902 EC Review Flashcards Preview

A+ 902 > 902 EC Review > Flashcards

Flashcards in 902 EC Review Deck (254)
Loading flashcards...
1
Q

Features of Windows XP mode?

A

Available for Windows 7
Fully licensed and fully furnished national version of XP
Reqs Windows Virtual PC
Guest OS run in a virtual environment

2
Q

A windows Vista operating system security and maintenance Monitoring component is called?

A

Windows Security Center

3
Q

A windows 7/8/8.1 operating system security and maintenance Monitoring component is called?

A

Action center

4
Q

Which Windows version offers a multi-monitor taskbar feature?

A

Windows 8/8.1

5
Q

Which in-place upgrade paths are not available for users migrating to s newer version of Windows?

A

XP to Windows 8
x86 to x64
Vista to Windows 8
XP to Windows 7

6
Q

Describe Windows Upgrade Assistant?

A

A free tool released mainly for Windows 7/8 owners who wish to perform an in-place upgrade to 8/8.1. The tool also allows for checking hw compatibility of Windows XP/Vista systems with Windows 8.

7
Q

What are Preboot Execution Environment (PXE) and Apple NetBoot?

A

Two technologies that allow booting a computer over a network interface.

8
Q

2 partition options of the MBR partitioning scheme?

A

Up to 4 parts

Up to 3 primary parts and one extended

9
Q

2 labels used in reference to a partition type that stores info about Windows OS and other parts on the drive?

A

Active

Bootable

10
Q

A basic disk used by GPT partition style can have how many primary parts?

A

128

11
Q

Microsoft’s proprietary file system optimized for flash drives?

A

exFAT

12
Q

4GB maximum file size and 8TB partition size limit are the characteristic features of which file system?

A

FAT32

13
Q

Creating images of a Windows drive Reqs which type of file system?

A

NTFS

14
Q

What are NTFSs advantages over FAT32?

A

Disk quotas, compression, object permissions, and encryption.

15
Q

A file system designed for optical media?

A

CDFS

16
Q

2 methods for accessing and storing data over a network?

A

DFS and NFS

17
Q

ext3/4 are examples of file systems used by?

A

Linux distros

18
Q

Which of the following 2 Windows sources allows for obtaining, installing, and updating device drivers?

A

Windows Update and Device Manufacturer.

19
Q

3 characteristics of organizing Windows pcs on networks are?

A

The PCs must be be part of a workgroup or domain.

The pcs’ on workplace networks usually belong to a domain.

The pcs’ on home networks are usually part of a workgroup.

20
Q

3 characteristics of Windows domains are?

A

Logging on to any computer requires a single set of credentials.

Security policies and permissions are managed centrally.

Uses the client-server architecture.

21
Q

Windows command for writing a new boot sector to the system partition?

A

BOOTREC /FIXBOOT

22
Q

RD command in Windows that allows for the deletion of an entire directory tree?

A

RD /S

23
Q

Windows commands that change the working directory to the root?

A

CD\

CHDIR\

24
Q

Windows commands for deleting file/s?

A

DEL

ERASE

25
Q

Windows command for copying multiple files or directory tress from one dir to another or across a net?

A

XCOPY

ROBOCOPY

26
Q

What is the function of the /R switch in CHKDSK?

A

Locates bad sectors and recovers info

Fixes disk errors

27
Q

CLI command in Windows that displays Group Policy info for a pc or user?

A

GPRESULT

28
Q

Windows CLI command that lists all of a directories files and sub directories?

A

DIR

DIR .

29
Q

All commands for exiting the Windows CLI?

A

TASKKILL /IM CMD.exe
EXIT
SHUTDOWN CMD.EXE

30
Q

All Windows commands for displaying help info in a CLI?

A

help [cmmd name]

[command name] /?

31
Q

Command that launches Win Device Manager?

A

DEVMGMT.EXE

32
Q

Is local users and groups a Windows MMC included by default I all versions that enables creating custom groups?

A

No

33
Q

Which Windows tool allows for managing multiple user accounts in Windows home editions?

A

User Accounts

34
Q

A MS Windows Administrative Tools folder applet for managing background applications is called:

A

Services

35
Q

Which of the Microsoft Windows tools listed below can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly?

A

System Configuration

36
Q

Which of the tools listed below allow for administering print devices in Microsoft Windows? (Select 3 answers)

A

Printers applet in Control Panel in Windows OSs prior to Windows 7

Devices and Printers applet in Control Panel in Windows 7 and later Microsoft OSs

Print Management utility in the Administrative Tools folder (not available in home versions of MS Windows)

37
Q

Which tab of the MSCONFIG utility in Windows lists choices for startup configuration modes?

A

General

38
Q

Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option?

A

General

39
Q

Which of the configuration features listed below can be managed through the MSCONFIG Boot tab?

A

Boot logging

Default OS to load in a multiboot environment

Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM)

Safe boot options

40
Q

Prior to Windows 8, the MSCONFIG Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSCONFIG utility shipped with later releases of MS Windows.

A

True

41
Q

Which of the answers listed below describe(s) the function of Windows Task Manager?

A

Allows to close a non-responsive application in Windows

Displays information on programs, processes, and services that are currently running on the computer

Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage)

Allows system administrators for managing the currently logged-in users

42
Q

Windows Task Manager can be launched by:

A

Ctrl+Shift+Esc key combination

Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the list menu

Right-clicking on the Windows Taskbar and selecting Task Manager

43
Q

Which of the following answers list(s) Windows Task Manager tab(s) not available in Windows 7?

A

Startup

App history

44
Q

Which of the answers listed below describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8?

A

On the Processes tab, click the program/process that isn’t responding, click End Task button

45
Q

Which of the following provide(s) access to the Disk Management utility in Windows?

A

Computer Management

Windows Command Prompt

46
Q

A temporary disk status set to “Initializing” indicates that a basic disk is in the process of being converted into a dynamic disk.

A

True

47
Q

Which of the following answers list(s) the correct sequence of steps for reducing partition size in Windows Disk Management utility?

A

Right-click on a partition, select “Shrink Volume…” option from the pop-up menu, in the launched pop-up window enter the amount of space to shrink in MB, click the “Shrink” button

Left-click on a partition in order to select it, in Disk Management Action menu select All Tasks menu item, select “Shrink Volume…” option, in the launched pop-up window enter the amount of space to shrink in MB, click the “Shrink” button

48
Q

hat is the name of a Windows Disk Management interface option for increasing partition size with the use of an unallocated disk space?

A

Extend

49
Q

Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality?

A

Storage Spaces

50
Q

Which of the following Windows tools allow(s) for migrating user data and user information to a new computer? (Select all that apply)

A

USMT
Windows Easy Transfer
Files and Settings Transfer Wizard (

51
Q

While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and devices will work with the new OS version. To find potential compatibility problems with computer’s hardware, devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC’s compatibility with Windows 7. What is the name of that utility?

A

Windows 7 Upgrade Advisor

52
Q

True or False:
Windows Upgrade Assistant is a free Microsoft tool released mainly for Windows 7/8 owners who wish to perform an in-place upgrade from their OS versions to Windows 8 or 8.1. The tool also allows to check for hardware compatibility of systems running Windows XP and Vista with Windows 8. This functionality is directed at those users who wish to upgrade Windows XP/Vista to Windows 8 through the clean installation option, which is the only upgrade path available in such case.

A

True

53
Q

Which other command-line command besides REGEDIT can be used to launch registry editor in Windows?

A

REGEDT32

54
Q

Which of the following answers lists a Windows command that launches an applet for managing background applications?

A

SERVICES.MSC

55
Q

Which of the following answers refers to the MS Windows client application for Remote Desktop Services?

A

MSTSC

56
Q

A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need for specifying path to the application’s file location is called:

A

NOTEPAD

57
Q

Which of the answers listed below refers to a diagnostic tool for detecting display, sound, and input related problems in MS Windows?

A

DXDIAG

58
Q

Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all volumes?

A

/C

59
Q

True or False:
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.

A

False

60
Q

Which of the following locations in MS Windows provide(s) access to the Internet Properties (INETCPL.CPL) system utility? (Select all that apply)

A

Internet Options applet in Windows Control Panel

Internet Options menu item in Internet Explorer’s Tools menu

Network and Sharing Center applet in Windows Control Panel (MS Vista and later releases)

61
Q

Which of the Windows Internet Properties system utility tabs provides access to proxy settings?

A

Connections

62
Q

Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms?

A

General

63
Q

A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called:

A

Privacy

64
Q

Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all of the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed?

A

Advanced

65
Q

Which of the following actions are available within the standard Windows account in User Accounts Control Panel applet? (Select 2 answers)

A

Change profile picture

Change password

66
Q

The Remote tab of the System Properties applet in MS Windows contains configuration options for: (Select all that apply)

A

Remote Assistance connections

Remote Desktop

67
Q

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)

A

Uninstalling applications
Repair installation of a malfunctioning program
Changing application configuration settings
Adding/removing Windows components

68
Q

Which of the locations listed below allow(s) for making adjustments to the volume of sound in Windows 7 and Windows 8/8.1? (Select 2 answers)

A

Windows Taskbar notification area

Sound applet in Control Panel

69
Q

Which of the signs listed below indicates that a Windows network share is intended for administrative access?

A

$

70
Q

In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:

A

Hidden

71
Q

In Windows 7/8/8.1, the Remote Desktop Connection utility can be launched from the Start menu search box, from the Run menu dialog box, or from a command line. Which of the following commands is used to start Remote Desktop Connection from the Command Prompt?

A

MSTSC

72
Q

Which of the statements listed below refer(s) to the Windows Remote Assistance utility? (Select all that apply)

A

Access based on one-time password

Temporal remote access

The host and invited user can both see the host’s screen

The host and invited user share control over host’s mouse and keyboard

Windows tool used for assisted remote troubleshooting

73
Q

True or False: Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic.

A

True

74
Q

Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?

A

Windows Firewall (Advanced settings)

75
Q

Which of the locations listed below allow(s) for enabling/disabling Windows Firewall? (Select all that apply)

A

Windows Firewall

Windows Firewall with Advanced Security

76
Q

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)

A

IP address

Subnet mask

Default gateway

DNS server address

77
Q

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.

A

True

78
Q

Which of the answers listed below describe(s) the function of Differentiated Services Code Point (DSCP) architecture? (Select all that apply)

A

QoS

Network traffic management

79
Q

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.

A

False

80
Q

Restoring data from an incremental backup requires: (Select 2 answers)

A

All copies of incremental backups made since the last full backup

Copy of the last full backup

81
Q

What is the function of archive bit?

A

Indicating whether a file has been modified since the last backup

82
Q

Which of the answers listed below describes the correct sequence of steps for accessing disk maintenance utilities in Windows 8.1?

A

Windows Explorer (Windows logo key + E) -> Select This PC from the left menu item list to view storage devices -> Right-click on the drive -> Select Properties from the pop-up menu -> Select a disk maintenance utility from the Tools tab

83
Q

An antivirus software is kept up to date through: (Select 2 answers)

A

Engine updates

Virus signature updates

84
Q

Which of the answers listed below refers to a Mac OS disk maintenance tool?
DEFRAG

A

Disk Utility

85
Q

An unresponsive application/process in Mac OS can be terminated with the use of:

A

Force Quit

86
Q

Which of the answers listed below refers to the system search utility for Mac OS?

A

Spotlight

87
Q

A desktop/file management system for Mac OS is known as:

A

Finder

88
Q

Which of the Mac OS X features allows for using the CD or DVD drive hosted from another computer?

A

Remote Disc

89
Q

The following command can be used for turning off or restarting a Linux host.

A

shutdown

90
Q

What is the name of a Linux command used for renaming files and directories?

A

mv

91
Q

A command-line command in Linux used for deleting files and directories is known as:

A

rm

92
Q

A Linux command that allows for modifying security privileges in order to be able to execute a single command that requires root access permissions is called:

A

sudo

93
Q

Which of the answers listed below refers to a package management system most often used on Debian and Debian-based Linux distributions?

A

APT

94
Q

Hardware enhancements adding support for virtualization developed by AMD for its CPUs are known as:

A

AMD-V

95
Q

A set of Intel CPU hardware enhancements improving support for virtualization is called:

A

VT-x

96
Q

Which of the following statements describe(s) disadvantages of virtualization? (Select all that apply)

A

Multiple virtual machines run on a single host share hardware resources which has a degrading effect on performance

Hardware used for hosting virtual machines becomes a single point of failure

97
Q

True or False: Windows Phone, iOS, and Android are all examples of closed-source operating systems.

A

False, Android is Open Source.

98
Q

Modern mobile devices have the capability to present landscape or portrait views of the device’s screen based on the way the device is being held. Which of the following built-in functionalities allows for determining screen orientation in those devices?

A

Accelerometer

99
Q

A type of mobile user interface presenting the main view of the device with a group of shortcut icons to apps is known as:

A

Launcher

100
Q

A package file format used by Android OS for distribution and installation of mobile apps is called:

A

APK

101
Q

Personal Area Network (PAN) over Bluetooth is known as:

A

Piconet

102
Q

Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)

A

TCP port 995

Secure Sockets Layer (SSL)

Transport Layer Security (TLS)

103
Q

What are the characteristic features of the secure version of IMAP? (Select all that apply)

A

TCP port 993

Secure Sockets Layer (SSL)

Transport Layer Security (TLS)

104
Q

True or False:
Multipurpose Internet Mail Extensions (MIME) specification extends the email message format beyond simple text enabling the transfer of graphics, audio, and video files over the Internet mail system.

A

True

105
Q

Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?

A

PRI

106
Q

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

A

PRL

107
Q

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

A

Phishing

108
Q

Which of the following functionalities allows a DLP system to fulfil its role?

A

Data Loss Prevention uses Content inspection

109
Q

Which of the acronyms listed below refers to a security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

A

DLP

110
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

111
Q

Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers)

A

Apply only to network users

Can be set on a folder level

112
Q

In NTFS filesystem, a folder or file copied from one location to another on the same volume retains its original permissions.

A

True

113
Q

In NTFS filesystem, a folder or file moved from one location to another on the same volume inherits permissions of its new parent folder.

A

False

114
Q

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as:

A

SSO

Single Sign On

115
Q

Which of the answers listed below refers to a Windows built-in component that allows for encryption of individual files?

A

Encrypting File System (EFS)

116
Q

Which of the security policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

A

Maximum password age setting

117
Q

Does OS hardening include setting up a network-based firewall?

A

No

118
Q

Which of the Windows utilities listed below is used for the purpose of hard drive low-level formatting?

CHKDSK
BOOTREC
FORMAT
DISKPART
None of the above
A

None of these

119
Q

Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage? (Select 2 answers)

A

Heat map

WAP power level controls

120
Q

Which of the following solutions would be the easiest while troubleshooting Windows blue screen?

A

System restart

121
Q

Which of the hardware-related solutions listed below can be used in troubleshooting failed system boot process? (Select 2 answers)

A

Drive cable/connector check

Hard drive replacement

122
Q

What is the name of the boot loader software used in Windows Vista and later releases of the Microsoft OS?

A

WINLOAD.EXE

123
Q

Which of the actions listed below enables access to the Automatic Repair utility during next system boot in Windows 8/8.1? (Select best answer)

A

Holding the Shift key and left-clicking on the power options button (Shut down/Restart) while in Windows (

124
Q

A boot loader application used in Windows XP is called:

A

NTLDR

125
Q

Which of the following allows to force Windows into Safe mode during next system boot?

A

Checking the Safe boot option on the Boot tab of the System Configuration (MSCONFIG) utility while in Windows

126
Q

An essential Windows XP startup file containing a list of installed OSs as well as information on the location of the operating system files is called:

A

BOOT.INI

127
Q

Which of the following answers list(s) example(s) of boot loader software used in Linux operating systems? (Select all that apply)

A

GRUB

LILO

128
Q

Which of the Windows Recovery Environment (WinRE) utilities would be used for manual troubleshooting of system startup issues?

A

BOOTREC.EXE

129
Q

Which of the files listed below are required to start Windows XP? (Select 3 answers)

A

NTLDR
NTDETECT.COM
BOOT.INI

130
Q

Startup files required to launch Windows Vista/7/8/8.1 include: (Select 3 answers)

A

BOOTMGR
BCD (Boot Configuration Data)
WINLOAD.EXE

131
Q

Which of the following sequence of steps in Windows Device Manager (DEVMGMT.MSC) allows for reverting back to the previously installed driver when a device fails after driver update?

A

You left the correct answer unselected.
Double-click the device type to view devices in that category -> Right-click on the device and select Properties -> On the Driver tab, click the Roll Back Driver button

132
Q

What is the name of a Windows tool that can be used for troubleshooting problems related to Dynamic-Link Libraries (DLLs) and ActiveX controls?

A

REGSVR32

133
Q

True or false:

Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1 Control Panel. Selecting the “Run programs made for previous versions of Windows” option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows.

A

True

134
Q

What is the correct sequence of steps for launching the disk defragmenter utility in MS Windows? (Select 3 answers)

A

You have selected the correct answer.
In Windows Vista/7: Open Windows Explorer by pressing the E key while holding the Windows Logo key -> Click on the Computer menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab

Press the R key while holding the Windows Logo key -> type in “cmd” (without quotation marks), and hit Enter -> Launch the disk defragmenter utility by typing in DEFRAG with the appropriate command switch

In Windows 8/8.1: Open File Explorer by pressing the E key while holding the Windows Logo key -> Click on the This PC menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab

135
Q

Name 5 things which might be the cause of slow computer system performance? (Select all that apply)

A
Unpatched OS
Malware presence
OS power management options
File fragmentation
Disk thrashing
136
Q

Name 4 things or solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply)

A

System Restore
Driver rollback
Malware removal
Startup Repair utility

137
Q

Name 3 solutions that would be of help in troubleshooting the “NTLDR is missing” error message displayed during system boot? (Select all that apply)

A

Startup Repair utility
Disconnecting any external drives
Adjusting the boot sequence in CMOS setup utility

138
Q

True or false:

One of the fixes for the “NTLDR is missing” error message during system boot relies on replacing the corrupt NTLDR file with the same file copied from another Windows host using the same operating system (Windows XP), or restoring it from the Windows XP installation CD. Copying the NTLDR file manually requires access to the command-line interface which can be found as one of the options available in the Advanced Boot Options menu displayed after pressing the F8 key during system boot. After gaining access to the CLI, the NTLDR file can be restored with the COPY command from an external storage device (e.g. USB flash drive) to the root folder (typically C:) of the drive containing the corrupt version of the file.

A

True

139
Q

Name 3 solutions/software tools that would be of use when troubleshooting a missing system GUI in MS Windows? (Select all that apply)

A

Safe mode video driver update
System File Checker (SFC.EXE)
VGA mode

140
Q

“Kernel panic” is a term used to describe stop errors in: (Select all that apply)

A

Linux

Mac OS

141
Q

True or false:
One of the recommended ways for enhancing a mobile device’s security includes employing a web-based service (an app scanner) that allows users to check for known potential security/privacy risks related to a mobile application before downloading/purchasing the app.

A

True

142
Q

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply)

A

Batteries
CRTs
Toner cartridges

Not PSUs or LCDs

143
Q

Which of the following tools would be used to clean the inside of a laser printer? (Select all that apply)

A

Can of compressed air
Toner vacuum

Not a cleaning brush

144
Q

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A

PII

145
Q

Examples of proper communication and professional skills while dealing with difficult customer include: (Select 2 answers)

A

Clarifying customer statements by asking open ended questions to narrow the scope of the problem

Restating the issue to verify understanding

146
Q

True or false:

Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.

A

False

147
Q

Does Vista come with a built in anti-virus program?

A

No

148
Q

How can you add gadgets to the Windows 7 desktop?

A

In Control Panel, select Appearance and Personalization/Desktop Gadgets

149
Q

Anti-Static wristbands protect …?

A

Computer HW against Electro-static discharge. Not you.

150
Q

What is a symptom indicative of a misconfigured Boot.ini file?

A

Error at boot: “Windows could not start.”

151
Q

What is the function of the Boot.ini file?

A

Boot.ini points to a valid copy of Windows and is usually stored in a folder called \WiNNT or \WINDOWS. This initialization file is always located on the root directory of the primary hard drive and is used by Windows to display and reference OS’s available for booting.

152
Q

What is the function of the NTLDR?

A

Short for NT Loader, this is a a program from the hd boot sector that displays menus and helps NT load. The MBR points to NTLDR and if it is malfunctioning or corrupt it will report NTLDR is missing.

153
Q

What does the error “No boot device present” mean?

A

BIOS is pointing to a drive that has not bootable partitions.

154
Q

Can WIN7 open ZIP files by default without a 3rd party app?

A

YES; Windows has been able to do so since XP.

155
Q

Is Cmmd Prompt|winsrv.msc|select service from a list|Stop a valid method of stopping a service in Vista?

A

No

156
Q

Tammpy wants to scan a Vista system for a virus. Which built-in app will accomlish this?

A

Vista does not come with a built in AV app.

157
Q

Which Windows command will compare two files for differences?

A

FC (File Compare)

158
Q

What does the Verifier command do?

A

Torubleshoots problematic drivers

159
Q

What is Microsoft’s recommended page file system in Win7?

A

1x RAM

160
Q

Can micro ATX boards fits in ATX cases?

A

Yes. You just have to move the brass stand-outs.

161
Q

Which CTRL Panel applet and menu allows you to adjust Virtual Memory Settings?

A

System>Advanced

162
Q

List the sequence of steps to back up the registry:

A

Open the registry|Edit|Export|Pick location to save to

163
Q

What is the shortcut for viewing the properties and attributes of a file or folder in Windows?

A

Hold the alt key while double-clicking a file or folder.

164
Q

If a .dll file cannot be found what is teh best course of action?

A

Research the file to id the application using it. Malware often uses .dll files to alter systems so always verify which program is using the .dll. Windows Update does not review all .dll files.

165
Q

On a Win7 system which option will enable File and Printer sharing between 3 workstations running Windows 7 Home Edition?

A

Setting up a homegroup.

Workgroups are earlier version of creating a simple SOHO network.

166
Q

How do you provide access rights to others ona network to allow remote access to folder?

A

Use the NET SHARE command.

167
Q

Which Windows tool allows the comparison of two files?

A

FC (file compare)

168
Q

What is the definition of an accelerometer?

A

It measures the velocity of the device and does MORE than provide the signal to the OS to tilt the screen when the device is rotated.

169
Q

What command is used to map a network share?

A

NET

170
Q

Which CLI command shows hidden files and folders?

A

DIR /AH

171
Q

Is Command Prompt|winsrv.msc||Stop a way to stop a service in Vista?

A

No

172
Q

Is Right clicking Computer|Manage|Services and applications|Services|select service|Stop a way to stop a service in Vista?

A

Yes

173
Q

Whice files system enables encryption of images?

A

EFS (encrypted file system)

FAT, FAT32 and OSR are older files systems without encryption functionality.

174
Q

If you receive low virtual memory alerts which Ctrl Panel applet can help correct this issue?

A

System>Advanced

175
Q

Which Control Panel applet contains Computer Management?

A

Administrative Tools

176
Q

Where are UAC settings adjusted?

A

Control Panel|User Accounts

177
Q

What is the proper way to refer to the system root folder?

A

%systemroot%

178
Q

Which tool at the Vista CLI should be used to edit operating system startup parameters located in the data store?

A

Bcdedit.ext

179
Q

What is the best way to prevent unauthorized access to a switch?

A

Disable unused ports.

180
Q

Which tool should you use to edit the policies and permissions of users on a local machine?

A

The local security policy utility.

The group policy editor is for group permissions and not individual users.

181
Q

What is the maximum partition size on a FAT32 file system?

A

2048GB (2TB)

Windows won’t allow you to create one greater than 32GB, but will recognize partitions greater than 32 GB created by a partitioning tool.

182
Q

What should you always do first to try and troubleshoot a malfunctioning service on a phone?

A

Re-start it!

183
Q

When you come to a site for work and it’s a very busy office what should you do before anything else?

A

Ask if you can start your work.

184
Q

Which Windows registry hive contains the file associations database?

A

HKEY_CLASSES_ROOT

185
Q

What is the danger associated with CRT monitors upon discarding?

A

Vacuum implosions. They do not contain arsenic or Li-Ions.

186
Q

IRP stands for…?

A

Incident response plan.

187
Q

Auto-starting programs exist in which locations?

A

Services snap-in
Startup folder in the start menu

Not boot.ini, Windows folder, or Bootcfg

The windows folder is the default location of Windows OS boot files and the bootcfg is used to rebuild the boot.ini

188
Q

Which permissions do you change if an attribute is set to read-only?

A

Share permissions.

189
Q

Microwave ovens cause which type of interference?

A

RFI

Not EMI which is the electric field surrounding magnets and motors.

190
Q

Which percentage of a hd must be free to run disk defragmentation?

A

15%

191
Q

If a certificate and a domain name are mismatched what should you do?

A

Contact the site owner.

192
Q

What is the first thing you should do when working on an infected pc?

A

Identify the malware.

Then determine how it was acquired.

193
Q

Is shutdown an APM/ACPI level?

A

No, only full-on, enabled and standby are.

194
Q

What is the most secure way to lock a mobile device?

A

Passcode

195
Q

What is the best way to ensure you’ve made a quality back-up?

A

Verify it by restoring it and checking the results or use the backup softwares verification utility.

196
Q

If you haven’t receive any new emails for a few days what should you try first?

A

Restart the phone.

197
Q

Where are bootlogging results stored?

A

ntbtlog.txt

198
Q

If a program has stopped working what is the best solution?

A

Use system restore to roll back to an earlier time. You have probably installed software since then that created the incompatibility.

199
Q

What is the single best safety method to use when replacing hardware?

A

Always use and anti-static mat and preferably wrist straps.

200
Q

If a user on a domain cannot install software which user group are they likely part of?

A

Guest users

Standard users can install software unless the default group permissions have been changed.

201
Q

What is the best method of tracking access to server rooms?

A

Sign in log.

202
Q

If a power outage occurs while running defrag what is the best course of action?

A

Nothing-restart your pc and run defrag.

It is not necessary to run chkdsk as defrag isnt interrupted by power outages.

203
Q

What is the best option for securing a pc when the user must walk away?

A

Lock the workstation. Screensaver passwords are a good idea but they don’t protect against someone quickly accessing the workstation.

204
Q

What is the first step when upgrading an OS?

A

Back up essential data

205
Q

Does windows vista come with full drive encryption tools, aka BitLocker?

A

No

206
Q

What does a blinking light on a UPS mean?

A

The battery needs replacing.

207
Q

If a computer is running normally except the hard drive is shutdown, the power management is in which mode?

A

Enabled. The system is running at full power even though a device might be shit down.

Suspend means the pc is shutdown or at its lowest power consumption. Hibernate is a type of suspension that stores critical info on the hard drive for faster wake-up

208
Q

What contains utilities to safely and easily modify the configuration of almost all windows settings?

A

Control panel.

Not the registry.

209
Q

Which switch used with the PING command resolves and ip address to a host name?

A
  • a
  • f prevents fragmentation of ping packets
  • n enables you to set the number of pings to send
  • t runs ping until you manually stop it.
210
Q

What are two of the best ways to secure a workstation after installing a firewall and AV software?

A

Assign security rights based on job roles and use strong passwords.

211
Q

What is a path to open event viewer?

A

Start/control panel/admin tools/event viewer

212
Q

If you can only view a portion of your screen and the text is very large what is wrong with the resolution settings?

A

They are set too low.

213
Q

What is the name of the personal documents folder in Vista.

A

Documents

214
Q

What is the recommended paging file size on Win7?

A

1x System ram

215
Q

Which file system is compatible with the widest range of OSs?

A

Fat32

NTFS is Windows only, Fat16 is mostly found on removable media, and CDFS is a CD file system.

216
Q

What are the two most common security threats in mobile devices?

A

Viruses and thefts.

217
Q

Which Windows features prevent and reduce the effects of malware attacks?

A

Windows defender and DEP (data execution prevention)

218
Q

Which key combo is used In Windows to permanently delete a file and avoid the recycle bin?

A

Shift+Delete

219
Q

Which Windows key combo opens the start menu?

A

Control+escape

F1 help
Alt+escape controls window sizes

220
Q

Which control panel utility in win7 is used for uninstalling apps?

A

Programs and Features

Add/Remove programs was a WinXP option

221
Q

Which information is required to configure/connect to a corporate email account?

A

Server and domain

You do not need the ip address.

222
Q

The windows CLI CMD to remove a directory is?

A

RD

Del and Erase remove files but not directories.

223
Q

What is the path to Windows temporary folder?

A

C:\Windows\Temp

224
Q

Which error message is the result of a misconfigured boot.ini file?

A

Error at boot: windows could not start.

Bootini points the valid copies of Windows.

MBR points to NTLDR

225
Q

Describe the functions of the Security, Advanced, Programs and Connections tabs in IE:

A

Security tab changes security settings

The advanced tab changes IEs default settings

The program tab changes the functionality of opening links, managing add ons, managing HTML, associating files with programs

Connections allows s you to set up dial-up, VPN, and LAN settings.

226
Q

Which Windows CLI tool can create images for tempt OS deployments…?

A

SYSPREP

227
Q

What is the difference between System Restore and Last Know Good Config…?

A

System restore enables you to undo installations and system changes that caused corruption.

Last know good configuration is used when a driver or registry is preventing Win from booting.

228
Q

Where is the Local Users and Groups locates…?

A

It’s a snap-in under Computer Management.

229
Q

Windows trial installs are valid for …days?

A

30

230
Q

Name the four Windows registry hives:

A

HKEY_CLASSES_ROOT

HKEY_LOCAL_MACHINE

HKEY_CURRENT_CONFIG

HKEY_USERS

231
Q

Describe the abilities of robocopy, xcopy, copy and shadow copy:

A

Robocopy replaces xcopy as a robust utility that copies more than files but not files in use.

Copy copies files that aren’t in use.

Xcopy not only copies files but allowed for multiple file and directory copies that aren’t in use.

Shadow copy allows copying of files in use and performing backups while a system is in use.

232
Q

What is the Bootcfg?

A

A utility in the recovery console for rebuilding the boot.ini.

233
Q

Describe Startup Repair:

A

Startup repair is a system recovery tool that fixes damaged/missing system files, restores boot files.

It is accessible via Repair Your Computer in the Advanced Boot Options Menu (F8/Shift+F8) and Windows Installation Discs/Drives, and the Windows Error Recovery Screen.

234
Q

Describe the System Recovery Menu Options:

A

Vista/7:
Startup Repair, System Restore, Sys Image Recovery, Win Mem Diag, CLI

8/10:
Recovery Mode Troubleshooting:
Refresh, Reset, Advanced: System Restore, Image Recovery, Auto/Sartup Repair, CLI, Start Settings

235
Q

Describe System File Checker

A

SFC.exe is a CLI program in🤔 Windows that repairs corrupt/missing system files including DLLs. It Reqs admin access in all Windows versions >= Vista and stores result in the CBS.log file.

C:\Windows\Logs\CBS\CBS.log

SFC /scannow

236
Q

What is the the correct path for mapping a network drive using the UNC?

A

The correct syntax for the Universal Naming Convention is

\servername\share. Mapping this to the UNC will allow access to the share folder on the servername pc.

237
Q

A basic disc cannot support which feature?

A

RAID. It can support NTFS. Windows requires dynamic discs to support RAID.

NTFS and sharing are both supported by basic and dynamic discs.

238
Q

Which CLI tool is used d to configure startup applications?

A

MSconfig

Services.msc starts and stops various services.

239
Q

Does Parental controls or User Account Control create logs of applications users run or attempt to run.

A

Only parental controls does.

240
Q

List the categories and uses of fire extinguishers?

A

A: ordinary free burning combustibles such as wood and paper.

B: flammable liquids.

C: electrical fires. Uses non-conducting foam or sprays.

D: combustible metals.

241
Q

Which command is used to modify file permissions?

A

Attrib: read-only, archive, system, hidden (RASH)

Label: labels volumes

Edit: basic text editor.

242
Q

Which tool can enable a technician to remove a virus that is preventing AV updates?

A

Safe mode may allow AV updates since the viruses background processes won’t be running.

243
Q

Describe the path to disc management?

A

CP\Admin tools\Computer Management\Disc Manage.

244
Q

What is the shortcut to Windows explorer?

A

Win key + e

245
Q

CLI command for disk management and a description of its capabilities?

A

Diskmgmt.msc

It can changes drive letters, format and partition drives, manage all types of drives, shrink and delete or extend partitions, change file systems…

On Win8/10 the shortcut is Win+X

246
Q

Which file system has the broadest OS compatibility?

A

FAT32

NTFS is Windows primarily and FAT16 is older, supports limited drive sizes and mostly for portable media.

247
Q

Describe the differences between full, incremental and differential backups:

A

Incremental contains only the information that has changed since the last backup of any type.

Differential backups create full backups of all the data that has changed since he last full back up.

248
Q

Describe the PXE:

A

The preboot execution environment is standard client/server interface that allows networked computers to be configured and booted remotely.

It provides DHCP, an API for BIOS or NBP(Network Bootstrap Program) and a standard method of initializing the PXE code on the PXE ROM chip or boot disk.

249
Q

What are the Attrib commands for hiding and unhiding files and files including their folder and subfolders:

A

+H filename
-H filename
+H /s “all files in the folder and subs are hidden”
-H /D unhide all files and folders

250
Q

Describe local security policy:

A

Available in Pro, Enterprise and Business and Ultimate editions. For non-domain computers, contains domains trusted to authenticate logon attempts, which user accounts may access the system and how, the rights and privileges assigned to accounts, and the security auditing policy.

251
Q

Describe Group policy:

A

An hierarchical infrastructure that allows a network admin to implement configurations for users and computers and also user, security and networking policies at the pc level. Set privileges for users on a network, access rights.

gpresult
gpupdate

252
Q

Paging File Minimums:

A

XP: 1-1.5x per <1GB and >1GB RAM
Vista: 1x
7: 1x
8/8.1: conditional

253
Q

What do NTFS permissions effect?

A

Local users not network shares.

254
Q

Are diskmgmt.ext and diskpart available in the recovery console?

A

Only diskpart is.