Chapt 22 (chapt 6 OS) Flashcards

1
Q

A technician is troubleshooting a computer that occasionally will not read data from the hard drive what should they try first?

A) run defragment and optimize drives
B) run chkdsk at a command prompt
C) format the hard drive and reinstall the OS
D) replace the hard drive

A

Run chkdsk at a command prompt

It is possible that the hard drive has some bad sectors so run check disk to scan the drive and attempt to repair them. If that doesn’t work, formatting is the second option and replacing the drive is the third. If your drive is getting read right errors, having an extra hard drive on hand would be wise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are at a Windows computer with the command prompt open. You believe that a user is improperly accessing files on a shared folder named ‘docs’ . On the Windows computer the D:\userfiles folder is shared as docs. Which command will immediately stop the sharing of this folder?

A) net share D:\userfiles /delete
B) net share D:\userfiles /stop
C) net share docs /delete
D) net share docs /stop

A

C
The net share command is used to share folders on a network as well as stop sharing folders. The proper syntax to share a folder is
net share <share>=<drive>:<path></path></drive></share>

To stop sharing use the delete flag. You must be running the command prompt as an administrator to create and delete shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following Windows editions support ReFS resilient file system? Choose two.

A) home
B) Pro
C) Pro for workstations
D) Enterprise

A

Pro for workstations and Enterprise

Resilient file system will detect when data on a mirrored drive has been corrupted and will use a healthy copy of the data on the other drives to attempt to correct corrupted data and protect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to configure internet connections on a Windows workstation. Which tabs of the internet options utility and control panel would you use to set the homepage and enable the pop-up blocker?

A) connections, security
B) general, security
C) general, privacy
D) connections, privacy

A

C
general, privacy

The internet options utility and windows control panel has six tabs that allow you to configure how your browser interacts with the internet. The six Tabs are general, security, privacy, content, connections, programs, and advanced. Not all versions of Windows have the content tab. The general tab allows you to change the homepage whereas the Privacy tab has a turn on pop-up blocker option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A salesperson and your company travels regularly to foreign countries, through different time zones. They have asked you if there is a way to set their Windows 10 PC so that it will always show the time and date for their location. How can this be done?

A) in window settings, choose time and language, then date and time, and select set time automatically
B) in control panel, choose date and time, then select set time zone automatically
C) in window settings, choose date and time, then select synchronize your clock
D) in Windows settings, choose time and language, then choose date and time, and select set time automatically and set time zone automatically

A

D
Select set time automatically and set time zone automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are working with a customer that has a small work group, peer-to-peer, network with Windows 10 pcs. The employee computers have a program that requires using the X Drive. Several computer users need to be able to access this drive, which is actually a shared folder located on the manager’s pc. What can you do to make this drive available for other computers to access as drivex? Choose two.

A) on each client computer, open file explorer, click this pc, then click map Network drive. Choose Drive letter x, then navigate to the shared resource
B) on the manager’s pc, navigate to the shared folder, then right click it and choose map network drive
C) on the manager’s pc, ensure that each user who will connect to the manager’s PC has a user account.
D) on the client computer, create a folder called drivex, then on the manager’s PC, map drivex to that folder

A

A, C
In a work group, peer-to-peer, network, you would first need to ensure that each person who will be using the shared resource has a username and password on the manager’s computer. The resource would then be shared on the manager’s pc, and then on each employee’s computer, go into file explorer, click this pc, then map network drive and follow the on-screen prompts to map drivex to that shared resource. The choices and windows 11 are slightly different and file explorer after clicking this PC you would click the three dots in the ribbon then choose map network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are setting up a network for a very small company. they have a total of 10 computers running a mix of Windows 10 home and Windows 10 Pro computers, and they have a network attached to printer. what will you use to allow them to share files and their printer?

A) domain
B) workgroup
C) HomeGroup
D) crossover cables

A

B workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user’s Windows workstation seems to be using an excessive amount of memory. Which management tool could you use to identify the application that is causing the problem?

A) performance monitor
B) computer management
C) Windows memory Diagnostics
D) processes tab of task manager

A

Processes tab of task manager

Performance monitor will show resources used but not by application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The CEO will be attending several meetings whose discussions must remain confidential. They want to ensure that the microphone on their Windows 10 PC is not available while they are using certain apps. Where can these settings be configured?

A) in Windows settings, choose privacy, then microphone
B) device manager
C) computer management
D) in Windows settings, choose personalization

A

And window settings, choose privacy then microphone

This provides granular settings for microphone use, including which apps can use the microphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are manually configuring IP version 4 addresses on a computer. The IP address is 200.100.1.10 and the network number is 200.100.0.0 what is the appropriate subnet mask for this computer?

A) 200.100.0.0
B) 255.255.0.0
C) 0.0.255.255
D) 192.168.0.0

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are creating a network diagram for a company that has just hired you as a network administrator. Which of the following could be the default gateway on the company’s network? Choose two.

A) web server
B) proxy server
C) router
D) switch

A

Proxy server and router

A proxy server can serve as a Gateway for a network because, if one exists, traffic will go through the proxy server before going into or out of the network. In the absence of a proxy server, the router serves as a gateway, forwarding traffic on the next Network or receiving external traffic and sending it to the proper device inside a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an internal networking device that provides a central connection point for Network nodes and uses the nodes Mac address that is found on the network interface card to send package to the proper destination?

A) router
B) Switch
C) hub
D) proxy server

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a subnet mask?

A) it identifies the network portion of an IPv4 address
B) it identifies the network portion of an IPv6 address
C) it masks, hides, part of the IP address from a hacker
D) it masks, hides, the host number from a hacker

A

It identifies the network portion of an IPv4 address

In IPv4 networking, a computer system will compare the subnet mask to the IP address to identify the network and host number of the IP address. Ip6 addresses do not use a subnet mask and the subnet mask does not hide anything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have been asked to help with a network for a company that has 50 computers. They have been using work groups, but it is getting too difficult. There is an assortment of Windows editions on the computers, including windows home, windows pro, and Windows Pro for workstations. What will you do to set up their new network? Choose two.

A) upgrade all the windows home PCS to Windows Pro
B) install a server with active directory
C) downgrade all the windows Pro for workstations to Windows Pro
D) upgrade all the workstations to Windows Enterprise

A

A, B
Upgrade to Windows Pro and install a server with active directory

A network with that many computers, typically more than 10, needs a domain for security management. The Windows home edition PCS can not log into a domain, so they would need to be upgraded to at least the Windows Pro edition. It is not necessary to upgrade them to Pro for workstations or Enterprise Editions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following IPv6 address types are routable?

A) global unicast
B) link local
C) loopback
D) unique local

A

Global unicast
addresses are routable, that means that a global unicast address can be reached by any other PC on the internet, unless you put security measures in place like a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are on a Windows computer that is joined to a work group. You are going home and ready to shut down your computer but want to be certain that no one is using the shared files on the computer first. Where would you go to check?

A) task manager
B) users and groups
C) performance monitor
D) control panel > networking

A

Task manager

The task managers users tab provides information about any users that are connected to the local machine. The users tab shows the user’s identification and the resources that are being used by them. Right click and choose to expand to see what they are using on your computer. You can also disconnect them from here, but it might be nicer to message them first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What information do you need to connect a PC using remote desktop?

A) the IP address of the PC
B) the password to the network that the PC resides on
C) the name under, how to connect to this pc, when remote desktop was enabled
D) the password of the signed on PC user

A

The name under, how to connect to this pc, when remote desktop was enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You find that you were often using system configuration, disc cleanup, and event viewer. What Windows 10 control panel utility gives you quick access to these and more tools?

A) computer management
B) resource monitor
C) administrative tools
D) task scheduler

A

Administrative tools

Administrative tools is not available in Windows 11, but the other tools listed in the question are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You need to work at a command prompt on a Windows pc. When you open the prompt, you are at C:\Windows\System32
You need to work on the second partition, which is listed as Drive d. How will you navigate to drive d? Assume you press enter after the command.

A) root D:
B) D:
C) cd D:
D) cd D:\

A

D:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are installing the Windows 10 home 64-bit operating system on a friend’s computer. What is the minimum storage space that must be available for the OS installation?

A) 1 GHz
B) 2 GHz
C) 16 Gb
D) 20 GB

A

20 GB
Windows 10 minimum requirements are a 1 GHz or faster processor or SOC system on a chip, DirectX 9 or later with the wddm windows display driver model 1.0 driver, and a minimum of 800x600 display. For storage, the 32-bit version requires 16 GB, and the 64-bit version requires 20 GB available for the os. Ram requirements are 1 GB for the 32-bit operating system and 2 GB for the 64-bit operating system. Keep in mind that these are the absolute minimum requirements and the OS will run but not as well as we have come to expect. And reality a faster processor, more ram, and more storage would be expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are in the Windows 10 command prompt, using run as administrator. There is a directory named D:\files that you want to delete. It currently has six subdirectories and dozens of files in it. Which command should you use to delete D:\files?

A) del D:\files /s
B) del D:\files /q
C) rmdir D:\files /s
D) rmdir D:\files /q

A

C
Rd and rmdir command will only delete empty directories by default. With that command, the /s switch will remove all subdirectories and files. The /q switch is quiet mode, and when used with the /s switch, it will not ask if it is okay to remove all the files and subdirectories, it will remove them without warning. The del command is for deleting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which Windows 10 Edition supports up to 2 TB of ram?

A) home
B) Pro
C) Pro for workstations
D) Enterprise

A

B
Pro addition supports up to 2 TB of RAM and a maximum of two CPU sockets. The home edition supports only 128 GB of RAM and only one CPU socket. Windows Pro for workstations and Enterprise editions support up to four physical CPU sockets and six terabytes of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You will be installing several new resource intensive applications on a Windows workstation, and the user has concerns over system performance. You want to monitor the memory and the CPU performance and set up the workstation so that it logs the performance over time. Which utility should you use to set this up?

A) resource monitor
B) performance monitor
C) task viewer
D) Event Viewer

A

Performance monitor

There are three tools that quickly show you CPU and memory usage and windows, resource monitor, performance monitor and task manager. The only one that lets you set up logs is performance monitor. It will collect counter information and then send that information to a console or Event log. Event Viewer logs system, application, and security events but not performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You are troubleshooting a network connectivity issue and want to see if the local computer can reach a particular server on the web. What command will you use?

A) ping
B) tracert
C) ipconfig
D) pathping

A

Ping

The Ping packet internet grouper command sends a series of four packets to a remote computer and waits for a reply. If the reply is received, you know that the local computer is able to reach the remote host. It also displays how long the transaction took. Ping can be used with domain names like google.com or the IP address, if known.

When ‘ping localhost’ or ‘ping 127.0.0.1’ or ‘ping ::1’ is run, the command verifies that tcp ip is working on the local computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which command in a Linux environment is used to display the full path to the current directory?

A) ls
B) pwd
C) cp
D) yum

A

B pwd
(print working directory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

One of the users you support has a macbook. They are finding that their desktop is too cluttered. What can they use to have quick access to what they want and help them organize their desktop? Choose two.

A) finder
B) time machine
C) spaces
D) multiple desktops

A

C, D
Spaces and multiple desktops
Multiple desktops are created using Mission control. Once multiple desktops are created, apps can be moved from One desktop to another by dragging, similar to using a smartphone. Binder is used to drill down through the file structure to find what you’re looking for and time machine is used to make backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You are at a command prompt on a Windows pc, at C:\ and need to get to C:\Windows\System32 . Which command listed will get you there? Assume that you press enter after the line. Choose two.

A) c:\windows cd system32
B) cd C:\Windows\System32
C) cd Windows\System32
D) cd system32 windows

A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Your system is running sluggishly, and you want to know why. Which application, as shown in the graphic, shows CPU usage by core and allows you to end problematic processes and stop running services?

A) eventvwr.msc
B) lusrmgr.msc
C) perfmon.msc
D) resmon.exe

A

Resmon.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You are at a friend’s house when a manager at your company calls to say they are having a problem with their Windows Pro PC while working at home. You listen and tell them you can easily fix it using remote desktop to take over their computer for a minute or two. Which of the following would not be an option to use remote desktop from where you are?

A) use your friends Windows home PC
B) use your friends Windows Pro PC
C) use Remote Desktop Mobile on your iOS device
D) use Remote Desktop Mobile on your Android device

A

Use your friends Windows home PC

Remote desktop can only be enabled on a Windows Pro or better operating system. Windows home edition does not have this capability. However, using a PC with Windows pro, Pro for work groups, or Enterprise Edition is not the only way to access the manager’s computer. The remote desktop mobile app is available for IOS and Android devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You have been having trouble with network Communications to one of your company’s offices. You want to determine the source of the latency on the connection. What command will you use in the Windows command prompt to see where the latency is?

A) grep
B) pathping
C) tracert
D) mv

A

pathping
This command works like Ping and trace route combined. It shows the path a packet takes from point A to point B and then we’ll show the time at each hop. A hop is the number of times a packet moves from one router to another to get to its destination after it leaves the initial router

tracert shows only the path a packet takes to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What utility in Mac OS will you use to repair any potential disk errors?

A

Disc utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A user with a Windows workstation recently received a second hard drive. Another administrator created a partition on the hard drive, and it is ready for use. The user will store the raw video files they create on that drive and insist that it be called the
R: drive. Which of the following statements is true?

A) you can use Disk Management to change the drive letter to R:
B) you can use Disk Management to change the drive letter to R: , but only if it’s a dynamic disc
C) you can use this management to change the drive letter to R:, but only if it’s an extended partition
D) you will need to use Disk Management to delete the partition first, then recreate it as R:

A

You can use this management to change the drive letter to R:

Task management is a Windows tool that has been available for many windows versions. With it you can reassign or change a drive letter, create and format volumes, shrink or expand volumes, change basic drives to Dynamic drives, import foreign drives, and even establish software raid. In Windows 10 it can be launched through control panel by using administrative tools then computer management, or you can launch it by typing diskmgmt.msc in the search box. Administrative tools is not available in Windows 11, but Disk Management is. The easiest way to access Disk Management in Windows 10 or 11 is to press the Windows key + X to bring up the quick link menu, which is a list of commonly used tools, and disc management is on the list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

One of your network users has a Macbook pro. Where should this user go to see whether there are any OS updates available?

A) open the app store and click updates in the toolbar
B) open Safari and click updates in the toolbar
C) open system preferences and click updates in the toolbar
D) open finder and click updates in the menu bar

A

Open the app store and click updates in the toolbar

Updates to Mac OS can be found at the app store. Open it and click updates in the toolbar to see which updates are available. There will be an install button to begin the installation. In system preferences, there is generally a software update icon to help with updates as well. Update is not an option on the toolbar of safari, which is the web browser. Finder is used for drilling down through directories to find files and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following commands was used to display the screen snippet shown in the graphic?

A) gpedit
B) gpresult
C) gprefresh
D) gpupdate

A

gpresult

This command will show the resultant set of policy rsop for a user or computer. The resultant set of policy is the combination of all policies that affect the target user or computer. It is particularly helpful when troubleshooting conflicting policies. The screen shown used the /r switch, which shows the rsop summary for the currently logged on user on the local computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You need to start a new shell on a Linux workstation with root permissions. Which command should you use to do this?

A) su
B) sudo
C) apt-get
D) ps

A

su

This command switch user, substitute user, or super user, is used to start another shell on a Linux computer. Without specifying the username, it is assumed that you are trying to start a shell with super user or root authority. This can be dangerous because as the root, the user can do anything on the system, including delete parts of the operating system, and there is no undo or warning message. You must know the root password to run su. It is far safer to run the sudo command. The sudo command stands for super user do, or substitute user do, and will run a single command as the alternate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You want to be able to access your Windows Pro desktop PC at home no matter where you are. Which of the following do you not need to do?

A) upgrade to Windows Enterprise
B) enable remote desktop on your PC
C) open remote desktop connection, provide the PC name, and click connect
D) install the remote desktop app on your smartphone

A

Upgrade to Windows Enterprise

Home editions of Windows do not support remote desktop, but the windows business Editions, pro, pro for workstation, and enterprise, do. Since you have Windows pro, you would not need to upgrade your operating system Edition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the 6 steps to use remote desktop to access a PC from a smartphone?

A

1 enable remote desktop on the PC
2 note the PC name
3 install remote desktop Mobile on the smartphone
4 open remote desktop app on your smartphone
5 enter the name of the PC you want to connect to
6 select the PC name and wait for the smartphone to connect

38
Q

You are at a Windows command prompt. You believe that some of the Windows system files are corrupted. Which command should you use to scan and repair problematic system files?

A) sfc /scanfile
B) sfc /scannow
C) sfc /verifyfile
D) sfc /verifyonly

A

scannow

Scan file will just check one specified file. The verify only option will scan the Integrity of protected system files but not attempt to repair them. The verify file option will verify the Integrity of a specified file

39
Q

The hard drive performance on your windows workstation has deteriorated over time. To attempt to improve performance, you want to ensure that files on the hard drive are written and contiguous blocks. Which Windows tool should you use to make this happen?

A) disk management
B) optimize drives
C) disk optimizer
D) device manager

A

Optimize drives

Disk Optimizer is not a Windows tool

40
Q

In Mac os, where can the menus displays, printers, and privacy be found and settings changed?

A) system preferences
B) accessibility
C) settings
D) App Store

A

System preferences

41
Q

Your company has a DHCP server to automatically assign IP addresses to any nodes that connect to it. Which of the following would you want to assign a static IP address to? Choose two.

A) workstation
B) file server
C) printer MFD
D) local printer

A

File server and printer MFD

A local printer, by definition, is attached to a local computer, not directly to the network, so it would not even have its own IP address

42
Q

You are working in a local school district in a computer lab full of Windows workstations, setting up an application that uses the name of the computer to identify it on the application. What command can you use at a workstation to determine its name? Choose two.

A) nslookup
B) clientname
C) hostname
D) ping localhost

A

Hostname and ping localhost

43
Q

The Linux workstation you are using seems slow. You want to see what processes are running on the computer. What command should you use?

A) su
B) pw
C) pwd
D) ps

A

Ps

ps = process status
This command will list the currently running processes, along with their PID (process ID) , the controlling terminal for the process, the time the CPU has been used by the process, and the name of the command that that started the process.

44
Q

A user installed a new headset, but the audio is still playing through the speakers. Where can you go to change that configuration? Choose two.

A) control panel, security and maintenance
B) Windows settings, devices
C) control panel, sound
D) window settings, apps

A

Window settings, devices
Control panel, sound

45
Q

You are working at a Windows command prompt. Which command should you use to copy directories and subdirectories but not empty directories?

A) xcopy /e
B) xcopy /s
C) xcopy /h
D) xcopy /a

A

B
The xcopy command is a more powerful version of copy. It lets you copy directories and also will copy file ownership and NTFS permissions. The /s switch is used to copy directories and subdirectories, except for empty ones. To copy those as well, use /e. The /h switch copies hidden and system files and the /a switch copies only files with the archive attribute set

46
Q

You suspect that one of your running Services is causing problems with the operating system. What is the tool, shown in the graphic, they let you choose a diagnostic startup on the next restart?

A) Event Viewer
B) performance monitor
C) system information
D) system configuration

A

System configuration

msconfig.exe

47
Q

A user wants to ensure that the hard drive in their Windows PC is encrypted for maximum data security. What are two commands you can have the user type into the run box, Windows key, or Windows command prompt to see whether the BitLocker drive encryption service is enabled and running?

A) services.msc
B) perfmon.msc
C) compmgmt.msc
D) diskmgmt.msc

A

Services.msc and compmgmt.msc

48
Q

You are setting up security for a company that is expanding rapidly. Part of your plan is to create groups to manage permissions to folders, and then add users to those groups to grant them permission they need. What utility will let you add users to groups?

A) device manager
B) local users and groups
C) certificate manager
D) Group Policy editor

A

Local users and groups

Group Policy editor allows administrators to further control what users and computers are allowed to do on the network, such as enforcing password complexity, disabling USB drives and limiting what users can do in control panel.

49
Q

One power state will close applications and files, and log off users like a full shutdown wood, then save the kernel State and system to a hibernation file before shutdown. Then, when the computer is restarted, it will automatically and quickly restore that file, saving some of the time involved in a normal boot. Which of the following states is being described?

A) hibernate
B) sleep
C) selective suspend
D) fast startup

A

Fast startup

Fast startup is similar to hibernate and how it works, but instead of saving all your applications and data as you had them so that you’re instantly back at work, it saves this system state. As described in the question, fast startup will close running apps and log off any users, then save the contents of RAM to a hibernation file. When the computer starts back up, it reads the hibernation file and loads drivers, system state, and the colonel much more quickly than it would if the system had to read all of that individually back into RAM as it normally would in a cold boot. Sleep stores everything that is open and RAM and enters a low power state. The display and drivers aren’t using power but power is needed to continually refresh memory so that it can retain the information. Sleep uses very little power but wakes up very quickly with everything open as it was. The hibernate option stores open programs and data to the hard drive and, once the computer is hibernated, would use no power, but it will not resume its state as quickly as sleep would

50
Q

You are troubleshooting a computer that is unable to resolve domain names to IP addresses. What command line utility can help identify what DNS server the computer relies on?

A) nslookup
B) netstat
C) ping
D) tracert

A

nslookup
This utility will query the DNS server the computer is currently configured to use. The utility can be used to perform a variety of DNS queries.

51
Q

You need to configure a virtual private Network VPN for an employee working remotely on a Windows Pro computer. What category group and Windows settings provides options for establishing dial-up or VPN connections?

A) Network and Sharing Center
B) Network & Internet
C) system
D) accounts

A

B
Network & Internet

Network and Sharing Center is a control panel utility. The system category of settings deals with display, sound, power, notification, and other settings. The accounts category is useful for managing users and sinking settings

52
Q

A print queue has stalled, so you are going to stop and restart The Print Spooler service. Where can you do this? Choose two.

A) the services console
B) task manager, Services tab
C) disk management, Services tab
D) task scheduler

A

The services console
Task manager, services tab

53
Q

A user types their username and password into a workstation that is configured in a domain. What examines their information and determines whether they are allowed access to network resources?

A) local operating system
B) file server
C) authentication server
D) DHCP server

A

Authentication server

A domain uses an authentication server to determine whether a user is granted access to Shared resources. In windows, and authentication server is also known as a domain controller. Domains are not available with Windows Home editions. Windows Home additions can only use workgroup, and in that case the operating system on the device with the shared resource would allow or deny access. A file server is a computer that provides access to shared files. A DHCP server is used to automatically assign IP addresses and to configure Network settings. A DHCP server is often included in the software on a SOHO

54
Q

Your spouse takes gaming seriously and has complained that restart notification sometimes pop up on the screen at crucial moments, disrupting their game. What settings group can you use to stop restart notifications from appearing and stop unnecessary programs from running in the background?

A) system
B) gaming
C) update and security
D) apps

A

Gaming

However, to turn off all notifications, or choose to manage whether and how individual notification senders can interact with you, you could go to Windows settings, select the system group, and then click notifications and actions. This is not the correct answer, though, because it doesn’t stop the background activity, it only stops the notifications. Game mode, found in the gaming options group, enables you to configure the system to be optimized for gameplay and recording. In addition to preventing driver update installations and stopping restart notifications, it modifies settings affecting video frame rate

55
Q

What type of operating system is found on an apple iphone?

A) iPhone OS
B) iOS
C) Android
D) windows for iPhone

A

IOS

IPhone os does not exist

56
Q

A Macbook user has a program they no longer use. What are their options for removing it from their computer? Choose two.

A) use finder, then applications to locate the app, then right click and choose delete
B) use finder, then applications to locate the apps folder, then look for an uninstaller and run it
C) youth finder, then applications to find the app, then drag the app from the applications folder to the trash
D) click apple, then uninstall, and then choose the app

A

B, C

An app can be deleted by simply dragging it to the trash, but if it has its own folder, look for an uninstall program. Right clicking and choosing delete is how you might remove a file in a Windows OS. There is no uninstall option from the Apple menu

57
Q

You need to install Windows on a new machine. Which of the following is not an installation option?

A) USB
B) Network
C) external drive
D) CD

A

CD

Compact discs do not hold enough information to be used for installation media for windows.

58
Q

Which of the following is not a best practice for hardening your Mac OS against attack?

A) use time machine to backup your Mac
B) use BitLocker to encrypt your drive
C) install updates and patches as soon as they are available
D) turn on the firewall and security and privacy pane

A

Use BitLocker to encrypt your drive

The program that is used to encrypt a drive on Mac is file vault, not BitLocker

59
Q

The graphics Department of your company just purchased a new printer, and now you need to install it. What system preference pane can you use to install new printers and Mac os?

A) printers
B) printers and scanners
C) devices
D) sharing

A

Printers and scanners

60
Q

Your customer, an artist, uses their Windows 10 tablet PC to enter sales and accept customer payments. They walk around the gallery with it and want to conserve as much power as possible. what control panel utility will you use to enable USB selective suspend? choose two

A) power options
B) device manager
C) programs and features
D) indexing options

A

A, B
The power options utility and control panel has a setting to enable or disable USB selective suspend. To get there, choose power options, then change plan settings, and then change Advanced power settings, then click USB settings in the settings list. In device manager, choose Universal cereal bus controllers, then double click USB root hub, choose the power management tab, and choose allow the computer to turn off this device to save power.

61
Q

Your company just purchased five new Macbook computers for employee use. We will be providing tech support for them. What file system will they have?

A) HFS+
B) APFS
C) ext4
D) NTFS

A

B APFS

HFS+ is an older file system that was used by apple.

62
Q

Your friend wants a new phone but has told you they are not fond of Apple products. They have decided to buy a Microsoft Duo product. What operating system will likely be on their new phone?

A) iPadOS
B) iOS
C) android
D) Windows

A

Android

Although the duo products are made by microsoft, they run an Android os, not Windows. There is no windows version for phones

63
Q

On a Mac using Mac OS 10.6 or later, what is the best way to protect the system against viruses and other malware? choose two.

A) install an antivirus from a vendor you trust
B) ensure the system data files and security updates are set to run automatically
C) only install software from reliable sources
D) use finder to find and delete viruses and malware

A

B, C
Since snow leopard Mac OS 10.6, Apple has included malware detection, called file quarantine, in its software. File quarantine will not allow a known malware file to be opened. In order to protect your system from the most recent malware, you should ensure that updates will run automatically. This is done by choosing system preferences from the Apple menu, selecting app store, and selecting automatically check for updates and then install system data files and security updates. It is also good advice to only download programs and files from reputable sources, like the App Store

64
Q

A user brought you a laptop that would not boot into the os. After trying some troubleshooting techniques, you inform them that you will need to reinstall the operating system. After ensuring that they have a backup of their files, you restart the computer, press f10, and the OS installation begins. What type of installation are you doing?

A) upgrade
B) recovery partition
C) repair installation
D) image deployment

A

Recovery partition

This is a recovery partition installation. A recovery partition is often created on a laptop that is purchased from a major supplier. There will be a key or multiple keys to press while the computer is booting. The exact keys will depend on the laptop manufacturer. Using a recovery partition will erase everything that is on the hard drive and restore the computer to the state it was when it was received from the manufacturer. This is sometimes called a factory reset. And upgrade installation will keep your files and settings but install a different version of an OS on your computer. A repair installation will use the same OS and attempt to leave all your files and settings while fixing any of the operating system files. Image deployments are usually done in large volume setting where you have many computers configured identically.

65
Q

You are working in the Linux terminal and need to locate a file. Which command let you locate and perform actions on a file?

A) find
B) ps
C) man
D) nano

A

Find

The find command is used to find files and directories and perform operations on them. They syntax of the command is
find[where to look] [-options] [what to find]
Example:
find Documents -name *.jpg

66
Q

A user wants to install an application that requires a 1 GHz processor on a Windows 10, 64-bit installation. What is the minimum speed processor that the computer must have?

A) 1 GHz
B) 2 GHz
C) 3 GHz
D) 4 GHz

A

B

Windows 10, 64-bit requires a 2 GHz or faster processor, so that’s what the system and question must already have. Unlike ram, where you must add the requirements together, choose a processor that is at least the fastest requirement of all the running software, in this case, the two gigahertz processor that is needed for the operating system. You would not need to buy a faster processor to accommodate the new software.

67
Q

You are looking at the specifications for a new computer and notice that it says, Intel UHD Graphics 630 with shared Graphics memory. What is true about this Graphics card? Choose two.

A) the GPU is on an expansion card
B) the GPU is located on the processor
C) it uses part of the system’s RAM
D) it has its own VRAM

A

B, C

A video card can either be discreet or integrated. If it is integrated, then the graphics Processing Unit GPU resides on the processor, and the GPU will share Ram with the system. A discrete video card will contain a GPU and VRAM video RAM and will be installed in an expansion slot

68
Q

You are upgrading your Windows 10 home edition to Windows 10 pro. What utility will you use to make a backup of your data before upgrading the system? Choose two.

A) file history
B) Windows update
C) recovery
D) backup

A

File history and backup

Type backup and the Windows 10 search box and click backup settings, and you will be taken to a screen that says backup using file history. You can also find the backup window and settings in the update and security group. You will need a storage device such as an external hard drive, then from the backup window you will choose to automatically create backups and click more options to choose the frequency. Every hour is the default, but the backup schedule options vary from 10 minutes up to daily. Here you can also choose what files to backup. Windows update checks for operating system updates, and Recovery is the utility that is used to reset a pc, meaning that the operating system is reinstalled but you can choose to keep your personal files

69
Q

You are moving your Windows 8.1 computer to Windows 10. What type of insulation are you doing?

A) upgrade installation
B) recovery partition
C) clean installation
D) image deployment

A

Upgrade installation

You will be performing an upgrade installation. And upgrade installation can only happen when there is an existing operating system. It will keep all of your files and settings but install a different version of an OS on your computer. A recovery partition is often found on a laptop and some desktops, that is purchased from a major supplier. There will be a key or multiple keys to press while the computer is booting. The exact keys will depend on the laptop manufacturer. Using a recovery partition will erase everything that is on the drive and restore the computer to the state it was in when it was received from the manufacturer. This is sometimes called a factory reset

70
Q

You would like to know the IP address of a website. What Linux tool will you use?

A) chown
B) dig
C) top
D) ip

A

dig

The Dig command can be used to retrieve the IP address of a website. The IP Command is used to display configuration information for network interfaces

71
Q

Which of the following is not true regarding managed Apple ids?

A) they are created by a company for its employees
B) they cannot make purchases
C) an IT administrator can remove or update your account
D) you can reset your own password

A

You can reset your own password

With managed Apple ids, your company, not you, can reset your password. Your company owns a managed Apple id, so there are restrictions in place. A managed ID is created by a company for use in the company business. Since it is linked to your company, your managed Apple ID cannot be used to make purchases, and an IT administrator at your company can restrict access to your account, remove it, or update it

72
Q

You are working on a Lenox workstation. A file named ‘docs’ needs to be renamed to ‘newdocs’ . What is the right command to do this?

A) ren docs newdocs
B) mv docs newdocs
C) cp docs newdocs
D) rm docs newdocs

A

B
In linux, the MV move command is used to rename files. As shown in the answer, the syntax is:
mv [ old file name] [ new file name]

‘ren’ is a Windows command to rename files

73
Q

Which of the following software packages let’s Linux, Windows, and other operating system platforms use shared files, shared printers, and other resources across a network or the internet?

A) spotlight
B) time machine
C) Samba
D) FileVault

A

Samba

This is a widely used freeware program based on SMB server message block and CIFS common internet file system that lets operating systems communicate despite their differences. A request for resources is sent from a client to a Samba server, which forwards the request to The Host. The host can either accept or deny the request.

74
Q

You are working at a Linux command prompt, that is the Linux terminal, and need to delete a file called oldstuff.txt. Which of the following commands will work?

A) rm oldstuff.txt
B) del oldstuff.txt
C) er oldstuff.txt
D) Rd oldstuff.txt

A

rm oldstuff.txt
In linux, RM remove is the command for deleting files and directories. If you are removing more than one file at a time, list of the files after the remove command such as:
rm file1.ext file2.ext
By using options, the RM command can also remove directories and work in verbose mode, meaning that it will tell you what it’s doing.

The del command is used to delete one or more files in a Windows command prompt. Rd is a Windows command to remove directories

75
Q

You purchased a Windows 10 laptop and notice that it immediately resumes when you open the lid. What allows it to do that?

A) hibernate
B) idle mode
C) modern standby
D) Auto off

A

Modern standby

Windows supports a feature called modern standby. Modern standby must also be supported by the hardware. With modern standby, the system will wake from the lowest power to allow short bursts milliseconds of software execution as the system needs them. The system uses just enough power to process background tasks but still preserves battery life. The result is that when in sleep mode, a computer can stay connected to a lan and reacts much like a smartphone with instant on and instant off ability

76
Q

You are at a command prompt in Windows and need to quickly add a user named student. What command will you use?

A) net user student * /add
B) net use /add student *
C) net user student *
D) user /add student

A

A) net user student * /add

The net user command can be used at a command prompt to add a user on the fly. The syntax is:
net user username [password| *] /add [options] [/domain]
. In this example we are adding a username student, and replacing the * replacing password tells the system to prompt us for a password. If no domain is specified, the command assumes the user is added to the local computer. As soon as this command is executed, the name to user will appear in the user’s utility of control panel

77
Q

Wet shortcut keys can you use to quickly access many of the technician tools used in Windows operating systems?

A) press Windows key + D
B) press Windows key + L
C) press Windows key + I
D) press Windows key + X

A

Press Windows key + X

This command will open the quick link menu. On it, and windows 11 you will find shortcuts to apps and features, Mobility center, power options, event viewer, device manager, Network connections, Disk Management, computer management, task manager, settings, file explorer, search, and run. The Windows 10 quick link menu includes links to Windows Powershell and windows Powershell administrator. You can also shut down or sign out from the quick link menu, or click desktop, which will display or hide all open applications on the desktop.

Pressing Windows key + D will hide or display all open applications. Pressing Windows key + L is a quick way to lock the computer, and pressing Windows key + I brings you to Windows settings

78
Q

On your personal computer, it seems that searching through files has gotten slower and slower. What utility will organize data so searches run faster?

A) in control panel, choose the indexing options utility
B) in window settings, choose the system group
C) in Windows settings, choose the apps group
D) in control panel, choose the default programs utility

A

A

Control panels indexing options looks at words in files and the files metadata to provide faster file searches. The system group of Windows settings enables you to configure notifications, power, and many other settings, but not indexing. The apps group of systems is where you can choose default programs and remove applications that you no longer need. The default programs app of control panel allows you to manage default applications for opening types of files such as photos or mail by opening those settings in Windows settings

79
Q

You are on a domain controller and need to share a folder of data files for some users and not others. Where will you configure access to the folder? Choose two.

A) on a domain controller
B) in Windows Active Directory
C) configure sharing on individual workstations
D) run a batch file to copy the files to each user who needs access

A

A, B

When a computer logs into a domain, access to resources is controlled through active directory. The server that active directory resides on is called a domain controller dc. And a work group, sharing would be configured on the computer that was providing access to the files. Running a batch file to copy the files to each user would result in multiple copies of the files, likely with all different information after a time, not a single file repository where the files are shared among users

80
Q

You are installing Windows 11 Enterprise in a bare metal system. What is the maximum amount of ram you can put into this system?

A

6 TB

81
Q

You are installing Windows 11 on a bare metal system, what is the maximum amount of ram you can put in the home edition?

A

128 GB

82
Q

You are installing Windows 11 Pro edition on a bear metal system comma what is the maximum amount of ram supported by that operating system?

A

2 TB

83
Q

You are creating a network for a small office with Windows Pro computers. They do not want centralized security, but they want it to be easy to share printers and files, including libraries. What type of network setup should you recommend?

A) workgroup
B) homegroup
C) personal area network
D) domain

A

workgroup
You would want a work group. By default, Windows 10 computers will join a work group called work group, making it easy to share files printers and other resources. Access to resources is configured on each workstation that is sharing a resource. The drawbacks of a work group are that security is configured on each pc, and it is only appropriate for a very small networks. Home group was a networking scheme and prior versions of Windows that shared libraries. A personal area network consists of a PC and its Wireless devices, usually paired Bluetooth devices such as printers headphones and input devices. A domain is a network wear access to resources is configured on a central server that all users of the resources must log into

84
Q

You are working at a Windows command prompt and need to prepare a volume on a hard drive to receive data using the NTFS file system. The volume should be designated as Drive X:. Which command would you use at a command prompt to do this?

A) format x: /fs:ntfs
B) initialize x: /fs:ntfs
C) format x: /ntfs
D) initialize x: /ntfs

A

A

The format command is used to format hard drives. Before you format any drive, be sure you have backed it up or are prepared to lose whatever is on it. The /fs:[file system] switch specifies the file system to prepare the disk with. Initialize is not a command

85
Q

You just set up a proxy server, so you need to add settings for it to every workstation. What information do you need to properly set up the proxy server in the network & internet group of Windows settings? Choose two.

A) the proxy servers IP address
B) the routers IP address
C) the DHCP servers IP address
D) the port number to use for the proxy server

A

A, D

To set up a proxy server in Windows settings, you only need the server’s IP address and port number to use. You likely should also check the box that says do not use the proxy server for local intranet addresses. You would not need the router’s IP address or the DHCP servers IP address unless it is also functioning as the proxy server. A router decides if a packet belongs on the Lan or another network, and a DHCP servers job is to provide IP addresses and other settings to devices that log into a network

86
Q

A user has shared a folder with you. Working and file explorer, how can you configure access to this shared network location each time you log in without reentering the path? Choose two.

A) left click this PC and choose the network share
B) select this PC on the left then click map network drive icon in the file explorer ribbon and follow the on-screen prompts, ensuring that you choose reconnect at sign in
C) use file explorer to drill down to the shared network resource. Right click the shared network resource, then choose map network drive and follow the on-screen prompts, ensuring that you choose reconnect that sign in.
D) click quick access and choose the network share

A

B, C
Mapping a network drive to a share makes it easy to access that share every time you log into your computer, provided you are on the same network. Left clicking on this PC will show the map drive and the right pane, after it has been set up as a mapped Drive, so that you can easily choose it from there. The network share will appear on quick access after you have used it

87
Q

You want to block an application from communicating through your windows defender firewall . what will you set up for this application?

A) an exception
B) a restriction
C) a mapped Drive
D) a network share

A

A restriction

A network restriction means that you will not allow an application to communicate through a firewall, whereas an exception means that you will allow that application to communicate through the firewall. To configure a restriction in Windows Defender firewall, open it from control panel and click advanced settings, then click outbound rules, then new rule. Ensure that program is selected and click next. Click browse to locate the program file, click to select it, then click open. The program path should appear in the new outbound rule wizard dialog box. Click next, then choose block the connection. Click next twice, then give your rule a name and click finish.

88
Q

A junior network administrator wants to know the fastest way to access file explorer, because they use it often. What do you tell them?

A) press Windows key + F
B) press Windows key + M
C) press Windows key + E
D) press Windows key + X, then choose File Explorer from the menu

A

Press Windows key + E

D would also work, but it is not the fastest way

89
Q

You need to know the path to a network resource. How can you locate it?

A) type mynetworkdrives in a browser window to see them
B) in file explorer, right click the resource, choose properties, then click the sharing tab
C) in file explorer, select this pc, network drives, and their path will show under Network locations
D) select computer management > shared folders > shares

A

B

90
Q

You are installing Windows 10 64-bit on the only drive in a computer that uses bios not UEFI. You will be booting from this drive. Which of the following are true? Choose two.

A) the partition scheme must be MBR
B) the partition scheme must be GPT
C) the partition must be less than 2 terabytes
D) you will not be able to boot from this device

A

A, C

Partition MBR and <2TB

When a motherboard uses bios rather than UEFI to manage firmware, it must use the MBR partition type or the drive will not be bootable. A GPT partition will be able to be read but not booted to. The partition size limit for MBR is 2 terabytes