Podcast
Questions and Answers
Which tabs of the Internet Options utility in Control Panel would you use to set the home page and enable the pop-up blocker?
Which tabs of the Internet Options utility in Control Panel would you use to set the home page and enable the pop-up blocker?
Where can you quickly look in the OS to see if there is a problem with the onboard NIC driver?
Where can you quickly look in the OS to see if there is a problem with the onboard NIC driver?
How can you set a Windows 10 PC to show the time and date for a specific location?
How can you set a Windows 10 PC to show the time and date for a specific location?
Where can you enable voice activation for as many applications as possible in Windows 10?
Where can you enable voice activation for as many applications as possible in Windows 10?
Signup and view all the answers
What is the shortcut key to open the Task Manager in Windows?
What is the shortcut key to open the Task Manager in Windows?
Signup and view all the answers
Which utility in Control Panel is used to configure Internet connections on a Windows workstation?
Which utility in Control Panel is used to configure Internet connections on a Windows workstation?
Signup and view all the answers
What tool can be used to identify the application causing a problem?
What tool can be used to identify the application causing a problem?
Signup and view all the answers
Where can the CEO configure settings to restrict microphone access for certain apps?
Where can the CEO configure settings to restrict microphone access for certain apps?
Signup and view all the answers
What is the appropriate subnet mask for a computer with IP address 200.100.1.10 and network number 200.100.0.0?
What is the appropriate subnet mask for a computer with IP address 200.100.1.10 and network number 200.100.0.0?
Signup and view all the answers
Where will a Windows client computer get its IP address and subnet mask from if it's on a network with a DHCP and DNS server?
Where will a Windows client computer get its IP address and subnet mask from if it's on a network with a DHCP and DNS server?
Signup and view all the answers
What is not a required setting to configure when setting up a static IP of 110.110.1.5 for a server?
What is not a required setting to configure when setting up a static IP of 110.110.1.5 for a server?
Signup and view all the answers
What tool can be used to view and manage running applications on a Windows computer?
What tool can be used to view and manage running applications on a Windows computer?
Signup and view all the answers
What utility is used to configure the laptop's power settings to turn off the display after a certain period of inactivity?
What utility is used to configure the laptop's power settings to turn off the display after a certain period of inactivity?
Signup and view all the answers
How do you navigate to the D: drive from the C:\window\system32 directory in the Command Prompt?
How do you navigate to the D: drive from the C:\window\system32 directory in the Command Prompt?
Signup and view all the answers
Which of the following Windows 10 editions support up to four CPU sockets?
Which of the following Windows 10 editions support up to four CPU sockets?
Signup and view all the answers
What is a limitation of installing an operating system on a workstation with a 32-bit processor?
What is a limitation of installing an operating system on a workstation with a 32-bit processor?
Signup and view all the answers
What is the architecture of the Windows 10 operating system being installed on a friend's computer?
What is the architecture of the Windows 10 operating system being installed on a friend's computer?
Signup and view all the answers
What is the minimum number of CPU sockets required for a Windows 10 Pro for Workstations installation?
What is the minimum number of CPU sockets required for a Windows 10 Pro for Workstations installation?
Signup and view all the answers
What is a characteristic of managed Apple IDs?
What is a characteristic of managed Apple IDs?
Signup and view all the answers
What type of authentication is the accounting department using?
What type of authentication is the accounting department using?
Signup and view all the answers
Which filesystem is optimized for flash drives?
Which filesystem is optimized for flash drives?
Signup and view all the answers
What is the correct command to rename a file in Linux?
What is the correct command to rename a file in Linux?
Signup and view all the answers
Which software package allows Linux, Windows, and other operating systems to share files and resources across a network?
Which software package allows Linux, Windows, and other operating systems to share files and resources across a network?
Signup and view all the answers
Which Control Panel utility displays information about the system's hardware, including the amount of RAM and processor type?
Which Control Panel utility displays information about the system's hardware, including the amount of RAM and processor type?
Signup and view all the answers
What type of token can be used as an alternative to a key fob for multifactor authentication?
What type of token can be used as an alternative to a key fob for multifactor authentication?
Signup and view all the answers
What wireless protocol is used in WPA to compensate for the weak encryption of WEP?
What wireless protocol is used in WPA to compensate for the weak encryption of WEP?
Signup and view all the answers
Which Active Directory concept can be used to enforce security settings on a group of computers?
Which Active Directory concept can be used to enforce security settings on a group of computers?
Signup and view all the answers
What is the purpose of the RADIUS protocol?
What is the purpose of the RADIUS protocol?
Signup and view all the answers
What is the name of the Active Directory function that locks out a user after a specified number of bad login attempts?
What is the name of the Active Directory function that locks out a user after a specified number of bad login attempts?
Signup and view all the answers
What is the purpose of an Organizational Unit in Active Directory?
What is the purpose of an Organizational Unit in Active Directory?
Signup and view all the answers
Study Notes
Management Tools
- Performance Monitor is used to identify the application causing a problem.
- Device Manager is used to check for problems with the onboard Network Interface Card (NIC) driver.
- Computer Management is not used to identify the application causing a problem.
Privacy Settings
- Windows 10 PC microphone settings can be configured in Windows Settings, under Privacy, then Microphone.
Networking
- The subnet mask for an IP address 200.100.1.10 with a network number 200.100.0.0 is 255.255.0.0.
- A Windows client computer on a network with a DHCP and DNS server will automatically get its IP address and subnet mask from the DHCP server.
- A static IP address of 110.110.1.5 requires configuration of the default gateway, but not the DNS server.
Authentication
- Two-factor authentication involves using a username and password, then inserting a fob into a USB port.
- An external hardware token is used in two-factor authentication.
- Managed Apple IDs are created by a company for its employees, and an IT administrator can remove or update the account.
File Systems
- exFAT is optimized for flash drives.
Linux
- The command to rename a file named "docs" to "newdocs" is mv docs newdocs.
- Samba allows Linux, Windows, and other operating system platforms to use shared files, shared printers, and other resources across a network or the Internet.
System Information
- The System utility in Control Panel is used to view information about the processor and RAM.
Internet Options
- The General and Security tabs of the Internet Options utility in Control Panel are used to set the home page and enable the pop-up blocker.
Network Connection
- Device Manager is used to check for problems with the onboard NIC driver.
Time Zone
- The time and date for a specific location can be set in Windows Settings, under Time & Language, then Date & time, and selecting Set time automatically.
Accessibility
- Voice activation for many applications can be enabled in Windows Settings, under Accessibility.
Power Options
- Power Options is used to configure settings for when the laptop is on battery power or plugged in.
Command Prompt
- The command to navigate to drive D: is cd D:.
Windows 10 Editions
- Pro and Pro for Workstations support up to four CPU sockets.
Operating System Installation
- A 32-bit processor can only install a 32-bit operating system.
Multifactor Authentication
- A software token can be used for multifactor authentication.
Wireless Protocols
- TKIP is used in WPA to compensate for the weak encryption of WEP.
- AES is used in WPA2 and is more secure than TKIP.
Active Directory
- Group Policy is used to enforce security settings.
- Organizational unit is a directory subdivision within which may be placed users, groups, computers, and other objects.
- RADIUS is used to authenticate remote users to a dial-in access server.
Authentication Encryption Protocols
- TACACS+ is an older protocol developed by Cisco but became an open protocol in the 1990s.
- AES is used in WPA2 and is more secure than TKIP.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of configuring internet connections and troubleshooting network issues on a Windows workstation. Learn how to set the home page and enable the pop-up blocker, and troubleshoot common network problems.