Operating System Configuration and Troubleshooting
30 Questions
6 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which tabs of the Internet Options utility in Control Panel would you use to set the home page and enable the pop-up blocker?

  • Security, Privacy
  • Connections, Security
  • General, Security
  • General, Privacy (correct)
  • Where can you quickly look in the OS to see if there is a problem with the onboard NIC driver?

  • Device Manager (correct)
  • Ease of Access
  • File Explorer Options
  • Programs and Features
  • How can you set a Windows 10 PC to show the time and date for a specific location?

  • In Control Panel, choose Date and Time, then select Set Time Zone Automatically
  • In Windows Settings, choose Date And Time, then select Synchronize Your Clock
  • In Windows Settings, choose Time & Language, then choose Date & time, and select Set time automatically and Set time zone automatically (correct)
  • In Windows Settings, choose Time & Language, then Date & time, and select Set time automatically
  • Where can you enable voice activation for as many applications as possible in Windows 10?

    <p>Windows Settings, Accessibility</p> Signup and view all the answers

    What is the shortcut key to open the Task Manager in Windows?

    <p>Ctrl+Shift+Esc</p> Signup and view all the answers

    Which utility in Control Panel is used to configure Internet connections on a Windows workstation?

    <p>Internet Options</p> Signup and view all the answers

    What tool can be used to identify the application causing a problem?

    <p>Performance Monitor</p> Signup and view all the answers

    Where can the CEO configure settings to restrict microphone access for certain apps?

    <p>Windows Settings, Privacy</p> Signup and view all the answers

    What is the appropriate subnet mask for a computer with IP address 200.100.1.10 and network number 200.100.0.0?

    <p>255.255.0.0</p> Signup and view all the answers

    Where will a Windows client computer get its IP address and subnet mask from if it's on a network with a DHCP and DNS server?

    <p>DHCP server</p> Signup and view all the answers

    What is not a required setting to configure when setting up a static IP of 110.110.1.5 for a server?

    <p>Computer name</p> Signup and view all the answers

    What tool can be used to view and manage running applications on a Windows computer?

    <p>Task Manager</p> Signup and view all the answers

    What utility is used to configure the laptop's power settings to turn off the display after a certain period of inactivity?

    <p>Power Options</p> Signup and view all the answers

    How do you navigate to the D: drive from the C:\window\system32 directory in the Command Prompt?

    <p>cd D:\</p> Signup and view all the answers

    Which of the following Windows 10 editions support up to four CPU sockets?

    <p>Pro for Workstations and Enterprise</p> Signup and view all the answers

    What is a limitation of installing an operating system on a workstation with a 32-bit processor?

    <p>You can only install a 32-bit operating system.</p> Signup and view all the answers

    What is the architecture of the Windows 10 operating system being installed on a friend's computer?

    <p>64-bit</p> Signup and view all the answers

    What is the minimum number of CPU sockets required for a Windows 10 Pro for Workstations installation?

    <p>One</p> Signup and view all the answers

    What is a characteristic of managed Apple IDs?

    <p>They are created by a company for its employees</p> Signup and view all the answers

    What type of authentication is the accounting department using?

    <p>Two-factor authentication</p> Signup and view all the answers

    Which filesystem is optimized for flash drives?

    <p>exFAT</p> Signup and view all the answers

    What is the correct command to rename a file in Linux?

    <p>mv docs newdocs</p> Signup and view all the answers

    Which software package allows Linux, Windows, and other operating systems to share files and resources across a network?

    <p>Samba</p> Signup and view all the answers

    Which Control Panel utility displays information about the system's hardware, including the amount of RAM and processor type?

    <p>System</p> Signup and view all the answers

    What type of token can be used as an alternative to a key fob for multifactor authentication?

    <p>Software token</p> Signup and view all the answers

    What wireless protocol is used in WPA to compensate for the weak encryption of WEP?

    <p>TKIP</p> Signup and view all the answers

    Which Active Directory concept can be used to enforce security settings on a group of computers?

    <p>Group Policy</p> Signup and view all the answers

    What is the purpose of the RADIUS protocol?

    <p>To authenticate remote users to a dial-in access server</p> Signup and view all the answers

    What is the name of the Active Directory function that locks out a user after a specified number of bad login attempts?

    <p>Failed login attempts restrictions</p> Signup and view all the answers

    What is the purpose of an Organizational Unit in Active Directory?

    <p>To create a directory subdivision</p> Signup and view all the answers

    Study Notes

    Management Tools

    • Performance Monitor is used to identify the application causing a problem.
    • Device Manager is used to check for problems with the onboard Network Interface Card (NIC) driver.
    • Computer Management is not used to identify the application causing a problem.

    Privacy Settings

    • Windows 10 PC microphone settings can be configured in Windows Settings, under Privacy, then Microphone.

    Networking

    • The subnet mask for an IP address 200.100.1.10 with a network number 200.100.0.0 is 255.255.0.0.
    • A Windows client computer on a network with a DHCP and DNS server will automatically get its IP address and subnet mask from the DHCP server.
    • A static IP address of 110.110.1.5 requires configuration of the default gateway, but not the DNS server.

    Authentication

    • Two-factor authentication involves using a username and password, then inserting a fob into a USB port.
    • An external hardware token is used in two-factor authentication.
    • Managed Apple IDs are created by a company for its employees, and an IT administrator can remove or update the account.

    File Systems

    • exFAT is optimized for flash drives.

    Linux

    • The command to rename a file named "docs" to "newdocs" is mv docs newdocs.
    • Samba allows Linux, Windows, and other operating system platforms to use shared files, shared printers, and other resources across a network or the Internet.

    System Information

    • The System utility in Control Panel is used to view information about the processor and RAM.

    Internet Options

    • The General and Security tabs of the Internet Options utility in Control Panel are used to set the home page and enable the pop-up blocker.

    Network Connection

    • Device Manager is used to check for problems with the onboard NIC driver.

    Time Zone

    • The time and date for a specific location can be set in Windows Settings, under Time & Language, then Date & time, and selecting Set time automatically.

    Accessibility

    • Voice activation for many applications can be enabled in Windows Settings, under Accessibility.

    Power Options

    • Power Options is used to configure settings for when the laptop is on battery power or plugged in.

    Command Prompt

    • The command to navigate to drive D: is cd D:.

    Windows 10 Editions

    • Pro and Pro for Workstations support up to four CPU sockets.

    Operating System Installation

    • A 32-bit processor can only install a 32-bit operating system.

    Multifactor Authentication

    • A software token can be used for multifactor authentication.

    Wireless Protocols

    • TKIP is used in WPA to compensate for the weak encryption of WEP.
    • AES is used in WPA2 and is more secure than TKIP.

    Active Directory

    • Group Policy is used to enforce security settings.
    • Organizational unit is a directory subdivision within which may be placed users, groups, computers, and other objects.
    • RADIUS is used to authenticate remote users to a dial-in access server.

    Authentication Encryption Protocols

    • TACACS+ is an older protocol developed by Cisco but became an open protocol in the 1990s.
    • AES is used in WPA2 and is more secure than TKIP.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of configuring internet connections and troubleshooting network issues on a Windows workstation. Learn how to set the home page and enable the pop-up blocker, and troubleshoot common network problems.

    More Like This

    Use Quizgecko on...
    Browser
    Browser