Test Out Exam Questions 2 Flashcards

(91 cards)

1
Q

What does the details tab in Task Manager do?

A

Allows you to change the priority of cpu utilization that a running application will receive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are two technologies that mobile operating systems use to detect device movement?

A

Accelerometers Gyroscopes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accelerometers Gyroscopes

A

two technologies that mobile operating systems use to detect device movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Geotracking

A

determines the location of a mobile device by obtaining its GPS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

determines the location of a mobile device by obtaining its GPS data.

A

Geotracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encrypting File System (EFS)

A

a Windows file encryption option, but only encrypts individual files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(VPN) uses an encryption protocol (such as IPSec, PPTP, or L2TP) to….

A

establish a secure communication channel between two hosts, or between two sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPSec

A

VPN protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Moving or copying files to a Non-NTFS partition

A

removes any permissions that were assigned to those files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

does FAT32 support NTFS permissions

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Moving a file to a new folder on the same drive does what to the file?

A

Preserves the NTFS permissions assigned to the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Moving or copying files to a different NTFS partition

A

removes any existing NTFS permissions so that only inherited permissions apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a computer starts in Safe Mode?

A

only the bare minimum background services that are very important to boot and run the Windows are initialized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Loss Prevention (DLP) programs or devices

A

monitors operations such as file transfers and emailS that could compromise data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewalls are placed between the company network and the internet to filter network traffic at what level

A

the IP level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you configure process priority

A

Details Tab in Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When you perform an in ­place upgrade what happens to user data and installed applications

A

They are preserved following the upgrade but you should make sure that applications still work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens when physical memory (RAM)D is low

A

The computer must swap data from RAM to hard disk to make space available for other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you hear the hard drive constantly operating as you work

A

the computer is constantly working moving data into and out of memory(RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If the hard drive light on the front of the system case stays illuminated for long periods of time

A

the computer is constantly working moving data into and out of memory(RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your network location must be set to ________ before you can see home groups that have been set up on your network

A

Home Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Directional antennae

A

Can be positioned to point wireless signals toward more desired areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Decreasing radio power levels

A

can limit the radius of the effective wireless signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

System Configuration

A

launches the initial startup, the boot files, and system services along with other tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Component Services give you access...
to the local Event Viewer so that you can examine Administrative Events and system logs.
26
Event Viewer maintains logs about?(3)
- program - security - system events on Windows
27
# r refreshes the local and Active Directory­ based Group Policy settings, including security settings.
gpudpate command
28
The Services console
lets you enable or disable Windows services. These are system ­level programs that typically start when Windows boots up.
29
# r program, security, and system events on Windows
Event Viewer maintains logs about ?
30
Device Manager
View and control the hardware attached to the computer.
31
# r creates a log file of what is happening at boot time by selecting the Boot tab and marking Boot log.
MSCONFIG (also known as the System Configuration console)
32
When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with in which window
Device Manager
33
What is the only way to add disk space to system volume
create a mount point froma new disk
34
To create a mount point: (3)
* Create an empty folder on the existing volume. * Create a partition on the new disk without a drive letter. * Mount the partition to the empty folder on the existing volume.
35
Can you extend the system volume if the Disk is dynamic?
You cannot extend the system volume even if it is on a dynamic disk or not.
36
You want to be able to access your home computer using Remote Desktop while traveling.
Open the firewall port for the Remote Desktop protocol.
37
Windows Upgrade Advisor
scans your hardware, programs for compatibility issues and gives you guidance on how to resolve them
38
USMT (User State Migration Tool)
lets advanced users transfer files and settings between PCs.
39
Windows Easy Transfer
allows users to transfer personal files and settings from a computer running an earlier version of Windows to a computer running a newer version.
40
proxy server
receives requests from the browser, and either forwards it to the internet or deny access to the site.
41
MSCONFIG (also known as the System Configuration console) does what a boot time?
creates a log file of everything happening at boot time You turn this on by selecting the Boot Tab & Checking Boot log.
42
S.M.A.R.T. errors are generated when
a hard disk is about to fail. It is imperative that you immediately backup the system, replace the hard disk, and then restore the system.
43
what is this command line executing? attrib +s +r -­a myfile.dll
attrib +s +r -­a myfile.dll +s, Adds System file attribute, +r, Adds the Read­only attribute -a, removes the Archive attribute
44
Is Backup and Restore available on Windows 8
No
45
What should you do when a "blue screen of death" has been displayed?
-Identify the source of the error by searching for the text of the error message in Microsoft's knowledge base -or Google/Internet
46
When to use Driver Rollback
you've installed a misbehaving driver and need to revert to an older version of the driver.
47
How does driver rollback work?
preserves the old driver every time you install a newer driver. Therefore, you could use Driver Rollback to uninstall the current driver and restore the previous version.
48
S/MIME (Secure/Multipurpose Internet Mail Extensions)
is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails.
49
# r a Windows file encryption option, but only encrypts individual files.
Encrypting File System (EFS)
50
# r controls the initial startup, the boot files, and services loaded along with other tasks.
System Configuration
51
# r access the local Event Viewer to examine Administrative Events and system logs.
Component Services
52
# r lets you enable or disable Windows services. These are system ­level programs that typically start when Windows boots up.
The Services console
53
# r View and control the hardware attached to the computer.
Device Manager
54
gpudpate command
refreshes the local and Active Directory­ Group Policy & Security settings.
55
displays the Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer.
gpresult command
56
popd
restores the previous value of the current directory saved by pushd.
57
fsutil command
displays or configures the file system properties
58
# r displays or configures the file system properties
fsutil command
59
# r displays or modifies file extension associations.
assoc command
60
gpresult command
displays the Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer.
61
# r restores the previous value of the current directory saved by pushd.
popd
62
assoc command
displays or modifies file extension associations.
63
# r scans your hardware, devices, and installed programs for known compatibility issues and will give you guidance on how to resolve any potential issues found.
Windows Upgrade Advisor
64
# r a Microsoft command line utility program intended to let advanced users transfer files and settings between PCs.
USMT (User State Migration Tool)
65
# r allows users to transfer personal files and settings from a computer running an earlier version of Windows to a computer running a newer version.
Windows Easy Transfer
66
# r is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails.
S/MIME (Secure/Multipurpose Internet Mail Extensions)
67
Clean install is the process of
installing Windows over the top of an existing operating system. Cleaning/Erasing all of the existing data.
68
Recovery partition
restore a corrupt computer back to the same state it was in when it was purchased
69
Hijacking
TCP/IP session is manipulated by a third party inserting alternate packets into the communication stream.
70
Spear Phishing
attackers gather specific information about the target, such as which bank they use. Then send phishing emails as if they are that bank
71
Whaling
a form of phishing that is targeted to senior executives and high profile victims.
72
To use multiple disks in a single logical storage unit
upgrade all disks to dynamic disks. Create a spanned volume.
73
DiskPart
the command line that you can use to create, format, and manage partitions and volumes.
74
Port forwarding
directs incoming network traffic to a host on the private network.
75
Port triggering
dynamically opens firewall ports based on applications that initiate contact from the private network
76
A worm
malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself.
77
Simple Storage Space
-Adds space from the storage pool to the storage space
78
Two­-Way mirror
- Requires at least two storage devices. - The data is written to two devices. - Requires 2x as much space as the amount of storage needed
79
Three­Way mirror
- Requires at least five storage devices. - The data is written to three storage devices. - Provides redundancy for the data if two storage devices fail at one time
80
Parity
- at least three storage devices - Requires only 50 percent more redundancy space than storage space.
81
If you need to move from a 32­bit operating system to a 64­bit operating system
You must install a clean version of Windows first otherwise not allowed
82
Unified Threat Management (UTM) appliance
Intrusion prevention\detection Anomaly logs & Alerts explained Email & Anti-Spam Filters
83
# r restore a corrupt computer back to the same state it was in when it was purchased
Recovery partition
84
# r TCP/IP session is manipulated by a third party inserting alternate packets into the communication stream.
Hijacking
85
# r attackers gather specific information about the target, such as which bank they use. Then send phishing emails as if they are that bank
Spear Phishing
86
# r directs incoming network traffic to a host on the private network.
Port forwarding
87
# r dynamically opens firewall ports based on applications that initiate contact from the private network
Port triggering
88
# r malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself.
A worm
89
# r - Requires at least two storage devices. - The data is written to two devices. - Requires 2x as much space as the amount of storage needed
Two­-Way mirror
90
# r Intrusion prevention\detection Anomaly logs & Alerts explained Email & Anti-Spam Filters
Unified Threat Management (UTM) appliance
91
Copying a file to a new folder on the same drive does what to the file?
Removes any existing NTFS permissions so that only inherited permissions apply