. Repeat the problem back to the customer.
B. Have the customer call back at a later time.
C. Ask the customer to not speak with an accent.
D. Tell the customer that her accent is preventing the problem from being solved.

A

A. Repeat the problem back to the customer.

80
Q

You are troubleshooting a networking problem with Windows and you can’t seem to fix it using the typical Windows GUI-based troubleshooting tools or with the Command Prompt. You have identified the problem, and established a theory of probable cause (in fact you are on you fourth theory). Which tool should be used to troubleshoot the problem and in what stage of the troubleshooting process should you do so?

A. Regsvr32–Conduct external or internal research based on symptoms.
B. Gpupdate–Perform backups before making any changes.
C. USMT–Verify full system functionality.
D. Regedit–Test the theory to determine cause.
E. Boot Camp–Document findings, actions and outcomes.

A

D. Regedit–Test the theory to determine cause.