• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/82

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

82 Cards in this Set

  • Front
  • Back

Driver

Software file that allows an operating system to communicate with a hardware device.

File Management

Process by which a computer stores and retrieves data.

Hypervisor

Software that allows the creation of virtual machines on a computer.

Standard Permissions

Permissions that are grouped together for easy assignment.

Fat32 File Attributes

Hidden, Read only, Archive, System

Domain Controller

Server responsible for the security administration of the domain.

Driver Signing

Used to minimize risk of adding third party software to your system.

Hives

Structure registry is broken into.

What is not an event viewer class

Installation

Drive Setting in bios for OS

Active

What is replacing MBR in 64 bit versions of Windows?

GPT

CMD to interact with boot sector?

Bootrec

Act of installing multiple OS on a computer and choosing one on boot?

Multi boot installation

Characters in a Windows 8 Key

25

What CMD reduces number of write in a SSD for Windows 8

Winsat formal

HDD space for 32 bit windows 8

16gb

Bootmgr

Windows boot manager bootstraps the system. Starts loading os.

BCD

Boot configuration data holds info about the OS such as its location.

Winload.exe

Loads the OS kernel

Winrusume.exe

If the system is not starting fresh bootmgr calls this file

Ntoskrnl.exe

Windows OS kernel

Location of Windows boot config

\boot

Max RAM in Windows 7 Enterprise

192gb

Restore point location

System protection tab of system properties

Winver

Shows Windows

What is the maximum amount of RAM supported in the 64-bit Enterprise edition of Windows Vista?

You work as technician for McNeil Inc. Mevrick, a sales manager, has a computer running Windows 7 Home at his home. To get all the features of Windows 7, he wants to upgrade his computer to Windows 7 Ultimate.

Windows Anytime Upgrade

You are a network administrator for a company and have decided to change the information related to network configuration. Which Linux command will you use?

As a software developer for a company, you've decided to build and test your web applications in a cloud environment. Which type of cloud service will best meet your needs?

Which of the following should be enabled on WAP to ensure that only certain wireless clients may join the network?

Mark works as a network administrator for NetTech Inc. The company has a Windows domain-based network. A user working on a Windows 8 computer reports that he is unable to access some files on the hard disk. However, he is able to successfully log on and access other files. What should Mark do to resolve the issue?

You're responsible for technical support at a hospital. Recently, all computers have been upgraded to Windows Vista 64-bit. However, you have a particular custom application that runs only in 32-bit. What should you do?

You will need to get the upgraded 64-bit version of the application.

You work as network administrator for a company. You require all the IP configuration information such as an IP address, subnet mask, default gateway, and the address of a DNS server to resolve the network issues. Which of the following server roles must be configured to obtain the information?

Sofia's mobile handset is stolen. She has lost all hopes of finding it back. She is concerned about some secure data saved in the handset. She needs to delete all data from her stolen handset. Which of the following features will allow her to accomplish this?

Remote wipes

You work as technician for Tech Perfect Inc. You have two appointments scheduled for the same time. Which of the following actions will you take to resolve the issue?

Call one of the clients and apologize, then reschedule.

Which of the following parameters is used with the chkdsk utility to fix errors on the disk?

Which of the following is a minimum requirement to play 1080p HD videos from iTunes 12.2 on a Mac?

Which program is really a link to regedit?

You need to install a 64-bit Windows 8 operating system on your home PC. What are the minimum hardware requirements your computer must meet for a successful installation?

20GB hard disk; 1GB RAM

Which of the following is not used to prevent electrostatic discharge?

Surge protector; Wrist strap;


Self grounding; ESD Mat

You have an iPhone, which is running on iOS 9.3.2. You have set your iPhone in Airplane mode. Which of the following services will you not be able to use?

Cellular data; Wi-Fi; GPS; Bluetooth

Which Internet appliance will you install to manage all of the security-related hardware and software through a single device or interface?

Which of the following switches is used with the chkdsk command to fix any errors that the command finds?

Peter is working on a PC having Mac OS X, but some programs still supports only Windows. He wants to install Windows along with it. Which of the following features will he use for installing?

Maria wants to delete an empty directory tree which is of no use to her. Which of the following Linux command will she use?

Which of the following terms refers to an antivirus software file updated from time to time to protect a computer from new viruses?

Service pack

You're using Windows 8 on your laptop which doesn't have touch screen feature. You've opened multiple applications and need to switch between them constantly. Which of the following actions should you perform to switch between the opened applications using touchpad?

You work as network administrator for McNeil Inc. The company has a Windows-based network. All client computers run Windows 7 Ultimate. You have recently purchased a computer for your home. The computer runs Windows 7 Professional. You want to secure data in your computer's hard disk through BitLocker. However, you are unable to find any option. Which of the following is the most likely cause?

Which of the following is an authentication method that uses physical characteristics to identify a user?

Smart card;Biometric;Encryption;Password

Within a Linux terminal/shell, you want to change the owner of the file and group to a new owner and group. Which Linux command will you use?

Which of the following is helpful in finding your handset in case you have lost it?

Which of the following statements is true of a power surge?

It is a sudden increase in electric line voltage.

While configuring email on a mobile device, which of the following information is not required?

You work as a network administrator for Beltech Inc. You want an application that can generate the daily work report of all the employees every day at 6.00 pm. Which of the following Windows utilities will you use to accomplish the task?

Task Scheduler

What is the minimum amount of memory recommended for the installation of Windows Vista Home Premium?

You work as desktop support technician for Tech Perfect Inc. The company has a domain-based network. All client computers run Windows 7. Sasha, a software developer, has stated that she is getting security notification pop-ups every now and then. You need to control when the security notifications should pop up. Which of the following features will help you configure this?

User Account Control

Which of the following errors is generated by Windows when the kernel or a driver running in kernel mode encounters an error from which it cannot recover?

Your company has two mail servers responsible for sending, receiving, and managing emails. Which of the following network protocols will you use to transfer emails between servers?

SMTP

You work as technician for Troubleshooters Inc. You receive a call from a user named Sofia. She wants to connect her Windows 8.1 computer to the Internet through a dial-up connection, but she is unable to do so. Now, she wants to verify that the modem is functioning properly. What will you suggest Sofia to accomplish this?

Which of the following run-line utilities starts a command prompt in Windows 7? (Choose the best answer)

Which of the following defines power management for various types of computers and peripherals?

A user wants to ensure that all contacts from her mobile device are copied onto her computer before migrating to a new device. Which of the following processes can accomplish this?

You're using a multimeter at a customer's worksite. Which of the following might you be testing?

Voltage

Which of the following statements are true of the compression feature of the NTFS file system?

Which of the following provides system resource access to virtual machines?

You work as desktop support technician for Tech Perfect Inc. The company has a domain-based network. All client computers run Windows 7. Sasha, a software developer, states that she is getting security notification pop-ups every now and then. You need to control when the security notifications should pop-up. Which of the following features will help you configure this?

Mark works as a network administrator for Tech Perfect Inc. He is assigned a project to test the security of the company's web server. He installs a rootkit on the server. Which of the following statements are true of rootkits?

Jill is concerned that her old laptop may not support Windows 7. What utility can she use to see if the hardware in the laptop will support this operating system?

Windows 7 Upgrade Advisor

One of your customers complains about the slow performance of his computer which runs Windows Vista Ultimate. You check the computer and find that it has several adware programs installed on it. The customer insists that he did not download any programs. What is the correct way to fix this?

Go to the user account and turn off the download option.

You work as network administrator for uCertify Inc. You want to update the Windows registry file with the information contained in a .reg file. What will you do to accomplish this?

You work as technician for Troubleshooters Inc. You receive a call from a user named Rick. He is unable to boot his computer. You visit his office to fix the issue. When you unscrew the CPU box, you notice a discolored motherboard. Which of the following is the most likely cause?

Power surge; High humidity;Spilled toner; Under clocking

You're using Windows 7 professional for your office computer. You want to perform an in-place upgrade of the operating system to Windows 8. Which of the following Windows 8 editions are possible upgrade options for your computer?

You're using Windows 8 on your laptop. Your operating system ran into a problem and you decide to reset it by booting into the Windows Recovery Environment. Which of the following effects will take place on resetting the operating system?

Windows will be reinstalled;Default apps will not be deleted

You're setting up a wireless router for a small accounting office. Which of the following is not a step in securing the router?

Use HTTP on the router admin page.

A __________ permits multiple virtual operating systems (guests) to run at the same time on a single computer.

John is facing security related issues in his mobile device. Which of the following techniques will he use to resolve the issue?

Soft reset;Force stop

Which of the following modes saves maximum battery power while maintaining the current state of a computing session?

Hibernate

Which of the following allows you to rearrange the file data that has spread all over the disk in the same location to reduce the system startup times?

Scheduled disk maintenance

What does the partition of a hard disk marked as 'Active' do?

It sets the logical drive parameters of the hard drive....orIt tells the system where to look for the operating system.

Which of the following statements are true of Windows registry?

It is a hierarchical database file.;It is a flat text file.;It stores operating system configuration information.

Your customer's Windows 7 machine has become unusable due to some unknown cause. You have verified that there is no hardware issue. You want to put the computer into a working state again. What is the best way to do this?

Reinstall Windows.

Which of the following statements are true of a Trojan horse?

It is a program that enters a system or network under the guise of another program.;It infects the boot record on hard disks.;It can create a back door or replace a valid program during installation.