1/77
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the Windows RE command that can be used to manage hard drives, partitions, and volumes
diskpart
What command searches for and replaces corrupted system files.
sfc/scannow
What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS?
Windows Boot Manager
What should be the first thing to try if the hard drive is not spinning at startup?
Check power connections and switches
Which Windows RE tool is considered to be the least intrusive?
Startup Repair
Which command is used to check and repair the hard drive?
chkdsk c:/r
Which diskpart command is used to remove any partition or volume information from the selected disk?
Clean
Which key should be pressed during the boot in order to display the Advanced Boot Options?
F8
Which of the following Windows RE commands can be used to scan for Windows installations not stored in the BCD?
bootrec /scanOS
Which of the following keys will cause the Windows Boot Manager to appear as long as it is pressed during the boot process?
spacebar
Which of the following symptoms might indicate that the MBR record is damaged?
Invalid partition table error
Which option should be enabled in order to view what did and did not load during the bootup?
Boot Logging
Which program is responsible for reading motherboard settings and running the POST?
Startup BIOS
Which program is used to start the part of the Win32 subsystem that displays graphics?
Smss.exe
How are IP addresses available to the Internet classified?
public
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.
Alternate Configuration
The solution for securing private data traveling over a public network, such as the Internet, is a ____.
Virtual Private Network
Using a ______________, packets are delivered to a single node on a network.
Unicast Address
What is it called when a router is configured to open or close certain ports so they can or cannot be used.
Port Filtering
What is the name of a 32-bit or 128-bit number that is used to identify a device?
IP Address
What is used to identify a wireless access point?
SSID
What type of IP address should be configured on a wireless access point so that it can always be
located by the devices that it serves?
Static IP Address
What type of device can be used to block unwanted traffic initiated from the Internet and can
also restrict Internet access from an internal network?
Firewall
Which TCP/IP protocol is used by Windows to share files and printers on a network?
Server Message Block (SMB)
Which command can be used to display TCP/IP configuration information and refresh the IP
address?
ipconfig
Which is used to identify the network portion and the host portion of an IP address?
subnet mask
Which protocol makes a connection, checks whether the data is received, and resends it if it is
not?
TCP
Which type of IP address is configured by a server when a device first initiates a connection to
the network?
Dynamic
Which utility can be used to automatically diagnose a problem with a network connection?
Windows Network Diagnostics
Which wireless networking radio frequency yields faster speeds but offers shorter range?
5 GHz
If you want to be able to power up a computer remotely, what feature should you use?
WoL
To which group does Windows give access to folders that you create which are not part of your
user profile?
Authenticated Users
When all users on a network require the same access to all resources, what type of network
model should you use?
Homegroup
When mapping a drive, you can type in the path to the shared folder on the host computer.
What is the syntax for the path?
//server/sharedfolder
When troubleshooting a live network cable, what should you use?
a loopback plug
Which NTFS permission(s) should you assign if the user should be able to create folders and files
and open files to read data, but not delete files.
Write, Read
Which built-in group might Windows automatically assign a user account to when determining
its permissions?
Anonymous Users
Which of the following is NOT true about Group Policy?
all policies are applied before
the logon screen appears
Which is NOT true about using share and NTFS permissions?
if both permissions are
used, the least restrictive permission between the two applies
Which of the following is NOT true about Remote Desktop?
by default all users can
access Remote Desktop
Which of the following is NOT true about user accounts and groups?
a user account can
belong to only one group at a time
Which of the following is a task you CAN'T do from the IE General tab?
disable file
downloads
Which of the following is described as a computer that intercepts requests that a browser makes
of a server and can cache received content.
proxy server
Which of the following is true about which folders to use to hold shared data when working with
a workgroup?
private data for each user should be kept in their C:\Users folder
Which statements is true about controlling access to folders and files?
rights are
assigned to accounts
Which type of permission should you set to control access to files and folders by local and
network users?
NTFS on NTFS volumes only
A privacy filter is used for what aspect of security?
screen viewing
An RFID badge is related to which type of authentication method?
Smart Card
If you don't want to use BitLocker to protect your computer, you can still configure a power-on
password using which of the following?
the BIOS
If you need to understand the parent-child relationships between running processes and view
parent processes as they call other processes, what tool should you use? Answer:
Process
Explorer
If you want your computer to be protected by BitLocker Encryption using computer
authentication, what feature must your computer have?
a TPM chip on the
motherboard
One way to authenticate users on a computer is to use a small device that contains
authentication information. What is this device called?
Smart Card
What keystroke should you press to get a logon window if you don't use the welcome screen?
Ctrl+Alt+Delete
Which command can you perform at the Windows RE command prompt to repair the OS boot
record on Windows 7?
bootrec /fixboot
Which of the following is NOT true about using Group Policy on business and professional
editions of Windows?
you can use gpedit.msc to see if any policies conflict
Which of the following is true about passwords.
by default, accounts with a blank
password cannot logon remotely
Which of the following is true about the Guest account in Windows 7?
it is disabled by
default
Which of the following is true about the Windows Encrypted File System?
an encrypted
file moved to an unencrypted folder remains encrypted
Which of the following provides a strong magnetic field used to completely erase data on a hard
drive or tape drive?
degausser
Which type of malware can hijack internal Windows components and often goes undetected
because it is already loaded when the antivirus software loads?
rootkit
Which type of malware hides in the MBR program of a hard drive?
boot sector virus
You should beware of a person attempting to use your computer after you step away from it, a
term referred to as which of the following?
tailgating
A SIM card is used for which of the following?
holding data related to your cellular
carrier
If you want to be able to wear gloves while using a smart phone, which screen technology will
work?
resistive touch screen
The delegation of server-side virtualization to a third party is referred to as which of the
following?
cloud computing
What can you do if you want to obtain administrator privileges to an Android device?
root the device
What does jailbreaking do?
give you root privileges to iOS
What is the accelerometer used for in mobile devices?
adjusting the screen orientation
What must you do before using a new iPad or iPod touch?
activate it
What should you configure on an iOS device if you want your data erased after ten failed logon
attempts?
Passcode Lock
Which company acquired Android code in 2005 and has a leadership role in its development?
Which component on a smart phone requires pairing with another device?
Bluetooth
Which of the following is NOT a function provided by iTunes for iOS devices?
back up
data on Apple web sites
Which of the following is a screen that uses electrodes that sense the conductive properties of
skin?
capacitive touch screen
Which of the following is based on open source code?
Android
Which of the following is true of a Type 1 hypervisor?
called bare-metal hypervisor
Which type of device is most likely to have a slot for an SD card?
Andriod smart phone
Which type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?
server-side