dimanche 25 novembre 2018

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 2018

  1. What are two functions of an operating system? (Choose two.)
    • controlling hardware access*
    • managing applications*
    • text processing
    • flow chart editing
    • program compilation
    • web browsing
    • controlling the BIOS
  2. Which two methods should a technician use to update a device driver? (Choose two.)
    • Insert the operating system installation media and load the driver from there.
    • Use the media that came with the device.*
    • Buy another operating system license.
    • Download the driver from the website of the manufacturer.*
    • Perform a firmware update.
  3. What is the term for the ability of a computer to run multiple applications at the same time?
    • multiuser
    • multitasking*
    • multimedia
    • multiprocessing
  4. What is provided by an operating system that has multiprocessing capability?
    • support for two or more processors*
    • support for two or more users
    • the capability to run multiple applications at the same time
    • the ability to run different parts of a program at the same time
  5. What is used by an operating system to communicate with hardware components?
    • device driver*
    • BIOS
    • CMOS
    • Application Program Interface
  6. Which application interface is comprised of multiple APIs that support multimedia tasks in Windows operating systems?
    • DirectX*
    • Java
    • Windows API
    • OpenGL
  7. Which version of Windows introduced the Metro user interface, which can be used on desktops, laptops, mobile phones, and tablets?
    • Windows XP
    • Windows Vista
    • Windows 7
    • Windows 8 *
  8. Where can a technician look to determine if specific computer hardware or software has been tested to work with Windows 7?
    • Microsoft Compatibility Center*
    • Microsoft Knowledge Base
    • Windows 7 manual
    • Windows Easy Transfer
  9. What is critical to consider when determining the version of Windows to install on a desktop computer?
    • version of Microsoft Office installed
    • type of monitor installed
    • off-the-shelf applications installed
    • customized applications installed *
  10. A user downloads and uses the Windows 7 Upgrade Advisor to generate a report on a PC that is being considered for an operating system upgrade. What information would the report contain?
    • recommended changes to hardware*
    • recommended changes to file systems
    • recommended changes to user permissions
    • recommended changes to directory structures
  11. What are two features of the active partition of a hard drive that is using MBR? (Choose two.)
    • The active partition must be a primary partition.*
    • Up to four primary partitions can be marked as active.
    • An active partition must be assigned C: as the drive letter.
    • The operating system uses the active partition to boot the system.*
    • The active partition may include the manufacturer recovery partition.
  12. A computer with the Windows 7 operating system fails to boot when the system is powered on. The technician suspects that the operating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality?
    • Use a differential backup to restore the system.
    • Use an incremental backup to restore the system.
    • Use a system image that was created prior to the failure to restore the system.*
    • Run chkdsk on the affected drive to restore system files to their post-installation state.
  13. What is the purpose of a recovery partition?
    • to provide a copy of the C: partition and data from the last backup in case of failure
    • to provide a backup copy of the BIOS
    • to return the system to an earlier state to recover from a failed update
    • to restore the computer to the factory state without deleting user files
    • to restore the computer to its factory state*
  14. What Windows 8 tool allows the computer to be rolled back to its factory state without losing any user files?
    • recovery partition
    • System Restore
    • Refresh your PC*
    • BIOS backup
  15. A Windows 8 computer locks up with a stop error during startup and then automatically reboots. The automatic restart setting is making it difficult to see any error messages. What can be done so that the error messages can be viewed?
    • Use the System Recovery options to restart the operating system.
    • Use the Command Prompt option to research the stop error messages.
    • View the error messages and recover the system using the System Image Recovery tool.
    • Access the Advanced Startup options menu before the OS loads to disable the auto restart function. *
  16. A user installs a new video driver on a computer that was working properly. After the new driver is installed and the computer is restarted, the computer fails to boot. How can the user quickly return the computer to a working state?
    • Restart the PC with the Windows System Recovery disc and use the Startup Repair utility.
    • Press F8 while the computer is booting and choose the Last Known Good Configuration option.*
    • Boot the system with the original Windows installation media and choose the Repair Your Computer option.
    • Press F8 while the computer is booting and choose the Start Windows Normally option.
  17. Where are the settings that are chosen during the installation process stored?
    • in the recovery partition
    • in BIOS
    • in flash memory
    • in the Registry *
  18. Why is it important to register a DLL file in Windows?
    • so that any program needing to use that specific program code can locate the file*
    • so that the operating system can be restored
    • so that the computer can be restored to factory settings
    • so that copyright laws are not violated when computer images are made
  19. A Windows 8.1 system is unable to boot properly. What is the procedure to boot this system into Safe Mode?
    • From the command prompt run the shutdown -r -s command.
    • Run the MSCONFIG utility and choose the option Selective Startup.
    • Reboot the system and press Del or F2 depending on the system.
    • Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode. *
  20. A technician has installed a new video driver on a Windows 8.1 computer and now the monitor shows distorted images. The technician needs to install a different video driver that is available on a network server. What startup mode should the technician use to access the driver on the network?
    • Safe Mode
    • Safe Mode with Networking*
    • Debugging Mode
    • Safe mode with Command Prompt
  21. A technician is considering implementing RAID 5 before installing Windows. Which technology does RAID 5 use?
    • spanning
    • mirroring
    • striping with parity*
    • lazy write
  22. What is a characteristic of a spanned volume?
    • Data is stored across two or more disks for faster read and write access.
    • Data is seen as one volume, but is stored across two or more disks.*
    • A copy of one disk is placed on another disk for fault tolerance.
    • Data is striped across a total of three or more disks, but one disk is used for parity in order to provide fault tolerance.
  23. Which Windows tool is used to determine if a dynamic disk is corrupted?
    • Disk Management*
    • Device Manager
    • Microsoft System Preparation
    • Bootmgr
  24. A user has upgraded a PC to Windows 7 but still needs to use an application that is created for the earlier version of Windows. Which mode of operation within Windows 7 can be used to run the application?
    • real mode
    • protected mode
    • virtual mode
    • compatibility mode*
    • multiuser mode
  25. Within which folder would a user of 64-bit Windows 8 find 32-bit programs?

    • C:Program Files
    • C:Program Files (x86)*
    • C:Program Files (x64)
    • C:Program Files (x32)

      Older Version

  26. Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed?
    • Services
    • Performance Monitor*
    • Component Services
    • Event Viewer
  27. What two terms can be used to describe the Windows Virtual PC? (Choose two.)
    • system resource management
    • server consolidation
    • hypervisor*
    • Virtual Machine Manager*
    • operating system sharing
  28. A technician has loaded an incorrect video driver on a Windows 7 computer. How can the technician revert to a previous driver?
    • Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver.*
    • Use the Devices and Printers control panel to right-click on the monitor, and select Properties.Select Roll Back Driver.
    • Select Create a Restore Point from System Tools.
    • Use regedit to remove the information about the graphics driver from the registry.
  29. Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? (Choose two.)
    • Disk Cleanup*
    • Disk Format
    • Disk Maintenance
    • Disk Partition
    • Disk Defragmenter*
  30. Which command is used from the Windows command prompt to schedule a program to run at a specific time?
    • TASKKILL
    • AT*
    • CMD
    • TASKLIST
  31. A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly after the upgrade. What can the user do to fix this problem?
    • Run the programs in Compatibility Mode.*
    • Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
    • Use the System Restore utility.
    • Update the driver for the graphics card.
  32. A technician notices that a program that is listed in the registry of a Windows computer is not found on that computer. What is a possible solution to the problem?
    • Restore the ntdetect.com file from the installation media.
    • Run fdisk /mbr from the command prompt.
    • Restore the boot.ini file from the installation media.
    • Reinstall the application. Then, run the uninstall program.*
  33. Which Windows 7 feature allows a user to view the contents of the desktop by moving the mouse to the right edge of the taskbar?
    • thumbnail previews
    • Search
    • jump lists
    • Shake
    • Snap
    • Aero Peek*
  34. After upgrading a computer to Windows 7, a user notices that the UAC (User Account Control) panel appears more frequently. How can the user reduce the frequency with which the UAC appears?
    • Replace the graphics card with one that meets the minimum hardware requirements for Windows 7.
    • In the Performance Options dialog box of the Performance Information and Tools control panel, choose Adjust for Best Performance.
    • Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control panel.*
    • Reinstall all user programs in Compatibility Mode.
  35. How much RAM can theoretically be addressed by a 64-bit operating system?
    • 32 GB maximum
    • 64 GB maximum
    • 16 GB maximum
    • 4 GB maximum
    • 128 GB or more*
  36. A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS without losing user data. Which course of action should be taken to upgrade the file system to NTFS?
    • Use the Disk Management utility to convert the drive from Basic to Dynamic, which changes the file system to NTFS automatically.
    • Reformat all of the existing partitions and use the NTFS file system.
    • Run the CONVERT.EXE utility to convert the file system to NTFS.*
    • Reinstall Windows XP and to format the drive choose NTFS when prompted.
  37. To which category of hypervisor does the Microsoft Virtual PC belong?
    • Type 1
    • Type 2*
    • Type 3
    • Type 4
  38. A college uses virtualization technology to deploy information security courses. Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs?
    • The viruses and worms will have limited functionality inside the virtualized environment.
    • Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack.*
    • The virtualization environment has better tools to develop mitigation solutions.
    • The lab exercises are performed faster inside of the virtualized environment.
  39. What are two advantages of the NTFS file system compared with FAT32? (Choose two.)
    • NTFS is easier to configure.
    • NTFS provides more security features.*
    • NTFS supports larger files.*
    • NTFS allows faster access to external peripherals such as a USB drive.
    • NTFS allows faster formatting of drives.
    • NTFS allows the automatic detection of bad sectors.
  40. Which two statements are true about restore points? (Choose two.)
    • A technician should always create them after updating the operating system.
    • They are useful to restore the computer to an earlier time when the system worked properly.*
    • They recover personal files that have been corrupted or deleted.
    • They contain information about the system and registry settings that are used by the Windows operating system.*
    • They back up personal data files.
  41. A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom?
    • The video card does not support the resolution that is being used.
    • A recently installed device driver is incompatible with the boot controller.
    • A process is using most of the CPU resources.*
    • One or more program files have been deleted.
  42. What would be the result of having a corrupt Master Boot Record?
    • The printer will function incorrectly.
    • The operating system will fail to start.*
    • A new application will fail to install.
    • The keyboard will be unresponsive to the user.

Aucun commentaire:

Enregistrer un commentaire

CCNA Security v2.0 Final Exam Answers 2018

Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA f...