Term
|
Definition
It manages hardware, runs applications, provides an interface for users, and stores, retrieves, and manipulates files. |
|
|
Term
Using Aero Snap, what happens when you drag a window to the top of the Windows 7 desktop? |
|
Definition
|
|
Term
How can you add a program icon to the Windows 7 taskbar so the program can quickly be launched at any time? |
|
Definition
First locate the program in the Start menu. Then right-click the program and select Pin to Taskbar from the shortcut menu. |
|
|
Term
What might happen to the Windows system if too many services are running, as indicated by multiple icons in the notification area of the taskbar? |
|
Definition
The system might slow down and not perform well. |
|
|
Term
What is the keyboard shortcut to the flip 3D view? |
|
Definition
|
|
Term
What are the four libraries that Windows 7 creates by default? |
|
Definition
Documents, Music, Pictures, and Videos libraries |
|
|
Term
What part of a file name does Windows use to know which application to open to manage the file? |
|
Definition
|
|
Term
What file extension is used to name a compressed folder? |
|
Definition
|
|
Term
Which folder does Windows use to store files a user puts in the Documents library? |
|
Definition
|
|
Term
Which Windows 7 edition(s) come only in a 32-bit version? |
|
Definition
Windows 7 Starter and Windows 7 Home Basic |
|
|
Term
What is the memory limitation for a 32-bit operating system? |
|
Definition
The OS can address no more than 4GB of memory. |
|
|
Term
How do you access the Properties box for a file to change a file attribute? |
|
Definition
In Explorer, right-click the file and select Properties from the shortcut menu. |
|
|
Term
What is the program name for the System Information utility? |
|
Definition
|
|
Term
Which Windows 7 window can be used to get a report of the history of problems on a computer? |
|
Definition
|
|
Term
When does a user need to enter a password into the UAC box in order to continue? |
|
Definition
When the user is logged on as a standard user. |
|
|
Term
What is the symbol or icon that represents an Apple product? What is the symbol or icon that represents Android? |
|
Definition
The Apple icon is an apple with a bite out of it. Android icon is a robot. |
|
|
Term
What are the last three releases of the Android OS in number and in name? |
|
Definition
Gingerbread(ver 2.x), Honeycomb(ver 3.x), Ice Cream Sandwich(4.x) |
|
|
Term
What company provides and oversees the Android marketplace? What is the website of this marketplace? |
|
Definition
Google at play.google.com or google.com/play |
|
|
Term
List three Apple devices that use the iOS. |
|
Definition
iPhone, iPad and iPod touch |
|
|
Term
Who is the sole distributor of apps for the iOS? |
|
Definition
|
|
Term
What is one disadvantage to users when using an open-source operating system on a mobile device? |
|
Definition
Answers can vary. One answer is apps might not be high quality or bug-free. |
|
|
Term
Which mobile device OS supports an SD card and a USB port, iOS or Android? |
|
Definition
|
|
Term
Which programming language is used to write most Android apps? Apple requires that iOS apps be written in one of which three programming languages? |
|
Definition
Java. Objective-C, C, or C++ |
|
|
Term
How can you configure a mobile device so it cannot connect to any network? |
|
Definition
|
|
Term
Which type of network connection requires that two devices pair before the connection is completed? |
|
Definition
|
|
Term
Which email protocol downloads email to be managed on the client machine? Manages email on the server? |
|
Definition
|
|
Term
Which email protocol uses port 110? 143? 993? 995? |
|
Definition
POP, IMAP, IMAP over SSL, POP over SSL |
|
|
Term
Which security protocol is used to encrypt email? |
|
Definition
|
|
Term
Which email server uses ActiveSync to sync all email, contacts, and calendar updates on the server and client machines, including mobile devices? |
|
Definition
|
|
Term
What software must be installed on your computer before you can upgrade the version of iOS on your mobile device? |
|
Definition
|
|
Term
What are the steps to configure an iPhone so it can be located if it is lost? |
|
Definition
Tap Settings, iCloud, Find My iPhone |
|
|
Term
How many failed logins on an iPad must happen before the device is locked? |
|
Definition
|
|
Term
Which procedure is the least-intrusive solution to a problem with the iOS, to reset an iOS device or to restore an iOS device? |
|
Definition
|
|
Term
When you attempt to set up an email account on an Android device using the automatic configuration feature and the setup fails, what do you do next? |
|
Definition
Try to set it up manually by unchecking Automatically configure account |
|
|
Term
List the steps to update the Android OS on a smart phone. |
|
Definition
Open the Settings app, tap About phone and tap System updates |
|
|
Term
What are the three methods you can use on an Android to lock the screen? Which method is the most secure? |
|
Definition
Pattern, PIN, and Password lock. The pattern is the most secure. |
|
|
Term
Which type of client-side virtualization creates a virtual environment in memory for an application to run on a client machine? |
|
Definition
Application virtualization |
|
|
Term
What Microsoft software can be used to create an application virtualization environment? |
|
Definition
Microsoft Application Virtualization (App-V) |
|
|
Term
List two types of hypervisors and describe their fundamental differences. |
|
Definition
A Type 1 hypervisor installs before any OS installs. A Type 2 hypervisor installs as an application in an OS. |
|
|
Term
What are the three main ways to secure a VM? |
|
Definition
Use security features within the VM as you would for a physical machine, isolate the VM, protect the underlying files that are used to hold the VM. |
|
|
Term
Which edition of Windows 7 comes only in a 32-bit version? |
|
Definition
|
|
Term
What is the maximum amount of memory a 64-bit version of Windows 7 Home Premium can support? |
|
Definition
|
|
Term
How much free space on the hard drive is required to install a 64-bit version of Windows 7? |
|
Definition
|
|
Term
How do you start the process to reinstall an OS on a laptop computer using the backup files stored on a recovery partition? |
|
Definition
Press a key combination at the beginning of the boot |
|
|
Term
What are three free applications mentioned in the chapter that can be used to create virtual machines? |
|
Definition
Windows Virtual PC, Oracle VirtualBox, and VMware Player |
|
|
Term
When upgrading from Windows XP to Windows 7, can you perform an in-place upgrade of Windows 7? |
|
Definition
No, you must perform a clean install |
|
|
Term
What must be installed in Windows Vista before you can perform an in-place upgrade from Vista to Windows 7? |
|
Definition
Service Pack 1 or a later service pack |
|
|
Term
Which file system is used on the volume where Windows is installed? |
|
Definition
Windows is installed on a NTFS volume |
|
|
Term
What is the minimum number of partitions required on a hard drive that is to be set up as a dual boot with Windows 7 and Windows XP? |
|
Definition
|
|
Term
Is the built-in administrator account in Windows 7 enabled or disabled by default? In Windows XP? |
|
Definition
Disabled in Windows 7. Enabled in Windows XP |
|
|
Term
Which gives better security, workgroup sharing or homegroup sharing? Why? |
|
Definition
A workgroup gives better security because sharing is limited to individual users rather than to entire computers, which is done with homegroup sharing. |
|
|
Term
Why will homegroup sharing not work on a network that has a mix of Windows XP, Vista, and 7 computers? |
|
Definition
Because homegroup sharing is not supported by Windows Vista and XP |
|
|
Term
During a Windows 7 installation, what network location should you choose when you intend to join the computer to a domain? When you intend to join a homegroup? |
|
Definition
Work network, Home network |
|
|
Term
What is the name of the domain controller database used by Windows Server 2011? |
|
Definition
|
|
Term
If you suspect a PC is infected with a virus, why is it not a good idea to perform an upgrade installation of Windows rather than a clean install? |
|
Definition
The virus might carry into the new installation |
|
|
Term
After setting up a dual boot installation with Windows 7 and Vista, how do you boot the system into Vista? |
|
Definition
Select the Vista operating system when the boot loader menu appears during startup |
|
|
Term
What dialog box can you use to change the computer name after Windows 7 is installed? |
|
Definition
The System Properties dialog box |
|
|
Term
Is the Windows 7 setup disc a CD or DVD? Vista setup disc? XP setup disc? |
|
Definition
Win 7 DVD, Vista DVD, and XP CD |
|
|
Term
After a Windows installation, what is the easiest way to determine that you have Internet access? |
|
Definition
Open Internet Explorer and browse to a Web site. |
|
|
Term
How many days do you normally have after a Windows installation to activate the OS? |
|
Definition
|
|
Term
What window in Windows 7 is used to solve connectivity problems on the network? |
|
Definition
The Network and Sharing Center |
|
|
Term
What Windows 7 tool can you use to migrate user data and settings from a Windows Vista installation on one computer to the new Windows 7 installation on a different computer? |
|
Definition
|
|
Term
What is your primary Windows tool for managing hardware devices? |
|
Definition
|
|
Term
What window is used to uninstall an application in Windows 7? |
|
Definition
Programs and Features window |
|
|
Term
Are you required to enter the product key during the Windows 7 installation? During the XP installation? |
|
Definition
|
|
Term
Using an unattended installation of Windows, what is the name of the file that holds the responses a technician would normally give during the installation? |
|
Definition
|
|
Term
What are the two commands used by the User State Migration tool? |
|
Definition
|
|
Term
To use the User State Migration tool, how must a computer join the network? |
|
Definition
Connect through a Windows domain |
|
|
Term
Where is the PXE programming code stored that is used to boot a computer when it is searching for an OS on the network? |
|
Definition
PXE is part of the BIOS which is stored on the motherboard |
|
|
Term
Which boot device should be set as the first boot device in BIOS setup when a technician is configuring a computer to launch Windows PE on the deployment server? |
|
Definition
|
|
Term
What are the three Window settings critical to securing a computer that need to be verified as part of regular maintenance? |
|
Definition
Windows updates happen automatically, antivirus software is up to date and is protecting the system, and the network location is set correctly. |
|
|
Term
What folder holds the Windows registry? What folder holds a backup of the registry? |
|
Definition
C:\Windows\system32\config
C:\Windows\system32\config\RegBack |
|
|
Term
What folder holds 32-bit programs installed in a 64-bit installation of Windows? |
|
Definition
|
|
Term
What file in the user account folder stores user settings? |
|
Definition
|
|
Term
What is the purpose of the C:\Windows\CSC folder? |
|
Definition
It holds offline files and folders maintained by Windows Offline Files |
|
|
Term
What is the purpose of the Windows.old folder? |
|
Definition
Created by Windows 7/Vista during the installation, it holds the previous installation of Windows |
|
|
Term
How can you delete the Windows.old folder? |
|
Definition
From the drive properties box, when you click Disk Cleanup |
|
|
Term
By default, how often does Windows 7 automatically defrag a drive? |
|
Definition
|
|
Term
What is another name for a file allocation unit, which is used to hold parts of a file on the hard drive? |
|
Definition
|
|
Term
On what type of hard drive does Windows 7 disable defragmenting? |
|
Definition
|
|
Term
What are two reasons to uninstall software you no longer use? |
|
Definition
To free up space on the hard drive and to speed up Windows startup |
|
|
Term
What is the filename and normal path of the Windows paging file used for virtual memory? |
|
Definition
|
|
Term
What type of storage media must be used to create a Windows 7 system image? |
|
Definition
An internal or external hard drive |
|
|
Term
What two Windows utilities are used to create previous versions of files that can be recovered from the file properties dialog box? |
|
Definition
Backup and Restore utility and System Protection utility |
|
|
Term
Why is it important to not store a backup of drive C on to another partition on the same hard drive? |
|
Definition
If the hard drive fails, both partitions will be lost |
|
|
Term
What does Windows XP call a backup of the critical system files it needs for Windows operations? |
|
Definition
|
|
Term
What is the %SystemRoot% folder as used in Microsoft documentation? |
|
Definition
The folder in which Windows is installed, usually C:\Windows |
|
|
Term
What Windows 7/Vista utility creates restore points? |
|
Definition
|
|
Term
How can you delete all restore points? |
|
Definition
Turn off System Protection |
|
|
Term
In what folder are restore points kept? |
|
Definition
C:\System Volume Information |
|
|
Term
Which dialog box can you use to manually create a restore point? |
|
Definition
The System Properties dialog box |
|
|
Term
What is the difference between the file allocation table used by the exFAT file system and the one used by the FAT32 file system? |
|
Definition
The exFAT file allocation table is 64 bits wide and the FAT32 file allocation table is 32 bits wide |
|
|
Term
List the steps to open an elevated command prompt window. |
|
Definition
Click Start, All Programs, Accessories, and right-click Command Prompt. Then select Run as administrator from the shortcut window. |
|
|
Term
In a command line, what is the purpose of the ? in a filename? |
|
Definition
It represents a single wildcard character. |
|
|
Term
What is the purpose of the more parameter at the end of a command line? |
|
Definition
To list information one screen at a time. |
|
|
Term
What is the command to list all files and subdirectories in a directory? |
|
Definition
|
|
Term
Using Windows 7 or Vista, what type of command prompt window is needed to run the Chkdsk command? |
|
Definition
Elecated command prompt window |
|
|
Term
When you want to use Chkdsk to fix file system errors and the drive is not locked, when does Windows schedule the Chkdsk command to run? |
|
Definition
The next time Windows is started |
|
|
Term
What command is intended to replace Xcopy? |
|
Definition
|
|
Term
Which Windows tool can you use to split a partition into two partitions? |
|
Definition
|
|
Term
Which is more stable, RAID implemented by Windows or RAID implemented by hardware? |
|
Definition
Hardware RAID is more stable |
|
|
Term
When you move a dynamic disk to a new computer, what status will Disk Management first assign the drive? |
|
Definition
|
|
Term
Which editions of Windows 7 allow you to install a language pack by using Windows Update? |
|
Definition
Windows 7 Ultimate and Windows 7 Enterprise |
|
|
Term
List four ways to start Task Manager |
|
Definition
-CTRL+ALT+DEL -Right-click a blank area on the taskbar, and then select Start Task Manager on the shortcut menu -CTRL+SHIFT+ESC -Enter taskmgr.exe in the search box |
|
|
Term
If a program is not responding, how can you stop it? |
|
Definition
In Task Manager, select the process and click the End Task button |
|
|
Term
If a necessary program is using too much of the system resources and bogging down other applications, what can you do to fix the problem? |
|
Definition
Use Task Manager to lower the priority level of the program |
|
|
Term
How can you view a list of users currently ogged onto the computer? |
|
Definition
Use the Users tab on the Task Manager window |
|
|
Term
What is the program filename and extension of the System Configuration? |
|
Definition
|
|
Term
Which Windows 7 tool can be used to see a history of problems a computer has had since Windows was installed? |
|
Definition
|
|
Term
What tool in Windows Vista, used to temporarily disable a startup program , is not available in Windows 7 or Windows XP? |
|
Definition
|
|
Term
If a nonessential services is slowing down startup, how can you permanently disable it? |
|
Definition
Use the Services console and set the startup type to Disabled |
|
|
Term
What should be the startup type of a service that should not load at startup but might be used later after startup? What tool can you use to set a service's startup type? |
|
Definition
|
|
Term
List three snap-ins that can be found in the Computer Management console that are used to manage hardware and track problems with hardware. |
|
Definition
Event Viewer, Device Manager, and Disk Management |
|
|
Term
What is the file extension of a console that is managed by Microsoft Management Console? |
|
Definition
|
|
Term
Name the program file name and file extension for the Microsoft Management Console. |
|
Definition
|
|
Term
Which log in Event Viewer would you use to find out about attempted logins to a computer? |
|
Definition
|
|
Term
Which log in Event Viewer would you use if you suspect a problem with the hard drive? |
|
Definition
|
|
Term
Which three Windows 7 tools are contained in the Vista Reliability and Performance Monitor? |
|
Definition
Performance Monitor, Resource Monitor, and Reliability Monitor |
|
|
Term
What is the path to the Ntuser.dat file in Windows 7? |
|
Definition
C:\Users\username\Ntuser.dat |
|
|
Term
How is the Ntuser.dat file used? |
|
Definition
Holds the preferences and settings of a user |
|
|
Term
Which registry key contains information that Device Manager uses to display information about hardware? |
|
Definition
|
|
Term
Which Windows 7/Vista tool can give you a quick report of the overall performance of the system expressed as a single number? |
|
Definition
|
|
Term
To improve Windows performance, you decide to disable the indexer used for Windows search. Will Windows search still work? |
|
Definition
|
|
Term
What three indicators in Task Manager can be used to find which program has a memory leak? |
|
Definition
Memory - Private Working Set, Handles, and Threads |
|
|
Term
What key do you press at startup to load the system in Safe Mode? |
|
Definition
|
|
Term
If performance improves when Windows is loaded in Safe Mode, what can you conclude? |
|
Definition
The problem is caused by non-essential startup services or programs |
|
|
Term
If performance does not improve when Windows is loaded in Safe Mode, what can you conclude? |
|
Definition
The problem is caused by a hardware device, a critical driver, or a Windows component |
|
|
Term
When using MSconfig to stop startup services including Microsoft services, which service should you not stop so that restore points will not be lost? |
|
Definition
|
|
Term
In what folder does Task Scheduler keep scheduled tasks? |
|
Definition
C:\Windows\System32\Tasks |
|
|
Term
What are the two folders where, by default, Windows stores installed software? |
|
Definition
C:\Program Files
C:\Program Files (x86) |
|
|
Term
What must you do first before you can delete the program folder containing software that is running in the background? |
|
Definition
You must first stop the software |
|
|
Term
What is the purpose of the Wow6432Node subkey in the Windows registry? |
|
Definition
This key is used by 32-bit programs installed in a 64-bit OS |
|
|
Term
What is the name of the window used to uninstall software in Windows 7/Vista? |
|
Definition
Programs and Features window |
|
|
Term
What are the six steps that you can use to solve any computer problem? |
|
Definition
1 - Interview the user and back up data 2 - Examine the system and form a theory of probable cause or your best guess 3 - Test your theory 4 - plan a solution and implement it 5 - Verify all works and take appropriate preventive measures 6 - Document what happened and the outcome |
|
|
Term
Blue Screen errors happen when which type of processes encounter an error? |
|
Definition
Processes running in kernel mode |
|
|
Term
In what folder are the driver files stored? |
|
Definition
C:\Windows\System32\drivers |
|
|
Term
What is the command to use the Memory Diagnostics tool? |
|
Definition
|
|
Term
What method can you use to test memory on a Windows XP system by using the Memory Diagnostics tool without having to install Windows 7 or Vista on the system? |
|
Definition
Boot the system from the Windows 7/Vista DVD and click Windows Memory Diagnostics Tool under the System Recovery Options |
|
|
Term
What is the command to use the System File Checker to immediately verify system files? To verify system files on the next restart? |
|
Definition
sfc /scannow, sfc /scanonce |
|
|
Term
How many bits does an x86-based operating system process at one time? |
|
Definition
|
|
Term
What GUI tool can you use to stop a program that is hung? |
|
Definition
|
|
Term
What command-line tool can you use to stop a program that is hung? |
|
Definition
|
|
Term
How can you eliminate the possibility that an application error is caused by another application or service running in the background? |
|
Definition
Run the application after starting the system in Safe Mode |
|
|
Term
How does Windows know which application to use to open a file when you double-click the file in Windows Explorer? |
|
Definition
Windows uses the file extension and associates a file extension to an application |
|
|
Term
Which Windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file? |
|
Definition
|
|
Term
Which two tools might a software developer or system administrator use to register a component of an application in the Windows registry? |
|
Definition
Component Services (COM+) and Regsvr32 |
|
|
Term
If an application works when the system is loaded in Safe Mode, but does not work when Windows is loaded normally, what can you assume? |
|
Definition
The problem is not with the application but with the OS, device drivers, or other programs loaded at startup. |
|
|
Term
When an application written for Windows XP does not work in Windows 7, which tool should you attempt to use first to solve the problem, Compatibility Mode or XP Mode? Why? |
|
Definition
Compatibility Mode because it uses less system resources than XP Mode. |
|
|
Term
What test does startup BIOS perform when you first turn on a computer to verify it can communicate with essential hardware devices? |
|
Definition
POST (Power-On Self Test) |
|
|
Term
Where is the partition table on a hard drive found? |
|
Definition
In the first sector on the drive called the Master Boot Record (MBR) |
|
|
Term
Is the BootMgr file stored in the boot partition or the system partition? |
|
Definition
|
|
Term
Where is the master boot record (MBR) located? |
|
Definition
First sector of the hard drive |
|
|
Term
What is the name of the Windows 7 boot loader program? Where is the program located? |
|
Definition
WinLoad.exe, C:\Windows\System32 |
|
|
Term
What is the name of the Windows 7 kernel program? |
|
Definition
|
|
Term
What is the name of the program that manages Windows logon? |
|
Definition
|
|
Term
Which registry hive is loaded first during Windows startup? |
|
Definition
|
|
Term
Where does Windows store device driver files? |
|
Definition
C:\Windows\System32\Drivers |
|
|
Term
During Windows 7 startup, how can you know when the Windows kernel has loaded successfully? |
|
Definition
When the Windows 7 flag appears |
|
|
Term
Blue screen errors happen when which type of processes encounter an error? |
|
Definition
Processes running in kernel mode |
|
|
Term
What method can you use to test memory on a Windows XP system by using the Windows 7 Memory Diagnostics tool without having to install Windows 7 on the system? |
|
Definition
Boot the system from the Windows 7 DVD and use the Windows Memory Diagnostics Tool under the System Recovery Options |
|
|
Term
What is the command to use the System File Checker to immediately verify system files? To verify system files on the next restart? |
|
Definition
sfc /scannow, sfc /scanonce |
|
|
Term
Which key do you press to launch the Advanced Boot Options window during Windows startup? |
|
Definition
|
|
Term
A blue screen error halts the system while it is booting, and the booting starts over in an endless loop of restarts. How can you solve this problem using the Advanced Boot Options screen? |
|
Definition
Press F8 at startup and select Disable automatic restart on system failure on the Advanced Boot Options menu. |
|
|
Term
What can you assume about the Windows 7 startup when you see the Windows 7 flag on-screen? |
|
Definition
The Windows graphics subsystem is running and the kernel has successfully loaded |
|
|
Term
When is the Windows startup process completed? |
|
Definition
The Windows startup is officially completed when the Windows desktop appears and the wait circle disappears. |
|
|
Term
At what point in Windows startup are the settings that are called the Last Known Good Configuration saved? |
|
Definition
When the user logs onto Windows. |
|
|
Term
What command in Windows RE can you use to rebuild the BCD file? |
|
Definition
|
|
Term
What command in Windows RE gives you the opportunity to manage partitions and volumes installed on the system? |
|
Definition
|
|
Term
Which log in Event Viewer only tracks errors and warnings? |
|
Definition
The Administrative Events log |
|
|
Term
If you are having a problem with a driver, which of the following is the least invasive solution: update the driver or use System Restore? |
|
Definition
|
|
Term
What are the three stages of the Windows 7/Vista startup process? |
|
Definition
Before the progress bar appears, after the progress bar appears and before logon, after logon |
|
|
Term
What is the name of the log file and its location that created when you enabled boot logging from the Advanced Boot Options startup menu? |
|
Definition
|
|
Term
What information is contained in the C:\Windows\System32\LogFiles\SRT\SRTTrail.txt file? |
|
Definition
The file contains a list of items examined and actions taken by the Startup Repair process |
|
|
Term
How many bits are in a MAC address? |
|
Definition
|
|
Term
How many bits are in an IPv4 IP address? In an IPv6 address? |
|
Definition
|
|
Term
How does a client application identify a server application on another computer on the network? |
|
Definition
|
|
Term
What are the IP addresses called that begin with 10, 172.16, or 192.168? |
|
Definition
|
|
Term
In what class is the IP address 185.75.255.10? |
|
Definition
|
|
Term
In what class is the IP address 193.200.30.5? |
|
Definition
|
|
Term
Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet? |
|
Definition
Public IP addresses are licensed authorized to use the Internet. Private IP addresses are not authorized or licensed to use the Internet. A computer with a private IP address uses a NAT router to access the Internet. |
|
|
Term
Why is it unlikely that you will find the IP address 192.168.250.10 on the internet? |
|
Definition
IP addresses that begin with 192.168 are private IP addresses |
|
|
Term
If no DHCP server is available when a computer configured for dynamic IP addressing connects to the network, what type of IP address is assigned to the computer? |
|
Definition
Automatic Private IP Address (APIPA) |
|
|
Term
If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address? |
|
Definition
The IP address was automatically assigned by Windows when it failed to lease an address from the DHCP server. The computer received an APIPA IP address |
|
|
Term
What are the last 64 bits of a IPv6 IP address called? How are these bits used? |
|
Definition
The Interface ID which is used to uniquely identify the network connection on the local link. |
|
|
Term
Name at least three tunneling protocols that are used for IPv6 packets to travel over an IPv4 network. |
|
Definition
|
|
Term
How is an IPv6 IP address used that begins with 2000::? That begins with FE80::? |
|
Definition
IP addresses that begin with 2000:: are global addresses used on the Internet. Addresses that begin with FE80:: are link local addresses used on a private network. |
|
|
Term
How many bits are in the Subnet ID block? What are the values of these bits for a link-local IP address? |
|
Definition
The Subnet ID block contains 16 bits. The value of these bits for a link-local address are 0000 0000 0000 0000. |
|
|
Term
Which type of IPv6 address is used to create multiple sites within a large organization? |
|
Definition
|
|
Term
What type of server serves up IP addresses to computer on a network? |
|
Definition
|
|
Term
Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? |
|
Definition
|
|
Term
At what port does an SMTP email server listen to receive email from a client computer? |
|
Definition
|
|
Term
Which protocol does a web server use when transmissions are encrypted for security? |
|
Definition
HTTPS uses either HTTP together with SSL or TLS encryption protocols |
|
|
Term
What type of server resolves fully qualified domain names to IP addresses? |
|
Definition
|
|
Term
Which email protocol allows a client application to manage email stored on an email server? |
|
Definition
|
|
Term
What type of protocol is used to present a public IP address to computers outside the LAN to handle requests to use the Internet from computers inside the LAN? |
|
Definition
|
|
Term
Which protocol is used when an application queries a database on a corporate network such as a database of printers? |
|
Definition
|
|
Term
What type of encryption protocol does Secure FTP (SFTP_ use to secure FTP transmissions? |
|
Definition
|
|
Term
What two Windows applications use the RDP protocol and port 3389? |
|
Definition
Remote Desktop and Remote Assistance |
|
|
Term
Which version of 802.11 technologies can use two antennas at both the access point and the network adapter? |
|
Definition
|
|
Term
Which wireless encryption standard is stronger, WEP or WPA? |
|
Definition
|
|
Term
When securing a Wi-Fi wireless network, which is considered better security: to filter MAC addresses, use encryption, or not broadcast the SSID? |
|
Definition
|
|
Term
Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)? |
|
Definition
|
|
Term
Which editions of Windows can be used to serve up Remote Desktop? |
|
Definition
Business, Professional, Ultimate, and Enterprise editions |
|
|
Term
What is the listening port for Remote Desktop? |
|
Definition
|
|
Term
Explain the difference when a user sees http:// in a browser address box and when the user sees https:// in the address box. |
|
Definition
HTTPS indicates the data passed from the user to the website will be encrypted. HTTP data is not encrypted |
|
|
Term
Which has more rights, a standard account or a guest account? |
|
Definition
|
|
Term
What folder in Windows 7/Vista is intended to be used for folders and files that all users share? |
|
Definition
|
|
Term
When using the Control Panel in Windows 7, what two types of user accounts can be created? |
|
Definition
Administrator and standard accounts |
|
|
Term
Which Windows console is used to create a new user group? |
|
Definition
Computer Management console |
|
|
Term
Why doesn't the Properties box for a file have a Sharing tab? |
|
Definition
Share permissions do not apply to files |
|
|
Term
When you view the Properties box for a folder, why might the Security tab be missing? |
|
Definition
Because the folder's volume is not NTFS |
|
|
Term
What is the term Windows XP uses to describe sharing files in a way that gives no control over which users have access to a shared file? |
|
Definition
|
|
Term
What type of permission does a folder receive from its parent folder? |
|
Definition
|
|
Term
What type of permissions must be used for a folder on a FAT volume? |
|
Definition
|
|
Term
If a folder has 10 subfolders, what is the easiest way to change the permissions for all 10 folders? |
|
Definition
Change the permissions of the parent folder |
|
|
Term
If you are having a problem changing the permissions of a folder that was created by another user, what can you do to help solve the problem? |
|
Definition
Take ownership of the folder |
|
|
Term
A shared folder whose name ends with a $ is called a(n) _____. |
|
Definition
|
|
Term
What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin? |
|
Definition
|
|
Term
What is the full command line to use ipconfig to release the current IP address? |
|
Definition
|
|
Term
What is the full command line for the loopback address test command? |
|
Definition
|
|
Term
What command can tell you if two computers on the same network have the same computer name? |
|
Definition
|
|
Term
What command lists the shared resources on a remote computer on the network? |
|
Definition
|
|
Term
Which type of net command can be used to map a network drive? |
|
Definition
|
|
Term
Which command tests for connectivity between two computers? |
|
Definition
|
|
Term
Which command is used to find the host name of a computer when you know its IP address? |
|
Definition
|
|
Term
Which command can give you the hop count from your computer to another? |
|
Definition
|
|
Term
What parameter can be added to the netstat command so that you can see what programs are using a network connection? |
|
Definition
|
|
Term
What TCP/IP utility would you use to display the route taken over the Internet by a communication between a web browser and web server? |
|
Definition
|
|
Term
What utility would you use to display information about the name space kept by a DNS server for a particular domain name? |
|
Definition
|
|
Term
How can you physically tell if a network card is not working? |
|
Definition
Check the status indicator lights |
|
|
Term
To know if Windows recognizes a NIC without errors, which tool do you use? |
|
Definition
|
|
Term
List the steps to recycle the connection to an ISP when using a cable modem and router. |
|
Definition
1 - Unplug the cable modem, DSL modem, or other device that you use to connect to your ISP. Unplug the router 2 - Plug in the cable modem, DSL mode, or other ISP device. Wait until the lights settle. Then plug in your router. 3 - On any PC on your network, repair the network connection. Open your browser and try to browse some websites. |
|
|
Term
Why is it more secure to require a user press Ctrl+Alt+Delete to log on rather than displaying the Windows Welcome screen? |
|
Definition
Because malware can sometimes fake the Windows Welcome screen to trick a user into giving his Windows password |
|
|
Term
Which window in Control Panel is used to require a Windows password to wake up a sleeping computer? |
|
Definition
|
|
Term
Which two tools can be used to reset a Windows password for another user when using Windows 7 Home Premium? |
|
Definition
The netplwiz utility and the Change Password window in Control Panel |
|
|
Term
Why is PINE963$&apple not a strong password? |
|
Definition
Because it contains real words |
|
|
Term
Which link in the Windows Firewall window allows you to add a port to the list of exceptions allowed through the firewall? |
|
Definition
|
|
Term
Which polocy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows system? |
|
Definition
|
|
Term
What hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? |
|
Definition
A TPM chip on the motherboard |
|
|
Term
What Windows utility can you use to change the name of the built-in Administrator account? |
|
Definition
|
|
Term
What type of employee badge does not have to be swiped by a card reader to allow the employee through a door? |
|
Definition
|
|
Term
Which type of biometric data is considered the most secure? |
|
Definition
|
|
Term
Which is better to destroy sensitive data on a hard drive, a low-level format, drill, or degausser? |
|
Definition
|
|
Term
What tool is best to use when destroying data on an SSD drive? Where can you get this tool? |
|
Definition
ATA Secure Erase utility provided by the drive manufacturer |
|
|
Term
What device can be installed on a laptop to prevent shoulder surfing? |
|
Definition
|
|
Term
Define and explain the differences between a virus, worm, and Trojan. |
|
Definition
A virus is a program that can replicate by attaching itself to another program. A worm can spread copies of itself throughout a network without a host program. A Trojan, like a worm, does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program. |
|
|
Term
What are the two best ways to protect a computer or network against worms? |
|
Definition
Use a firewall and run AV software |
|
|
Term
What is the best way to determine if an email message warning about a virus is a hoax? |
|
Definition
Check websites that track virus hoaxes |
|
|
Term
What is the first thing you should do when you discover a computer is infected with malware? |
|
Definition
Quarantine the computer so it will not infect other computers on the network |
|
|
Term
What does AV software look for to determine that a program or a process is a virus? |
|
Definition
|
|
Term
Which antispyware software is embedded in Windows 7? |
|
Definition
|
|
Term
Why is it helpful to run AV software in Safe Mode? |
|
Definition
Because malware is less likely to be running in the background to prevent AF software from running or detecting the malware |
|
|
Term
What registry key keeps information about services that run when a computer is booted into Safe Mode? |
|
Definition
HKLM\System\CurrentControlSet\Control\SafeBoot |
|
|
Term
What folder is used by Windows to hold restore points? |
|
Definition
System Volume Information folder |
|
|
Term
What must you do to allow AV software to scan and delete malware it might find in the data storage area where restore points are kept? |
|
Definition
Turn off System Protection |
|
|
Term
What is the best tool to use to find out the purpose of a program that is running on your system? |
|
Definition
The web, especially the Microsoft websites |
|
|
Term
What software can you use to fidplay a process tree that shows how processes relate, yielding more information than given by Task Manager? |
|
Definition
Process Explorer at technet.microsoft.com |
|
|