Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
74 Cards in this Set
- Front
- Back
What version of Windows XP can join a domain?
|
Professional
|
|
What version of Windows XP allows for the PC to be used for recording television?
|
Media Center
|
|
What is the maximum amount of RAM that can be installed on a PC for a 32-bit OS?
|
4 GB
|
|
Which of the following types of programs will not run on a 64-bit OS?
|
16-bit
|
|
Which of the following cannot be installed on a 64-bit OS?
|
32-bit device drivers
|
|
What can be entered at the command line to locate the System Folder?
|
cd %systemroot%
|
|
What folder contatins the critical system files for Windows 7?
|
C:\Windows\System32
|
|
Where are unique user settings found in Windows XP?
|
C:\Documents and Settings
|
|
Which Control Panel view lists programs by group?
|
Category View
|
|
What Microsoft tool allows for you to create your own toolbox?
|
MMC
|
|
What is the lowest version of Windows 7 that allows for Volume licensing?
|
Professional
|
|
What is the maximum amount of RAM that can be installed on a 64-bit version of Windows 7 Professional?
|
192 GB
|
|
What is the name of the tool that allows for a fully functional version of Windows XP to run in Windows 7?
|
Windows XP Mode
|
|
A user is having difficulty using Bitlocker with Windows 7 Professional? What is the problem?
|
Bitlocker can not be used in the Professional version of Windows 7
|
|
What is the minimum amount of RAM required to install the 64-bit version of Windows 7?
|
2 GB
|
|
How much additional RAM is required to use Windows XP mode in Windows 7?
|
1 GB
|
|
Which Aero tool allows for you to grab the Title bar of the Windows you want to focus on and then move themouse back and forth causing all other open Windows to be minimized?
|
Shake
|
|
What Windows tool allows for a centralized location that allows you to view Security Alerts?
|
Action Center
|
|
What Windows tool that originated in Windows Vista notifies you when a program attempts to make a changeto the computer?
|
UAC
|
|
Which program provides for antispyware protection in Windows?
|
Windows Defender
|
|
Which tool in Windows examines packets from the network as they arrive on the PC?
|
Windows Firewall
|
|
What Windows tool allows for flash memory to be used as additional cache memory for a PC?
|
ReadyBoost
|
|
A user attempts to run a new program that they downloaded and it will not run? The user determines that thisprogram was created for Windows XP and is not available for Windows 7. What should the user do to run thisprogram?
|
Run the program in compatibility mode for Windows XP
|
|
Which Windows tool allows for a user to collect files from Windows XP and then migrated to Windows 7?
|
WET
|
|
What is the maximum partition size limit for FAT32?
|
32 GB
|
|
Which of the following NTFS tools allows for an administrator to control how much storage a user can accesson a shared PC?
|
Disk Quotas
|
|
What type of OS installation does not require the admin to reinstall programs?
|
Upgrade install
|
|
Which of the following operating system versions is the minimum version can be upgraded to Windows 7?
|
Windows Vista SP 1
|
|
What disk type is installed by default on a new installation?
|
Basic
|
|
How many primary partitions can be created in a Windows OS?
|
4
|
|
What is the drive called when it is located in the Extended partition?
|
Logical
|
|
An admin wants to permanently disable specific services from running in the background on a PC. WhatWindows tool will be used for this purpose?
|
msconfig.exe
|
|
Which of the following is not a method used to access Task Manager?
|
Ctrl+Shift+Delete
|
|
Which key combination will allow you to minimize all open Windows?
|
Windows+D
|
|
A technician deleted a file and now can not find it in the Recycle Bin to recover the file? What happened?
|
The technician used Shift+Del to delete the file
|
|
What key combination will undo a change that you just made in a Word document?
|
Ctrl+Z
|
|
What command was available in Windows 2000 to access the registry?
|
regedt32
|
|
Which registry hive stores information related to what application will open when a file is double-clicked?
|
HKEY_CLASSES_ROOT
|
|
Which registry hive stores the Security Account Manager?
|
HKEY_LOCAL_MACHINE
|
|
Which registry hive contains Plug and Play information about the hardware?
|
HKEY_CURRENT_CONFIG
|
|
Which networking command allows you to see what ports are open on your PC?
|
netstat
|
|
An admin needs to identify where the failure is occuring outside of his network between his two corporatelocations. What command will be used for this purpose?
|
tracert
|
|
What command run from Recovery Console allows you to recreate the boot sector by reparing the boot.ini file?
|
fixboot
|
|
What command run from Recovery Console allows you to repair the boot record?
|
fixmbr
|
|
Which command allows you to delete multiple files from command line?
|
del
|
|
A user needs access to a folder on the network at all times. What should the admin do to make sure it isavailable?
|
Map the drive and select reconnect at logon
|
|
What type of network connection allows for traffic to only travel in one direction at a time?
|
Half duplex
|
|
What allows for power to be provided to a VoIP phone by connecting it to a switch?
|
PoE
|
|
What is the service that allows for us to prioritize traffic in our networks?
|
QoS
|
|
Which of the following is not a private address?
|
172.32.15.74
|
|
What networking service allows for one public IP address to represent many private IP addresses?
|
NAT
|
|
What service allows for incoming traffic to be sent to the appropriate server?
|
Port Forwarding
|
|
Which of the following is not a best practice for preventative maintenance in our computer networks?
|
Reinstall Windows every six months
|
|
In a network environment, it is only necessary to update the Windows Operating System installed on your clientmachines.
|
False
|
|
What Windows tool allows us to reset the OS to the way the OS was configured at a previous point in time?
|
System Restore
|
|
Which component of the CIA triad is associated with the use of authorization and encryption?
|
Confidentiality
|
|
Which component of the CIA triad is associated with ensuring data validity?
|
Integrity
|
|
Which component of the CIA triad is associated with providing data to users in a timely manner?
|
Availability
|
|
Which component of a AAA server involves controlling access to resources based on identity?
|
Authorization
|
|
Which component of a AAA server involves documenting the actions taken by a user while they are in thenetwork?
|
Accounting
|
|
The concept that users should be given no more capacities than required to perform their responsibilities is known as the _______________________________________.
|
Principle of Least Privilege
|
|
When we close ports that are not being used on a server, we are reducing that server's________________________.
|
Attack Surface
|
|
The concept of layered security is also known as _________________________.
|
Defense-in-Depth
|
|
What type of attack is defined as a server being attacked in order to prevent it from servicing valid clients?
|
DoS
|
|
What type of malware is self replicating?
|
Worm
|
|
A network administrator has added some code into Active Directory.He is fired and when the new network administrator removes the user account for the fired administrator, thescreen goes black and a single word pops up on the screen that says BINGO! The network administrator nowhas to troubleshoot the system to see if he can find a way to get Active Directory to function properly again.What type of malware does this describe?
|
Logic bomb
|
|
An employee opens up a spreadsheet that he'd received in his e-mail and suddenly his computer locks up andon reboot Windows will load, but then locks up again.What type of virus does this describe?
|
Macro virus
|
|
What is the first thing a technician should do when a server is identified to have a virus?
|
Unplug the server from the network
|
|
An employee receives a phone call and the caller states that they are the new network administrator and therehas been a potential breach of security.The caller then states that he needs the employee's username and password in order to verify that theemployee's account wasn't breached.What type of attack just took place?
|
Social Engineering
|
|
Which of the following is not an element associated with Physical Security?
|
Require strong passwords
|
|
Which NTFS permission includes the ability to delete files or subfolders, but not the ability to take ownership?
|
Modify
|
|
What vendor provides access to applications on mobile devices via its App Store?
|
Apple
|
|
Which of the following is not a requirement for Bluetooth pairing?
|
Reboot the phone
|
|
An employee is having a problem with their mobile phone and they bring it to you for resolution.When you push on an app, the app above opens instead. What needs to be done to resolve this issue?
|
Recalibrate the phone
|