Test C Flashcards
- Which of the following protects confidential information from being disclosed publicly?
A. Classification
B. Social engineering
C. RAS
D. Hard drive wipe
A. Classification
- Programs that run when Windows starts are stored in which of the following registry hives?
A. HKEY_CURRENT_CONFIG
B. HKEY_USERS
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
C. HKEY_LOCAL_MACHINE
- Typically, which of the following Windows tools enables you to configure a SOHO router?
A. Internet Explorer
B. Device Manager
C. Msconfig
D. Windows Explorer/
A. Internet Explorer
- Which of the following steps is performed first when running a clean install of Windows Professional on a new hard drive?
A. Format the partition.
B. Partition the drive.
C. Configure Windows settings.
D. Load RAID drivers.
D. Load RAID drivers.
- A co-worker maps a network drive for a user, but after rebooting, the drive is not seen within Explorer. Which of the following steps should be taken first to ensure that the drive remains mapped?
A. Check Reconnect at Logon when mapping the drive.
B. Select the drive letter needed to connect each time the co-worker logs on.
C. Check the Folder connection when mapping the drive.
D. Use the net use command instead.
A. Check Reconnect at Logon when mapping the drive.
- Based on the physical hardware address of the client’s network device, which of the following is commonly used to restrict access to a network?
A. WPA key
B. DHCP settings
C. MAC filtering
D. SSID broadcast
C. MAC filtering
- A print job fails to leave the print queue. Which of the following services may need to be restarted?
A. Print driver
B. Print Spooler
C. Network adapter
D. Printer
B. Print Spooler
- After installing a network application on a computer running Windows, the application does not communicate with the server. Which of the following actions should be taken first?
A. Uninstall the service pack. B. Reinstall the latest security update.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
D. Add the port number to the network firewall.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
- A customer reports a problem with a PC located in the same room as cement testing equipment. The room appears to have adequate cooling. The PC will boot up but locks up after 5– 10 minutes of use. After a lockup it will not reboot immediately. Which the following statements best describes the most likely problem?
A. The PC has a virus.
B. The PC air intakes are clogged with cement dust.
C. The CPU heat sink is underrated for the CPU.
D. The power supply is underrated for the electrical load of the PC.
B. The PC air intakes are clogged with cement dust.
- When accessing an NTFS shared resource, which of the following is required? (Select the two best answers.)
A. An active certificate
B. Correct user permissions C. Local user access
D. Correct share permissions
B. Correct user permissions
D. Correct share permissions
- Which of the following protocols should be set up in order to establish the most secure wireless connection?
A. WEP
B. WPA
C. WPA2
D. WAP
C. WPA2
- You are contracted to recover data from a laptop. In which two locations might you find irreplaceable, valuable data? (Select the two best answers.)
A. Ntoskrnl.exe
B. Windows folder
C. Pictures
D. E-mail E. System32 folder
C. Pictures
D. E-mail E. System32 folder
- Which utility enables auditing at the local level?
A. Group Policy
B. Local Security Policy
C. Active Directory Policy
D. Site Policy
B. Local Security Policy
- Which of the following statements best describes how NAT provides additional security for users who are behind a gateway?
A. It sets the hours that users can access the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
C. It limits users from accessing particular websites.
D. It blocks computers on the LAN from accessing computers on the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
- A customer plugs in a new USB barcode reader and the computer recognizes it, but the reader is unable to work properly. Which of the following statements best describes the most likely reason?
A. Faulty USB cable.
B. The operating system needs to be updated.
C. Software drivers need to be updated.
D. Too many USB devices are plugged in.
C. Software drivers need to be updated
- A customer has forgotten his password. He can no longer access his company e-mail address. Which of the following statements best describes the recommended course of action?
A. Tell him to remember his password.
B. Ask him for information confirming his identity.
C. Tell him that the password will be reset in several minutes.
D. Tell him that he shouldn’t forget his password.
B. Ask him for information confirming his identity.
- Which of the following can help locate a lost or stolen mobile device?
A. Passcode
B. Auto-erase
C. GPS
D. Encryption
C. GPS
- Which the following can be disabled to help prevent access to a wireless network?
A. MAC filtering
B. SSID broadcast
C. WPA2 passphrase
D. WPA key
B. SSID broadcast
- Which of the following commands sets the time on a workstation?
A. Time
B. Net time
C. Net timer
D. Net time set
A. Time
- In Windows, which utility enables you to select and copy characters from any font?
A. Language bar
B. Sticky keys
C. Control Panel > Fonts
D. Character map
D. Character map
- Which of the following can be described as removing the limitations of Apple iOS?
A. Rooting
B. Jailbreaking
C. VirusBarrier
D. Super-admin powers
B. Jailbreaking
- Which of the following built-in applets should be used by a technician to configure offline files and folders in Windows?
A. File History
B. USMT
C. Robust file copy
D. Sync Center
D. Sync Center
- Which language support for representing characters is built in to Windows?
A. Unicode
B. EBCDIC
C. ASCII
D. ITU-T
A. Unicode
- Which of the following is the best source of information about malicious software detected on a computer?
A. Operating system documentation
B. Anti-spyware software website
C. Readme.txt file included with the anti-spyware software installation
D. The user of a previously infected computer
B. Anti-spyware software website
- Viruses have been detected and removed on a customer’s computer several times during the course of several weeks. Which of the following methods will best help prevent future occurrences?
A. Delete temporary files, cookies, and browser history. B. Defragment the hard drive. C. Install antivirus software that uses manual updates.
D. Discuss safer web browsing habits with the customer.
D. Discuss safer web browsing habits with the customer.
- Which of the following sends an invitation by e-mail asking for help?
A. Remote Desktop Connection
B. Service call
C. VNC
D. Remote Assistance
D. Remote Assistance
- When performing a clean installation, which of the following is the default location for the system files of Windows?
A. C:\ Windows
B. C:\ Windows\ System32\ Config
C. C:\ System Files
D. C:\ Windows\ System32
D. C:\ Windows\ System32
- You are required to set up a remote backup solution for music and photos stored on an Android tablet. The files cannot be stored at any company location. Which technology should be used?
A. iCloud
B. Google Cloud Platform
C. Microsoft OneDrive
D. Local NAS device
B. Google Cloud Platform
- You need to copy and paste information from a web page, but you want to remove all formatting so that it can be pasted cleanly into Word. Which program should be used as an intermediary?
A. CMD
B. Excel
C. Notepad
D. MMC
C. Notepad
- A computer is responding slowly and the Windows Task Manager shows that spoolsv.exe is using 95 percent of system resources. Which of the following is most likely the cause of this problem?
A. Windows Update is running.
B. A virus infection has occurred.
C. Hyper-Threading has been disabled.
D. The printing subsystem.
D. The printing subsystem.
- Which of the following descriptions classifies the protocol IMAP?
A. A protocol that allows real-time messaging
B. An e-mail protocol that allows users to selectively download messages
C. An e-mail protocol that allows users to send but not to receive messages
D. A protocol that authenticates users who are sending e-mail
B. An e-mail protocol that allows users to selectively download messages
- Which of the following is a user-defined collection of folders that acts as logical representations of the user’s content?
A. Metadata
B. My Documents
C. Libraries
D. Public Documents
C. Libraries