Software Final Review (chp 13,16,17,18 And 20)

25 July 2022
4.7 (114 reviews)
75 test answers

Unlock all answers in this set

Unlock answers (71)
question
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows startup process?
answer
spacebar
question
What is the file name given to the Windows kernel?
answer
Ntoskrnl.exe
question
What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.)
answer
Starts the Session Manager starts critical services Activates the HAL
question
What is a typical symptom that might indicate the MBR record is damaged?
answer
Invalid partition table error
question
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?
answer
Boot Logging
question
There is no option for networking access when using Safe Mode.
answer
false
question
What error messages indicate that the MBR sector is damaged, or the active partition is corrupt or missing? (Choose all that apply.)
answer
Missing operating system Error loading operating system Invalid partition table
question
Which of the following text error messages can indicate that BIOS could not find a hard drive? (Choose all that apply)
answer
No boot device available Hard drive not found
question
What command can be used to check for file system errors?
answer
chkdsk /r
question
What command can be used to scan for Windows installations not stored in the BCD?
answer
bootrec /scanOS
question
What events can occur during BootMgr's role in startup? (Choose all that apply.)
answer
Dual-boot menu is displayed the settings in the BCD are read
question
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
answer
false
question
What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI?
answer
winresume.exe winresume.efi
question
If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?
answer
sfc /scannow
question
The Advanced Boot Options menu appears when a user presses F8 as Windows is loading.
answer
true
question
Releases of Android are named after animals, such as Lion, Leopard, or Puma.
answer
false
question
What is the more secure alternative to the SMTP mail protocol?
answer
S/MIME
question
What unique number is used to identify each mobile phone or tablet device worldwide?
answer
IMEI
question
Outgoing mail is normally sent using what mail delivery protocol?
answer
SMTP
question
All parts of an Android application are published as a package of files wrapped into one file utilizing what file extension?
answer
.apk
question
Which devices utilize an operating system based on the Mac OS X operating system? (Choose all that apply.)
answer
iPad iPhone iPod touch
question
Applications on the Android OS are mostly written in what programming language?
answer
Java
question
The act of jailbreaking a phone was once illegal, but was made legal by the U.S. Copyright Office and the Library of Congress.
answer
true
question
Siri is an example of what technology?
answer
virtual assistant
question
What two U.S. carriers offer a feature called Wi-Fi calling?
answer
T-Mobile Sprint
question
What must you do before using a new iPad or iPod touch?
answer
activate it
question
How much storage is offered by iCloud Drive for no cost?
answer
5GB
question
Most new Android devices are shipping with what version of Android?
answer
KitKat Lollipop
question
What component on a smart phone requires pairing with another device?
answer
Bluetooth
question
What mobile operating system is the Fire OS used by Amazon's Kindle Fire devices based on?
answer
Android
question
What kind of a computer intercepts requests that a browser makes of a server and can cache received content?
answer
proxy server
question
What statement about user accounts and groups is NOT true?
answer
a user account can belong to only one group at a time
question
When using Group Policy to configure QoS, what options are available? (Choose all that apply.)
answer
outbound traffic can be throttled the priority is a number from 0 and 63
question
Which of the following are true about NTFS permissions? (Choose all that apply.)
answer
when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies
question
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
answer
false
question
To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.
answer
false
question
What is a valid reason for wanting to configure a proxy server in Internet Explorer?
answer
to connect to secured websites on a corporate network VPN
question
What statement about controlling access to folders and files is accurate?
answer
rights are assigned to accounts
question
What type of permission should you set to control access to files and folders by local and network users?
answer
NTFS on NTFS volumes only
question
Windows 10 features what new web browser, which is designed to replace Internet Explorer?
answer
Microsoft Edge
question
Which of the following is NOT true about Remote Desktop?
answer
by default all users can access Remote Desktop
question
What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?
answer
PNRP
question
The default value of the security level in IE is Medium-high.
answer
True
question
What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)
answer
Write Read
question
When all users on a network require the same access to all resources, what type of network model should you use?
answer
Homegroup
question
CryptoLocker is an example of what type of malware?
answer
ransomware
question
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
answer
the BIOS
question
Using Group Policy, you can set security policies to help secure a workstation.
answer
True
question
What inputs would be considered to be part of a biometric device? (Choose all that apply.)
answer
fingerprint retina voice
question
What statement is true regarding the Guest account in Windows 7?
answer
it is disabled by default
question
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
answer
smart card
question
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
answer
true
question
A root certificate is the original certificate issued by the CA.
answer
true
question
On a peer-to-peer network, authentication is the responsibility of the domain.
answer
false
question
What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
answer
rootkit
question
When using the Windows Encrypted File System, what statement is accurate?
answer
an encrypted file moved to an unencrypted folder remains encrypted
question
What command can be used to take full access of a file?
answer
icacls
question
Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?
answer
malware signatures
question
What keystroke should you press to get a logon window if you don't use the welcome screen?
answer
Ctrl+Alt+Delete
question
What statement regarding passwords on Windows is accurate?
answer
by default, accounts with a blank password cannot logon remotely
question
What is a typical use of a Type 2 hypervisor? (Choose all that apply.)
answer
as honeypots to lure hackers by developers to test applications
question
What Linux distribution is considered a cutting-edge distribution?
answer
Fedora
question
What is the main advantage of using a thick client?
answer
can be used for purposes other than server-side virtualization
question
What statement regarding Type 1 hypervisors is accurate?
answer
They are called bare-metal hypervisors
question
If you need to redirect the output from a command, what symbol should you use?
answer
>
question
What command can be used to copy and convert files, directories, partitions, and even entire DVDs or hard drives?
answer
dd
question
What type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?
answer
server-side
question
In order to break out of a command or process on a terminal, what keys should you press?
answer
ctrl+c
question
In order to ensure that a Mac has no startup items, what two directories should you check for items?
answer
/Library/StartupItems /System/Library/StartupItems
question
What two commands are used to change the permissions and ownership of a file or directory in Linux?
answer
chmod chown
question
LILO is the most commonly installed boot loader by the Linux operating system.
answer
false
question
How much drive space should be available for each virtual machine on a system?
answer
20 GB
question
VMs running under a Type 1 hypervisor are isolated from each other.
answer
true
question
On Linux, where are the commands required for system administration stored?
answer
/sbin
question
When using Mac OS X, what gesture can be used to show the Launchpad?
answer
swipe