• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/74

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

74 Cards in this Set

  • Front
  • Back
What version of Windows XP can join a domain?
Professional
What version of Windows XP allows for the PC to be used for recording television?
Media Center
What is the maximum amount of RAM that can be installed on a PC for a 32-bit OS?
4 GB
Which of the following types of programs will not run on a 64-bit OS?
16-bit
Which of the following cannot be installed on a 64-bit OS?
32-bit device drivers
What can be entered at the command line to locate the System Folder?
cd %systemroot%
What folder contatins the critical system files for Windows 7?
C:\Windows\System32
Where are unique user settings found in Windows XP?
C:\Documents and Settings
Which Control Panel view lists programs by group?
Category View
What Microsoft tool allows for you to create your own toolbox?
MMC
What is the lowest version of Windows 7 that allows for Volume licensing?
Professional
What is the maximum amount of RAM that can be installed on a 64-bit version of Windows 7 Professional?
192 GB
What is the name of the tool that allows for a fully functional version of Windows XP to run in Windows 7?
Windows XP Mode
A user is having difficulty using Bitlocker with Windows 7 Professional? What is the problem?
Bitlocker can not be used in the Professional version of Windows 7
What is the minimum amount of RAM required to install the 64-bit version of Windows 7?
2 GB
How much additional RAM is required to use Windows XP mode in Windows 7?
1 GB
Which Aero tool allows for you to grab the Title bar of the Windows you want to focus on and then move themouse back and forth causing all other open Windows to be minimized?
Shake
What Windows tool allows for a centralized location that allows you to view Security Alerts?
Action Center
What Windows tool that originated in Windows Vista notifies you when a program attempts to make a changeto the computer?
UAC
Which program provides for antispyware protection in Windows?
Windows Defender
Which tool in Windows examines packets from the network as they arrive on the PC?
Windows Firewall
What Windows tool allows for flash memory to be used as additional cache memory for a PC?
ReadyBoost
A user attempts to run a new program that they downloaded and it will not run? The user determines that thisprogram was created for Windows XP and is not available for Windows 7. What should the user do to run thisprogram?
Run the program in compatibility mode for Windows XP
Which Windows tool allows for a user to collect files from Windows XP and then migrated to Windows 7?
WET
What is the maximum partition size limit for FAT32?
32 GB
Which of the following NTFS tools allows for an administrator to control how much storage a user can accesson a shared PC?
Disk Quotas
What type of OS installation does not require the admin to reinstall programs?
Upgrade install
Which of the following operating system versions is the minimum version can be upgraded to Windows 7?
Windows Vista SP 1
What disk type is installed by default on a new installation?
Basic
How many primary partitions can be created in a Windows OS?
4
What is the drive called when it is located in the Extended partition?
Logical
An admin wants to permanently disable specific services from running in the background on a PC. WhatWindows tool will be used for this purpose?
msconfig.exe
Which of the following is not a method used to access Task Manager?
Ctrl+Shift+Delete
Which key combination will allow you to minimize all open Windows?
Windows+D
A technician deleted a file and now can not find it in the Recycle Bin to recover the file? What happened?
The technician used Shift+Del to delete the file
What key combination will undo a change that you just made in a Word document?
Ctrl+Z
What command was available in Windows 2000 to access the registry?
regedt32
Which registry hive stores information related to what application will open when a file is double-clicked?
HKEY_CLASSES_ROOT
Which registry hive stores the Security Account Manager?
HKEY_LOCAL_MACHINE
Which registry hive contains Plug and Play information about the hardware?
HKEY_CURRENT_CONFIG
Which networking command allows you to see what ports are open on your PC?
netstat
An admin needs to identify where the failure is occuring outside of his network between his two corporatelocations. What command will be used for this purpose?
tracert
What command run from Recovery Console allows you to recreate the boot sector by reparing the boot.ini file?
fixboot
What command run from Recovery Console allows you to repair the boot record?
fixmbr
Which command allows you to delete multiple files from command line?
del
A user needs access to a folder on the network at all times. What should the admin do to make sure it isavailable?
Map the drive and select reconnect at logon
What type of network connection allows for traffic to only travel in one direction at a time?
Half duplex
What allows for power to be provided to a VoIP phone by connecting it to a switch?
PoE
What is the service that allows for us to prioritize traffic in our networks?
QoS
Which of the following is not a private address?
172.32.15.74
What networking service allows for one public IP address to represent many private IP addresses?
NAT
What service allows for incoming traffic to be sent to the appropriate server?
Port Forwarding
Which of the following is not a best practice for preventative maintenance in our computer networks?
Reinstall Windows every six months
In a network environment, it is only necessary to update the Windows Operating System installed on your clientmachines.
False
What Windows tool allows us to reset the OS to the way the OS was configured at a previous point in time?
System Restore
Which component of the CIA triad is associated with the use of authorization and encryption?
Confidentiality
Which component of the CIA triad is associated with ensuring data validity?
Integrity
Which component of the CIA triad is associated with providing data to users in a timely manner?
Availability
Which component of a AAA server involves controlling access to resources based on identity?
Authorization
Which component of a AAA server involves documenting the actions taken by a user while they are in thenetwork?
Accounting
The concept that users should be given no more capacities than required to perform their responsibilities is known as the _______________________________________.
Principle of Least Privilege
When we close ports that are not being used on a server, we are reducing that server's________________________.
Attack Surface
The concept of layered security is also known as _________________________.
Defense-in-Depth
What type of attack is defined as a server being attacked in order to prevent it from servicing valid clients?
DoS
What type of malware is self replicating?
Worm
A network administrator has added some code into Active Directory.He is fired and when the new network administrator removes the user account for the fired administrator, thescreen goes black and a single word pops up on the screen that says BINGO! The network administrator nowhas to troubleshoot the system to see if he can find a way to get Active Directory to function properly again.What type of malware does this describe?
Logic bomb
An employee opens up a spreadsheet that he'd received in his e-mail and suddenly his computer locks up andon reboot Windows will load, but then locks up again.What type of virus does this describe?
Macro virus
What is the first thing a technician should do when a server is identified to have a virus?
Unplug the server from the network
An employee receives a phone call and the caller states that they are the new network administrator and therehas been a potential breach of security.The caller then states that he needs the employee's username and password in order to verify that theemployee's account wasn't breached.What type of attack just took place?
Social Engineering
Which of the following is not an element associated with Physical Security?
Require strong passwords
Which NTFS permission includes the ability to delete files or subfolders, but not the ability to take ownership?
Modify
What vendor provides access to applications on mobile devices via its App Store?
Apple
Which of the following is not a requirement for Bluetooth pairing?
Reboot the phone
An employee is having a problem with their mobile phone and they bring it to you for resolution.When you push on an app, the app above opens instead. What needs to be done to resolve this issue?
Recalibrate the phone