Sie sind auf Seite 1von 74

Review Test Submission: Assignment 1

Content User Stephen saan-ire

Submitted 10/18/11 4:00 PM Status Score Instructions Completed 100 out of 100 points

Question 1 0 out of 4 points ____ are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card, or modem. Answer Selected Answer: Device Drivers Question 2 4 out of 4 points A(n) ____ is a list of items that is used to speed up a search. Answer Selected Answer: c. index Question 3 4 out of 4 points

A(n) ____ is the portion of an OS that relates to the user and to applications. Answer Selected Answer: c. shell Question 4 4 out of 4 points The ____ is usually on the right side of the taskbar and displays open services. Answer Selected Answer: d. system tray Question 5 4 out of 4 points Vista has a new 3D user interface called the ____ user interface. Answer Selected Answer: a. Aero Question 6 4 out of 4 points Windows identifies file types primarily by the ____. Answer Selected Answer: d. file extension Question 7 4 out of 4 points

A(n) ____ is a program that runs in the background to support or serve Windows or an application. Answer Selected Answer: c. service Question 8 4 out of 4 points The OS ____ is responsible for interacting with hardware. Answer Selected Answer: c. kernel Question 9 4 out of 4 points System Information can be useful when strange error messages appear during startup. Answer Selected Answer: Question 10 4 out of 4 points Windows offers two ways to sync files: ____. Answer Selected Answer: b. Briefcase and Offline Files Question 11 4 out of 4 points True

The ____ interface between the subsystems in user mode and the HAL. Answer Selected Answer: d. executive services Question 12 4 out of 4 points A(n) ____ is software that controls a computer. Answer Selected Answer: d. operating system Question 13 4 out of 4 points An applet has a ____ file extension. Answer Selected Answer: b. .cpl Question 14 4 out of 4 points The kernel provides a way for the user to do such things as select music to burn to a CD, install an application, or change the wallpaper on the Windows desktop. Answer Selected Answer: Question 15 4 out of 4 points False

The Windows desktop is itself a folder. Answer Selected Answer: Question 16 4 out of 4 points In 1986, ____ was introduced and quickly became the most popular OS among IBM computers and IBM-compatible computers using the Intel 8086 processors. Answer Selected Answer: c. MS-DOS Question 17 4 out of 4 points An operating system manages hardware, runs applications, provides an interface for users, and stores, retrieves, and manipulates files. Answer Selected Answer: Question 18 4 out of 4 points A ____ is a single task, such as the task of printing a file, that the process requests from the kernel. Answer Selected Answer: d. thread Question 19 4 out of 4 points True True

A ____ interface is an interface that uses graphics as compared to a command-driven interface. Answer Selected Answer: b. graphical user Question 20 4 out of 4 points The ____ is normally located at the bottom of the Windows desktop, displaying information about open programs and providing quick access to others. Answer Selected Answer: d. taskbar Question 21 4 out of 4 points A(n) ____ is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive. Answer Selected Answer: d. netbook Question 22 4 out of 4 points A ____ is one or more characters following the last period in a filename, such as .exe, .txt, or .avi. Answer Selected Answer: b. file extension Question 23

4 out of 4 points A ____ makes it possible to boot a computer into one of two installed OSs. Answer Selected Answer: a. dual boot Question 24 4 out of 4 points From the ____ window, you can change the read-only, hidden, archive, and indexing attributes of the file. Answer Selected Answer: a. Properties Question 25 4 out of 4 points The ____ dialog box in Windows Vista appears each time a user attempts to perform an action that can be done only with administrative privileges. Answer Selected Answer: a. User Account Control Tuesday, October 18, 2011 4:00:52 PM CDT

Review Test Submission: Assignment 2


Content User Submitted 10/18/11 4:54 PM Status Score Instructions Completed 100 out of 100 points

Question 1 4 out of 4 points When youre working with or talking to a customer, focus on ____. Answer Selected Answer: b. him or her Question 2 4 out of 4 points The best way to give bad news is ____. Answer Selected Answer: c. face to face Question 3 4 out of 4 points ____ support requires more interaction with customers than any other type of PC support.

Answer Selected Answer: d. Phone Question 4 4 out of 4 points A help-desk call is the most difficult situation to handle when a customer is not knowledgeable about how to use a computer. Answer Selected Answer: Question 5 4 out of 4 points ____ customers are your customers who come to you or your company for service. Answer Selected Answer: a. External Question 6 4 out of 4 points ____ customers are those where you both work for the same company, in which case you might consider the customer your colleague Answer Selected Answer: a. Internal Question 7 4 out of 4 points ____ has industry recognition, so it should be your first choice for certification as a PC True

technician. Answer Selected Answer: b. A+ Certification Question 8 4 out of 4 points Knowing how to effectively work with people in a technical world is one of the most soughtafter skills in todays service-oriented work environments. Answer Selected Answer: Question 9 4 out of 4 points When working with a customer, your primary job is to satisfy your boss. Answer Selected Answer: Question 10 4 out of 4 points ____ differences happen because we are from different countries and societies or because of physical handicaps. Answer Selected Answer: d. Cultural Question 11 4 out of 4 points False True

Most PC support jobs require simply working with hardware and software. Answer Selected Answer: Question 12 4 out of 4 points Knowing how to ____ a problem to those higher in the support chain is one of the first things you should learn on a new job. Answer Selected Answer: a. escalate Question 13 4 out of 4 points ____ is required if the customer must be told each key to press or command button to click. Answer Selected Answer: d. Patience Question 14 4 out of 4 points To provide good service, you need to have a good ____ when servicing customers on the phone or online, on site, or in a shop. Answer Selected Answer: c. plan Question 15 4 out of 4 points False

As a support technician, your goals can include ____ the user, as well as repairing the computer. Answer Selected Answer: b. educating Question 16 4 out of 4 points The most significant certifying organization for PC technicians is the ____. Answer Selected Answer: c. Computing Technology Industry Association Question 17 4 out of 4 points ____ a problem increases your value in the eyes of your coworkers and boss. Answer Selected Answer: a. Taking ownership of Question 18 4 out of 4 points Troubleshooting begins by ____. Answer Selected Answer: b. interviewing the user Question 19 4 out of 4 points

Organize your time by making ____ and sticking with them as best you can. Answer Selected Answer: d. to-do lists Question 20 4 out of 4 points A ____ is the only one responsible for the PC before trouble occurs. Answer Selected Answer: b. PC support technician Question 21 4 out of 4 points When someone initiates a call for help, the technician starts the process by creating a(n) ____. Answer Selected Answer: c. ticket Question 22 4 out of 4 points To improve your attitude, you must do it from your ____. Answer Selected Answer: c. heart Question 23 4 out of 4 points

Begin each new relationship with a ____. Answer Selected Answer: d. handshake Question 24 4 out of 4 points One of the most important ways to achieve customer satisfaction is to do your best by being ____. Answer Selected Answer: b. prepared Question 25 4 out of 4 points Part of setting ____ is to establish a timeline with your customer for the completion of a project. Answer Selected Answer: a. expectations Wednesday, October 19, 2011 12:09:58 PM CDT OK

Review Test Submission: Assignment 3


Content

User Submitted 10/19/11 11:10 AM Status Completed Score 100 out of 100 points Instructions

Question 1
4 out of 4 points

An example of a network operating system is Windows Server 2008, which controls a network using the directory database called ____. Answer Selected Answer: a. Active Directory

Question 2
4 out of 4 points

During a normal Windows XP installation, setup causes the system to reboot ____ times. Answer Selected Answer: c. three

Question 3
4 out of 4 points

A(n) ____ server is used to hold the setup files on the Windows CD or DVD to a file server on the network and then at each PC, you can execute the Setup program on the server. Answer Selected Answer: b. distribution

Question 4
4 out of 4 points

The ____ partition is the active partition of the hard drive. Answer Selected Answer: c.

system

Question 5
4 out of 4 points

A(n) ____ installation is performed by storing the answers to installation questions in a text file or script that Windows calls an answer file. Answer Selected Answer: a. unattended

Question 6
0 out of 4 points

The ____ command is used to copy the information to the new computer. Answer Selected Answer: loadstate

Question 7
4 out of 4 points

A Windows domain is a type of ____ network, which is a network where resources are managed by a centralized computer. Answer Selected Answer: a. client/server

Question 8
4 out of 4 points

For an always-up broadband connection (such as cable modem or DSL), select ____ when you configure updates. Answer Selected Answer: b. Automatic

Question 9
4 out of 4 points

When you configure updates, if the PC doesnt have an always-up Internet connection (such as dial-up), you might want to select ____. Answer Selected Answer: d.

Notify me but dont automatically download or install them

Question 10
4 out of 4 points

A Windows ____ is a logical group of computers and users that share resources, where administration, resources, and security on a workstation are controlled by that workstation. Answer Selected Answer: b. workgroup

Question 11
4 out of 4 points

The Windows utility ____ is used to remove configuration settings, such as the computer name that uniquely identifies the PC. Answer Selected Answer: c. sysprep.exe

Question 12
4 out of 4 points

Use a ____-bit OS if you need increased performance and your system has enough resources to support it. Answer Selected Answer: d. 64

Question 13
4 out of 4 points

Upgrading to a better edition of Vista can easily be accomplished by using the ____ feature. Answer Selected Answer: d. Windows Anytime Upgrade

Question 14
4 out of 4 points

For some brand-name computers, the hard drive contains a ____ partition that can be used to reinstall Windows. Answer

Selected Answer:

c. hidden recovery

Question 15
4 out of 4 points

As a PC support technician, you can expect to be faced with installing Windows in a variety of situations. Answer Selected Answer: True

Question 16
4 out of 4 points

Product ____ is a method used by Microsoft to prevent unlicensed use of its software so that you must purchase a Windows license for each installation of Windows. Answer Selected Answer: c. activation

Question 17
4 out of 4 points

Use ____ to find out which devices are installed in your XP system. Answer Selected Answer: d. Device Manager

Question 18
4 out of 4 points

A ____ computer is software that simulates the hardware of a physical computer. Answer Selected Answer: c. virtual

Question 19
4 out of 4 points

The retail version costs less than the OEM version, but can only be installed on a new PC for resale. Answer Selected Answer: False

Question 20

4 out of 4 points

The ____ command is used to copy the information from the old computer to a server or removable media. Answer Selected Answer: c. scanstate

Question 21
4 out of 4 points

A ____ boot allows you to install the new OS without disturbing the old one so you can boot to either OS. Answer Selected Answer: b. dual

Question 22
4 out of 4 points

Many hardware manufacturers have chosen to not produce Vista drivers for their older devices, so its very important to find out if your hardware will be compatible with Vista. Answer Selected Answer: True

Question 23
4 out of 4 points

Microsoft no longer supports Windows 2000, so you should never be called on to install it on a new PC. Answer Selected Answer: True

Question 24
4 out of 4 points

A ____ is a copy of the entire volume on which Windows is installed to another bootable media such as CDs or USB drive. Answer Selected Answer: d. drive image

Question 25
4 out of 4 points

To convert a FAT32 volume to an NTFS volume, first back up all important data on the

drive and then use this command at a command prompt: ____, where D: is the drive to be converted. Answer Selected Answer: b. convert D: /FS:NTFS

Wednesday, October 19, 2011 11:10:12 AM CDT


OK

Review Test Submission: Assignment 4

Content User Stephen saan-ire

Submitted 10/19/11 12:07 PM Status Score Instructions Completed 100 out of 100 points

Question 1 4 out of 4 points To view and manually install updates, click ____, and then follow the directions on-screen. Answer Selected Answer: b. Start, All Programs, and Windows Updates Question 2 4 out of 4 points A snapshot of the system settings and configuration is called a ____. Answer Selected Answer: d. restore point Question 3 4 out of 4 points When a hard drive is first sensed by Windows, it is assigned the ____ disk status. Answer Selected Answer: a.

Basic Question 4 4 out of 4 points ____ creates restore points at regular intervals and just before you install software or hardware. Answer Selected Answer: d. System Protection Question 5 4 out of 4 points Currently, Microsoft offers four service packs for Windows XP. Answer Selected Answer: Question 6 4 out of 4 points You can use ____ to convert two or more basic disks to dynamic disks. Answer Selected Answer: a. Disk Management Question 7 4 out of 4 points A disk marked as dynamic can be used with other dynamic disks in a spanned or ____ volume. Answer False

Selected Answer:

c. striped

Question 8 4 out of 4 points A dynamic disk requires ____ MB of storage for the disk management database. Answer Selected Answer: 1 Question 9 4 out of 4 points The ____ command creates a subdirectory under a directory. Answer Selected Answer: d. MD Question 10 4 out of 4 points Windows Vista Ultimate offers language packs through ____. Answer Selected Answer: a. Windows Update Question 11 4 out of 4 points To make sure the drive is healthy, you need to search for and repair file system errors using the Windows ____ utility. a.

Answer Selected Answer: a. Chkdsk Question 12 4 out of 4 points Use the ____ command to defrag the drive from a command prompt window. Answer Selected Answer: b. Defrag Question 13 4 out of 4 points Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for a variety of other tasks, so its important to delete unneeded files occasionally. Answer Selected Answer: Question 14 4 out of 4 points The user folder for an account contains a group of subfolders called the user ____. Answer Selected Answer: c. profile namespace Question 15 4 out of 4 points True

For Windows XP, use the ____ to see which service packs are installed. Answer Selected Answer: c. System Properties box Question 16 4 out of 4 points If you enter a command and want to terminate its execution before it is finished, you can press ____ to do so. Answer Selected Answer: c. Ctrl+Break Question 17 4 out of 4 points If you are having problems with a hard drive, volume, or mounted drive, check ____ for events about the drive that might have been recorded there. Answer Selected Answer: a. Event Viewer Question 18 4 out of 4 points You can install an OS on a spanned or striped volume that uses software RAID. Answer Selected Answer: Question 19 4 out of 4 points False

A file with a .bat file extension is called a ____ file. Answer Selected Answer: c. batch Question 20 4 out of 4 points Besides backing up user data or system files, you can also back up the entire hard drive using Windows Vista ____. Answer Selected Answer: b. Complete PC Backup Question 21 4 out of 4 points To protect a system against malicious attack, you need to verify that ____ software is configured to scan the system regularly and that it is up-to-date. Answer Selected Answer: c. antivirus Question 22 4 out of 4 points When you back up the system state, the registry is also backed up to the folder ____. Answer Selected Answer: a. %SystemRoot%\repair\RegBack Question 23

4 out of 4 points Files can end up in ____ segments all over the drive. Answer Selected Answer: a. fragmented Question 24 4 out of 4 points When a new hard drive is first installed in a system, you must first initialize the disk. Answer Selected Answer: Question 25 4 out of 4 points By default, Vista automatically defrags a drive every ____. Answer Selected Answer: a. Wednesday at 1:00 AM Wednesday, October 19, 2011 12:07:23 PM CDT OK True

Review Test Submission: Assignment 5


User stephen saan-ire Submitted 10/19/11 6:26 PM

Status Completed Score 100 out of 100 points Instructions

Question 1
4 out of 4 points

In a console, the individual tools are called ____. Answer Selected Answer: b. snap-ins

Question 2
4 out of 4 points

The ____ box can protect your system against users making unauthorized changes and against malware installing itself without your knowledge. Answer Selected Answer: d. UAC

Question 3
4 out of 4 points

Device Manager reads data from the ____ key to build the information it displays about hardware configurations. Answer Selected Answer: a. HKLM\HARDWARE

Question 4
4 out of 4 points

You can use the ____ utility to zero in on the service or other program that is slowing down startup. Answer Selected Answer: d. MSconfig

Question 5
4 out of 4 points

You can edit the registry and create a restore point while in Safe Mode. Answer

Selected Answer:

False

Question 6
4 out of 4 points

A(n) ____ is a single window that contains one or more administrative tools such as Device Manager or Disk Management. Answer Selected Answer: c. console

Question 7
4 out of 4 points

The ____ tab in Task Manager provides details about how a program uses system resources. Answer Selected Answer: d. Performance

Question 8
4 out of 4 points

Editing the registry can be dangerous, so do this with caution and be sure to back up first! Answer Selected Answer: True

Question 9
4 out of 4 points

To stop a process using Task Manager, select the process and click ____. Answer Selected Answer: d. End Process

Question 10
4 out of 4 points

____, under Windows Vista, is a summary index designed to measure the overall performance of a system. Answer Selected Answer: c. Windows Experience Index

Question 11
4 out of 4 points

The ____ tab in Task Manager lets you monitor network activity and bandwidth used. Answer Selected Answer: d. Networking

Question 12
4 out of 4 points

The ____ tab in Task Manager shows all users currently logged on the system. Answer Selected Answer: d. Users

Question 13
4 out of 4 points

You can use the ____ to find out what processes are launched at startup and to temporarily disable a process from loading. Answer Selected Answer: b. System Configuration Utility

Question 14
4 out of 4 points

You can use the ____ to find information about the installed processor and its speed, how much RAM is installed, and free space on the hard drive. Answer Selected Answer: d. System Information Utility

Question 15
4 out of 4 points

If a system is giving repeated startup errors or you have just removed several programs, you might want to search through ____ for processes left there by uninstalled or corrupted software that might be giving startup problems. Answer Selected Answer: b. registry keys

Question 16

4 out of 4 points

Most programs written for Windows have a(n) ____ routine which can be accessed from the Vista Programs and Features applet in the Control Panel, the XP Add Remove Programs applet in the Control Panel, or a utility in the All Programs menu. Answer Selected Answer: c. uninstall

Question 17
4 out of 4 points

To make sure that all hardware or software installed on the system is compatible with Windows Vista, use the ____. Answer Selected Answer: a. Vista Upgrade Advisor

Question 18
4 out of 4 points

The ____ is responsible for maintaining an index of files and folders on a hard drive to speed up Windows searches. Answer Selected Answer: c. Windows indexer

Question 19
4 out of 4 points

If your desktop locks up, you can use ____ to refresh it. Answer Selected Answer: c. Task Manager

Question 20
4 out of 4 points

To find out if programs and services are slowing down Windows startup, boot the system in ____ and watch to see if performance improves. Answer Selected Answer: c. Safe Mode

Question 21

4 out of 4 points

A console is saved in a file with an ____ file extension. Answer Selected Answer: a. .msc

Question 22
4 out of 4 points

____ is a Windows utility that can be used to build your own customized console windows. Answer Selected Answer: b. Microsoft Management Console

Question 23
4 out of 4 points

If you notice that performance slows after a system has been up and running without a restart for some time, suspect a memory leak. Answer Selected Answer: True

Question 24
4 out of 4 points

The indexing service of Windows indexer has a high priority and take precedence over other programs. Answer Selected Answer: False

Question 25
4 out of 4 points

The ____ tab of Task Manager lists system services and other processes associated with applications, together with how much CPU time and memory the process uses. Answer Selected Answer: d. Processes

Wednesday, October 19, 2011 6:26:10 PM CDT


OK

Review Test Submission: Assignment 6

User

stephen saan-ire

Submitted 10/20/11 6:29 PM Status Score Instructions Completed 100 out of 100 points

Question 1 4 out of 4 points To move to the root directory, use the command ____. Answer Selected Answer: a. CD \ Question 2 4 out of 4 points Use the ____ command to repair the file system and recover data from bad sectors. Answer Selected Answer: a. chkdsk C: /r Question 3 4 out of 4 points Use the ____ command to extract .cab files. Answer Selected Answer: c. Expand

Question 4 4 out of 4 points Use the ____ command followed by the name of the service to show the current status of a service. Answer Selected Answer: c. Enable Question 5 4 out of 4 points If your hard drive is corrupted, you still might be able to recover data. Answer Selected Answer: Question 6 4 out of 4 points In the Recovery Console, the command ____ deletes a directory. Answer Selected Answer: a. RD Question 7 4 out of 4 points The ____ file is a hidden text file stored in the root directory of the active partition that Ntldr reads to see what operating systems are available and how to set up the boot. Answer Selected Answer: d. True

Boot.ini Question 8 4 out of 4 points If Driver Verifier runs for a few days and has still not found the problem, it probably will not help you. Answer Selected Answer: Question 9 4 out of 4 points The ____ tool can be used to direct information about drivers to a file, including information about digital signatures. Answer Selected Answer: c. Driver Query Question 10 4 out of 4 points Registry settings collectively called the ____ are saved in the registry each time the user successfully logs onto the system. Answer Selected Answer: a. Last Known Good Configuration Question 11 4 out of 4 points To retrieve the last command entered in the Recovery Console, press ____ at the command prompt. True

Answer Selected Answer: c. F3 Question 12 4 out of 4 points Vista configuration data is stored in the Vista ____ file. Answer Selected Answer: c. Boot Configuration Data Question 13 4 out of 4 points You can use the Windows RE command prompt window to restore registry files using those saved in the ____ folder. Answer Selected Answer: b. c:\windows\system32\config\regback Question 14 4 out of 4 points If the problem happens in the kernel mode of Windows, a ____ or blue screen error occurs. Answer Selected Answer: a. STOP Question 15 4 out of 4 points

The Vista Advanced Boot Options menu appears when a user presses ____ as Vista is loading. Answer Selected Answer: c. F8 Question 16 4 out of 4 points You can quickly identify a problem with memory or eliminate memory as the source of a problem by using the ____ tool. Answer Selected Answer: c. Vista Memory Diagnostics Question 17 4 out of 4 points The ____ is used when Windows 2000/XP does not start properly or hangs during the load. Answer Selected Answer: d. Recovery Console Question 18 4 out of 4 points Driver Verifier attempts to overload the drivers it monitors, which can cause a memory error. Answer Selected Answer: Question 19 4 out of 4 points False

To retrieve the command entered in the Recovery Console one character at a time, press the ____ key. Answer Selected Answer: a. F1 Question 20 4 out of 4 points The ____ tool displays information about digitally signed files, including device driver files and application files, and logs information to C:\Windows\Sigverif.txt. Answer Selected Answer: c. File Signature Verification Question 21 4 out of 4 points For hardware problems, ____ is a Windows Vista/XP/2000 utility that runs in the background to put stress on drivers as they are loaded and running. Answer Selected Answer: c. Driver Verifier Question 22 4 out of 4 points Errors with memory are often difficult to diagnose because they can appear intermittently and might be mistaken as application errors, user errors, or other hardware component errors. Answer Selected Answer: Question 23 True

4 out of 4 points Enter the command ____ to see a list of all services currently installed, which includes device drivers. Answer Selected Answer: d. listsvc Question 24 4 out of 4 points Use the Windows Vista ____ tool to deal with an immediate hardware or software problem. Answer Selected Answer: d. Problem Reports and Solutions Question 25 4 out of 4 points A compressed file uses a(n) ____ as the last character in the file extension. Answer Selected Answer: b. underscore Thursday, October 20, 2011 6:29:10 PM CDT

Chapter 7 User stephen saan-ire

Submitted 11/5/11 9:51 PM Status Completed Score 100 out of 100 points Instructions Question 1 4 out of 4 points The key that loads services and drivers can be found in the ____ location. Answer Selected Answer: c. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services

Question 2 4 out of 4 points

The error ____ is caused by a driver or service making an illegal access to memory. Answer Selected Answer: b. Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL

Question 3 4 out of 4 points

For Vista, use the ____ tool to search for the problem and suggested solutions. Answer Selected Answer: c. Problem Reports and Solutions

Question 4 4 out of 4 points

If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation. Answer Selected Answer: c. hidden partition

Question 5 4 out of 4 points

The ____ Configuration is updated after you log on normally to Vista. Answer Selected Answer: c. Last Known Good

Question 6 4 out of 4 points

For essential hardware devices, use the ____ to verify and replace system files. Answer Selected Answer: b. System File Checker

Question 7 4 out of 4 points

Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted. Answer Selected Answer: d. restore

Question 8 4 out of 4 points

To uninstall a program, in Device Manager ____ the device and select Uninstall. Answer Selected Answer: c. right-click

Question 9 0 out of 4 points

If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted. Answer Selected Answer: True

Question 10 4 out of 4 points

When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded. Answer Selected Answer: a. Windows kernel

Question 11 4 out of 4 points

The error ____ is means a bad driver or service has performed an illegal action. Answer

Selected Answer:

c. Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED

Question 12 4 out of 4 points

Use the ____ tool to test memory. Answer Selected Answer: d. Memory Diagnostics

Question 13 4 out of 4 points

Sometimes a Windows update solves a problem with a hardware device. Answer Selected Answer: True

Question 14 4 out of 4 points

Errors or warnings in Device Manager are displayed as a ____. Answer Selected Answer: b. yellow triangle or question mark

Question 15 4 out of 4 points

Check ____ to verify that a device is enabled and Windows thinks the device should be working. Answer Selected Answer: a. Device Manager

Question 16 4 out of 4 points

After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive. Answer Selected Answer: a. SFC, Chkdsk, and Defrag

Question 17 4 out of 4 points

The command ____ searches for and replaces corrupted system files. Answer Selected Answer: a. sfc /scannow

Question 18 4 out of 4 points

As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. Answer Selected Answer: False

Question 19 4 out of 4 points

If you can identify the approximate date the error started and that date is in the recent past, use ____. Answer Selected Answer: b. System Restore

Question 20 4 out of 4 points

Press ____ at startup to display the Advanced Boot Options menu. Answer Selected Answer: F8

b. Question 21 4 out of 4 points

During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder. Answer Selected Answer: a. \Windows.old

Question 22 4 out of 4 points

For a laptop or other brand-name computer, dont forget to reinstall Windows using recovery CDs provided by ____. Answer Selected Answer: d. the computer manufacturer

Question 23 4 out of 4 points

In Event Viewer, the ____ log shows only warnings and error events Answer Selected Answer: b. Administrative Events

Question 24 4 out of 4 points

If the system is caught in an endless loop of restarts, boot into ____. Answer Selected Answer: c. Safe Mode

Question 25 4 out of 4 points

When installing a device, you must always run the setup CD for the device after you physically install the device. Answer Selected Answer: False Saturday, November 5, 2011 9:51:54 PM CDT OK

Chapter 8 Review Test Submission: Assignment 8 Content User

Submitted 11/5/11 11:01 PM Status Score Instructions

Completed 100 out of 100 points

Question 1 4 out of 4 points If you are comfortable with Vista automatically connecting to a particular network in the future, check _____. Answer Selected Answer: d. Save this network

Question 2 4 out of 4 points The danger in connecting to unknown hotspots is that _____ and hackers might be waiting for unsecured computers to connect. Answer Selected Answer: a. malware

Question 3 4 out of 4 points Wireless networks can be secured by broadcasting the name of the wireless access point (called the Service Set Identifier or SSID). Answer Selected Answer: False

Question 4 4 out of 4 points

The ____ command tests connectivity by sending an echo request to a remote computer. Answer Selected Answer: a. ping

Question 5 4 out of 4 points Unless you protect your computer by using strong _____ settings, your computer might get hacked. Answer Selected Answer: d. firewall

Question 6 4 out of 4 points If you select a(n) _____ network, Vista warns you about sending information over it. Answer Selected Answer: a. unsecured

Question 7 4 out of 4 points The ____ command can display TCP/IP configuration information and refresh the IP address. Answer Selected Answer: d. ipconfig

Question 8 4 out of 4 points

A private and secured wireless access point might be configured for _____ address filtering in order to control which wireless adapters can use the access point. Answer Selected Answer: c. MAC

Question 9 4 out of 4 points The IP addresses available to the Internet are called ____ IP addresses. Answer Selected Answer: a. public

Question 10 4 out of 4 points When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. Answer Selected Answer: True

Question 11 4 out of 4 points A(n) ____ is a 32-bit string used to identify a computer on a network. Answer Selected Answer: c. IP address

Question 12 4 out of 4 points If a network adapter is installed on your computer and you need to know the MAC

address, you can open a command prompt window and enter the command _____. Answer Selected Answer: a. ipconfig/all

Question 13 4 out of 4 points A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computers IP address is on the same or a different network. Answer Selected Answer: c. subnet mask

Question 14 4 out of 4 points A____ application means one computer (the remote computer) is running the Telnet component and another computer (the local computer) runs the Telnet component. Answer Selected Answer: a. client/server

Question 15 4 out of 4 points When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection. Answer Selected Answer: False

Question 16 4 out of 4 points

If the access point is not broadcasting its SSID, the name of the wireless network will appear as _____. Answer Selected Answer: d. Unnamed Network

Question 17 4 out of 4 points If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network. Answer Selected Answer: c. Alternate Configuration

Question 18 4 out of 4 points Wireless networks can be secured by using an encryption key (using _____, WPA, or WPA2 encryption standards). Answer Selected Answer: b. WEP

Question 19 4 out of 4 points A ____ IP address is assigned for the current connection only. Answer Selected Answer: a. dynamic

Question 20

4 out of 4 points When connecting to a wireless network that is not broadcasting its SSID, you are given the opportunity to enter the _____ of the network. Answer Selected Answer: b. name

Question 21 4 out of 4 points To use ____, you can create user accounts using the Control Panel. Answer Selected Answer: d. Telnet

Question 22 4 out of 4 points The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. Answer Selected Answer: False

Question 23 4 out of 4 points To verify firewall settings and check for errors, open the _____window. Answer Selected Answer: b. Network and Sharing Center

Question 24 4 out of 4 points

The solution for securing private data traveling over a public network is a ____. Answer Selected Answer: d. virtual private network

Question 25 4 out of 4 points A ____ is the connection a computer uses to access another network if it does not have a better option. Answer Selected Answer: c. default gateway Saturday, November 5, 2011 11:01:22 PM CDT OK

Chapter 9 Review Test Submission: Assignment 9 Content User Submitted 11/5/11 11:40 PM Status Score Completed 96 out of 100 points

Instructions

Question 1 4 out of 4 points Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet. Answer Selected Answer: c. Desktop

Question 2 4 out of 4 points To disconnect a mapped network drive, use the ____ command. Answer Selected Answer: b. net use z: /delete

Question 3 4 out of 4 points Port ____ opens a port when a PC on the network initiates communication through another port. Answer Selected Answer: b. triggering

Question 4 4 out of 4 points A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a computers IP address. Answer

Selected Answer:

d. reverse

Question 5 4 out of 4 points The command to flush the DNS cache kept on the computer is ____. Answer Selected Answer: c. ipconfig /flushdns

Question 6 4 out of 4 points To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP addressing. Answer Selected Answer: c. static

Question 7 4 out of 4 points DSL service and an older technology, ISDN, are provided by the local telephone company. Answer Selected Answer: True

Question 8 4 out of 4 points In order to activate your service, the cable company must know the ____ of the cable modem you have installed. Answer

Selected Answer:

d. MAC address

Question 9 4 out of 4 points When a Remote ____ session is opened, all local users are logged off. Answer Selected Answer: d. Desktop

Question 10 4 out of 4 points Remote ____ can help you support users and their computers from a distance. Answer Selected Answer: a. Assistance

Question 11 4 out of 4 points For port forwarding to work, the computer on your network must have a ____ IP Address. Answer Selected Answer: d. static

Question 12 4 out of 4 points You can use a regular analog phone as an Internet phone if you use a(n) ____. Answer

Selected Answer:

b. Analog Telephone Adapter

Question 13 4 out of 4 points To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command. Answer Selected Answer: d. nslookup www.microsoft.com

Question 14 4 out of 4 points A log file is kept of every Remote Assistance session in the ____ folder. Answer Selected Answer: c. C:\Users\username\Documents\Remote Assistance Logs

Question 15 4 out of 4 points The logon for an on-demand broadband connection is managed by a protocol called ____. Answer Selected Answer: b. PPPoE

Question 16 4 out of 4 points If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network.

Answer Selected Answer: b. proxy

Question 17 4 out of 4 points Networking happens in ____. Answer Selected Answer: c. layers

Question 18 0 out of 4 points When trying to use client/server applications on the Internet, your software and hardware firewalls and other security settings on the router will automatically allow the communication. Answer Selected Answer: False

Question 19 4 out of 4 points Because electrical interference can be a problem with VoIP phones, each network cable connected to a VoIP phone needs a(n) ____ clamp attached. Answer Selected Answer: c. ferrite

Question 20 4 out of 4 points A DSL installation works very differently than a cable modem installation.

Answer Selected Answer:

False

Question 21 4 out of 4 points Most broadband connections today are always up and use ____ IP addressing. Answer Selected Answer: c. dynamic

Question 22 4 out of 4 points When supporting and troubleshooting small networks, youll need to use ____ to test the physical connections of the network. Answer Selected Answer: d. cable testers

Question 23 4 out of 4 points When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____. Answer Selected Answer: d. VoIP provider

Question 24 4 out of 4 points Many software vendors use FTP sites for downloading software to their customers.

Answer Selected Answer:

True

Question 25 4 out of 4 points ____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN. Answer Selected Answer: d. Encryption Saturday, November 5, 2011 11:40:16 PM CDT OK

Chapter 10 Review Test Submission: Assignment 10 Content User Submitted 11/6/11 7:13 PM Status Score Instructions Completed 100 out of 100 points

Question 1 4 out of 4 points

A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. Answer Selected Answer: b. backdoor

Question 2 4 out of 4 points The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources. Answer Selected Answer: c. ISO 17799 and ISO 27002

Question 3 4 out of 4 points A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are. Answer Selected Answer: a. digital certificate

Question 4 4 out of 4 points When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day. Answer Selected Answer: False

Question 5 4 out of 4 points A ____ is made of several words with spaces allowed. Answer Selected Answer: c. passphrase

Question 6 4 out of 4 points A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination. Answer Selected Answer: b. macro

Question 7 4 out of 4 points A network ____ map is one of the most powerful and versatile methods of communicating over a network. Answer Selected Answer: a. drive

Question 8 4 out of 4 points Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data. Answer

Selected Answer:

b. permissions

Question 9 4 out of 4 points A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords. Answer Selected Answer: b. strong

Question 10 4 out of 4 points Generally speaking, the weakest link in setting up security in a computer environment is ____. Answer Selected Answer: b. people

Question 11 4 out of 4 points A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users data. Answer Selected Answer: c. limited

Question 12

4 out of 4 points Individuals are always free to decide what security measures they want to use. Answer Selected Answer:

False

Question 13 4 out of 4 points Its best to use three-factor authentication. Answer Selected Answer: False

Question 14 4 out of 4 points A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users. Answer Selected Answer: d. administrator

Question 15 4 out of 4 points A ____ virus is a combination of a boot sector virus and a file virus and can hide in either. Answer Selected Answer: b. multipartite

Question 16 4 out of 4 points

Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level. Answer Selected Answer:

True

Question 17 4 out of 4 points Most encryption software products use a method called ____. Answer Selected Answer: b. Public Key Encryption

Question 18 4 out of 4 points When implementing a security plan, the four steps are sometimes called the ____. Answer Selected Answer: a. Plan-Do-Study-Act

Question 19 4 out of 4 points Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password. Answer Selected Answer: c. reset

Question 20 4 out of 4 points In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. Answer Selected Answer: c. social engineering

Question 21 4 out of 4 points Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive. Answer Selected Answer: a. zero-fill utility

Question 22 4 out of 4 points As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current. Answer Selected Answer: d. antivirus

Question 23 4 out of 4 points ____ is any annoying and unwanted program that might or might not mean you harm. Answer

Selected Answer:

d. Grayware

Question 24 4 out of 4 points For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals. Answer Selected Answer: d. HIPAA

Question 25 4 out of 4 points A ____ virus can hide in either of two boot areas of a hard drive. Answer Selected Answer: c. boot sector

Sunday, November 6, 2011 7:13:17 PM CST OK

Chapter 11 Review Test Submission: Assignment 11

Content User Submitted 11/6/11 7:51 PM Status Score Instructions Completed 100 out of 100 points

Question 1 4 out of 4 points A rootkit running in ____ mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window. Answer Selected Answer: c. user Question 2 4 out of 4 points The best way to change inherited permissions is to change the permissions of the ____. Answer Selected Answer: b. parent object Question 3 4 out of 4 points Certificates are managed using the ____ console.

Answer Selected Answer: a. Certificate Manager Question 4 4 out of 4 points Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file. Answer Selected Answer: c. simple Question 5 4 out of 4 points Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software. Answer Selected Answer: a. Task Manager Question 6 4 out of 4 points When you share folders on the network, the ____ permissions for remote users need to be set. Answer Selected Answer: d.

share Question 7 4 out of 4 points The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost. Answer Selected Answer: d. Cipher Question 8 4 out of 4 points Permissions manually set for a subfolder or file cannot override inherited permissions. Answer Selected Answer: Question 9 4 out of 4 points To see a list of services managed by Svchost, enter this command in a commandprompt window: ____. Answer Selected Answer: d. tasklist /SVC Question 10 4 out of 4 points In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ False

account. Answer Selected Answer: a. root Question 11 4 out of 4 points You can recognize a program as a counterfeit process if its not running under System, Local Service, or ____. Answer Selected Answer: c. Network Service Question 12 4 out of 4 points If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____. Answer Selected Answer: b. HKLM\System\CurrentControlSet\Control\SafeBoot Question 13 4 out of 4 points ____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip. Answer

Selected Answer:

b. BIOS

Question 14 4 out of 4 points AV software detects a known virus by looking for distinguishing characteristics called ____ signatures. Answer Selected Answer: b. virus Question 15 4 out of 4 points When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups. Answer Selected Answer: Question 16 4 out of 4 points If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate. Answer Selected Answer: c. recovery Question 17 4 out of 4 points True

A $ at the end of the folder name creates a(n) ____ share. Answer Selected Answer: d. hidden Question 18 4 out of 4 points If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box. Answer Selected Answer: d. \\computername\Financial$ Question 19 4 out of 4 points Many notebook computers have a chip on the motherboard called the ____. Answer Selected Answer: d. TPM Question 20 4 out of 4 points The term ____ applies to a kit or set of tools used originally on UNIX computers. Answer Selected Answer: b. rootkit

Question 21 4 out of 4 points A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources. Answer Selected Answer: c. quarantined Question 22 4 out of 4 points To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. Answer Selected Answer: c. Effective Permissions Question 23 4 out of 4 points If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted. Answer Selected Answer: Question 24 4 out of 4 points It is necessary that all computers belong to the same workgroup in order to share resources. True

Answer Selected Answer: Question 25 4 out of 4 points For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption. Answer Selected Answer: c. self-signed Sunday, November 6, 2011 7:51:28 PM CST OK False

Das könnte Ihnen auch gefallen