week four Flashcards

(50 cards)

1
Q

In addition to Reliability Monitor, where can you access Windows event logs for information about Microsoft-based application problems?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is another name for the blue screen error condition that occurs when Windows fails to boot properly or quits unexpectedly?

A

Blue Screen of Death (BSOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the process called when backgrounded (minimized) processes are loaded onto the hard drive due to a lack of physical memory?

A

Paging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Windows tool can scan and replace critical files when a feature of the operating system stops functioning or becomes corrupted?

A

System File Checker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a copy of your system configuration at a given point in time called?

A

Restore point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a symbolic word or combination of letters that can be used to hold a value?

A

Variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What tool allows for the automation and management of Windows operating systems, as well as cloud-related services such as Microsoft Azure and Microsoft 365?

A

PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are scripts commonly used for in IT environments?

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of network extends a company’s internal network across the Internet or other unsecured public networks?

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is commonly used for remote access via a text console for Linux and UNIX operating systems?

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Windows utility provides a more visual and detailed view of computer resource usage?

A

Resource Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What command can be issued at the command prompt to rebuild the BCD?

A

bootrec /rebuildbcd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when an application stops responding, requiring the user to end the task manually?

A

Application crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What file extension signifies that a file contains a script (text) and not an executable code in Linux and MacOS?

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of scripting language typically uses the .py extension?

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of script logic enables code to deviate or branch based on conditions?

A

Branch logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What scripting language is mainly interpreted in web browsers to allow for interactive web pages?

A

JavaScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which command should you use to repair the boot sector of the hard disk?

A

bootrec /fixboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user installs a second 1 TB hard disk drive (HDD) in their Windows 10 computer. Upon booting, they receive a “No Operating System Found” error. Unplugging the new HDD allows the computer to boot. What should you do next to fix the issue?

A

Verify the boot order in the BIOS/UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A macOS user browsing the internet in Google Chrome sees a notification stating, “Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!” What type of threat is this?

A

Rogue anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Two weeks after a technician removed a virus from Jack’s computer, the symptoms return. What step in the malware removal process was most likely missed?

A

Educate the end-user about how to avoid malware in the future

21
Q

A coworker is writing a script and includes “#!/bin/bash” as the first line. What file extension should the script use?

22
Q

Which remote access protocol should you use to securely connect to a Linux server over the internet?

23
Q

Your mother needs help with her computer and asks you to remotely connect to her Windows 10 laptop. What technology should you use?

24
What protocol should you use to securely access the command line of a network’s switches and routers remotely for configuration?
SSH
25
Which two account management security solutions provide countermeasures against brute-force attacks?
Failed attempts lockout Timeout period between login attempts
26
A Windows folder has share permissions granting Full Control and local NTFS permissions granting Read access. What are the user's effective permissions?
Read when accessing the share remotely Read when accessing the folder locally
27
In Windows, where can you check the dependencies of a service that failed to start?
In the Services utility (services.msc), right-click the service, select Properties, and check the Dependencies tab.
28
What programming construct repeats a sequence of instructions until a specified condition is met?
Loop
29
What term refers to removing software restrictions imposed by Apple on iOS?
Jailbreaking
30
Which account management security measure restricts user access to specified hours?
Login time restrictions
31
What type of critical file does a Windows system depend on to operate properly, which is hidden by default?
System file
32
Do Solid-State Drives (SSDs) require periodic defragmentation to improve system performance?
False
33
What script file type is designed to run in the Unix command line?
.sh
34
What is the mobile device functionality that enables the usage of locator applications?
GPS
35
Which utility can you use to access Safe Boot on Windows 11?
msconfig.exe
36
Which command should a technician use to scan and fix corrupted system files in Windows 10?
sfc /scannow
37
What is the term for a Li-ion battery overheating to the point of fire or explosion?
Thermal runaway
38
Which command can be used with Windows to replace missing system files?
sfc
39
Which protocol and suite of utilities allow secure remote access and management of systems?
SSH
40
What file extension is used for a plain-text script file that can be run or edited in a Windows command prompt?
.bat
41
Which scripting language uses cmdlets?
PowerShell
42
What type of script has the filename extension .ps1?
PowerShell
43
What is the first step to take when troubleshooting a Windows 11 workstation for malware removal?
Investigate and verify malware symptoms
44
A USB 2.0 port can handle a maximum of how many mA total?
500 mA
45
During the boot process, which file processes another file in the root directory that specifies installed OSs and their locations?
winload.exe
46
What Windows feature prevents users from running programs with elevated privileges without confirmation?
UAC (User Account Control)
47
You need to retrieve a file from your Windows Pro computer at home. What could you use?
VNC
48
What programming language uses files with the .js extension?
JavaScript
49
What Microsoft protocol allows you to connect to a different Microsoft client with a graphical interface?
RDP