Test Out Exam Questions 2 Flashcards

1
Q

What does the details tab in Task Manager do?

A

Allows you to change the priority of cpu utilization that a running application will receive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are two technologies that mobile operating systems use to detect device movement?

A

Accelerometers Gyroscopes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accelerometers Gyroscopes

A

two technologies that mobile operating systems use to detect device movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Geotracking

A

determines the location of a mobile device by obtaining its GPS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

determines the location of a mobile device by obtaining its GPS data.

A

Geotracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encrypting File System (EFS)

A

a Windows file encryption option, but only encrypts individual files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(VPN) uses an encryption protocol (such as IPSec, PPTP, or L2TP) to….

A

establish a secure communication channel between two hosts, or between two sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPSec

A

VPN protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Moving or copying files to a Non-NTFS partition

A

removes any permissions that were assigned to those files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

does FAT32 support NTFS permissions

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Moving a file to a new folder on the same drive does what to the file?

A

Preserves the NTFS permissions assigned to the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Moving or copying files to a different NTFS partition

A

removes any existing NTFS permissions so that only inherited permissions apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a computer starts in Safe Mode?

A

only the bare minimum background services that are very important to boot and run the Windows are initialized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Loss Prevention (DLP) programs or devices

A

monitors operations such as file transfers and emailS that could compromise data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewalls are placed between the company network and the internet to filter network traffic at what level

A

the IP level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you configure process priority

A

Details Tab in Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When you perform an in ­place upgrade what happens to user data and installed applications

A

They are preserved following the upgrade but you should make sure that applications still work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens when physical memory (RAM)D is low

A

The computer must swap data from RAM to hard disk to make space available for other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you hear the hard drive constantly operating as you work

A

the computer is constantly working moving data into and out of memory(RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If the hard drive light on the front of the system case stays illuminated for long periods of time

A

the computer is constantly working moving data into and out of memory(RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your network location must be set to ________ before you can see home groups that have been set up on your network

A

Home Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Directional antennae

A

Can be positioned to point wireless signals toward more desired areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Decreasing radio power levels

A

can limit the radius of the effective wireless signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

System Configuration

A

launches the initial startup, the boot files, and system services along with other tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Component Services give you access…

A

to the local Event Viewer so that you can examine Administrative Events and system logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Event Viewer maintains logs about?(3)

A
  • program
  • security
  • system events on Windows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

r

refreshes the local and Active Directory­ based Group Policy settings, including security settings.

A

gpudpate command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The Services console

A

lets you enable or disable Windows services. These are system ­level programs that typically start when Windows boots up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

r

program, security, and system events on Windows

A

Event Viewer maintains logs about ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Device Manager

A

View and control the hardware attached to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

r

creates a log file of what is happening at boot time by selecting the Boot tab and marking Boot log.

A

MSCONFIG (also known as the System Configuration console)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with in which window

A

Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the only way to add disk space to system volume

A

create a mount point froma new disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

To create a mount point: (3)

A
  • Create an empty folder on the existing volume.
  • Create a partition on the new disk without a drive letter.
  • Mount the partition to the empty folder on the existing volume.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Can you extend the system volume if the Disk is dynamic?

A

You cannot extend the system volume even if it is on a dynamic disk or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You want to be able to access your home computer using Remote Desktop while traveling.

A

Open the firewall port for the Remote Desktop protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Windows Upgrade Advisor

A

scans your hardware, programs for compatibility issues and gives you guidance on how to resolve them

38
Q

USMT (User State Migration Tool)

A

lets advanced users transfer files and settings between PCs.

39
Q

Windows Easy Transfer

A

allows users to transfer personal files and settings from a computer running an earlier version of Windows to a computer running a newer version.

40
Q

proxy server

A

receives requests from the browser, and either forwards it to the internet or deny access to the site.

41
Q

MSCONFIG (also known as the System Configuration console) does what a boot time?

A

creates a log file of everything happening at boot time

You turn this on by selecting the Boot Tab & Checking Boot log.

42
Q

S.M.A.R.T. errors are generated when

A

a hard disk is about to fail. It is imperative that you immediately backup the system, replace the hard disk, and then restore the system.

43
Q

what is this command line executing? attrib +s +r -­a myfile.dll

A

attrib +s +r -­a myfile.dll

+s, Adds System file attribute,

+r, Adds the Read­only attribute

-a, removes the Archive attribute

44
Q

Is Backup and Restore available on Windows 8

A

No

45
Q

What should you do when a “blue screen of death” has been displayed?

A

-Identify the source of the error by searching for the text of the error message in Microsoft’s knowledge base -or Google/Internet

46
Q

When to use Driver Rollback

A

you’ve installed a misbehaving driver and need to revert to an older version of the driver.

47
Q

How does driver rollback work?

A

preserves the old driver every time you install a newer driver. Therefore, you could use Driver Rollback to uninstall the current driver and restore the previous version.

48
Q

S/MIME (Secure/Multipurpose Internet Mail Extensions)

A

is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails.

49
Q

r

a Windows file encryption option, but only encrypts individual files.

A

Encrypting File System (EFS)

50
Q

r

controls the initial startup, the boot files, and services loaded along with other tasks.

A

System Configuration

51
Q

r

access the local Event Viewer to examine Administrative Events and system logs.

A

Component Services

52
Q

r

lets you enable or disable Windows services. These are system ­level programs that typically start when Windows boots up.

A

The Services console

53
Q

r

View and control the hardware attached to the computer.

A

Device Manager

54
Q

gpudpate command

A

refreshes the local and Active Directory­ Group Policy & Security settings.

55
Q

displays the Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer.

A

gpresult command

56
Q

popd

A

restores the previous value of the current directory saved by pushd.

57
Q

fsutil command

A

displays or configures the file system properties

58
Q

r

displays or configures the file system properties

A

fsutil command

59
Q

r

displays or modifies file extension associations.

A

assoc command

60
Q

gpresult command

A

displays the Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer.

61
Q

r

restores the previous value of the current directory saved by pushd.

A

popd

62
Q

assoc command

A

displays or modifies file extension associations.

63
Q

r

scans your hardware, devices, and installed programs for known compatibility issues and will give you guidance on how to resolve any potential issues found.

A

Windows Upgrade Advisor

64
Q

r

a Microsoft command line utility program intended to let advanced users transfer files and settings between PCs.

A

USMT (User State Migration Tool)

65
Q

r

allows users to transfer personal files and settings from a computer running an earlier version of Windows to a computer running a newer version.

A

Windows Easy Transfer

66
Q

r

is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails.

A

S/MIME (Secure/Multipurpose Internet Mail Extensions)

67
Q

Clean install is the process of

A

installing Windows over the top of an existing operating system. Cleaning/Erasing all of the existing data.

68
Q

Recovery partition

A

restore a corrupt computer back to the same state it was in when it was purchased

69
Q

Hijacking

A

TCP/IP session is manipulated by a third party inserting alternate packets into the communication stream.

70
Q

Spear Phishing

A

attackers gather specific information about the target, such as which bank they use. Then send phishing emails as if they are that bank

71
Q

Whaling

A

a form of phishing that is targeted to senior executives and high profile victims.

72
Q

To use multiple disks in a single logical storage unit

A

upgrade all disks to dynamic disks. Create a spanned volume.

73
Q

DiskPart

A

the command line that you can use to create, format, and manage partitions and volumes.

74
Q

Port forwarding

A

directs incoming network traffic to a host on the private network.

75
Q

Port triggering

A

dynamically opens firewall ports based on applications that initiate contact from the private network

76
Q

A worm

A

malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself.

77
Q

Simple Storage Space

A

-Adds space from the storage pool to the storage space

78
Q

Two­-Way mirror

A
  • Requires at least two storage devices.
  • The data is written to two devices.
  • Requires 2x as much space as the amount of storage needed
79
Q

Three­Way mirror

A
  • Requires at least five storage devices.
  • The data is written to three storage devices.
  • Provides redundancy for the data if two storage devices fail at one time
80
Q

Parity

A
  • at least three storage devices
  • Requires only 50 percent more redundancy space than storage space.
81
Q

If you need to move from a 32­bit operating system to a 64­bit operating system

A

You must install a clean version of Windows first otherwise not allowed

82
Q

Unified Threat Management (UTM) appliance

A

Intrusion prevention\detection

Anomaly logs & Alerts explained

Email & Anti-Spam Filters

83
Q

r

restore a corrupt computer back to the same state it was in when it was purchased

A

Recovery partition

84
Q

r

TCP/IP session is manipulated by a third party inserting alternate packets into the communication stream.

A

Hijacking

85
Q

r

attackers gather specific information about the target, such as which bank they use. Then send phishing emails as if they are that bank

A

Spear Phishing

86
Q

r

directs incoming network traffic to a host on the private network.

A

Port forwarding

87
Q

r

dynamically opens firewall ports based on applications that initiate contact from the private network

A

Port triggering

88
Q

r

malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself.

A

A worm

89
Q

r

  • Requires at least two storage devices.
  • The data is written to two devices.
  • Requires 2x as much space as the amount of storage needed
A

Two­-Way mirror

90
Q

r

Intrusion prevention\detection

Anomaly logs & Alerts explained

Email & Anti-Spam Filters

A

Unified Threat Management (UTM) appliance

91
Q

Copying a file to a new folder on the same drive does what to the file?

A

Removes any existing NTFS permissions so that only inherited permissions apply