• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/137

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

137 Cards in this Set

  • Front
  • Back

Which of the answers listed below describe(s) the features of Windows XP Mode? (Select all that apply)

Available for Microsoft Windows 7


Fully-licensed version of Windows XP


Requires Windows Virtual PC


Fully-functional version of Windows XP


Guest OS run in a virtual environment

A Windows Vista operating system security and maintenance monitoring component is called:

Windows Security Center

What is the name of a system component designed for monitoring security and maintenance-related items in Windows 7/8/8.1?

Action Center

An online Microsoft software distribution platform for games and apps is known as:

Windows Store

An operating system installation that preserves system settings, personal files, and applications from the older OS version is referred to as:

In-place upgrade

Which of the in-place upgrade paths listed below are not available for users who wish to migrate their OS from an older version to a newer release of MS Windows? (Select all that apply)

Windows XP to Windows 8


x86 to x64


Windows Vista to Windows 8


Windows XP to Windows 7



While upgrading from an earlier edition of Windows to Windows 7 it is important to make sure that programs and devices will work with the new OS version. To find potential compatibility problems with computer's hardware, devices, or programs that might affect the installation of Windows 7, Microsoft offers a free utility designed to check for any issues and to provide recommendations on what to do before performing an upgrade to improve the PC's compatibility with Windows 7. What is the name of that utility?

Windows 7 Upgrade Advisor

Which of the new built-in software options added in Windows 8 allows for reinstallation of the OS without affecting the existing user profiles and settings?

Refresh

A new maintenance feature added in Windows 8 that enables clean installation of the OS without the need for installation media is called:

Reset

Which of the answers listed below describe the available options of the Master Boot Record (MBR) partitioning scheme? (Select 3 answers)

Overall number of partitions limited to four


Up to three primary partitions and one extended partition


Up to four primary partitions

Which of the following terms refer to methods of storing and accessing data over computer network? (Select 2 answers)

dfs-microsofts disributed file system


nfs-sun microsystems network file system

Which of the following sources allow(s) for obtaining, installing, and updating device drivers used by Microsoft Windows OSs? (Select all that apply)

Windows Update


Device manufacturer



Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)

Windows-based computers on a network must be part of a workgroup or a domain


Windows-based computers on workplace networks are usually part of a domain


Windows-based computers on home networks are usually part of a workgroup

Which of the answers listed below refers to the correct syntax for a Windows Command Prompt TASKKILL command that would allow to close NOTEPAD.EXE by providing its imagename?

TASKKILL /IM NOTEPAD.EXE

Which of the Windows Command Prompt commands writes a new master boot record to a disk?

BOOTREC /FIXMBR

Which of the following commands in Windows Command Prompt writes a new boot sector to the system partition?

BOOTREC /FIXBOOT

Which SHUTDOWN command switch in Windows Command Prompt forces full system shutdown and restart of the Windows host?

/r

Which of the following commands in Windows change(s) the current directory to the root directory? (Select all that apply)

cd\


chdir\

Which of the Windows Command Prompt commands listed below can be used to delete one or more files? (Select all that apply)

del


erase



Which of the COPY command switches verifies that the new files are written correctly?

/V

Which of the COPY command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file?

/Y

Which of the Microsoft Windows command-line commands allow(s) for copying multiple files or entire directory trees from one directory to another and for copying files across a network? (Select all that apply)

xcopy


robocopy

The SFC utility in Windows:

Scans for and restores corrupted system files

The /R switch of the CHKDSK utility: (Select all that apply)

Locates bad sectors and recovers readable information


Fixes errors on the disk

Which of the command-line commands listed below allows for updating multiple Group Policy settings in MS Windows?

GPUPDATE

A command-line command in MS Windows that displays Group Policy information for a machine or user is known as:

GPRESULT

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers)

DIR


DIR *.*

Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select all that apply)

[command name] /?


help [command name]

Windows Task Scheduler is a component of Microsoft Windows that provides the ability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut which can be used to launch the Task Scheduler MMC snap-in?

Administrative Tools menu in Windows Control Panel

Which tab of the MSCONFIG utility in Windows lists choices for startup configuration modes?

general

Which of the configuration features listed below can be managed through the MSCONFIG Boot tab? (Select all that apply)

boot logging


defaul os to load


safe boot options


amout of hardware resources used by selected os in multiboot enviroment

In Windows 8 and later releases, contents of the MSCONFIG's Startup tab can be viewed and managed via:

task manager

Which of the answers listed below describe(s) the function of Windows Task Manager? (Select all that apply)

Allows system administrators for managing the currently logged-in users

Which of the following answers list Windows Task Manager tabs available only in Windows 7 and earlier releases of the Microsoft OS? (Select all that apply)

applications


processes


performance


networking

Which of the Windows Task Manager tabs in Windows 8 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS?

Performance

Which of the following provide(s) access to the Disk Management utility in Windows? (Select all that apply)

computer management


command prompt



A temporary disk status set to "Initializing" indicates that a basic disk is in the process of being converted into a dynamic disk.

True

Which of the following answers list(s) the correct sequence of steps for reducing partition size in Windows Disk Management utility? (Select all that apply)

Right-click on a partition, select "Shrink Volume..." option from the pop-up menu, in the launched pop-up window enter the amount of space to shrink in MB, click the "Shrink" button




Left-click on a partition in order to select it, in Disk Management Action menu select All Tasks menu item, select "Shrink Volume..." option, in the launched pop-up window enter the amount of space to shrink in MB, click the "Shrink" button

Which of the following Windows tools allow(s) for migrating user data and user information to a new computer? (Select all that apply)

Windows Easy Transfer


Files an settings transfer Wizard


usmt(user state migration tool)

Which of the following answers refers to the MS Windows client application for Remote Desktop Services?

mstsc-microsoft terminal server connection

Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all volumes?

/C

Which of the following locations in MS Windows provide(s) access to the Internet Properties (INETCPL.CPL) system utility? (Select all that apply)

nternet Options applet in Windows Control Panel


Internet Options menu item in Internet Explorer's Tools menu


Network and Sharing Center applet in Windows Control Panel (MS Vista and later releases)

finished 7

finished 7

Which of the Windows Internet Properties system utility tabs provides access to proxy settings?

Connections

The Internet Properties applet tab containing an option for configuring VPN settings is called:

Connections

The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser.

True

Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms?

General

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)
Uninstalling applications

Repair installation of a malfunctioning program


Changing application configuration settings


Adding/removing Windows components


Managing installed updates

Which of the locations listed below allow(s) for making adjustments to the volume of sound in Windows 7 and Windows 8/8.1? (Select 2 answers)
Windows Taskbar notification area

Sound applet in Control Panel

The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 is a centralized place providing access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security.

true

Which of the signs listed below indicates that a Windows network share is intended for administrative access?

$

In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden

A type of wireless network providing high-speed Internet access through mobile telecommunication cellular network technologies is known as:

wwan wireless wide area network

Which of the statements listed below refer(s) to the Windows Remote Assistance utility? (Select all that apply)

Access based on one-time password


Temporal remote access (


The host and invited user can both see the host's screen


The host and invited user share control over host's mouse and keyboard


Windows tool used for assisted remote troubleshooting

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)
Permanent remote access

Access based on local password (local user account password) (


Windows tool used for connecting remotely to the user's own computer

Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?
Windows Firewall (Advanced settings)
Which of the locations listed below allow(s) for enabling/disabling Windows Firewall? (Select all that apply)

windows firewall


windows firewall with avdvanced security

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)
IP address

Subnet mask (


Default gateway


DNS server address





If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place:

Only in one direction at a time

Which of the answers listed below describe(s) the function of Differentiated Services Code Point (DSCP) architecture? (Select all that apply)

network traffic managment


quality of service



The backup utility in Windows 8 that allows for restoration of different versions of saved personal files is called:

file history

What is the function of archive bit?

indicate file has been modified since last backup

Which of the following allows for backing up the entire Windows installation and restoring the entire contents of the drive in case of hard drive failure?

system image

An unresponsive application/process in Mac OS can be terminated with the use of:

force quit



A Mac OS X system feature providing a single-screen thumbnail preview of all open windows and applications is called:

mission control

Which of the following Mac OS features allows for creation of switchable desktop environments?

spaces

A command-line command in Linux that allows to search files for lines containing a match to a given pattern is called:

grep globally search a regular expression and print

The following command can be used for turning off or restarting a Linux host.

shutdown

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

pwd print working directory

A Linux command used for transferring files/directories to a different directory is called:

mv

Which of the answers listed below refers to a Unix command for copying files and directories?

cp

What is the name of a Linux command used for renaming files and directories?

mv

A command-line command in Linux used for deleting files and directories is known as:

rm

What is the name of a Linux command-line utility used for reporting statistics on running processes?

ps

Which of the answers listed below refers to a Linux command that allows for assuming the identity of a different system user and executing commands with security privileges of that user account?

su-subsitute user



A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

dd used for creating files ystem backups

Which of the following statements describe(s) disadvantages of virtualization? (Select all that apply)

degrading effect on performance the more vms are running


hardware becomes single point of failure

In which of the cloud computing service models clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

IaaS infrastructure as a service

Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?

PaaS platform as a service

Which of the answers listed below refers to a cloud computing deployment model in which the cloud infrastructure is provisioned for open use by the general public?

public cloud

Which of the terms listed below refers to a cloud computing feature that allows for automatic allocation of computing resources in proportion with the demand?

rapid elasticity

The term "Unified Threat Management" (UTM) refers to a
network security solution (commonly in the form of a dedicated device called UTM appliance) which combines the functionality of a firewall with additional safeguards such as for example URL filtering, spam filtering, gateway antivirus protection, intrusion detection or prevention, content inspection, or malware inspection.
The term "Intrusion Detection System" (IDS) refers to a
device or software application designed to detect malicious activities and violations of security policies on a network and/or computer host. An IDS designed to monitor networks is known as Network Intrusion Detection System (NIDS), an IDS installed on a particular host monitoring only that host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.

Which of the answers listed below illustrates the difference between passive and active security breach response?

IDS vs. IPS intrusion detection, logging and alerting

IPS intrusion prevention system, firewall, control devices, looks through rules looking for reasons to drop packets

Modern mobile devices have the capability to present landscape or portrait views of the device's screen based on the way the device is being held. Which of the following built-in functionalities allows for determining screen orientation in those devices?

dumb , accelerator :measures acceleration, also static forces, such as gravity

Personal Area Network (PAN) over Bluetooth is known as:

piconet -master slave network, 2 to 8 devices

Mobile device email configuration settings required for retrieval of messages from a mail server include: (Select all that apply)

imap


pop3


only smtp for sending on clients

Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)

ssl


tls


tcp port 995

What are the characteristic features of the secure version of IMAP? (Select all that apply)

ssl


tls


tcp port 993

What is the name of an email server software product developed by Microsoft?

dumb. exchange

What is specification that extends the email message format beyond simple text enabling the transfer of graphics, audio, and video files over the Internet mail system.
Multipurpose Internet Mail Extensions (MIME)
Which of the following answers refer to S/MIME? (Select 2 answers)
Digital signatures

Encryption

Which of the answers listed below refers to the default configuration settings a mobile device is shipped with?

pri product release instructions

A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower is called:

preferred roaming list

Which of the following answers refers to a unique number used for identification of a physical mobile device?

imei international mobile equipment identifier

A unique number used for identification of a mobile network phone user is known as:

international mobile subsciber identity imsi

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is commonly referred to as:
Single Sign-On (SSO)
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?

smtp simple mail tranfer protocol

Which of the following fall(s) into the category of social engineering attacks? (Select all that apply)

spear phishing


shoulder surfing


tailgating




What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software?



nac network access control unifies endpoint security with network security enforcement

Which of the following is an example of active eavesdropping?

MITM, man in the middle, controls conversation, can insert

The two factors that are considered important for creating strong passwords are:

password length


password complexity

A router configuration feature that allows for opening an inbound port temporarily based on the outbound requests made by hosts placed inside a private network is called:

port triggering

________ provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis.

static network address ranslation

________ provides a mapping between private IP address and any of the IP addresses belonging to the available public IP address pool.

dynamic network address translation

Which of the following technologies simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network?

wps, wifi protected setup

Which of the following enables broadband Internet access based on the cable television infrastructure?

docsis data over cable service interface spec

What is the most common type of a DSL Internet access?

adsl asymmetric digital subscriber line 5 down, 1 up typical

Which of the following solutions allows for simultaneous digital transmission of voice, video, data, and other network services over a PSTN?

isdn integrated services digital network

The process of OS hardening involves: (Select all that apply)

disabling unesecary services


patch/update management process


fixing config issues

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

degaussing



Which of the Windows utilities listed below is used for the purpose of hard drive low-level formatting?

only third party tools, mainly manufacturers



Disabling SSID broadcast:

"harder" to discover...

Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage? (Select 2 answers)

WAP power level controls


heat map

Which of the following solutions would be the easiest while troubleshooting Windows blue screen?

dumb bs. restart

What is the name of the boot loader software used in Windows Vista and later releases of the Microsoft OS?

winload.exe

A boot loader application used in Windows XP is called:

NTLDR

Which of the following allows to force Windows into Safe mode during next system boot?

MSCONFIG safe boot in boot tab

Automatic boot to Windows Recovery Environment (WinRE) in Windows 8/8.1 requires the system to fail the boot process three times.

true

Which of the files listed below are required to start Windows XP? (Select 3 answers)

NTLDR


NTDETECT.COM


BOOT.INI

Startup files required to launch Windows Vista/7/8/8.1 include: (Select 3 answers)

BCD boot config data


BOOTMGR


WINLOAD.EXE

What is the name of a Windows tool that can be used for troubleshooting problems related to Dynamic-Link Libraries (DLLs) and ActiveX controls?

REGSVR32 microsoft register server, register unreg dlls and activeX controls in regisry

Which of the following could cause slow performance of a hard drive?

file fragmentation


insufficient ram


disk thrashing (excessive page file usage)

What is the correct sequence of steps for launching the disk defragmenter utility in MS Windows? (Select 3 answers)

cmd defrag


tools defrag

Which of the following might be the cause of slow computer system performance? (Select all that apply)

unpatched os


malware


os power management


fragmentation


disk thrashing





Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers)

msconfig settings


corrupt device drier

Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply)

system restore


drivr rollback


malware removal


startup repair utility

Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed during system boot? (Select 2 answers)

corrupt ntldr


nonbootable drive

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following BOOTREC options should be used by a technician for manual CLI troubleshooting of this error?

bootrec /rebuildbcd

Which of the solutions/software tools listed below would be of use when troubleshooting a missing system GUI in MS Windows? (Select all that apply)

safe mode video driver update


system file checker SFC


vga mode



"Kernel panic" is a term used to describe stop errors in: (Select all that apply)

linux


osx



Which of the following locations would be the right source for finding information pertaining to a digital certificate validity?

browser padlock icon

One of the recommended ways for enhancing a mobile device's security includes employing a web-based service (an app scanner) that allows users to check for known potential security/privacy risks related to a mobile application before downloading/purchasing the app.

true...(name one)

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply)

bateries


crts


toner

Which of the following actions should be the first step in the troubleshooting process?

identifying problem



Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.

false

The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures.

true