Which of the following is a Windows service that assists utilities and applications in creating snapshots of a running Windows system quizlet?

VNC (Virtual Network Computing)

Which of these applications is compatible with Mac OS Screen Sharing?

-Microsoft Remote Desktop
-VNC
-iShare
-RDP

Buffer overflow

An IPS (Intrusion Prevention System) is designed to stop known vulnerabilities traversing the network. The vulnerabilities may be operating system exploits, buffer overflows, cross-site scripting attacks, SQL injections, and more. Virus, URLs, and applications are not commonly blocked with an IPS.

Which of the following would you commonly block with an IPS?

-A URL category of "sports news"
-Virus infection
-Buffer overflow
-Social media posting
-Unknown malware downloads

Schedule data backup

-Because tar is easily scripted at the command line, it's commonly used when scheduling ongoing backups.

Which of the following would be the most likely use of the Linux tar utility?

-Copy files from one directory to another
-Schedule data backup
-Change the name of a directory
-Modify the default startup device
-Check a storage device for logical errors

Command-Option-Escape

Which of the following shortcut keys can be used to launch the Force Quit dialog in Mac OS?

-Control-Alt-Delete
-Command-Q
-Command-Option-Escape
-Command-Start

IMAP

Which of these protocols would be exclusively used to retrieve mail on an Android device?

-HTTP
-SSL
-IMAP
-SNMP

file system consistency check

fsck stands for?

fsck

Which of the following would be the best choice to check for file system problems in Linux?

-chkdsk
-diskcheck
-apt-check
-fsck
-rpmchk

dd

-The dd command in Linux is commonly used for creating disk images of files and partitions.

Which of the following commands would be the best choice for backing up an entire Linux partition?

-backupd
-Backup Manager
-dd
-Disk Manager

IaaS

Which of these architectures would be most closely associated with a web hosting provider?

-SaaS
-PaaS
-Hyrbrid
-IaaS
-Community

.dmg

-An Apple Disk Image file is labeled with a .dmg file extension, and will mount in the operating system as a normal file system.

Which of these best describes the extension of an Apple Disk Image file?

.img
.tar
.zip
.dmg
.iso

killall

-The Linux killall command allows you to terminate a process by name instead of using the process ID (PID).

Which of the following would be the best way to terminate a Linux process by name

-kill
-halt
-taskkill
-killall
-net stop

PaaS

-Platform as a Service (PaaS) is commonly used to modularly build applications without needing to build the entire application yourself. PaaS allows providers to offer a framework that allows the customers to build and customize their own applications and services.

You'd like to build your own applications without the time and expense of writing everything from scratch. Which of the following would be a good choice for this requirement?

-IaaS
-Hybrid
-PaaS
-SaaS

Timecard system

-An embedded system does not commonly allow access to the operating system of the devices. Systems such as alarm systems, door security, and timecard systems are common examples of embedded systems.

Which of these would best describe an embedded system?

-Timecard system
-Mail server
-IPS
-Web Server
-Authentication server

Testing an iOS application on a Mac OS desktop

An emulator is a device that is running a process that was designed for a completely different architecture. For example, it's common for mobile device developers to run Android and iOS emulators on their computer desktops to test their applications without using the physical mobile device.

Which of the following would best describe emulation?

A. Running a Windows virtual machine on your Linux desktop
B. Using Remote Desktop to connect to a Windows computer from Mac OS
C. Running a Linux Live CD on your Windows computer
D. Testing an iOS application on a Mac OS desktop
E. Dual-booting between Windows and Linux

System Information

The System Information utility in Mac OS can provide you with detailed information about your hardware, network, and software.

Which of the following would be the best way to view device driver information in Mac OS?

A. Mission Control
B. System Information
C. System Preferences / General
D. Driver Manager
E. System Tools

Define search categories in System Preferences / Spotlight

The Mac OS Spotlight search provides integrated search for almost anything in the operating system, and online. You can modify the results by enabling or disabling search categories in the System Preferences.

Which of these would be the best way to modify the Mac OS search results?

A. Define search categories in System Preferences / Spotlight
B. Enable indexing in the System Utilities
C. Clear the browser cache and stored data
D. Update the search application signatures
E. Move all personal files to an external drive

Finder

The Mac OS Finder utility is the integrated file management system in Mac OS.

Which of the following is the best utility to use when moving files from one volume to another in Mac OS?

A. Filer
B. File Manager
C. Mac Explorer
D. Finder
E. File Wizard

SaaS

Software as a Service (SaaS) is a common way to take advantage of applications without the requirement of hardware costs or on-site software installations.

Which of these would best describe a provider that offers on-demand applications with no requirement of local installation or hardware costs?

A. IaaS
B. ISP
C. SaaS
D. WAN
E. LEC

Lightning
802.11

iOS devices can synchronize to a local computer using wireless networking over 802.11 networks and physical cabling over the proprietary Lightning interface.

Which of these interface types would you use when synchronizing data on an iOS device? Pick two.

A. Lightning
B. 802.11
C. FireWire
D. eSATA
E. USB Micro-B

Some CPUs include virtualization capabilities in hardware

Intel CPUs with VT (Virtualization Technology) and AMD CPUs with AMD-V are designed with specialized virtualization features in the CPU. Some virtualization software requires these features to work, while some other virtualization software packages will operate less efficiently without these features.

Which of these is true of virtual machines?

A. The hypervisor's memory requirements are similar to a standard workstation
B. You must route between different virtual machines
C. Virtualization renders anti-virus and anti-malware unnecessary
D. Virtualization features are limited to Windows operating systems
E. Some CPUs include virtualization capabilities in hardware

mv

The mv (move) command is used to "move" or rename a file from one name to another.

How would you change the name of a file in Linux?

A. ren
B. mv
C. chmod
D. rename
E. cp

Use a DVD-ROM drive on a remote device

The Remote Disc feature allows you to use an optical drive that's located on a remote device.

Which of these would be a reason for using Remote Disc on Mac OS?

A. Connect to Windows shares
B. Transferring files from network-connected file servers
C. Use a DVD-ROM drive on a remote device
D. Connect through an encrypted tunnel from a remote location
E. Synchronize the contents of a drive across the network

SSID name

The iwconfig command displays and modifies wireless network configurations, including SSID information, wireless frequencies, and more.

Which of the following would be commonly seen in the output of the iwconfig command?

A. Default route
B. Volume storage space
C. SSID name
D. Duplex setting
E. QoS statistics

Network Access Control

802.1X defines Network Access Control, which is a way to securely provide access to a network.

Which of these is most associated with the 802.1X standard?

A. Ethernet topology
B. Network Access Control
C. Ethernet trunking
D. Spanning Tree Protocol

The application will only have access to specific data sources

Each application is designed to operate in its own little "world" where it has limited access to anything else on the mobile device. If required, the user can allow the application to access external data sources. For example, a contact list application may request permission to view the contact list on the mobile device, and the user must interactively provide this access.

What does it mean when a mobile device application runs in a "sandbox?"

A. The application has full access to the mobile device storage and memory
B. The application will only use a specific amount of memory
C. The application will only have access to specific data sources
D. The application will automatically build links to other data sources as required

Run the editor as Administrator

During normal use, all user processes run normally without any special permissions. To perform a procedure that required elevated rights and permissions, you need to select the option to run the application as Administrator

What process should you follow in Windows 8.1 to edit system configuration files?

A. Run the editor as Administrator
B. Start Windows 8.1 in Safe Mode
C. Run the Windows Startup Repair utility
D. Modify the files in System Information
E. Make the changes in the Windows Registry Editor

Anti-virus application

An anti-virus and anti-malware application is designed to stop malicious code from executing on your computer.

Which of the following would be the best way to stop malicious code when it tries to execute in main memory?

A. Host-based firewall
B. DLP application
C. Access control list
D. Anti-virus application
E. NTFS file system

The recovery process should not be trivial

The password recovery process is the only thing between your network resources and an illegitimate user. The process for resetting the password and recovering the account should be a formal process with many checks and balances.

Which of the following would be true of a password recovery process?

A. The process should be automated and seamless
B. Passwords can be sent to registered email addresses
C. The recovery process should not be trivial
D. Server passwords do not need to be regularly changed
E. The recovery process should reset to a well-known password

A high-level format can be performed by the operating system

A high-level format is almost always done by the operating system, and it's designed to initialize the drive or partition for use by the OS.

Which of these is true about high-level formatting?

A. A drive cannot be used again after a high-level format
B. The high-level formatting process is always done at the factory
C. All data is securely deleted after a high-level format
D. A high-level format can be performed by the operating system

NTFS

The NTFS file system allows for many capabilities, and EFS (Encrypted File System) is one of those enhancements. If you're using a supported version of Windows, you can encrypt your files to prevent anyone else from seeing the contents. The encryption and decryption process is done seamlessly in the operating system.

Which of the following file systems can support EFS?

A. FAT
B. FAT32
C. HPFS
D. NTFS

Local email relay

It's common to catch unsolicited email at centralized points, such as the local mail gateway or at a cloud-based spam filtering email gateway. Most firewalls will not provide any significant spam filtering.

Which of the following would be common filtering points for spam?

A. Local email relay
B. Firewall
C. Switch interface
D. Internet router
E. Switch trunks

Sandbox

On a mobile device, all applications run in a "sandbox," which limits the access of the application to the other portions of your mobile device. If an application needs access to resources such as your contact list, it must explicitly ask you for that permission.

What security feature keeps mobile apps from accessing your private information?

A. Sandbox
B. VPN
C. On-device encryption
D. Anti-virus
E. Mobile device manager

Disable interactive logins on the account

It's important to disable any unused accounts, but some accounts must remain active for certain system processes to work properly. In these cases, the best practice is to keep the account active but disable any interactive logins for the account.

Which of the following would be the best way to allow a system account to operate properly, but prevent any logins across the network?

A. Change the ownership of the user documents
B. Only allow access during certain hours of the day
C. Disable the network connection on the device
D. Change the password for the system account
E. Disable interactive logins on the account

Credentials are only required during the initial login process

SSO (Single Sign-On) is a process where you provide login credentials one time and access to other allowed resources are provided without any additional authentication.

Which of these would be a characteristic of the Windows SSO process?

A. Access times to stored data is increased
B. Wireless network encryption is integrated
C. File permissions can be defined for all Windows users
D. All network communication is encrypted by default
E. Credentials are only required during the initial login process

Disabled completely

In Windows 7, the AutoRun feature was completely disabled for any device that mounts as a USB drive.

How does the Windows AutoRun feature work with USB drives in Windows 7?

A. Enabled by default
B. Enabled with a registry change
C. Disabled with a security path
D. Disabled completely

Authenticator app

Instead of physical authenticators that would hang from your keychain, many authentication systems now use authenticator apps that can be installed on your mobile device.

Which of these of mobile device apps is commonly used when connecting to a VPN?

A. Authenticator app
B. Tunnel monitor
C. Encryption app
D. Network monitor
E. Key manager

Store a password

To protect the original password, the plaintext of the password is usually hashed. This hashed data is stored as the password and the hashing is recreated and compared with each authentication attempt. Since the hash cannot be reversed, the original password text remains private.

Which of these events would commonly involve a hash?

A. Copy data to a USB memory stick
B. Start your browser
C. Store a password
D. Install a new hardware driver

Virus

A computer virus doesn't have the ability to replicate on its own, so it relies on humans to click a button or run an application to execute and spread.

What is the security threat that best describes malicious software that uses humans as the method of distribution?

A. Social engineering
B. Worm
C. Virus
D. Tailgating
E. Man-in-the-middle

Read only

When examining different NTFS and share rights, the most restrictive right always wins when a conflict occurs.

You have applied some read-only NTFS permissions to an important folder containing spreadsheets, and you've applied it to all users. However, a member of the accounting department connects across the network and has share permissions that allow writing to the folder. What type of access to the spreadsheet would the accounting department user ultimately have?

A. Read only
B. Write only
C. Read and write
D. No access

Firewall

Some firewalls can filter traffic by port number, application, and proxy network traffic flows.

Which of these would be most likely to proxy network traffic?

A. Anti-virus software
B. NTFS file permissions
C. Firewall
D. Anti-malware software
E. IPS

Unencrypted credit card numbers

Most DLP (Data Loss Prevention) solutions can identify sensitive data traversing the network. These DLP systems can send an alarm or block network traffic if this traffic is identified.

Which of these would commonly be identified by DLP?

A. Known operating system vulnerabilities
B. Unencrypted credit card numbers
C. Unauthorized web site URLs
D. Port scans
E. Zero-day vulnerabilities

sensitive data

Most DLP (Data Loss Prevention) solutions can identify _______ traversing the network.

WPA2

WPA2 is the most secure encryption type to use on wireless networks.

Which of these would be the best encryption type to use on a wireless network?

A. 802.1X
B. WEP
C. WPA2
D. TKIP

All traffic is allowed, but certain traffic types are administratively blocked

A network blacklist is a security technique that allows all traffic except the items listed on a blacklist.

How does a blacklist of outbound traffic work in a SOHO network?

A. All traffic is blocked by default, and only specified traffic types are allowed
B. All inbound traffic to a server is redirected to the internal address
C. All outbound traffic uses a proxy
D. All traffic is allowed, but certain traffic types are administratively blocked
E. No outbound traffic is allowed

It's easy to brute force the WPS PIN

The WPS (Wi-Fi Protected Setup) feature on many wireless routers was designed to provide an easy way for other devices to connect to a secure network. Unfortunately, it's very easy to brute force the WPS PIN to gain unauthorized access to a WPS-enabled network.

Which of the following would be the best reason not to use WPS on your wireless router?

A. The WPS process contains a cryptographic vulnerability
B. It's easy to brute force the WPS PIN
C. WPS is only available for Windows devices
D. The WPS process is too complex for most people
E. WPS only protects outgoing traffic

The original permissions are retained

If a file is copied from one location to another, the newly created file will inherit the permissions from the parent object. If a file is moved, however, the only thing that changes is the pointer to the file location; the moved file is essentially the same file, so none of the permissions are modified. The moved file will have the exact same permissions it had before the move.

You've moved a file from one folder on an NTFS volume to another folder on the same NTFS volume. What has happened to the permissions of the file after the move?

A. The permissions are inherited from the new parent object
B. The permissions are reset to default
C. The original permissions are retained
D. The permissions are inherited from other files in the new folder

Smart card

A smart card often contains a digital certificate to create a unique card that cannot be duplicated elsewhere. It's common to use smart cards as authentication factors to use with passwords, PINs, fingerprints, and more.

Which of the following commonly contain a digital certificate?

A. DVD-ROM
B. PIN
C. Strong password
D. MBR
E. Smart card

The device erases itself after 10 failed attempt

If you have configured an iOS device with the "Erase Data" passcode lock option, all data will be deleted after 10 failed passcode attempts.

What happens if the failed passcode lock attempt security option is activated in Apple iOS?

A. The device erases itself after 10 failed attempt
B. The passcode will randomly change after every 10 attempts
C. The device locks and requires a Google login
D. An email will be sent to the device owner after 10 failed attempts
E. The device locks and an email is sent to the owner of the device

ACLs

An access control list (ACL) is a way to associate permissions with an object. This is the method used to configure permissions in operating systems, network devices, file systems, and more.

Which of the following best describes the list of permissions associated with operating system objects?

A. Network shares
B. Usernames
C. Multifactor authentication
D. ACLs
E. Process IDs

ACLs

The method used to configure permissions in operating systems, network devices, file systems, and more.

(no description version answer)

Microsoft Exchange

Microsoft supports full device encryption when the Windows Phone is used with Microsoft Exchange.

Which of the following is required to enable full device encryption in the Windows Phone OS?

A. NTFS
B. Microsoft Exchange
C. BitLocker
D. TPM
E. EFS

The most permissive setting wins

When calculating permissions, the most restrictive setting always wins.

Which of the following is NOT true when determining NTFS vs. Share permissions?

A. The most permissive setting wins
B. Share permissions only apply to connections over the network
C. NTFS permissions apply to both local and network connections.
D. Permissions are inherited from the parent object, unless the resource is moved to a different folder in the same volume

As soon as they are available

Operating system patches often include security updates, so it's important to test and deploy any updates as soon as possible.

How often should operating system patches be deployed?

A. Once a month
B. As soon as they are available
C. After the release of a consolidated service pack
D. Once a week
E. There's no ongoing requirement to patch the operating system

Something you have

One authentication factor might be to verify something that might be physically associated with a person. Our phone is a very common personal physical item that can be used as an authentication method, and one way to do this is by sending a verification code to a phone using a text message (SMS).

Which of these would best describe a code sent to your phone using SMS?

A. Something you know
B. Something you are
C. Something you have
D. Somewhere you are
E. Something you do

Recovery Console Command Prompt

The Windows Recovery Console and Command Prompt can provide you with many configuration and operating system options, including the modification or removal of files, enabling and disabling of devices, and the configuration of startup programs and services.

Which of these would be the best choice for disabling a Windows service before the operating system starts?

A. System Restore
B. Windows Services
C. Windows Repair
D. Recovery Console Command Prompt
E. Windows PE

Windows Preinstallation Environment (Windows PE)

A minimal Windows environment that's commonly used for troubleshooting and recovering from startup problems.

(short answer)

Error message on the screen

A kernel panic is a non-recoverable fatal error, and it requires a reboot of the system to restore the system to operation. The panic could be caused by a hardware error, an operating system bug, or a similar issue. The error message displayed on the screen or in the error logs can provide you with more information about the error and give you some information on where to start troubleshooting.

Where would you look to get information about a Linux kernel panic?

A. Error message on the screen
B. The BIOS alert log
C. Event Viewer
D. LILO
E. Kernel Builder

Run real-time anti-virus software

Local anti-virus and anti-malware software is designed to identify and stop malicious software from executing on a computer. Make sure you keep your anti-virus and anti-malware signatures updated!

Which of these would be the best way to prevent malicious software from executing in the local memory of a computer?

A. Use a personal firewall
B. Run real-time anti-virus software
C. Connect to all Internet sites through a proxy
D. Use an IPS on the corporate network
E. Run all software in protected mode

-Check the Windows Event Log
-Try logging in with a different user name

Once the computer login prompt appears, you know that the issue isn't related to the boot partition or the partition you're booting from. If a more detailed message isn't in the Event Log, you can try a different user to see if the issue is related to all users or just a single login name.

When you login to your Windows 7 system, you receive an error message that does not display any application name. The error message is a series of numbers and doesn't appear to offer any additional references. Which of these methods would best assist you with troubleshooting this error? Pick two.

A. Check the Windows Event Log
B. Rebuild the hard drive boot sector
C. Try logging in with a different user name
D. Modify the Boot Configuration Data
E. Run hardware diagnostics from the BIOS

Update the Control Panel / Default Programs

The Control Panel applet for Default Programs will allow you to make file association changes in your Windows 7 operating system, and it's much easier than making changes to the registry.

Some malware has removed a file association on your Windows 7 computer. Now that the malware has been removed, which of these would be the best way to restore this file association?

A. Change the compatibility mode for the application
B. Update the Control Panel / Default Programs
C. Change the file extensions
D. Modify the registry settings for those file types

*READ
The Control Panel applet for Default Programs will allow you to make file association changes in your Windows 7 operating system, and it's much easier than making changes to the registry

*READ
The Control Panel applet for Default Programs will allow you to make file association changes in your Windows 7 operating system, and it's much easier than making changes to the registry.

System Configuration

The System Configuration utility, or msconfig, includes a checkbox in the Boot tab that allows you to enable and disable a boot log. If you're having problems during startup, you can reference the boot log at C:\Windows\ntbtlog.txt to see the results of your last boot process.

Which of these utilities can be used to easily enable a Windows boot log?

A. BOOTLOG
B. Windows PE
C. Registry Editor
D. System Configuration
E. Event Viewer

-Check access to all online backups
-Perform a factory reset of your mobile phone

If a breach has occurred, it's important to find out where the data leak might be. You'll want to check all of your installed apps, run an anti-malware scan, check access to all of your online backups, and ultimately perform a factory reset to guarantee that no malicious software is on your device.

You're concerned that some of your private company information from your mobile phone may have been leaked to others outside of your organization. Which of the following would be a best practice if you suspect a breach? Pick two.

A. Check access to all online backups
B. Verify that Internet access is available
C. Run a hardware diagnostic
D. Perform a factory reset of your mobile phone
E. Perform a soft reset of your mobile phone

System Configuration

The Windows System Configuration utility, or MSCONFIG, identifies all of the services and applications that are run during the startup process, and the utility provides an easy checkbox method to enable or disable any of the apps. It may take some time to narrow down the troublemaker, but it's very easy to use.

Your Windows 7 startup process is performing very slowly, but it's difficult to tell which application is causing the issue. Which of these utilities would be the most help to identify the problematic application?

A. Event Viewer
B. System Repair Disk
C. System Configuration
D. Defragmentation

Update the system BIOS

There are many reasons for Windows to have performance issues, but there's not much that a BIOS update can do to fix that issue.

Which of the following would not commonly be a best practice for troubleshooting slow Windows system performance?

A. Check Task Manager for application utilization statistics
B. Run Windows Update to get the latest patches
C. Check the available storage space
D. Run an anti-virus and anti-malware scan
E. Update the system BIOS

Reliability Monitor

The Windows Reliability Monitor can provide information about application failures, Windows problems, warnings, informational messages, and more.

What Windows utility would be the best choice to provide you with a long-term analysis of application stability and problem history?

A. Event log
B. Performance Monitor
C. System Configuration
D. Computer Management
E. Reliability Monitor

An application is waiting to access a system resource

The Apple spinning wait cursor is a colorful spinning ball that is similar to the Windows hourglass cursor. When the wait cursor appears, an application is waiting to access memory, storage, or some other resource.

Which of these would be the most likely reason to see an Apple "pinwheel?"

A. An application is shutting down
B. Total internet bandwidth is below 10 megabits per second
C. The operating system is notifying you of a pending update
D. The primary storage drive is at 90% capacity
E. An application is waiting to access a system resource

REGSVR32

The REGSVR32 (Microsoft Register Server) utility is used to register DLLs, unregister DLLs, and update the Windows Registry.

Which of these would be the best way to register a DLL?

A. REGEDIT
B. Reinstall the associated application
C. REGSVR32
D. Run Startup Repair
E. REGDLL

Recover from malware that corrupted the boot sector

A Windows PE (Preinstallation Environment) is a minimal version of Windows that can be run completely from a DVD-ROM, USB drive, or any other storage device. It's common to use Windows PE when recovering a computer that's having a problem when starting Windows.

Which of these would be the most common use of a Windows PE?

A. Reset the application associations for a .DOC file
B. Copy files from an external USB storage device
C. Recover from malware that corrupted the boot sector
D. Migrate user documents from one version of Windows to another
E. Collect long-term performance information

The installation process doesn't have the proper access to install the driver

Many driver installation files require Administrator access to install properly, especially if it's an executable application that also installs additional "helper" files in Windows directories and requires additional services to be installed.

You're trying to install a new device driver using an executable file from the manufacturer, but the installation process fails in the middle of the installation. Which of these is most likely the issue?

A. The driver package isn't signed by Microsoft
B. The driver installation program is damaged
C. The installation process doesn't have the proper access to install the driver
D. The hardware associated with this driver is not installed in this computer

Delete everything on the drive perform a clean install

Although many removal tools can do a good job of removing many malware types, the only way to be absolutely sure the malware is removed is to delete the entire drive and reload it from scratch or an external backup.

You've discovered that one of your computers at work has been infected with malware. Which of these options would provide the most effective removal of the spyware?

A. Use a third-party malware remover
B. Delete everything on the drive perform a clean install
C. Restore the computer to a previously saved restore point
D. Use a hammer and chisel. Use care around the memory modules

Additional restore points containing malware would not be created

When you make a significant change, System Protection creates a restore point. Although this would normally be a good thing, you don't want to save any restore points that might save the malware. You should also delete all previous restore points as well.

Why would you disable System Protection prior to attempting a malware removal?

A. The anti-malware scan runs faster with System Protection disabled
B. Additional restore points containing malware would not be created
C. Disabling System Protection allows the malware to run, allowing easy identification
D. You would replace System Protection functionality with a 3rd-party product

None of the above

The only way to guarantee the removal of malware is to remove all data on the drive and reload the operating system, applications, and data.

Which of these methods is guaranteed to remove malware from an infected computer?

A. Scan and remove with anti-virus software
B. Remove with a specialized anti-malware software package
C. Use an anti-virus stand-alone application running in Windows PE
D. None of the above

Run Startup Repair

Although Windows Vista and later operating systems use winload.exe and the Windows Boot Manager instead of NTLDR as the boot loader, some updates can improperly replace the boot loader files with incorrect versions. Running Startup Repair from your Windows installation media can usually resolve this issue.

When you start your Windows Vista computer, your Windows desktop does not appear. Instead, you get a blank screen with this message at the top; "NTLDR is missing." Which of the following would be the best way to troubleshoot this issue?

A. Update the video driver
B. Run hardware diagnostics
C. Run Startup Repair
D. Upgrade the memory
E. Replace the data cables to the storage drive

System Repair Disk

The Windows System Repair Disk boots the computer and provides the standard list of system recovery options. From the System Repair Disk, you can run Startup Repair, System Restore, System Image Recovery, Windows Memory Diagnostic, or launch the Command Prompt.

Which of these would be the best choice to provide system recovery options in Windows 7 without booting the operating system?

A. BIOS diagnostics
B. Microsoft Register Server
C. Windows Recovery Disk
D. System Configuration
E. System Repair Disk

Application configurations

The Windows Registry contains detailed system information, driver details, operating system and application configurations, and more.

Which of the following would you expect to find in the Windows Registry?

A. Login credentials
B. Application configurations
C. BIOS settings
D. Hardware inventory
E. Master Boot Record

Check for known bad apps

App scanners are large databases that contain a list of mobile apps and information about their security status. You can check the app scanner before installing a new app to make sure it's legitimate.

In which of the following would you be most likely to use an app scanner?

A. Check for known bad apps
B. Determine the bandwidth requirements for an app
C. Search for a list of apps that similar to another
D. Find a particular installed app icon
E. Determine how much storage space an app is using

Botnet
Botnets are exceptionally good at infecting and controlling devices. Once hijacked by the botnet, devices can be made to participate in denial of service attacks, send unsolicited emails, and anything else the botnet owner would like.

Which of these would be the most likely cause of a hijacked email device?

A. Botnet
B. Virus hoax
C. Pop-up blocker
D. HTTPS

Windows Resource Protection

Windows Resource Protection is the integrated Windows technology that protects registry entries, system folders, and essential system files.

Which Windows feature prevents the system from overwriting an important DLL?

A. System Protection
B. Windows Backup and Restore
C. Time Machine
D. Windows Resource Protection
E. File History

During the next login

The settings for the Last Known Good Configuration are updated after login. If you've made a significant change to the Windows operating system, you might want to wait at the login prompt until all of the services and drivers have completely loaded.

At what point is the "Last Known Good Configuration" updated to the current configuration?

A. Five minutes after boot
B. During the next login
C. During the next System Restore checkpoint
D. During the next logoff
E. After all services have loaded

A set of files can be restored from a previous version

A Linux LVM (Logical Volume Manager) snapshot is similar to the feature of Windows System Restore, where files or folders can be reverted to a previous version or point in time.

Which of the following would best describe the use of an LVM snapshot?

A. The memory contents of a computer can be modified between reboots
B. A set of files can be restored from a previous version
C. A cluster of servers can maintain the same set of files
D. Multiple firewalls can be used in a high-availability configuration
E. A duplicate of all traffic is sent through multiple "snapshot" network adapters

The certificate may be close to the expiration date

Although it's important to keep your certificates up to date, your browser won't show any problems with the certificate until you're past the expiration date.

Which of the following would not indicate a problem with a website's certificate?

A. The certificate may be close to the expiration date
B. The certificate may be using a different domain name
C. The certificate may not be properly signed
D. The website host name is different than the host name on the certificate

Run a refresh procedure

Windows 8.1 includes a new refresh feature that will return Windows to the configuration it had when it was first installed. This process will effectively remove all of your applications, but your user documents will remain intact.

Which of the following would be the best way to create a clean configuration of Windows 8.1 without losing any of your personal files?

A. Backup your documents and perform a clean install
B. Use a third-party disk imaging program
C. Use System Restore to revert back to the original configuration
D. Run a refresh procedure
E. Use an LVM snapshot to restore back to the original configuration

All device content is deleted

Most mobile devices are configured to automatically erase everything if too many unlock attempts fail. It usually takes at least 10 attempts before erasing the data, so it would be difficult to accidentally cause this to occur. It's always important to have a backup of your data!

Which of the following would be a common response on a mobile device to an excessive number of consecutive failed unlock attempts?

A. The device reboots
B. All apps are deleted
C. All screen input is disabled
D. All device content is deleted
E. The secondary unlock questions are presented

Chain of custody

The chain of custody provides a paper trail of a piece of physical or digital evidence from the point of seizure through the final disposition of the evidence.

Which of these best describes the control and integrity of evidence as it moves from person to person?

A. Digital signatures
B. Tamper controls
C. Burden of proof
D. Chain of custody

Ask an associate in the department for some assistance

The materials on the user's desk may seem sensitive, so someone else in the department should be able to move the documents or confirm that the information is not sensitive. This would make sure that someone else in the area was aware of the documents, and they'll also know that the documents were not seen during the repair. Since the repair was urgent, this would allow you to complete the job while maintaining the security of the information.

You've been asked to work on an urgent computer repair while the user is at lunch. When you arrive, you notice paperwork on the desk that may contain private information about your customers. Which of these would be the best next step?

A. Complete the repair as quickly as possible
B. Move the papers somewhere out of sight
C. Ask an associate in the department for some assistance
D. Leave without repairing the computer

Larger joule ratings

The absorption ratings of a surge suppressor are measured in joules. The larger joule rating can absorb a larger spike of power.

What type of surge absorption ratings should you look for on a suppressor?

A. Smaller joule ratings
B. Larger amp ratings
C. Higher let-through ratings
D. Larger joule ratings E. Smaller amp ratings

Maintain a humidity level over 60%

High humidity helps to control electrostatic discharge, although keeping a room this humid and simultaneously at a comfortable temperature may be a challenge.

Which of these would be the best method of minimizing electrostatic discharge?

A. Keep all work surfaces clean
B. Use non-magnetic tools
C. Unplug all power sources prior to working inside of the computer
D. Maintain a humidity level over 60%

Foam

You should avoid using water or foam when battling an electrical fire.

Which of these should not be used with an electrical fire?

A. FM-200
B. Foam
C. Carbon dioxide
D. Dry chemical

Enterprise license

It's common for a company to purchase software with an enterprise license that must be renewed annually. At home, we commonly license software perpetually, where a one-time cost is the only purchase requirement.

Which of these software licenses is most often associated with annual renewals?

A. Personal license
B. FOSS
C. Enterprise license
D. EULA
E. Home license

A damp cloth

As the name implies, an LCD contains liquid crystals and is very sensitive to harsh chemicals. For the best (and safest) cleaning, use a cloth that's dampened with water. Chemicals on an LCD screen are quite harsh. For best results, keep your alcohol and other cleaning agents away from the LCD screen. Although an air blower would remove large pieces of dust from an LCD screen, it won't work well enough to completely clean the display. A vacuum cleaner is worse than an air blower since a vacuum cleaner can't avoid some direct contact with the display. An LCD screen is very fragile, so you want to avoid using any cleaning devices that might damage the display.

Which of these would be the best cleaner to use on LCD displays?

A. Isopropyl alcohol
B. Compressed air
C. A damp cloth
D. Computer vacuum cleaner

Use a small screwdriver to dislodge dust from smaller components

A motherboard contains many small components, and many of the components are only mounted onto the surface of the board. A slight bit of pressure can easily dislodge the components, and physically touching the components could potentially discharge static electricity and permanently damage the silicon.

Which of these options should not be used to clean a motherboard?

A. Remove large dust collections with a vacuum
B. Use air to blow out smaller layers of dust
C. Use a brush to dislodge dust
D. Use a small screwdriver to dislodge dust from smaller components

Divert electrical faults away from people

An electrical ground is a path for electricity to take in the case of a stray voltages. The electrical ground is the best path to the Earth, so any inadvertent power would take the path through the electrical ground instead of our bodies.

Which of these would best describe the primary purpose of an electrical ground?

A. Increase the total power available to a computer
B. Minimize the number of power outages
C. Provides a way to run multiple devices from the same power outlet
D. Provide electrical backup E. Divert electrical faults away from people

330 volts

The let-through voltage specifies the point that a surge suppressor will begin diverting a spike of power away from your equipment. The lower let-through voltage is always better.

Which of these surge suppressor let-through ratings is the best?

A. 400 volts
B. 600 volts
C. 330 volts
D. 500 volts
E. 700 volts

Which of the following is a product that supports creating and running virtual machines in Windows Server 2008?

Which of the following is a product that supports creating and running virtual machines in Windows Server 2008? A business continuity plan (BCP) is a plan that ensures the infrastructure is operational and ready to support primary business functions.

Which of the following terms is used to describe providing credentials that claim a specific identity such as a user name?

For purposes of user identity, users are typically identified with a user ID, and authentication occurs when the user provides credentials such as a password that matches their user ID. The practice of requiring a user ID and password is known as single-factor authentication (SFA).

Which of the following is a subset of SQL used to query Windows machines for management and operations data?

WMI Query Language (WQL) is subset of SQL used to query Windows machines for management and operations data.