Computer Systems Maintenance Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the best method to address occasional voltage spikes in a power system?

  • Maintain an inventory of replacement power supplies
  • Confirm that the building has an electrical ground
  • Power down when not actively working
  • Connect a surge suppressor to each system (correct)
  • What is the maximum amount of RAM that a 32-bit operating system can support?

  • 8 GB
  • 4 GB (correct)
  • 192 GB
  • 16 GB
  • Which tool would provide details on a previously crashed application?

  • Event Viewer (correct)
  • Task Manager
  • Startup Repair
  • Safe Mode
  • What type of attack involves trying every combination of characters to discover a password?

    <p>Brute force attack</p> Signup and view all the answers

    Which of the following tasks is NOT typically managed by Device Manager?

    <p>Configure network settings</p> Signup and view all the answers

    During which situation is it most appropriate to use maintenance of power supplies?

    <p>To prepare for unexpected power outages</p> Signup and view all the answers

    Why is it important to confirm electrical grounding in a building?

    <p>To mitigate voltage spikes</p> Signup and view all the answers

    Which statement is true regarding a technician who uses Task Manager?

    <p>They can monitor system performance</p> Signup and view all the answers

    What change would most effectively improve battery life on the phone?

    <p>Enable auto-lock</p> Signup and view all the answers

    Why would connecting to a VPN decrease battery performance?

    <p>It requires additional processing for encryption and decryption.</p> Signup and view all the answers

    How does increasing available storage space affect battery life?

    <p>It does not impact battery life.</p> Signup and view all the answers

    What would likely be the first step in resolving a print spooler issue?

    <p>Restart the spooler service</p> Signup and view all the answers

    Which tool can provide the system administrator with additional information when an application randomly shuts down without error messages?

    <p>Event Viewer</p> Signup and view all the answers

    What is a primary reason to reboot the computer after addressing a print spooler service error?

    <p>It refreshes all background services.</p> Signup and view all the answers

    What is the BEST troubleshooting step for a workstation on the manufacturing floor that is booting slower than normal?

    <p>Disable the startup applications</p> Signup and view all the answers

    During the installation of a new application that includes a service, which permission is required for the installation to proceed?

    <p>Administrator</p> Signup and view all the answers

    Which option would NOT be effective in fixing the print spooler service issue?

    <p>Reinstalling all printer drivers</p> Signup and view all the answers

    Which statement best describes the effect of keeping Wi-Fi enabled on battery life?

    <p>It has little impact compared to the screen backlight.</p> Signup and view all the answers

    What is the MOST likely reason a user working from home cannot print to a corporate laser printer?

    <p>Disconnected VPN</p> Signup and view all the answers

    What happens to the print spooler service when issues are identified?

    <p>It requires manual restart.</p> Signup and view all the answers

    Why might users from a different computer be unable to access a local file that has had NTFS permissions modified to allow read access to Everyone?

    <p>The NTFS permissions were not synchronized</p> Signup and view all the answers

    Which of the following might NOT be a viable solution if an application constantly crashes during use?

    <p>Changing user permissions</p> Signup and view all the answers

    If a workstation is experiencing prolonged boot times, which of the following actions could have the least impact on improving startup performance?

    <p>Replace the motherboard</p> Signup and view all the answers

    In the event of a printing issue, which of the following checks should be prioritized first?

    <p>Connectivity to the printer</p> Signup and view all the answers

    What is the term used to describe the action of following someone closely to gain unauthorized access through a secure door?

    <p>Tailgating</p> Signup and view all the answers

    Which utility would a Linux administrator use to modify configuration text files?

    <p>nano</p> Signup and view all the answers

    If a server in the DMZ is infected with malware that activates at system startup but is not part of an OS file, what type of malware is most likely present?

    <p>Boot sector virus</p> Signup and view all the answers

    When dealing with a frustrated user at a help desk, what is the best initial response?

    <p>Provide an estimate and follow-up time</p> Signup and view all the answers

    What action is typically related to someone trying to bypass security by closely following another person?

    <p>Tailgating</p> Signup and view all the answers

    What is the primary purpose of the 'df' command in Linux?

    <p>Display disk space usage</p> Signup and view all the answers

    Which malware type remains active with the system even if it is not a regular file on the OS?

    <p>Boot sector virus</p> Signup and view all the answers

    In an IT support scenario, what is the best way to address a user's unrelated repair request?

    <p>Make a note of the request but prioritize the current issue</p> Signup and view all the answers

    What should a technician use to prevent inhaling particles in a dusty environment?

    <p>Face mask</p> Signup and view all the answers

    What is the most likely reason a user cannot see any devices available for AirDrop?

    <p>Wi-Fi and Bluetooth are disabled</p> Signup and view all the answers

    Which item would be least relevant for a cleaning process outside of a computer?

    <p>ESD mat</p> Signup and view all the answers

    If a technician experiences a fire inside a computer case, they should do which of the following first?

    <p>Disconnect the power source</p> Signup and view all the answers

    What impact does enabling rotation lock have on a device's ability to use AirDrop?

    <p>It has no impact on AirDrop</p> Signup and view all the answers

    What is a potential consequence of low storage space on an iOS device regarding AirDrop functionality?

    <p>It does not prevent any AirDrop function</p> Signup and view all the answers

    In a cleaning scenario involving a server, which item is unnecessary?

    <p>Surge suppressor</p> Signup and view all the answers

    To successfully transfer files over AirDrop, which two technologies must be enabled on the device?

    <p>Wi-Fi and Bluetooth</p> Signup and view all the answers

    What type of fire extinguisher is most appropriate for electrical fires?

    <p>Carbon dioxide extinguisher</p> Signup and view all the answers

    Which of the following features is primarily designed for full disk encryption on Windows systems?

    <p>BitLocker</p> Signup and view all the answers

    Why should water-based extinguishers be avoided for electrical fires?

    <p>They can cause electrical conduction.</p> Signup and view all the answers

    What does EFS stand for in the context of Windows features?

    <p>Encrypted File System</p> Signup and view all the answers

    Which type of data is described as requiring retention for five years due to regulatory standards?

    <p>Customer names and addresses</p> Signup and view all the answers

    What is the main purpose of a Dry Powder extinguisher in fire safety?

    <p>Suppressing electrical fires and flammable liquids</p> Signup and view all the answers

    In what situation is it critical to disconnect the power source during a fire emergency?

    <p>As a safety precaution before extinguishing the fire</p> Signup and view all the answers

    Which of the following components is specifically effective for encrypting files at the file system level?

    <p>EFS</p> Signup and view all the answers

    Study Notes

    Performance-Based Questions

    • A1: A technician needs to analyze and repair damaged operating system files on a Windows computer using the command line. The specific command is sfc /scannow. This process takes time and details are in a log file.

    • A2: Arrange malware removal tasks in order: Identify symptoms, Quarantine infected systems, Disable System Restore, Schedule scans and run updates, Remediate, Educate the end user, Enable System Restore. Following order is crucial to prevent reinfection.

    • A3: Match technologies to descriptions:

      • EULA: The proper use of computers, tablets, and other devices is part of the employee handbook.
      • PII: A database includes client first names, last names, and home addresses.
      • GFS: A backup series consists of monthly, weekly, and daily backup data, a strategy for large amounts of data.
      • AUP: The proper use of computers, tablets, and other devices is part of the employee handbook (same as EULA).
    • A4: Access a file on a network share called \gate-room\ship-diagnostics using drive g: The command is net use g: \\gate-room\ship-diagnostics.

    • A5: Match commands to descriptions:

      • dir: List the contents of a Windows directory.
      • gpupdate: Apply Group Policy changes.
      • diskpart: List volume names on storage.
      • hostname: Identify the name of a database server.
      • chkdsk: Repair logical file system errors.
      • cd: Change to a different working directory.

    Multiple Choice Questions

    • A6: A technician is installing a new server. A tingling sensation during installation means equipment grounding should be tested first.
    • A7: A phone battery is draining quickly and warming up after connecting to a corporate network. Disabling Wi-Fi is the best solution for improving battery life.
    • A8: The error message "The print spooler service is not running" means the spooler service should be restarted. The spooler is a background service in Windows.
    • A9: The best security method for a laptop in a library is a cable lock.
    • A10: Rodney, a technician cleaning computer components, needs a face mask to prevent inhaling sawdust and wood chips.
    • A11: AirDrop of a document will fail if Wi-Fi and Bluetooth are disabled.
    • A12: A server fire should be extinguished with carbon dioxide extinguisher (not water).
    • A13: BitLocker encrypts all data on a storage drive in Windows.
    • A14: A company retaining customer data for five years involves PII (Personally Identifiable Information).
    • A15: For restoring data if a mobile device is lost or damaged, use remote backup.
    • A16: Disclaimers and usage requirements displayed during application login are called a splash screen or acceptable use policy.
    • A17: For modifying UAC (User Account Control) settings in Windows 10, go to User Accounts in the Control Panel.
    • A18: To mitigate voltage spikes in an office power system use a surge suppressor.
    • A19: 32-bit operating systems have a maximum RAM of 4 GB.
    • A20: Use Event Viewer to examine past occurrences of application crashes.
    • A21: Trying every combination of letters and numbers to discover a password, is a brute force attack.
    • A22: To return an email server to previous state after an upgrade failure, use a rollback plan.
    • A23: If the error message appears stating "The controller does not have enough resources for this device," after installing a USB webcam, move the webcam to a different USB interface.
    • A24: The MOST likely method for accessing large OS images on a network share is to map the folder to an available drive letter.
    • A25: To install a 64-bit Windows 10 upgrade, when there is not enough space, increase the free storage space to 32 GB.
    • A26: Rootkit is a type of malware running in the OS kernel.
    • A27: When an application won't start on Android tablets, power cycle the tablets is the best troubleshooting step.
    • A28: A Windows desktop taking fifteen minutes to load usually indicates slow profile load.
    • A29: Installing a 64-bit software on a 32-bit OS requires OS compatibility.
    • A30: A security guard noticing someone bypassing security by following another person is called tailgating.
    • A31: The Linux utility to edit configuration files is nano.
    • A32: If a server in the DMZ is infected without an infected file in the OS, that is most likely a boot sector virus.
    • A33: When a customer is upset, repeat understanding, offer an estimate and a follow-up time.
    • A34: After performing a factory reset on an Android phone showing ads, verify the source of each app is the most important step. 
    • A35: To configure WPA3 security on wireless access points, you use GCMP.
    • A36: Use multi-factor authentication (MFA) for added security when connecting to a corporate VPN.
    • A37: To troubleshoot a slow Windows 10 startup, use Task Manager.
    • A38: If replacing server memory, first disconnect all power sources.
    • A39: To safely remove data from a failed hard drive, use regular format.
    • A40: To access a folder named "logs" using the command line, use cd logs.
    • A41: To use eight bootable partitions, the GPT (GUID Partition Table) partition style is appropriate.
    • A42: When a Windows installation fails to recognize the drive controller, load third-party device drivers.

    • A43: When a computer is slow and files disappear, install anti-malware software.
    • A44: An Android phone upgrade will fail if the smartphone storage is nearly full.
    • A45: When a macOS hard drive fails, use Time Machine to restore data.
    • A46: A user may have installed a personal license, causing an automatically removal on a company computer.
    • A47: For upgrading files and applications when upgrading to Windows 11, a clean install is appropriate.
    • A48: If identifying a malware-infected computer, disconnect the network cable first.

    • A49: If a printer needs a hardware replacement, inform the user of the repair status and add a follow-up event.
    • A50: When upgrading from Windows 8.1 Enterprise to Windows 10, use Windows 10 Enterprise x64.
    • A51: To troubleshoot why an app keeps crashing, check the Event Viewer.
    • A52: To troubleshoot a slow boot, disable startup applications.
    • A53: To install an application that also installs a service on a Windows 10 computer, you need Administrator permission.
    • A54: When a user can't print from home to a corporate office, it's likely the user is disconnected from the VPN.
    • A55: If users can't access a network share with read access through Everyone, there are share permissions restrictions related to remote devices.
    • A56: To permanently remove data from a hard drive during disposal, use a shredder
    • A57: When multiple support tickets exist, contact the end-user to determine priority and urgency, triaging is unnecessary to make the decision.

    • A58: To deal with a false virus alert and remove restore points, the best solution is to update anti-virus signatures.

    • A59: For managing a network switch and firewall in a data center, use SSH.
    • A60: If a smartphone shows fake security warnings, a virus scan is the best first step.
    • A61: If a computer boots with a "missing operating system" error, modify the BIOS boot order to resolve incompatibility problems with USB boot devices .
    • A62: Randomly appearing ads might be caused by adware.
    • A63: Use .bat file extensions for Windows batch files when referring to a command like cd c:\source.
    • A64: Use the sfc (System File Checker) command to restore missing operating system files.
    • A65: To resolve copyright infringement on a company computer, the best next step is to securely remove and store the computer.

    • A66: Group Policy is best used to enforce a password complexity policy in Active Directory.

    • A67: A dollar sign ($) added to a shared network folder name makes it invisible to users browsing.

    • A68: The most likely reason a phone won't connect to a wireless network is an incorrect Wi-Fi password.
    • A69: Use an anti-static strap when upgrading a video adapter.

    • A70: To identify and track computer systems, use Asset tags.
    • A71: Hiding extensions for known file types may cause executable files to appear as spreadsheets, making it tricky to spot malware.
    • A72: To ensure high-end wireless security and user verification, use multi-factor authentication and WPA3.

    • A73: The final step in updating internet firewalls is end-user acceptance.  

    • A74: Employ gpupdate on a laptop to enforce a new password policy.
    • A75: Failing to disable System Restore before malware removal may lead to reinfection .
    • A76: UPS (Uninterruptible Power Supply) helps maintain server uptime during power failures.
    • A77: Implement full device encryption to keep tablet data safe during theft or loss.
    • A78: The best tool for seeing storage configuration is Disk Management.
    • A79: Check the Event Viewer if a laptop freezes during a presentation.
    • A80: For upgrading twenty systems to the latest Windows version, use remote network installation for efficiency.
    • A81: After removing malware, educate the end user on how to prevent future problems.
    • A82: Slow profile load is the most likely reason for a Windows desktop taking a long time to load.
    • A83: To resolve pop-up windows, restore the workstation from a known good backup.
    • A84: To address access issues from a business partner with a limited firewall, install the latest OS patches is the most important step.
    • A85: The command sudo gives Linux administrators elevated privileges for software upgrades.
    • A86: A laptop can be configured to remain active while the lid is closed via the Power Options settings in Windows.
    • A87: To allow all computers except a kiosk access to a wireless network, use MAC filtering to exclude the kiosk's MAC address.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Practice Exam A PDF

    Description

    Test your knowledge on maintaining computer systems and handling common issues. This quiz covers topics such as voltage spikes, RAM limits, and troubleshooting tools. It is designed for students and professionals looking to deepen their understanding of system management.

    More Like This

    Use Quizgecko on...
    Browser
    Browser