Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
137 Cards in this Set
- Front
- Back
Which of the answers listed below describe(s) the features of Windows XP Mode? (Select all that apply) |
Available for Microsoft Windows 7 Fully-licensed version of Windows XP Requires Windows Virtual PC Fully-functional version of Windows XP Guest OS run in a virtual environment |
|
A Windows Vista operating system security and maintenance monitoring component is called: |
Windows Security Center |
|
What is the name of a system component designed for monitoring security and maintenance-related items in Windows 7/8/8.1? |
Action Center |
|
An online Microsoft software distribution platform for games and apps is known as: |
Windows Store |
|
An operating system installation that preserves system settings, personal files, and applications from the older OS version is referred to as: |
In-place upgrade |
|
Which of the in-place upgrade paths listed below are not available for users who wish to migrate their OS from an older version to a newer release of MS Windows? (Select all that apply) |
Windows XP to Windows 8 x86 to x64 Windows Vista to Windows 8 Windows XP to Windows 7 |
|
While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and devices will work with the new OS version. To find potential compatibility problems with computer's hardware, devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC's compatibility with Windows 7. What is the name of that utility? |
Windows 7 Upgrade Advisor |
|
Which of the new built-in software options added in Windows 8 allows for reinstallation of the OS without affecting the existing user profiles and settings? |
Refresh |
|
A new maintenance feature added in Windows 8 that enables clean installation of the OS without the need for installation media is called: |
Reset |
|
Which of the answers listed below describe the available options of the Master Boot Record (MBR) partitioning scheme? (Select 3 answers) |
Overall number of partitions limited to four Up to three primary partitions and one extended partition Up to four primary partitions |
|
Which of the following terms refer to methods of storing and accessing data over computer network? (Select 2 answers) |
dfs-microsofts disributed file system nfs-sun microsystems network file system |
|
Which of the following sources allow(s) for obtaining, installing, and updating device drivers used by Microsoft Windows OSs? (Select all that apply) |
Windows Update Device manufacturer |
|
Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers) |
Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup |
|
Which of the answers listed below refers to the correct syntax for a Windows Command Prompt TASKKILL command that would allow to close NOTEPAD.EXE by providing its imagename? |
TASKKILL /IM NOTEPAD.EXE |
|
Which of the Windows Command Prompt commands writes a new master boot record to a disk? |
BOOTREC /FIXMBR |
|
Which of the following commands in Windows Command Prompt writes a new boot sector to the system partition? |
BOOTREC /FIXBOOT |
|
Which SHUTDOWN command switch in Windows Command Prompt forces full system shutdown and restart of the Windows host? |
/r |
|
Which of the following commands in Windows change(s) the current directory to the root directory? (Select all that apply) |
cd\ chdir\ |
|
Which of the Windows Command Prompt commands listed below can be used to delete one or more files? (Select all that apply) |
del erase |
|
Which of the COPY command switches verifies that the new files are written correctly? |
/V |
|
Which of the COPY command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file? |
/Y |
|
Which of the Microsoft Windows command-line commands allow(s) for copying multiple files or entire directory trees from one directory to another and for copying files across a network? (Select all that apply) |
xcopy robocopy |
|
The SFC utility in Windows: |
Scans for and restores corrupted system files |
|
The /R switch of the CHKDSK utility: (Select all that apply) |
Locates bad sectors and recovers readable information Fixes errors on the disk |
|
Which of the command-line commands listed below allows for updating multiple Group Policy settings in MS Windows? |
GPUPDATE |
|
A command-line command in MS Windows that displays Group Policy information for a machine or user is known as: |
GPRESULT |
|
Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers) |
DIR DIR *.* |
|
Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select all that apply) |
[command name] /? help [command name] |
|
Windows Task Scheduler is a component of Microsoft Windows that provides the ability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut which can be used to launch the Task Scheduler MMC snap-in? |
Administrative Tools menu in Windows Control Panel |
|
Which tab of the MSCONFIG utility in Windows lists choices for startup configuration modes? |
general |
|
Which of the configuration features listed below can be managed through the MSCONFIG Boot tab? (Select all that apply)
|
boot logging defaul os to load safe boot options amout of hardware resources used by selected os in multiboot enviroment |
|
In Windows 8 and later releases, contents of the MSCONFIG's Startup tab can be viewed and managed via: |
task manager |
|
Which of the answers listed below describe(s) the function of Windows Task Manager? (Select all that apply) |
Allows system administrators for managing the currently logged-in users |
|
Which of the following answers list Windows Task Manager tabs available only in Windows 7 and earlier releases of the Microsoft OS? (Select all that apply)
|
applications processes performance networking |
|
Which of the Windows Task Manager tabs in Windows 8 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS?
|
Performance |
|
Which of the following provide(s) access to the Disk Management utility in Windows? (Select all that apply) |
computer management command prompt |
|
A temporary disk status set to "Initializing" indicates that a basic disk is in the process of being converted into a dynamic disk. |
True |
|
Which of the following answers list(s) the correct sequence of steps for reducing partition size in Windows Disk Management utility? (Select all that apply) |
Right-click on a partition, select "Shrink Volume..." option from the pop-up menu, in the launched pop-up window enter the amount of space to shrink in MB, click the "Shrink" button Left-click on a partition in order to select it, in Disk Management Action menu select All Tasks menu item, select "Shrink Volume..." option, in the launched pop-up window enter the amount of space to shrink in MB, click the "Shrink" button |
|
Which of the following Windows tools allow(s) for migrating user data and user information to a new computer? (Select all that apply)
|
Windows Easy Transfer Files an settings transfer Wizard usmt(user state migration tool) |
|
Which of the following answers refers to the MS Windows client application for Remote Desktop Services? |
mstsc-microsoft terminal server connection |
|
Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all volumes? |
/C |
|
Which of the following locations in MS Windows provide(s) access to the Internet Properties (INETCPL.CPL) system utility? (Select all that apply)
|
nternet Options applet in Windows Control Panel Internet Options menu item in Internet Explorer's Tools menu Network and Sharing Center applet in Windows Control Panel (MS Vista and later releases) |
|
finished 7 |
finished 7 |
|
Which of the Windows Internet Properties system utility tabs provides access to proxy settings? |
Connections |
|
The Internet Properties applet tab containing an option for configuring VPN settings is called: |
Connections |
|
The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser. |
True |
|
Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms? |
General |
|
The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)
|
Uninstalling applications
Repair installation of a malfunctioning program Changing application configuration settings Adding/removing Windows components Managing installed updates |
|
Which of the locations listed below allow(s) for making adjustments to the volume of sound in Windows 7 and Windows 8/8.1? (Select 2 answers)
|
Windows Taskbar notification area
Sound applet in Control Panel |
|
The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 is a centralized place providing access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security.
|
true |
|
Which of the signs listed below indicates that a Windows network share is intended for administrative access? |
$ |
|
In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is: |
Hidden |
|
A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network technologies is known as: |
wwan wireless wide area network |
|
Which of the statements listed below refer(s) to the Windows Remote Assistance utility? (Select all that apply)
|
Access based on one-time password Temporal remote access ( The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting |
|
Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)
|
Permanent remote access
Access based on local password (local user account password) ( Windows tool used for connecting remotely to the user's own computer |
|
Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?
|
Windows Firewall (Advanced settings)
|
|
Which of the locations listed below allow(s) for enabling/disabling Windows Firewall? (Select all that apply)
|
windows firewall windows firewall with avdvanced security |
|
Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)
|
IP address
Subnet mask ( Default gateway DNS server address |
|
If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place: |
Only in one direction at a time |
|
Which of the answers listed below describe(s) the function of Differentiated Services Code Point (DSCP) architecture? (Select all that apply)
|
network traffic managment quality of service |
|
The backup utility in Windows 8 that allows for restoration of different versions of saved personal files is called:
|
file history |
|
What is the function of archive bit?
|
indicate file has been modified since last backup |
|
Which of the following allows for backing up the entire Windows installation and restoring the entire contents of the drive in case of hard drive failure? |
system image |
|
An unresponsive application/process in Mac OS can be terminated with the use of: |
force quit |
|
A Mac OS X system feature providing a single-screen thumbnail preview of all open windows and applications is called: |
mission control |
|
Which of the following Mac OS features allows for creation of switchable desktop environments? |
spaces |
|
A command-line command in Linux that allows to search files for lines containing a match to a given pattern is called: |
grep globally search a regular expression and print |
|
The following command can be used for turning off or restarting a Linux host. |
shutdown |
|
A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called: |
pwd print working directory |
|
A Linux command used for transferring files/directories to a different directory is called: |
mv |
|
Which of the answers listed below refers to a Unix command for copying files and directories? |
cp |
|
What is the name of a Linux command used for renaming files and directories? |
mv |
|
A command-line command in Linux used for deleting files and directories is known as: |
rm |
|
What is the name of a Linux command-line utility used for reporting statistics on running processes? |
ps |
|
Which of the answers listed below refers to a Linux command that allows for assuming the identity of a different system user and executing commands with security privileges of that user account? |
su-subsitute user |
|
A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called: |
dd used for creating files ystem backups |
|
Which of the following statements describe(s) disadvantages of virtualization? (Select all that apply) |
degrading effect on performance the more vms are running hardware becomes single point of failure |
|
In which of the cloud computing service models clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software? |
IaaS infrastructure as a service |
|
Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?
|
PaaS platform as a service |
|
Which of the answers listed below refers to a cloud computing deployment model in which the cloud infrastructure is provisioned for open use by the general public? |
public cloud |
|
Which of the terms listed below refers to a cloud computing feature that allows for automatic allocation of computing resources in proportion with the demand?
|
rapid elasticity |
|
The term "Unified Threat Management" (UTM) refers to a
|
network security solution (commonly in the form of a dedicated device called UTM appliance) which combines the functionality of a firewall with additional safeguards such as for example URL filtering, spam filtering, gateway antivirus protection, intrusion detection or prevention, content inspection, or malware inspection.
|
|
The term "Intrusion Detection System" (IDS) refers to a
|
device or software application designed to detect malicious activities and violations of security policies on a network and/or computer host. An IDS designed to monitor networks is known as Network Intrusion Detection System (NIDS), an IDS installed on a particular host monitoring only that host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.
|
|
Which of the answers listed below illustrates the difference between passive and active security breach response? |
IDS vs. IPS intrusion detection, logging and alerting
IPS intrusion prevention system, firewall, control devices, looks through rules looking for reasons to drop packets |
|
Modern mobile devices have the capability to present landscape or portrait views of the device's screen based on the way the device is being held. Which of the following built-in functionalities allows for determining screen orientation in those devices? |
dumb , accelerator :measures acceleration, also static forces, such as gravity |
|
Personal Area Network (PAN) over Bluetooth is known as: |
piconet -master slave network, 2 to 8 devices |
|
Mobile device email configuration settings required for retrieval of messages from a mail server include: (Select all that apply) |
imap pop3 only smtp for sending on clients |
|
Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply) |
ssl tls tcp port 995 |
|
What are the characteristic features of the secure version of IMAP? (Select all that apply)
|
ssl tls tcp port 993 |
|
What is the name of an email server software product developed by Microsoft?
|
dumb. exchange |
|
What is specification that extends the email message format beyond simple text enabling the transfer of graphics, audio, and video files over the Internet mail system.
|
Multipurpose Internet Mail Extensions (MIME)
|
|
Which of the following answers refer to S/MIME? (Select 2 answers)
|
Digital signatures
Encryption |
|
Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?
|
pri product release instructions |
|
A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:
|
preferred roaming list |
|
Which of the following answers refers to a unique number used for identification of a physical mobile device?
|
imei international mobile equipment identifier |
|
A unique number used for identification of a mobile network phone user is known as:
|
international mobile subsciber identity imsi |
|
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is commonly referred to as:
|
Single Sign-On (SSO)
|
|
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
|
smtp simple mail tranfer protocol |
|
Which of the following fall(s) into the category of social engineering attacks? (Select all that apply)
|
spear phishing shoulder surfing tailgating |
|
What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software? |
nac network access control unifies endpoint security with network security enforcement |
|
Which of the following is an example of active eavesdropping?
|
MITM, man in the middle, controls conversation, can insert |
|
The two factors that are considered important for creating strong passwords are:
|
password length password complexity |
|
A router configuration feature that allows for opening an inbound port temporarily based on the outbound requests made by hosts placed inside a private network is called:
|
port triggering |
|
________ provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis.
|
static network address ranslation |
|
________ provides a mapping between private IP address and any of the IP addresses belonging to the available public IP address pool.
|
dynamic network address translation |
|
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network?
|
wps, wifi protected setup |
|
Which of the following enables broadband Internet access based on the cable television infrastructure?
|
docsis data over cable service interface spec |
|
What is the most common type of a DSL Internet access?
|
adsl asymmetric digital subscriber line 5 down, 1 up typical |
|
Which of the following solutions allows for simultaneous digital transmission of voice, video, data, and other network services over a PSTN?
|
isdn integrated services digital network |
|
The process of OS hardening involves: (Select all that apply)
|
disabling unesecary services patch/update management process fixing config issues |
|
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
|
degaussing |
|
Which of the Windows utilities listed below is used for the purpose of hard drive low-level formatting? |
only third party tools, mainly manufacturers |
|
Disabling SSID broadcast:
|
"harder" to discover... |
|
Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage? (Select 2 answers)
|
WAP power level controls heat map |
|
Which of the following solutions would be the easiest while troubleshooting Windows blue screen?
|
dumb bs. restart |
|
What is the name of the boot loader software used in Windows Vista and later releases of the Microsoft OS?
|
winload.exe |
|
A boot loader application used in Windows XP is called:
|
NTLDR |
|
Which of the following allows to force Windows into Safe mode during next system boot?
|
MSCONFIG safe boot in boot tab |
|
Automatic boot to Windows Recovery Environment (WinRE) in Windows 8/8.1 requires the system to fail the boot process three times.
|
true |
|
Which of the files listed below are required to start Windows XP? (Select 3 answers)
|
NTLDR NTDETECT.COM BOOT.INI |
|
Startup files required to launch Windows Vista/7/8/8.1 include: (Select 3 answers)
|
BCD boot config data BOOTMGR WINLOAD.EXE |
|
What is the name of a Windows tool that can be used for troubleshooting problems related to Dynamic-Link Libraries (DLLs) and ActiveX controls?
|
REGSVR32 microsoft register server, register unreg dlls and activeX controls in regisry |
|
Which of the following could cause slow performance of a hard drive?
|
file fragmentation insufficient ram disk thrashing (excessive page file usage) |
|
What is the correct sequence of steps for launching the disk defragmenter utility in MS Windows? (Select 3 answers)
|
cmd defrag tools defrag |
|
Which of the following might be the cause of slow computer system performance? (Select all that apply)
|
unpatched os malware os power management fragmentation disk thrashing |
|
Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers)
|
msconfig settings corrupt device drier |
|
Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply)
|
system restore drivr rollback malware removal startup repair utility |
|
Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed during system boot? (Select 2 answers)
|
corrupt ntldr nonbootable drive |
|
While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following BOOTREC options should be used by a technician for manual CLI troubleshooting of this error?
|
bootrec /rebuildbcd |
|
Which of the solutions/software tools listed below would be of use when troubleshooting a missing system GUI in MS Windows? (Select all that apply)
|
safe mode video driver update system file checker SFC vga mode |
|
"Kernel panic" is a term used to describe stop errors in: (Select all that apply) |
linux osx |
|
Which of the following locations would be the right source for finding information pertaining to a digital certificate validity?
|
browser padlock icon |
|
One of the recommended ways for enhancing a mobile device's security includes employing a web-based service (an app scanner) that allows users to check for known potential security/privacy risks related to a mobile application before downloading/purchasing the app.
|
true...(name one) |
|
Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply)
|
bateries crts toner |
|
Which of the following actions should be the first step in the troubleshooting process?
|
identifying problem |
|
Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.
|
false |
|
The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures.
|
true |