Review Test Submission Final_assignment 1-11
description
Transcript of Review Test Submission Final_assignment 1-11
Review Test Submission: Assignment 1
Content
User Stephen saan-ire
Submitted 10/18/11 4:00 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
0 out of 4 points
____ are small programs stored on the hard drive that tell the computer how to communicate
with a specific hardware device such as a printer, network card, or modem.
Answer
Selected Answer: Device Drivers
Question 2
4 out of 4 points
A(n) ____ is a list of items that is used to speed up a search.
Answer
Selected Answer: c.
index
Question 3
4 out of 4 points
A(n) ____ is the portion of an OS that relates to the user and to applications.
Answer
Selected Answer: c.
shell
Question 4
4 out of 4 points
The ____ is usually on the right side of the taskbar and displays open services.
Answer
Selected Answer: d.
system tray
Question 5
4 out of 4 points
Vista has a new 3D user interface called the ____ user interface.
Answer
Selected Answer: a.
Aero
Question 6
4 out of 4 points
Windows identifies file types primarily by the ____.
Answer
Selected Answer: d.
file extension
Question 7
4 out of 4 points
A(n) ____ is a program that runs in the background to support or serve Windows or an
application.
Answer
Selected Answer: c.
service
Question 8
4 out of 4 points
The OS ____ is responsible for interacting with hardware.
Answer
Selected Answer: c.
kernel
Question 9
4 out of 4 points
System Information can be useful when strange error messages appear during startup.
Answer
Selected Answer: True
Question 10
4 out of 4 points
Windows offers two ways to sync files: ____.
Answer
Selected Answer: b.
Briefcase and Offline Files
Question 11
4 out of 4 points
The ____ interface between the subsystems in user mode and the HAL.
Answer
Selected Answer: d.
executive services
Question 12
4 out of 4 points
A(n) ____ is software that controls a computer.
Answer
Selected Answer: d.
operating system
Question 13
4 out of 4 points
An applet has a ____ file extension.
Answer
Selected Answer: b.
.cpl
Question 14
4 out of 4 points
The kernel provides a way for the user to do such things as select music to burn to a CD, install
an application, or change the wallpaper on the Windows desktop.
Answer
Selected Answer: False
Question 15
4 out of 4 points
The Windows desktop is itself a folder.
Answer
Selected Answer: True
Question 16
4 out of 4 points
In 1986, ____ was introduced and quickly became the most popular OS among IBM computers
and IBM-compatible computers using the Intel 8086 processors.
Answer
Selected Answer: c.
MS-DOS
Question 17
4 out of 4 points
An operating system manages hardware, runs applications, provides an interface for users, and
stores, retrieves, and manipulates files.
Answer
Selected Answer: True
Question 18
4 out of 4 points
A ____ is a single task, such as the task of printing a file, that the process requests from the
kernel.
Answer
Selected Answer: d.
thread
Question 19
4 out of 4 points
A ____ interface is an interface that uses graphics as compared to a command-driven interface.
Answer
Selected Answer: b.
graphical user
Question 20
4 out of 4 points
The ____ is normally located at the bottom of the Windows desktop, displaying information
about open programs and providing quick access to others.
Answer
Selected Answer: d.
taskbar
Question 21
4 out of 4 points
A(n) ____ is a low-end inexpensive laptop with a small 9- or 10-inch screen and no optical drive.
Answer
Selected Answer: d.
netbook
Question 22
4 out of 4 points
A ____ is one or more characters following the last period in a filename, such as .exe, .txt, or
.avi.
Answer
Selected Answer: b.
file extension
Question 23
4 out of 4 points
A ____ makes it possible to boot a computer into one of two installed OSs.
Answer
Selected Answer: a.
dual boot
Question 24
4 out of 4 points
From the ____ window, you can change the read-only, hidden, archive, and indexing attributes
of the file.
Answer
Selected Answer: a.
Properties
Question 25
4 out of 4 points
The ____ dialog box in Windows Vista appears each time a user attempts to perform an action
that can be done only with administrative privileges.
Answer
Selected Answer: a.
User Account Control
Tuesday, October 18, 2011 4:00:52 PM CDT
Review Test Submission: Assignment 2
Content
User
Submitted 10/18/11 4:54 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
When you’re working with or talking to a customer, focus on ____.
Answer
Selected Answer: b.
him or her
Question 2
4 out of 4 points
The best way to give bad news is ____.
Answer
Selected Answer: c.
face to face
Question 3
4 out of 4 points
____ support requires more interaction with customers than any other type of PC support.
Answer
Selected Answer: d.
Phone
Question 4
4 out of 4 points
A help-desk call is the most difficult situation to handle when a customer is not knowledgeable
about how to use a computer.
Answer
Selected Answer: True
Question 5
4 out of 4 points
____ customers are your customers who come to you or your company for service.
Answer
Selected Answer: a.
External
Question 6
4 out of 4 points
____ customers are those where you both work for the same company, in which case you might
consider the customer your colleague
Answer
Selected Answer: a.
Internal
Question 7
4 out of 4 points
____ has industry recognition, so it should be your first choice for certification as a PC
technician.
Answer
Selected Answer: b.
A+ Certification
Question 8
4 out of 4 points
Knowing how to effectively work with people in a technical world is one of the most sought-
after skills in today’s service-oriented work environments.
Answer
Selected Answer: True
Question 9
4 out of 4 points
When working with a customer, your primary job is to satisfy your boss.
Answer
Selected Answer: False
Question 10
4 out of 4 points
____ differences happen because we are from different countries and societies or because of
physical handicaps.
Answer
Selected Answer: d.
Cultural
Question 11
4 out of 4 points
Most PC support jobs require simply working with hardware and software.
Answer
Selected Answer: False
Question 12
4 out of 4 points
Knowing how to ____ a problem to those higher in the support chain is one of the first things
you should learn on a new job.
Answer
Selected Answer: a.
escalate
Question 13
4 out of 4 points
____ is required if the customer must be told each key to press or command button to click.
Answer
Selected Answer: d.
Patience
Question 14
4 out of 4 points
To provide good service, you need to have a good ____ when servicing customers on the phone
or online, on site, or in a shop.
Answer
Selected Answer: c.
plan
Question 15
4 out of 4 points
As a support technician, your goals can include ____ the user, as well as repairing the computer.
Answer
Selected Answer: b.
educating
Question 16
4 out of 4 points
The most significant certifying organization for PC technicians is the ____.
Answer
Selected Answer: c.
Computing Technology Industry Association
Question 17
4 out of 4 points
____ a problem increases your value in the eyes of your coworkers and boss.
Answer
Selected Answer: a.
Taking ownership of
Question 18
4 out of 4 points
Troubleshooting begins by ____.
Answer
Selected Answer: b.
interviewing the user
Question 19
4 out of 4 points
Organize your time by making ____ and sticking with them as best you can.
Answer
Selected Answer: d.
to-do lists
Question 20
4 out of 4 points
A ____ is the only one responsible for the PC before trouble occurs.
Answer
Selected Answer: b.
PC support technician
Question 21
4 out of 4 points
When someone initiates a call for help, the technician starts the process by creating a(n) ____.
Answer
Selected Answer: c.
ticket
Question 22
4 out of 4 points
To improve your attitude, you must do it from your ____.
Answer
Selected Answer: c.
heart
Question 23
4 out of 4 points
Begin each new relationship with a ____.
Answer
Selected Answer: d.
handshake
Question 24
4 out of 4 points
One of the most important ways to achieve customer satisfaction is to do your best by being
____.
Answer
Selected Answer: b.
prepared
Question 25
4 out of 4 points
Part of setting ____ is to establish a timeline with your customer for the completion of a
project.
Answer
Selected Answer: a.
expectations
Wednesday, October 19, 2011 12:09:58 PM CDT
OK
Review Test Submission: Assignment 3
Content
User
Submitted 10/19/11 11:10 AM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
An example of a network operating system is Windows Server 2008, which controls a
network using the directory database called ____.
Answer
Selected Answer: a.
Active Directory
Question 2
4 out of 4 points
During a normal Windows XP installation, setup causes the system to reboot ____ times.
Answer
Selected Answer: c.
three
Question 3
4 out of 4 points
A(n) ____ server is used to hold the setup files on the Windows CD or DVD to a file
server on the network and then at each PC, you can execute the Setup program on the
server.
Answer
Selected Answer: b.
distribution
Question 4
4 out of 4 points
The ____ partition is the active partition of the hard drive.
Answer
Selected Answer: c.
system
Question 5
4 out of 4 points
A(n) ____ installation is performed by storing the answers to installation questions in a
text file or script that Windows calls an answer file.
Answer
Selected Answer: a.
unattended
Question 6
0 out of 4 points
The ____ command is used to copy the information to the new computer.
Answer
Selected Answer:
loadstate
Question 7
4 out of 4 points
A Windows domain is a type of ____ network, which is a network where resources are
managed by a centralized computer.
Answer
Selected Answer: a.
client/server
Question 8
4 out of 4 points
For an always-up broadband connection (such as cable modem or DSL), select ____
when you configure updates.
Answer
Selected Answer: b.
Automatic
Question 9
4 out of 4 points
When you configure updates, if the PC doesn’t have an always-up Internet connection
(such as dial-up), you might want to select ____.
Answer
Selected Answer: d.
Notify me but don’t automatically download or install them
Question 10
4 out of 4 points
A Windows ____ is a logical group of computers and users that share resources, where
administration, resources, and security on a workstation are controlled by that
workstation.
Answer
Selected Answer: b.
workgroup
Question 11
4 out of 4 points
The Windows utility ____ is used to remove configuration settings, such as the computer
name that uniquely identifies the PC.
Answer
Selected Answer: c.
sysprep.exe
Question 12
4 out of 4 points
Use a ____-bit OS if you need increased performance and your system has enough
resources to support it.
Answer
Selected Answer: d.
64
Question 13
4 out of 4 points
Upgrading to a better edition of Vista can easily be accomplished by using the ____
feature.
Answer
Selected Answer: d.
Windows Anytime Upgrade
Question 14
4 out of 4 points
For some brand-name computers, the hard drive contains a ____ partition that can be
used to reinstall Windows.
Answer
Selected Answer: c.
hidden recovery
Question 15
4 out of 4 points
As a PC support technician, you can expect to be faced with installing Windows in a
variety of situations.
Answer
Selected Answer: True
Question 16
4 out of 4 points
Product ____ is a method used by Microsoft to prevent unlicensed use of its software so
that you must purchase a Windows license for each installation of Windows.
Answer
Selected Answer: c.
activation
Question 17
4 out of 4 points
Use ____ to find out which devices are installed in your XP system.
Answer
Selected Answer: d.
Device Manager
Question 18
4 out of 4 points
A ____ computer is software that simulates the hardware of a physical computer.
Answer
Selected Answer: c.
virtual
Question 19
4 out of 4 points
The retail version costs less than the OEM version, but can only be installed on a new PC
for resale.
Answer
Selected Answer: False
Question 20
4 out of 4 points
The ____ command is used to copy the information from the old computer to a server or
removable media.
Answer
Selected Answer: c.
scanstate
Question 21
4 out of 4 points
A ____ boot allows you to install the new OS without disturbing the old one so you can
boot to either OS.
Answer
Selected Answer: b.
dual
Question 22
4 out of 4 points
Many hardware manufacturers have chosen to not produce Vista drivers for their older
devices, so it’s very important to find out if your hardware will be compatible with Vista.
Answer
Selected Answer: True
Question 23
4 out of 4 points
Microsoft no longer supports Windows 2000, so you should never be called on to install
it on a new PC.
Answer
Selected Answer: True
Question 24
4 out of 4 points
A ____ is a copy of the entire volume on which Windows is installed to another bootable
media such as CDs or USB drive.
Answer
Selected Answer: d.
drive image
Question 25
4 out of 4 points
To convert a FAT32 volume to an NTFS volume, first back up all important data on the
drive and then use this command at a command prompt: ____, where D: is the drive to
be converted.
Answer
Selected Answer: b.
convert D: /FS:NTFS
Wednesday, October 19, 2011 11:10:12 AM CDT
OK
Review Test Submission: Assignment 4
Content
User Stephen saan-ire
Submitted 10/19/11 12:07 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
To view and manually install updates, click ____, and then follow the directions on-screen.
Answer
Selected Answer: b.
Start, All Programs, and Windows Updates
Question 2
4 out of 4 points
A snapshot of the system settings and configuration is called a ____.
Answer
Selected Answer: d.
restore point
Question 3
4 out of 4 points
When a hard drive is first sensed by Windows, it is assigned the ____ disk status.
Answer
Selected Answer: a.
Basic
Question 4
4 out of 4 points
____ creates restore points at regular intervals and just before you install software or
hardware.
Answer
Selected Answer: d.
System Protection
Question 5
4 out of 4 points
Currently, Microsoft offers four service packs for Windows XP.
Answer
Selected Answer: False
Question 6
4 out of 4 points
You can use ____ to convert two or more basic disks to dynamic disks.
Answer
Selected Answer: a.
Disk Management
Question 7
4 out of 4 points
A disk marked as dynamic can be used with other dynamic disks in a spanned or ____ volume.
Answer
Selected Answer: c.
striped
Question 8
4 out of 4 points
A dynamic disk requires ____ MB of storage for the disk management database.
Answer
Selected Answer: a.
1
Question 9
4 out of 4 points
The ____ command creates a subdirectory under a directory.
Answer
Selected Answer: d.
MD
Question 10
4 out of 4 points
Windows Vista Ultimate offers language packs through ____.
Answer
Selected Answer: a.
Windows Update
Question 11
4 out of 4 points
To make sure the drive is healthy, you need to search for and repair file system errors using the
Windows ____ utility.
Answer
Selected Answer: a.
Chkdsk
Question 12
4 out of 4 points
Use the ____ command to defrag the drive from a command prompt window.
Answer
Selected Answer: b.
Defrag
Question 13
4 out of 4 points
Windows needs free space on the hard drive for normal operation, for defragmenting the drive,
for burning CDs and DVDs, and for a variety of other tasks, so it’s important to delete unneeded
files occasionally.
Answer
Selected Answer: True
Question 14
4 out of 4 points
The user folder for an account contains a group of subfolders called the user ____.
Answer
Selected Answer: c.
profile namespace
Question 15
4 out of 4 points
For Windows XP, use the ____ to see which service packs are installed.
Answer
Selected Answer: c.
System Properties box
Question 16
4 out of 4 points
If you enter a command and want to terminate its execution before it is finished, you can press
____ to do so.
Answer
Selected Answer: c.
Ctrl+Break
Question 17
4 out of 4 points
If you are having problems with a hard drive, volume, or mounted drive, check ____ for events
about the drive that might have been recorded there.
Answer
Selected Answer: a.
Event Viewer
Question 18
4 out of 4 points
You can install an OS on a spanned or striped volume that uses software RAID.
Answer
Selected Answer: False
Question 19
4 out of 4 points
A file with a .bat file extension is called a ____ file.
Answer
Selected Answer: c.
batch
Question 20
4 out of 4 points
Besides backing up user data or system files, you can also back up the entire hard drive using
Windows Vista ____.
Answer
Selected Answer: b.
Complete PC Backup
Question 21
4 out of 4 points
To protect a system against malicious attack, you need to verify that ____ software is
configured to scan the system regularly and that it is up-to-date.
Answer
Selected Answer: c.
antivirus
Question 22
4 out of 4 points
When you back up the system state, the registry is also backed up to the folder ____.
Answer
Selected Answer: a.
%SystemRoot%\repair\RegBack
Question 23
4 out of 4 points
Files can end up in ____ segments all over the drive.
Answer
Selected Answer: a.
fragmented
Question 24
4 out of 4 points
When a new hard drive is first installed in a system, you must first initialize the disk.
Answer
Selected Answer: True
Question 25
4 out of 4 points
By default, Vista automatically defrags a drive every ____.
Answer
Selected Answer: a.
Wednesday at 1:00 AM
Wednesday, October 19, 2011 12:07:23 PM CDT
OK
Review Test Submission: Assignment 5
User stephen saan-ire
Submitted 10/19/11 6:26 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
In a console, the individual tools are called ____.
Answer
Selected Answer: b.
snap-ins
Question 2
4 out of 4 points
The ____ box can protect your system against users making unauthorized changes and
against malware installing itself without your knowledge.
Answer
Selected Answer: d.
UAC
Question 3
4 out of 4 points
Device Manager reads data from the ____ key to build the information it displays about
hardware configurations.
Answer
Selected Answer: a.
HKLM\HARDWARE
Question 4
4 out of 4 points
You can use the ____ utility to zero in on the service or other program that is slowing
down startup.
Answer
Selected Answer: d.
MSconfig
Question 5
4 out of 4 points
You can edit the registry and create a restore point while in Safe Mode.
Answer
Selected Answer: False
Question 6
4 out of 4 points
A(n) ____ is a single window that contains one or more administrative tools such as
Device Manager or Disk Management.
Answer
Selected Answer: c.
console
Question 7
4 out of 4 points
The ____ tab in Task Manager provides details about how a program uses system
resources.
Answer
Selected Answer: d.
Performance
Question 8
4 out of 4 points
Editing the registry can be dangerous, so do this with caution and be sure to back up
first!
Answer
Selected Answer: True
Question 9
4 out of 4 points
To stop a process using Task Manager, select the process and click ____.
Answer
Selected Answer: d.
End Process
Question 10
4 out of 4 points
____, under Windows Vista, is a summary index designed to measure the overall
performance of a system.
Answer
Selected Answer: c.
Windows Experience Index
Question 11
4 out of 4 points
The ____ tab in Task Manager lets you monitor network activity and bandwidth used.
Answer
Selected Answer: d.
Networking
Question 12
4 out of 4 points
The ____ tab in Task Manager shows all users currently logged on the system.
Answer
Selected Answer: d.
Users
Question 13
4 out of 4 points
You can use the ____ to find out what processes are launched at startup and to
temporarily disable a process from loading.
Answer
Selected Answer: b.
System Configuration Utility
Question 14
4 out of 4 points
You can use the ____ to find information about the installed processor and its speed,
how much RAM is installed, and free space on the hard drive.
Answer
Selected Answer: d.
System Information Utility
Question 15
4 out of 4 points
If a system is giving repeated startup errors or you have just removed several programs,
you might want to search through ____ for processes left there by uninstalled or
corrupted software that might be giving startup problems.
Answer
Selected Answer: b.
registry keys
Question 16
4 out of 4 points
Most programs written for Windows have a(n) ____ routine which can be accessed from
the Vista Programs and Features applet in the Control Panel, the XP Add Remove
Programs applet in the Control Panel, or a utility in the All Programs menu.
Answer
Selected Answer: c.
uninstall
Question 17
4 out of 4 points
To make sure that all hardware or software installed on the system is compatible with
Windows Vista, use the ____.
Answer
Selected Answer: a.
Vista Upgrade Advisor
Question 18
4 out of 4 points
The ____ is responsible for maintaining an index of files and folders on a hard drive to
speed up Windows searches.
Answer
Selected Answer: c.
Windows indexer
Question 19
4 out of 4 points
If your desktop locks up, you can use ____ to refresh it.
Answer
Selected Answer: c.
Task Manager
Question 20
4 out of 4 points
To find out if programs and services are slowing down Windows startup, boot the system
in ____ and watch to see if performance improves.
Answer
Selected Answer: c.
Safe Mode
Question 21
4 out of 4 points
A console is saved in a file with an ____ file extension.
Answer
Selected Answer: a.
.msc
Question 22
4 out of 4 points
____ is a Windows utility that can be used to build your own customized console
windows.
Answer
Selected Answer: b.
Microsoft Management Console
Question 23
4 out of 4 points
If you notice that performance slows after a system has been up and running without a
restart for some time, suspect a memory leak.
Answer
Selected Answer: True
Question 24
4 out of 4 points
The indexing service of Windows indexer has a high priority and take precedence over
other programs.
Answer
Selected Answer: False
Question 25
4 out of 4 points
The ____ tab of Task Manager lists system services and other processes associated with
applications, together with how much CPU time and memory the process uses.
Answer
Selected Answer: d.
Processes
Wednesday, October 19, 2011 6:26:10 PM CDT
OK
Review Test Submission: Assignment 6
User stephen saan-ire
Submitted 10/20/11 6:29 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
To move to the root directory, use the command ____.
Answer
Selected Answer: a.
CD \
Question 2
4 out of 4 points
Use the ____ command to repair the file system and recover data from bad sectors.
Answer
Selected Answer: a.
chkdsk C: /r
Question 3
4 out of 4 points
Use the ____ command to extract .cab files.
Answer
Selected Answer: c.
Expand
Question 4
4 out of 4 points
Use the ____ command followed by the name of the service to show the current status of a
service.
Answer
Selected Answer: c.
Enable
Question 5
4 out of 4 points
If your hard drive is corrupted, you still might be able to recover data.
Answer
Selected Answer: True
Question 6
4 out of 4 points
In the Recovery Console, the command ____ deletes a directory.
Answer
Selected Answer: a.
RD
Question 7
4 out of 4 points
The ____ file is a hidden text file stored in the root directory of the active partition that Ntldr
reads to see what operating systems are available and how to set up the boot.
Answer
Selected Answer: d.
Boot.ini
Question 8
4 out of 4 points
If Driver Verifier runs for a few days and has still not found the problem, it probably will not
help you.
Answer
Selected Answer: True
Question 9
4 out of 4 points
The ____ tool can be used to direct information about drivers to a file, including information
about digital signatures.
Answer
Selected Answer: c.
Driver Query
Question 10
4 out of 4 points
Registry settings collectively called the ____ are saved in the registry each time the user
successfully logs onto the system.
Answer
Selected Answer: a.
Last Known Good Configuration
Question 11
4 out of 4 points
To retrieve the last command entered in the Recovery Console, press ____ at the command
prompt.
Answer
Selected Answer: c.
F3
Question 12
4 out of 4 points
Vista configuration data is stored in the Vista ____ file.
Answer
Selected Answer: c.
Boot Configuration Data
Question 13
4 out of 4 points
You can use the Windows RE command prompt window to restore registry files using those
saved in the ____ folder.
Answer
Selected Answer: b.
c:\windows\system32\config\regback
Question 14
4 out of 4 points
If the problem happens in the kernel mode of Windows, a ____ or blue screen error occurs.
Answer
Selected Answer: a.
STOP
Question 15
4 out of 4 points
The Vista Advanced Boot Options menu appears when a user presses ____ as Vista is loading.
Answer
Selected Answer: c.
F8
Question 16
4 out of 4 points
You can quickly identify a problem with memory or eliminate memory as the source of a
problem by using the ____ tool.
Answer
Selected Answer: c.
Vista Memory Diagnostics
Question 17
4 out of 4 points
The ____ is used when Windows 2000/XP does not start properly or hangs during the load.
Answer
Selected Answer: d.
Recovery Console
Question 18
4 out of 4 points
Driver Verifier attempts to overload the drivers it monitors, which can cause a memory error.
Answer
Selected Answer: False
Question 19
4 out of 4 points
To retrieve the command entered in the Recovery Console one character at a time, press the
____ key.
Answer
Selected Answer: a.
F1
Question 20
4 out of 4 points
The ____ tool displays information about digitally signed files, including device driver files and
application files, and logs information to C:\Windows\Sigverif.txt.
Answer
Selected Answer: c.
File Signature Verification
Question 21
4 out of 4 points
For hardware problems, ____ is a Windows Vista/XP/2000 utility that runs in the background to
put stress on drivers as they are loaded and running.
Answer
Selected Answer: c.
Driver Verifier
Question 22
4 out of 4 points
Errors with memory are often difficult to diagnose because they can appear intermittently and
might be mistaken as application errors, user errors, or other hardware component errors.
Answer
Selected Answer: True
Question 23
4 out of 4 points
Enter the command ____ to see a list of all services currently installed, which includes device
drivers.
Answer
Selected Answer: d.
listsvc
Question 24
4 out of 4 points
Use the Windows Vista ____ tool to deal with an immediate hardware or software problem.
Answer
Selected Answer: d.
Problem Reports and Solutions
Question 25
4 out of 4 points
A compressed file uses a(n) ____ as the last character in the file extension.
Answer
Selected Answer: b.
underscore
Thursday, October 20, 2011 6:29:10 PM CDT
Chapter 7
User stephen saan-ire
Submitted 11/5/11 9:51 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
The key that loads services and drivers can be found in the ____ location.
Answer
Selected Answer: c.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
Question 2
4 out of 4 points
The error ____ is caused by a driver or service making an illegal access to memory.
Answer
Selected Answer: b.
Stop 0x0A or IRQL_NOT_LESS_OR_EQUAL
Question 3
4 out of 4 points
For Vista, use the ____ tool to search for the problem and suggested solutions.
Answer
Selected Answer: c.
Problem Reports and Solutions
Question 4
4 out of 4 points
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most
likely the manufacturer has set up a ____ on the hard drive that can be used to recover
the Windows installation.
Answer
Selected Answer: c.
hidden partition
Question 5
4 out of 4 points
The ____ Configuration is updated after you log on normally to Vista.
Answer
Selected Answer: c.
Last Known Good
Question 6
4 out of 4 points
For essential hardware devices, use the ____ to verify and replace system files.
Answer
Selected Answer: b.
System File Checker
Question 7
4 out of 4 points
Reverting to a ____ point can solve problems with registry entries the application uses
that have become corrupted.
Answer
Selected Answer: d.
restore
Question 8
4 out of 4 points
To uninstall a program, in Device Manager ____ the device and select Uninstall.
Answer
Selected Answer: c.
right-click
Question 9
0 out of 4 points
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you
can assume that the boot files in the root directory of drive C are missing or corrupted.
Answer
Selected Answer: True
Question 10
4 out of 4 points
When you see the Microsoft progress bar appear, you know the ____, including all
critical services and drivers, has loaded.
Answer
Selected Answer: a.
Windows kernel
Question 11
4 out of 4 points
The error ____ is means a bad driver or service has performed an illegal action.
Answer
Selected Answer: c.
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
Question 12
4 out of 4 points
Use the ____ tool to test memory.
Answer
Selected Answer: d.
Memory Diagnostics
Question 13
4 out of 4 points
Sometimes a Windows update solves a problem with a hardware device.
Answer
Selected Answer: True
Question 14
4 out of 4 points
Errors or warnings in Device Manager are displayed as a ____.
Answer
Selected Answer: b.
yellow triangle or question mark
Question 15
4 out of 4 points
Check ____ to verify that a device is enabled and Windows thinks the device should be
working.
Answer
Selected Answer: a.
Device Manager
Question 16
4 out of 4 points
After you boot into Safe Mode, you can use the ____ commands to verify system files
and clean the hard drive.
Answer
Selected Answer: a.
SFC, Chkdsk, and Defrag
Question 17
4 out of 4 points
The command ____ searches for and replaces corrupted system files.
Answer
Selected Answer: a.
sfc /scannow
Question 18
4 out of 4 points
As you work to solve a Windows problem, always choose the method that makes the
most changes to the system as possible in order to rejuvenate the machine.
Answer
Selected Answer: False
Question 19
4 out of 4 points
If you can identify the approximate date the error started and that date is in the recent
past, use ____.
Answer
Selected Answer: b.
System Restore
Question 20
4 out of 4 points
Press ____ at startup to display the Advanced Boot Options menu.
Answer
Selected Answer: b.
F8
Question 21
4 out of 4 points
During a reinstallation, Vista setup will move all folders of the old installation into the
____ folder.
Answer
Selected Answer: a.
\Windows.old
Question 22
4 out of 4 points
For a laptop or other brand-name computer, don’t forget to reinstall Windows using
recovery CDs provided by ____.
Answer
Selected Answer: d.
the computer manufacturer
Question 23
4 out of 4 points
In Event Viewer, the ____ log shows only warnings and error events
Answer
Selected Answer: b.
Administrative Events
Question 24
4 out of 4 points
If the system is caught in an endless loop of restarts, boot into ____.
Answer
Selected Answer: c.
Safe Mode
Question 25
4 out of 4 points
When installing a device, you must always run the setup CD for the device after you
physically install the device.
Answer
Selected Answer: False
Saturday, November 5, 2011 9:51:54 PM CDT
OK
Chapter 8
Review Test Submission: Assignment 8
Content
User
Submitted 11/5/11 11:01 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
If you are comfortable with Vista automatically connecting to a particular network in the
future, check _____.
Answer
Selected Answer: d.
Save this network
Question 2
4 out of 4 points
The danger in connecting to unknown hotspots is that _____ and hackers might be
waiting for unsecured computers to connect.
Answer
Selected Answer: a.
malware
Question 3
4 out of 4 points
Wireless networks can be secured by broadcasting the name of the wireless access point
(called the Service Set Identifier or SSID).
Answer
Selected Answer: False
Question 4
4 out of 4 points
The ____ command tests connectivity by sending an echo request to a remote computer.
Answer
Selected Answer: a.
ping
Question 5
4 out of 4 points
Unless you protect your computer by using strong _____ settings, your computer might
get hacked.
Answer
Selected Answer: d.
firewall
Question 6
4 out of 4 points
If you select a(n) _____ network, Vista warns you about sending information over it.
Answer
Selected Answer: a.
unsecured
Question 7
4 out of 4 points
The ____ command can display TCP/IP configuration information and refresh the IP
address.
Answer
Selected Answer: d.
ipconfig
Question 8
4 out of 4 points
A private and secured wireless access point might be configured for _____ address
filtering in order to control which wireless adapters can use the access point.
Answer
Selected Answer: c.
MAC
Question 9
4 out of 4 points
The IP addresses available to the Internet are called ____ IP addresses.
Answer
Selected Answer: a.
public
Question 10
4 out of 4 points
When connecting to a private and secured wireless access point, you must provide the
information that proves you have the right to use the network.
Answer
Selected Answer: True
Question 11
4 out of 4 points
A(n) ____ is a 32-bit string used to identify a computer on a network.
Answer
Selected Answer: c.
IP address
Question 12
4 out of 4 points
If a network adapter is installed on your computer and you need to know the MAC
address, you can open a command prompt window and enter the command _____.
Answer
Selected Answer: a.
ipconfig/all
Question 13
4 out of 4 points
A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells
TCP/IP if a computer’s IP address is on the same or a different network.
Answer
Selected Answer: c.
subnet mask
Question 14
4 out of 4 points
A____ application means one computer (the remote computer) is running the Telnet
component and another computer (the local computer) runs the Telnet component.
Answer
Selected Answer: a.
client/server
Question 15
4 out of 4 points
When connecting to a network, by default Windows assumes static IP addressing and
automatically configures the network connection.
Answer
Selected Answer: False
Question 16
4 out of 4 points
If the access point is not broadcasting its SSID, the name of the wireless network will
appear as “_____.”
Answer
Selected Answer: d.
Unnamed Network
Question 17
4 out of 4 points
If the computer you are using is a laptop that moves from one network to another, you
can click the _____ tab and configure static IP address settings for a second network.
Answer
Selected Answer: c.
Alternate Configuration
Question 18
4 out of 4 points
Wireless networks can be secured by using an encryption key (using _____, WPA, or
WPA2 encryption standards).
Answer
Selected Answer: b.
WEP
Question 19
4 out of 4 points
A ____ IP address is assigned for the current connection only.
Answer
Selected Answer: a.
dynamic
Question 20
4 out of 4 points
When connecting to a wireless network that is not broadcasting its SSID, you are given
the opportunity to enter the _____ of the network.
Answer
Selected Answer: b.
name
Question 21
4 out of 4 points
To use ____, you can create user accounts using the Control Panel.
Answer
Selected Answer: d.
Telnet
Question 22
4 out of 4 points
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others
on the network.
Answer
Selected Answer: False
Question 23
4 out of 4 points
To verify firewall settings and check for errors, open the _____window.
Answer
Selected Answer: b.
Network and Sharing Center
Question 24
4 out of 4 points
The solution for securing private data traveling over a public network is a ____.
Answer
Selected Answer: d.
virtual private network
Question 25
4 out of 4 points
A ____ is the connection a computer uses to access another network if it does not have a
better option.
Answer
Selected Answer: c.
default gateway
Saturday, November 5, 2011 11:01:22 PM CDT
OK
Chapter 9
Review Test Submission: Assignment 9
Content
User
Submitted 11/5/11 11:40 PM
Status Completed
Score 96 out of 100 points
Instructions
Question 1
4 out of 4 points
Remote ____ gives a user access to his or her Windows desktop from anywhere on the
Internet.
Answer
Selected Answer: c.
Desktop
Question 2
4 out of 4 points
To disconnect a mapped network drive, use the ____ command.
Answer
Selected Answer: b.
net use z: /delete
Question 3
4 out of 4 points
Port ____ opens a port when a PC on the network initiates communication through
another port.
Answer
Selected Answer: b.
triggering
Question 4
4 out of 4 points
A(n) ____ lookup is when you use the Nslookup command to find the host name when
you know a computer’s IP address.
Answer
Selected Answer: d.
reverse
Question 5
4 out of 4 points
The command to flush the DNS cache kept on the computer is ____.
Answer
Selected Answer: c.
ipconfig /flushdns
Question 6
4 out of 4 points
To prepare a computer to serve up Remote Desktop, you need to configure the computer
for ____ IP addressing.
Answer
Selected Answer: c.
static
Question 7
4 out of 4 points
DSL service and an older technology, ISDN, are provided by the local telephone
company.
Answer
Selected Answer: True
Question 8
4 out of 4 points
In order to activate your service, the cable company must know the ____ of the cable
modem you have installed.
Answer
Selected Answer: d.
MAC address
Question 9
4 out of 4 points
When a Remote ____ session is opened, all local users are logged off.
Answer
Selected Answer: d.
Desktop
Question 10
4 out of 4 points
Remote ____ can help you support users and their computers from a distance.
Answer
Selected Answer: a.
Assistance
Question 11
4 out of 4 points
For port forwarding to work, the computer on your network must have a ____ IP
Address.
Answer
Selected Answer: d.
static
Question 12
4 out of 4 points
You can use a regular analog phone as an Internet phone if you use a(n) ____.
Answer
Selected Answer: b.
Analog Telephone Adapter
Question 13
4 out of 4 points
To find out what your DNS server knows about the domain name www.microsoft.com,
use the ____ command.
Answer
Selected Answer: d.
nslookup www.microsoft.com
Question 14
4 out of 4 points
A log file is kept of every Remote Assistance session in the ____ folder.
Answer
Selected Answer: c.
C:\Users\username\Documents\Remote Assistance Logs
Question 15
4 out of 4 points
The logon for an on-demand broadband connection is managed by a protocol called
____.
Answer
Selected Answer: b.
PPPoE
Question 16
4 out of 4 points
If you have a problem with connecting to a secured Web site from a corporate network,
you might be using the wrong ____ server on the network.
Answer
Selected Answer: b.
proxy
Question 17
4 out of 4 points
Networking happens in ____.
Answer
Selected Answer: c.
layers
Question 18
0 out of 4 points
When trying to use client/server applications on the Internet, your software and hardware
firewalls and other security settings on the router will automatically allow the
communication.
Answer
Selected Answer: False
Question 19
4 out of 4 points
Because electrical interference can be a problem with VoIP phones, each network cable
connected to a VoIP phone needs a(n) ____ clamp attached.
Answer
Selected Answer: c.
ferrite
Question 20
4 out of 4 points
A DSL installation works very differently than a cable modem installation.
Answer
Selected Answer: False
Question 21
4 out of 4 points
Most broadband connections today are always up and use ____ IP addressing.
Answer
Selected Answer: c.
dynamic
Question 22
4 out of 4 points
When supporting and troubleshooting small networks, you’ll need to use ____ to test the
physical connections of the network.
Answer
Selected Answer: d.
cable testers
Question 23
4 out of 4 points
When setting up a VoIP system, know that each digital phone or ATA must be
programmed with a phone number from the ____.
Answer
Selected Answer: d.
VoIP provider
Question 24
4 out of 4 points
Many software vendors use FTP sites for downloading software to their customers.
Answer
Selected Answer: True
Question 25
4 out of 4 points
____ is essential to keep others from hacking into your wireless data and to prevent
unauthorized use of your wireless LAN.
Answer
Selected Answer: d.
Encryption
Saturday, November 5, 2011 11:40:16 PM CDT
OK
Chapter 10
Review Test Submission: Assignment 10
Content
User
Submitted 11/6/11 7:13 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow
malware to reach the system in secret even after the Trojan has been removed.
Answer
Selected Answer: b.
backdoor
Question 2
4 out of 4 points
The International Organization for Standardization has developed two documents (____),
which describe, in detail, the recommended standards to secure computer resources.
Answer
Selected Answer: c.
ISO 17799 and ISO 27002
Question 3
4 out of 4 points
A ____ is assigned by a Certification Authority, and is used to prove you are who you
say you are.
Answer
Selected Answer: a.
digital certificate
Question 4
4 out of 4 points
When you are responsible for the security of a computer or small network, make it a
habit to check every computer for which you are responsible every day.
Answer
Selected Answer: False
Question 5
4 out of 4 points
A ____ is made of several words with spaces allowed.
Answer
Selected Answer: c.
passphrase
Question 6
4 out of 4 points
A ____ is a small program contained in a document that can be automatically executed
either when the document is first loaded or later by pressing a key combination.
Answer
Selected Answer: b.
macro
Question 7
4 out of 4 points
A network ____ map is one of the most powerful and versatile methods of
communicating over a network.
Answer
Selected Answer: a.
drive
Question 8
4 out of 4 points
Folders and files stored on a workstation or server that contain user data need to be
classified as to the ____ assigned to the data.
Answer
Selected Answer: b.
permissions
Question 9
4 out of 4 points
A(n)____ password means it is not easy to guess by both humans and computer
programs designed to hack passwords.
Answer
Selected Answer: b.
strong
Question 10
4 out of 4 points
Generally speaking, the weakest link in setting up security in a computer environment is
____.
Answer
Selected Answer: b.
people
Question 11
4 out of 4 points
A(n) ____ account has read-write access only on its own folders, read-only access to
most system folders, and no access to other users’ data.
Answer
Selected Answer: c.
limited
Question 12
4 out of 4 points
Individuals are always free to decide what security measures they want to use.
Answer
Selected Answer: False
Question 13
4 out of 4 points
It’s best to use three-factor authentication.
Answer
Selected Answer: False
Question 14
4 out of 4 points
A(n) ____ account has complete access to the system and can make changes that affect
the security of the system and other users.
Answer
Selected Answer: d.
administrator
Question 15
4 out of 4 points
A ____ virus is a combination of a boot sector virus and a file virus and can hide in
either.
Answer
Selected Answer: b.
multipartite
Question 16
4 out of 4 points
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability
to block scripts and disable scripts embedded in Web pages, and the ability to set the
general security level.
Answer
Selected Answer: True
Question 17
4 out of 4 points
Most encryption software products use a method called ____.
Answer
Selected Answer: b.
Public Key Encryption
Question 18
4 out of 4 points
When implementing a security plan, the four steps are sometimes called the ____.
Answer
Selected Answer: a.
Plan-Do-Study-Act
Question 19
4 out of 4 points
Because of the problem of losing encrypted data and Internet passwords when a user
password is reset, each new user should create a password ____ disk for use in the event
the user forgets the password.
Answer
Selected Answer: c.
reset
Question 20
4 out of 4 points
In the computer arena, ____ is the practice of tricking people into giving out private
information or allowing unsafe programs into the network or computer.
Answer
Selected Answer: c.
social engineering
Question 21
4 out of 4 points
Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive.
Answer
Selected Answer: a.
zero-fill utility
Question 22
4 out of 4 points
As a defensive and offensive measure to protect against malicious software, install and
run ____ software and keep it current.
Answer
Selected Answer: d.
antivirus
Question 23
4 out of 4 points
____ is any annoying and unwanted program that might or might not mean you harm.
Answer
Selected Answer: d.
Grayware
Question 24
4 out of 4 points
For the health care industry, the ____ includes regulations to secure patient data that
apply to all health care companies and professionals.
Answer
Selected Answer: d.
HIPAA
Question 25
4 out of 4 points
A ____ virus can hide in either of two boot areas of a hard drive.
Answer
Selected Answer: c.
boot sector
Sunday, November 6, 2011 7:13:17 PM CST
OK
Chapter 11
Review Test Submission: Assignment 11
Content
User
Submitted 11/6/11 7:51 PM
Status Completed
Score 100 out of 100 points
Instructions
Question 1
4 out of 4 points
A rootkit running in ____ mode intercepts the API calls between the time when the API
retrieves the data and when it is displayed in a window.
Answer
Selected Answer: c.
user
Question 2
4 out of 4 points
The best way to change inherited permissions is to change the permissions of the ____.
Answer
Selected Answer: b.
parent object
Question 3
4 out of 4 points
Certificates are managed using the ____ console.
Answer
Selected Answer: a.
Certificate Manager
Question 4
4 out of 4 points
Windows XP uses ____ file sharing by default, which means you have no control over
who has access to a shared folder or file.
Answer
Selected Answer: c.
simple
Question 5
4 out of 4 points
Use ____ to search for malware processes, especially those that mask themselves as
core Windows processes and elude AV software.
Answer
Selected Answer: a.
Task Manager
Question 6
4 out of 4 points
When you share folders on the network, the ____ permissions for remote users need to
be set.
Answer
Selected Answer: d.
share
Question 7
4 out of 4 points
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when
the certificates are lost.
Answer
Selected Answer: d.
Cipher
Question 8
4 out of 4 points
Permissions manually set for a subfolder or file cannot override inherited permissions.
Answer
Selected Answer: False
Question 9
4 out of 4 points
To see a list of services managed by Svchost, enter this command in a command-
prompt window: ____.
Answer
Selected Answer: d.
tasklist /SVC
Question 10
4 out of 4 points
In UNIX, the lowest and most powerful level of UNIX accounts is called the ____
account.
Answer
Selected Answer: a.
root
Question 11
4 out of 4 points
You can recognize a program as a counterfeit process if it’s not running under System,
Local Service, or ____.
Answer
Selected Answer: c.
Network Service
Question 12
4 out of 4 points
If viruses are launched even after you boot in Safe Mode and you cannot get the AV
software to work, try searching for suspicious entries in the subkeys under ____.
Answer
Selected Answer: b.
HKLM\System\CurrentControlSet\Control\SafeBoot
Question 13
4 out of 4 points
____ on a motherboard offers security features including power-on passwords, support
for intrusion-detection devices, and support for a TPM chip.
Answer
Selected Answer: b.
BIOS
Question 14
4 out of 4 points
AV software detects a known virus by looking for distinguishing characteristics called
____ signatures.
Answer
Selected Answer: b.
virus
Question 15
4 out of 4 points
When controlling access to data folders or files, permissions to these resources are
assigned to individual user accounts or user groups.
Answer
Selected Answer: True
Question 16
4 out of 4 points
If you cannot access an encrypted file because the certificate is corrupted and there are
no backup certificates, you might be able to recover the file using a(n) ____ certificate.
Answer
Selected Answer: c.
recovery
Question 17
4 out of 4 points
A $ at the end of the folder name creates a(n) ____ share.
Answer
Selected Answer: d.
hidden
Question 18
4 out of 4 points
If you name a shared folder Financial$, in order to access the folder, a user must enter
____ in the Vista Start Search box.
Answer
Selected Answer: d.
\\computername\Financial$
Question 19
4 out of 4 points
Many notebook computers have a chip on the motherboard called the ____.
Answer
Selected Answer: d.
TPM
Question 20
4 out of 4 points
The term ____ applies to a kit or set of tools used originally on UNIX computers.
Answer
Selected Answer: b.
rootkit
Question 21
4 out of 4 points
A(n) ____ computer is not allowed to use the network, is put on a different network
dedicated to them, or is only allowed to access certain network resources.
Answer
Selected Answer: c.
quarantined
Question 22
4 out of 4 points
To know for sure exactly which permissions for a file or folder are in effect, see the
____ tab of the Advanced Security Settings box.
Answer
Selected Answer: c.
Effective Permissions
Question 23
4 out of 4 points
If an infected computer will not boot, it might be that the boot sectors of the hard drive
are infected or damaged or the BIOS code might be corrupted.
Answer
Selected Answer: True
Question 24
4 out of 4 points
It is necessary that all computers belong to the same workgroup in order to share
resources.
Answer
Selected Answer: False
Question 25
4 out of 4 points
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting
process generates a ____ digital certificate to be used for the encryption.
Answer
Selected Answer: c.
self-signed
Sunday, November 6, 2011 7:51:28 PM CST
OK