Term
Most computer problems are simple and easy to solve. |
|
Definition
|
|
Term
Sometimes a Windows update solves a problem with a hardware device. |
|
Definition
|
|
Term
When installing a device, you must always run the setup CD for the device after you physically install the device. |
|
Definition
|
|
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted. |
|
Definition
|
|
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. |
|
Definition
|
|
Term
Individuals are always free to decide what security measures they want to use. |
|
Definition
|
|
Term
It’s best to use three-factor authentication. |
|
Definition
|
|
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level. |
|
Definition
|
|
Term
Don’t use the same password on more than one system (computer, network, or application). |
|
Definition
|
|
Term
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day. |
|
Definition
|
|
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups. |
|
Definition
|
|
Term
Allowing users full control of a folder is always required by job requirements. |
|
Definition
|
|
Term
Permissions manually set for a subfolder or file cannot override inherited permissions. |
|
Definition
|
|
Term
It is necessary that all computers belong to the same workgroup in order to share resources. |
|
Definition
|
|
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted. |
|
Definition
|
|
Term
A notebook is currently considered a “black box” to PC support technicians. |
|
Definition
|
|
Term
A tablet PC has more features than a notebook, including a touch screen that also allows you to handwrite on it with a stylus. |
|
Definition
|
|
Term
Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers. |
|
Definition
|
|
Term
In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly. |
|
Definition
|
|
Term
Sometimes, a notebook LCD panel, including the entire cover and hinges, is considered a single field replaceable unit, and sometimes components within the LCD assembly are considered an FRU. |
|
Definition
|
|
Term
If you can afford it, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine. |
|
Definition
|
|
Term
The last four steps of the laser printing process use the printer components that undergo the most wear. |
|
Definition
|
|
Term
Routine printer maintenance procedures are generally the same from manufacturer to manufacturer and printer to printer. |
|
Definition
|
|
Term
An older PC and printer should never have a problem with bidirectional communication. |
|
Definition
|
|
Term
If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required. |
|
Definition
|
|
Term
In Event Viewer, the ____ log shows only warnings and error events a. Program Events c. Active Events b. Administrative Events d. Network Events |
|
Definition
|
|
Term
Check ____ to verify that a device is enabled and Windows thinks the device should be working. a. Computer Management c. Hardware Manager b. System Manager d. Device Manager |
|
Definition
|
|
Term
Errors or warnings in Device Manager are displayed as a ____. a. red triangle or question mark b. red triangle or yellow question mark c. yellow triangle or question mark d. red question mark or yellow exclamation mark |
|
Definition
c. yellow triangle or question mark |
|
|
Term
To uninstall a program, in Device Manager ____ the device and select Uninstall. a. left-click c. shift+right-click b. right-click d. ctrl+right-click |
|
Definition
|
|
Term
If you can identify the approximate date the error started and that date is in the recent past, use ____. a. System Restore c. System Recovery b. Safe Mode d. Safe Recovery |
|
Definition
|
|
Term
If the system is caught in an endless loop of restarts, boot into ____. a. System Restore c. Safe Mode b. System Recovery d. Conditional Mode |
|
Definition
|
|
Term
For essential hardware devices, use the ____ to verify and replace system files. a. System Restore mode c. Safe Boot mode b. System File Checker d. File Integrity Checker |
|
Definition
|
|
Term
Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted. a. safe c. restore b. recovery d. solution |
|
Definition
|
|
Term
Use the ____ tool to test memory. a. Memory Diagnostics c. Hardware Integrity b. File Checker d. Boot Integrity |
|
Definition
|
|
Term
Press ____ at startup to display the Advanced Boot Options menu. a. F4 c. F10 b. F8 d. F12 |
|
Definition
|
|
Term
During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder. a. \Windows.sav c. \Windows.prv b. \Windows.old d. \Windows.rst |
|
Definition
|
|
Term
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation. a. visible partition c. hidden partition b. preserved partition d. conspicuous partition |
|
Definition
|
|
Term
When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded. a. Windows core c. Windows driver layer b. Windows abstraction layer d. Windows kernel |
|
Definition
|
|
Term
The ____ Configuration is updated after you log on normally to Vista. a. Last Known Good c. Last Known Usable b. Last Known Bootable d. Last Known Accessible |
|
Definition
|
|
Term
The command ____ searches for and replaces corrupted system files. a. sfc /scan /now c. sfc /now /sfcscan b. sfc /scannow d. svc /now /sfcscan |
|
Definition
|
|
Term
The error ____ is caused by a driver or service making an illegal access to memory. a. Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED b. Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL c. Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA d. Stop 0x7B or INACCESSIBLE_BOOT_DEVICE |
|
Definition
b. Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL |
|
|
Term
The error ____ means a bad driver or service has performed an illegal action. a. Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED b. Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL c. Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA d. Stop 0x7B or INACCESSIBLE_BOOT_DEVICE |
|
Definition
a. Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED |
|
|
Term
For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by ____. a. the computer manufacturer b. Microsoft c. some third-party vendors d. the computer manufacturer through Microsoft |
|
Definition
a. the computer manufacturer |
|
|
Term
The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources. a. BS 7799 and ISO 17799 c. ISO 17799 and ISO 27001 b. ISO 17799 and ISO 27002 d. ISO 27001 and ISO 7799 |
|
Definition
b. ISO 17799 and ISO 27002 |
|
|
Term
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password. a. reset c. vault b. recovery d. conversion |
|
Definition
|
|
Term
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are. a. password c. digital certificate b. token d. credential |
|
Definition
|
|
Term
A ____ is made of several words with spaces allowed. a. password c. token b. passphrase d. credential |
|
Definition
|
|
Term
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users. a. service c. privileged b. administrator d. user |
|
Definition
|
|
Term
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data. a. user c. limited b. administrator d. privileged |
|
Definition
|
|
Term
Most encryption software products use a method called ____. a. Private Key Encryption c. Shared Secret Encryption b. Symmetric Key Encryption d. Public Key Encryption |
|
Definition
|
|
Term
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. a. backdoor c. helper b. release d. beneficial routine |
|
Definition
|
|
Term
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either. a. polymorphic c. multipartite b. boot sector d. macro |
|
Definition
|
|
Term
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination. a. multipartite c. polymorphic b. macro d. boot sector |
|
Definition
|
|
Term
Generally speaking, the weakest link in setting up security in a computer environment is ____. a. the network c. people b. the operating system d. the hardware |
|
Definition
|
|
Term
Most hard drive manufacturers offer a ____ used to wipe clean all data on the drive. a. partition utility c. cloning utility b. diagnostic utility d. zero-fill utilitya. the network c. people b. the operating system d. the hardware |
|
Definition
|
|
Term
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file. a. network c. directory b. simple d. user c. directory b. simple d. user |
|
Definition
|
|
Term
The best way to change inherited permissions is to change the permissions of the ____. a. child object c. parent object b. inherited objects d. inheriting objects |
|
Definition
|
|
Term
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. a. Security c. Actual Permissions b. Derived Permissions d. Effective Permissions |
|
Definition
|
|
Term
If you name a shared folder Financial$, in order to access the folder, a user must enter ____ in the Vista Start Search box. a. \\computername\Financial$ c. \\computername\shares\financial$ b. \\financial$\computername d. \\shares\computername\financial$ |
|
Definition
a. \\computername\Financial$ |
|
|
Term
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost. a. Decipher c. Decode b. Cipher d. Transcode |
|
Definition
|
|
Term
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption. a. publicly-signed c. system-signed b. network-signed d. self-signed |
|
Definition
|
|
Term
Certificates are managed using the ____ console. a. Certificate Store c. Certificate Manager b. Certificate Preparation d. Digital Certificate |
|
Definition
|
|
Term
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate. a. recovery c. backup b. restoration d. administrator |
|
Definition
|
|
Term
Many notebook computers have a chip on the motherboard called the ____. a. MPM c. UPM b. CPM d. TPM |
|
Definition
|
|
Term
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip. a. Software c. Blocks b. BIOS d. Chipsets |
|
Definition
|
|
Term
A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources. a. unrestricted c. isolated b. restricted d. quarantined |
|
Definition
|
|
Term
If viruses are launched even after you boot in Safe Mode and you cannot get the AV software to work, try searching for suspicious entries in the subkeys under ____. a. HKLM\System\CurrentControlSet\Control\SafeBoot b. HKLM\System\CurrentControlSet\System\SafeBoot c. HKCU\System\CurrentControlSet\Control\SafeBoot d. HKLM\System\CurrentControlSet\Services\SafeBoot |
|
Definition
a. HKLM\System\CurrentControlSet\Control\SafeBoot |
|
|
Term
Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software. a. Computer Manager c. System Manager b. Task Manager d. Event Viewer |
|
Definition
|
|
Term
The term ____ applies to a kit or set of tools used originally on UNIX computers. a. rootkit c. stealthkit b. botkit d. worm |
|
Definition
|
|
Term
In UNIX, the lowest and most powerful level of UNIX accounts is called the ____ account. a. God c. universal b. master d. root |
|
Definition
|
|
Term
Most notebook manufacturers provide ____ software that can help you test components to determine which component needs replacing. a. diagnostic c. development b. management d. installation |
|
Definition
|
|
Term
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive. a. development c. diagnostic b. management d. recovery |
|
Definition
|
|
Term
A(n) ____ is about the size of a credit card, but thicker. a. ExpressCard c. PCI card b. CardBus card d. PC Card |
|
Definition
|
|
Term
A(n) ____ is an electrical device that changes DC to AC. a. inverter c. converter b. exciter d. voltage shifter |
|
Definition
|
|
Term
In ____ sleep, all work is saved to the hard drive, but the system still maintains a trickle of power. a. standby c. pure b. deep d. hybrid |
|
Definition
|
|
Term
In Windows XP, ____ mode is similar to Vista sleep mode and corresponds to ACPI S3 mode. a. standby c. hibernation b. hybrid d. rescue |
|
Definition
|
|
Term
IBM and Lenovo ThinkPad notebooks use a unique and popular pointing device embedded in the keyboard called a ____ or point stick. a. TrackPad c. TrackKnob b. TrackPoint d. TrackStick |
|
Definition
|
|
Term
You can adjust the way the touch pad or works on a laptop using the ____ box. a. Mouse Properties c. Control Properties b. Display Properties d. Track Properties |
|
Definition
|
|
Term
For tablet PCs, the stylus can be controlled from the ____ box. a. Input Devices c. Mouse and Input Devices b. Pen and Input Devices d. Pen and Stick Devices |
|
Definition
|
|
Term
The brightness is a function of the ____ component of the LCD panel. a. forelight c. backlight b. inverter d. diverter |
|
Definition
|
|
Term
To substitute an internal device with an external device, first go into ____ setup and disable the internal device. a. BIOS c. system b. device d. computer |
|
Definition
|
|
Term
A MicroDIMM that contains SDRAM has ____ pins. a. 120 c. 144 b. 124 d. 172 |
|
Definition
|
|
Term
A MicroDIMM that contains DDR SDRAM has ____ pins. a. 120 c. 144 b. 124 d. 172 |
|
Definition
|
|
Term
A notebook drive is ____ inches wide. a. 2.5 c. 3.5 b. 3.0 d. 4.0 |
|
Definition
|
|
Term
Mini PCI Express slots have ____ pins on the edge connector. a. 25 c. 52 b. 68 d. 100 |
|
Definition
|
|
Term
____ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning. a. Inkjet c. Dye-sublimation b. Thermal d. Laser |
|
Definition
|
|
Term
A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____. a. REt c. VART b. REx d. eRT |
|
Definition
|
|
Term
____ printers tend to smudge on inexpensive paper, and they are slower than laser printers. a. Laser c. Thermal b. Dye-sublimation d. Inkjet |
|
Definition
|
|
Term
Automatically printing on both sides of the page is called ____ printing. a. duplex c. duo b. simplex d. complex |
|
Definition
|
|
Term
A dedicated device or computer called a print ____ can control several printers connected to a network. a. queue c. manager b. server d. client |
|
Definition
|
|
Term
When you print to the Microsoft XPS Document Writer printer, it creates a(n) ____ file. a. .xps c. .xml b. .pdf d. .doc |
|
Definition
|
|
Term
Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____. a. banking c. storing b. spooling d. pooling |
|
Definition
|
|
Term
Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance. a. toner maintenance c. imaging management b. printer development d. printer maintenance |
|
Definition
|
|
Term
To find out how many pages a printer has printed so that you know if you need to do the maintenance, you need to have the printer give you the ____ count since the last maintenance. a. page c. coverage b. sheet d. image |
|
Definition
|
|
Term
In a laser printer, the fuser should last for about ____ pages. a. 450 c. 45,000 b. 4500 d. 450,000 |
|
Definition
|
|
Term
Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site. a. BIOS c. firmware b. logic d. controller |
|
Definition
|
|
Term
A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed. a. menu map c. configuration b. test d. management |
|
Definition
|
|
Term
Check ____ for recorded events that have to do with the printer or the port it is using. a. Event Log c. Resource Monitor b. System Monitor d. Event Viewer |
|
Definition
|
|
Term
If symbols or other special characters don’t print correctly on a laser printer, try using ____ printing rather than asking the printer to interpret the characters. a. binary c. image b. text d. decimal |
|
Definition
|
|
Term
Do not use less than ____-LB paper in any type of printer, unless the printer documentation specifically says that a lower weight is satisfactory. a. 14 c. 20 b. 16 d. 24 |
|
Definition
|
|