BEST ITN 106 FINAL EXAM STUDY GUIDE

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

What is the Windows RE command that can be used to manage hard drives, partitions, and volumes

diskpart

2
New cards

What command searches for and replaces corrupted system files.

sfc/scannow

3
New cards

What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS?

Windows Boot Manager

4
New cards

What should be the first thing to try if the hard drive is not spinning at startup?

Check power connections and switches

5
New cards

Which Windows RE tool is considered to be the least intrusive?

Startup Repair

6
New cards

Which command is used to check and repair the hard drive?

chkdsk c:/r

7
New cards

Which diskpart command is used to remove any partition or volume information from the selected disk?

Clean

8
New cards

Which key should be pressed during the boot in order to display the Advanced Boot Options?

F8

9
New cards

Which of the following Windows RE commands can be used to scan for Windows installations not stored in the BCD?

bootrec /scanOS

10
New cards

Which of the following keys will cause the Windows Boot Manager to appear as long as it is pressed during the boot process?

spacebar

11
New cards

Which of the following symptoms might indicate that the MBR record is damaged?

Invalid partition table error

12
New cards

Which option should be enabled in order to view what did and did not load during the bootup?

Boot Logging

13
New cards

Which program is responsible for reading motherboard settings and running the POST?

Startup BIOS

14
New cards

Which program is used to start the part of the Win32 subsystem that displays graphics?

Smss.exe

15
New cards

How are IP addresses available to the Internet classified?

public

16
New cards

If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

Alternate Configuration

17
New cards

The solution for securing private data traveling over a public network, such as the Internet, is a ____.

Virtual Private Network

18
New cards

Using a ______________, packets are delivered to a single node on a network.

Unicast Address

19
New cards

What is it called when a router is configured to open or close certain ports so they can or cannot be used.

Port Filtering

20
New cards

What is the name of a 32-bit or 128-bit number that is used to identify a device?

IP Address

21
New cards

What is used to identify a wireless access point?

SSID

22
New cards

What type of IP address should be configured on a wireless access point so that it can always be

located by the devices that it serves?

Static IP Address

23
New cards

What type of device can be used to block unwanted traffic initiated from the Internet and can

also restrict Internet access from an internal network?

Firewall

24
New cards

Which TCP/IP protocol is used by Windows to share files and printers on a network?

Server Message Block (SMB)

25
New cards

Which command can be used to display TCP/IP configuration information and refresh the IP

address?

ipconfig

26
New cards

Which is used to identify the network portion and the host portion of an IP address?

subnet mask

27
New cards

Which protocol makes a connection, checks whether the data is received, and resends it if it is

not?

TCP

28
New cards

Which type of IP address is configured by a server when a device first initiates a connection to

the network?

Dynamic

29
New cards

Which utility can be used to automatically diagnose a problem with a network connection?

Windows Network Diagnostics

30
New cards

Which wireless networking radio frequency yields faster speeds but offers shorter range?

5 GHz

31
New cards

If you want to be able to power up a computer remotely, what feature should you use?

WoL

32
New cards

To which group does Windows give access to folders that you create which are not part of your

user profile?

Authenticated Users

33
New cards

When all users on a network require the same access to all resources, what type of network

model should you use?

Homegroup

34
New cards

When mapping a drive, you can type in the path to the shared folder on the host computer.

What is the syntax for the path?

//server/sharedfolder

35
New cards

When troubleshooting a live network cable, what should you use?

a loopback plug

36
New cards

Which NTFS permission(s) should you assign if the user should be able to create folders and files

and open files to read data, but not delete files.

Write, Read

37
New cards

Which built-in group might Windows automatically assign a user account to when determining

its permissions?

Anonymous Users

38
New cards

Which of the following is NOT true about Group Policy?

all policies are applied before

the logon screen appears

39
New cards

Which is NOT true about using share and NTFS permissions?

if both permissions are

used, the least restrictive permission between the two applies

40
New cards

Which of the following is NOT true about Remote Desktop?

by default all users can

access Remote Desktop

41
New cards

Which of the following is NOT true about user accounts and groups?

a user account can

belong to only one group at a time

42
New cards

Which of the following is a task you CAN'T do from the IE General tab?

disable file

downloads

43
New cards

Which of the following is described as a computer that intercepts requests that a browser makes

of a server and can cache received content.

proxy server

44
New cards

Which of the following is true about which folders to use to hold shared data when working with

a workgroup?

private data for each user should be kept in their C:\Users folder

45
New cards

Which statements is true about controlling access to folders and files?

rights are

assigned to accounts

46
New cards

Which type of permission should you set to control access to files and folders by local and

network users?

NTFS on NTFS volumes only

47
New cards

A privacy filter is used for what aspect of security?

screen viewing

48
New cards

An RFID badge is related to which type of authentication method?

Smart Card

49
New cards

If you don't want to use BitLocker to protect your computer, you can still configure a power-on

password using which of the following?

the BIOS

50
New cards

If you need to understand the parent-child relationships between running processes and view

parent processes as they call other processes, what tool should you use? Answer:

Process

Explorer

51
New cards

If you want your computer to be protected by BitLocker Encryption using computer

authentication, what feature must your computer have?

a TPM chip on the

motherboard

52
New cards

One way to authenticate users on a computer is to use a small device that contains

authentication information. What is this device called?

Smart Card

53
New cards

What keystroke should you press to get a logon window if you don't use the welcome screen?

Ctrl+Alt+Delete

54
New cards

Which command can you perform at the Windows RE command prompt to repair the OS boot

record on Windows 7?

bootrec /fixboot

55
New cards

Which of the following is NOT true about using Group Policy on business and professional

editions of Windows?

you can use gpedit.msc to see if any policies conflict

56
New cards

Which of the following is true about passwords.

by default, accounts with a blank

password cannot logon remotely

57
New cards

Which of the following is true about the Guest account in Windows 7?

it is disabled by

default

58
New cards

Which of the following is true about the Windows Encrypted File System?

an encrypted

file moved to an unencrypted folder remains encrypted

59
New cards

Which of the following provides a strong magnetic field used to completely erase data on a hard

drive or tape drive?

degausser

60
New cards

Which type of malware can hijack internal Windows components and often goes undetected

because it is already loaded when the antivirus software loads?

rootkit

61
New cards

Which type of malware hides in the MBR program of a hard drive?

boot sector virus

62
New cards

You should beware of a person attempting to use your computer after you step away from it, a

term referred to as which of the following?

tailgating

63
New cards

A SIM card is used for which of the following?

holding data related to your cellular

carrier

64
New cards

If you want to be able to wear gloves while using a smart phone, which screen technology will

work?

resistive touch screen

65
New cards

The delegation of server-side virtualization to a third party is referred to as which of the

following?

cloud computing

66
New cards

What can you do if you want to obtain administrator privileges to an Android device?

root the device

67
New cards

What does jailbreaking do?

give you root privileges to iOS

68
New cards

What is the accelerometer used for in mobile devices?

adjusting the screen orientation

69
New cards

What must you do before using a new iPad or iPod touch?

activate it

70
New cards

What should you configure on an iOS device if you want your data erased after ten failed logon

attempts?

Passcode Lock

71
New cards

Which company acquired Android code in 2005 and has a leadership role in its development?

Google

72
New cards

Which component on a smart phone requires pairing with another device?

Bluetooth

73
New cards

Which of the following is NOT a function provided by iTunes for iOS devices?

back up

data on Apple web sites

74
New cards

Which of the following is a screen that uses electrodes that sense the conductive properties of

skin?

capacitive touch screen

75
New cards

Which of the following is based on open source code?

Android

76
New cards

Which of the following is true of a Type 1 hypervisor?

called bare-metal hypervisor

77
New cards

Which type of device is most likely to have a slot for an SD card?

Andriod smart phone

78
New cards

Which type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?

server-side