Test C Flashcards
- Which of the following protects confidential information from being disclosed publicly?
A. Classification
B. Social engineering
C. RAS
D. Hard drive wipe
A. Classification
- Programs that run when Windows starts are stored in which of the following registry hives?
A. HKEY_CURRENT_CONFIG
B. HKEY_USERS
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
C. HKEY_LOCAL_MACHINE
- Typically, which of the following Windows tools enables you to configure a SOHO router?
A. Internet Explorer
B. Device Manager
C. Msconfig
D. Windows Explorer/
A. Internet Explorer
- Which of the following steps is performed first when running a clean install of Windows Professional on a new hard drive?
A. Format the partition.
B. Partition the drive.
C. Configure Windows settings.
D. Load RAID drivers.
D. Load RAID drivers.
- A co-worker maps a network drive for a user, but after rebooting, the drive is not seen within Explorer. Which of the following steps should be taken first to ensure that the drive remains mapped?
A. Check Reconnect at Logon when mapping the drive.
B. Select the drive letter needed to connect each time the co-worker logs on.
C. Check the Folder connection when mapping the drive.
D. Use the net use command instead.
A. Check Reconnect at Logon when mapping the drive.
- Based on the physical hardware address of the client’s network device, which of the following is commonly used to restrict access to a network?
A. WPA key
B. DHCP settings
C. MAC filtering
D. SSID broadcast
C. MAC filtering
- A print job fails to leave the print queue. Which of the following services may need to be restarted?
A. Print driver
B. Print Spooler
C. Network adapter
D. Printer
B. Print Spooler
- After installing a network application on a computer running Windows, the application does not communicate with the server. Which of the following actions should be taken first?
A. Uninstall the service pack. B. Reinstall the latest security update.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
D. Add the port number to the network firewall.
C. Add the port number and name of the service to the Exceptions list of Windows Firewall.
- A customer reports a problem with a PC located in the same room as cement testing equipment. The room appears to have adequate cooling. The PC will boot up but locks up after 5– 10 minutes of use. After a lockup it will not reboot immediately. Which the following statements best describes the most likely problem?
A. The PC has a virus.
B. The PC air intakes are clogged with cement dust.
C. The CPU heat sink is underrated for the CPU.
D. The power supply is underrated for the electrical load of the PC.
B. The PC air intakes are clogged with cement dust.
- When accessing an NTFS shared resource, which of the following is required? (Select the two best answers.)
A. An active certificate
B. Correct user permissions C. Local user access
D. Correct share permissions
B. Correct user permissions
D. Correct share permissions
- Which of the following protocols should be set up in order to establish the most secure wireless connection?
A. WEP
B. WPA
C. WPA2
D. WAP
C. WPA2
- You are contracted to recover data from a laptop. In which two locations might you find irreplaceable, valuable data? (Select the two best answers.)
A. Ntoskrnl.exe
B. Windows folder
C. Pictures
D. E-mail E. System32 folder
C. Pictures
D. E-mail E. System32 folder
- Which utility enables auditing at the local level?
A. Group Policy
B. Local Security Policy
C. Active Directory Policy
D. Site Policy
B. Local Security Policy
- Which of the following statements best describes how NAT provides additional security for users who are behind a gateway?
A. It sets the hours that users can access the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
C. It limits users from accessing particular websites.
D. It blocks computers on the LAN from accessing computers on the Internet.
B. It blocks computers on the Internet from accessing computers on the LAN.
- A customer plugs in a new USB barcode reader and the computer recognizes it, but the reader is unable to work properly. Which of the following statements best describes the most likely reason?
A. Faulty USB cable.
B. The operating system needs to be updated.
C. Software drivers need to be updated.
D. Too many USB devices are plugged in.
C. Software drivers need to be updated
- A customer has forgotten his password. He can no longer access his company e-mail address. Which of the following statements best describes the recommended course of action?
A. Tell him to remember his password.
B. Ask him for information confirming his identity.
C. Tell him that the password will be reset in several minutes.
D. Tell him that he shouldn’t forget his password.
B. Ask him for information confirming his identity.
- Which of the following can help locate a lost or stolen mobile device?
A. Passcode
B. Auto-erase
C. GPS
D. Encryption
C. GPS
- Which the following can be disabled to help prevent access to a wireless network?
A. MAC filtering
B. SSID broadcast
C. WPA2 passphrase
D. WPA key
B. SSID broadcast
- Which of the following commands sets the time on a workstation?
A. Time
B. Net time
C. Net timer
D. Net time set
A. Time
- In Windows, which utility enables you to select and copy characters from any font?
A. Language bar
B. Sticky keys
C. Control Panel > Fonts
D. Character map
D. Character map
- Which of the following can be described as removing the limitations of Apple iOS?
A. Rooting
B. Jailbreaking
C. VirusBarrier
D. Super-admin powers
B. Jailbreaking
- Which of the following built-in applets should be used by a technician to configure offline files and folders in Windows?
A. File History
B. USMT
C. Robust file copy
D. Sync Center
D. Sync Center
- Which language support for representing characters is built in to Windows?
A. Unicode
B. EBCDIC
C. ASCII
D. ITU-T
A. Unicode
- Which of the following is the best source of information about malicious software detected on a computer?
A. Operating system documentation
B. Anti-spyware software website
C. Readme.txt file included with the anti-spyware software installation
D. The user of a previously infected computer
B. Anti-spyware software website