Windows Versions and Features Review (PDF)

Summary

This document is an assessment covering Windows versions, features, and operating systems. The document includes a variety of questions and answers on topics such as Windows editions, memory management, and macOS features.

Full Transcript

Assessment: Windows versions and features Which of the following is true about 64-bit support in Windows? Choose the best response. A. 32-bit support was removed beginning with Windows 11. B. 64-bit support was first introduced in Windows 7. C. Windows 10 workstation comes in both 32...

Assessment: Windows versions and features Which of the following is true about 64-bit support in Windows? Choose the best response. A. 32-bit support was removed beginning with Windows 11. B. 64-bit support was first introduced in Windows 7. C. Windows 10 workstation comes in both 32-bit and 64-bit editions. D. Home editions are 32-bit, while professional editions are 64-bit. A, C Copyright © 2022 30 Bird Media LLC Assessment: Windows versions and features At most, how much memory can the 32- bit versions of Windows address? Choose the best response. A. 2 GB B. 4 GB C. 16 GB D. 32 GB B Copyright © 2022 30 Bird Media LLC Assessment: Windows versions and features Which features are offered in Windows 10 Pro for Workstation edition? Select all that apply. A. BitLocker B. BranchCache C. Domain access D. Group Policy Editor A, C, D Copyright © 2022 30 Bird Media LLC Assessment: Windows versions and features Which Windows versions included Live tiles in the Start menu? Select all that apply. A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10 E. Windows 11 B, C, D Copyright © 2022 30 Bird Media LLC Assessment: Windows versions and features What is the name of the web browser in Windows 10 and 11? A. Internet Explorer B. Chrome C. Edge D. Safari E. Windows 11 C Copyright © 2022 30 Bird Media LLC Assessment: Non-windows operating systems In which macOS X version was the Siri digital assistant introduced? Choose the best response. A. 10.7 Lion B. 10.11 El Capitan C. 10.12 Sierra D. 10.14 Mojave C Copyright © 2022 30 Bird Media LLC Assessment: Non-windows operating systems Which macOS feature stores and manages passwords for applications, websites, and network shares? Choose the best response. A. Finder B. iCloud C. Keychain D. Mission Control C Copyright © 2022 30 Bird Media LLC Assessment: Non-windows operating systems Which of the following is true about Linux? Choose all that apply. A. It can be distributed both commercially and non-commercially B. It is only distributed non-commercially C. It is used only for desktops and servers D. It is used on mobile and embedded devices as well as desktops and servers E. It usually only has a command-line interface A, D Copyright © 2022 30 Bird Media LLC Assessment: Non-windows operating systems Which Linux command would you use to show the directory you're currently in (the working directory)? Choose the best response. A. cd B. ls C. mw D. pwd D Copyright © 2022 30 Bird Media LLC Assessment: Non-windows operating systems What advantages does an embedded operating system have over a workstation operating system? Choose all that apply. A. Better for connecting to remote computers B. Broader compatibility with user-installed applications C. Can run on less powerful hardware D. Easier to support E. More built-in services C, D Copyright © 2022 30 Bird Media LLC Assessment: Operating system installation and upgrades You have a computer with Windows 7 on it. You need to upgrade it to Windows 10 and deploy it to a new employee. Which is the best upgrade type for this situation? Choose the best response. A. Clean installation B. In-place upgrade C. Either, depending on the user account type D. Either, depending on whether you're booting locally or from the network A Copyright © 2022 30 Bird Media LLC Assessment: Operating system installation and upgrades Which of the following boot methods can be used to install macOS from a network location? Choose the best response. A. Netexe B. Netboot C. PXE D. USB device E. Pxeboot B Copyright © 2022 30 Bird Media LLC Assessment: Operating system installation and upgrades Which installation type can be used for identical operating system installations to multiple computers? Choose the best response. A. Clean B. Multiboot C. Remote network D. Image deployment E. Unattended D Copyright © 2022 30 Bird Media LLC Assessment: Operating system installation and upgrades Master boot record partitions can't support hard disks that are larger than what size? Choose the best response. A. 2 MB B. 2 GB C. 2 TB D. 2 PB C Copyright © 2022 30 Bird Media LLC Assessment: Operating system installation and upgrades Which file system is used for iPadOS? Choose the best response. A. FAT B. NTFS C. APFS D. HFS E. ext4 C Copyright © 2022 30 Bird Media LLC Assessment: Applications and scripting You want to install an application on a computer that has no internet connection, but the software is only available as an internet download. You hope you can download it to a USB flash drive from another computer, then put it on the target system. What kind of installer would this NOT work for? Choose the best response. A. Online installer B. Portable app C. Source code D. Standalone installer A Copyright © 2022 30 Bird Media LLC Assessment: Applications and scripting What type of software can you modify and redistribute freely? Choose the best response. A. Commercial license software B. Open source software C. Any software D. No software B Copyright © 2022 30 Bird Media LLC Assessment: Applications and scripting Which of the following governs software ownership rights and what the purchaser (the end user) may do with what he or she has purchased? Choose the best response. A. DRM B. EULA C. EOL D. TPM B Copyright © 2022 30 Bird Media LLC Assessment: Applications and scripting Match the script file formats with their scripting environments..bat Microsoft Visual Basic.vbs.js Unix shell.sh.ps1 Python interpreter.py.py Windows PowerShell.ps1.sh Windows Command prompt.bat.vbs JavaScript.js Copyright © 2022 30 Bird Media LLC Assessment: Applications and scripting You're not really familiar with this scripting language, but one variable was defined as a "string" data type. What does that mean? Choose the best response. A. It can be any whole number. B. It can be any fractional number. C. It can be any combination of alphanumeric characters. D. It is an ordered set of values, rather than one single value. E. It is defined by the operating system or scripting language, rather than by the script itself. C Copyright © 2022 30 Bird Media LLC Assessment: Applications and scripting You see a # character in a.sh script. What can you guess about the text immediately following it? Choose the best response. A. It defines a variable. B. It is a comment. C. It is a conditional statement. D. It is part of a loop. B Copyright © 2022 30 Bird Media LLC Assessment: Operating system features and tools Which Windows utility do you use to access system tools such as Event Viewer and Device Manager? Choose the best response. A. Component Services B. Disk Management C. Microsoft Management Console D. Windows Services C Copyright © 2022 30 Bird Media LLC Assessment: Operating system features and tools Which administrative tool can you use to check your computer’s health or troubleshoot problems with the operating system or software? Choose the best response. A. Component Services B. Disk Management C. Event Viewer D. Performance Monitor C Copyright © 2022 30 Bird Media LLC Assessment: Operating system features and tools Which system utility can you use to troubleshoot a computer that’s slow to start by enabling or disabling startup programs? Choose the best response. A. Disk Management B.DXDIAG C.MSCONFIG D.SERVICES MSC C Copyright © 2022 30 Bird Media LLC Assessment: Operating system features and tools If you have an application that is not responding and you want to force it to shut down, which system utility can you use? Choose the best response. A. Disk Management B.MSCONFIG C. Services D. Task Manager D Copyright © 2022 30 Bird Media LLC Assessment: Operating system features and tools Which switch is used with the FORMAT command to create the label DATA to show up in Windows Explorer? Choose the best response. A./FS B./N C./Q D./V D Copyright © 2022 30 Bird Media LLC Assessment: Control Panel and Settings Which Control Panel utility would you use to troubleshoot a printer issue? Choose the best response. A. Hardware and Sound > Device Manager B. Hardware and Sound >Devices and Printers C. Printers and Devices D. Programs and Features B Copyright © 2022 30 Bird Media LLC Assessment: Control Panel and Settings You would like to set your user’s Edge home page to your company’s local intranet. How would you use to accomplish this? Choose the best response. A. Control Panel > Network and Internet > Internet Options B. Windows Settings > Network and Internet > Internet Options C. Edge Settings > Start, home, and new tabs D. Windows Settings > Network and Sharing > Browser Properties C Copyright © 2022 30 Bird Media LLC Assessment: Control Panel and Settings Which utility is no longer in the Control Panel in Windows 10? Choose the best response. A. Devices and Printers B. Display C. Power options D. System B Copyright © 2022 30 Bird Media LLC Assessment: Control Panel and Settings When configuring laptop power options, what happens when you close the lid is the same as what happens when you press the power button. True or false? A. True B. False B Copyright © 2022 30 Bird Media LLC Assessment: Control Panel and Settings Which tasks can you easily access from the System utility? Select all that apply. A. Allow or deny remote access B. Change the computer name C. Create user accounts D. Uninstall applications E. Restore Defaults for File Explorer AB Copyright © 2022 30 Bird Media LLC Assessment: Command-line tools If you want to copy a subfolder and its contents from one location to another, which file management command would you use? Choose the best response. A.copy B.md C.move D.xcopy D Copyright © 2022 30 Bird Media LLC Assessment: Command-line tools To get help with a particular command’s syntax and parameters/options, simply type the command /?. True or false. A. True B. False A Copyright © 2022 30 Bird Media LLC Assessment: Command-line tools Which disk management command would you use to check your hard disk for corrupt files and repair them? Choose the best response. A.bootrec B.diskpart C.chkdsk D.sfc D Copyright © 2022 30 Bird Media LLC Assessment: Command-line tools Which command can you use to repair a local Windows system image with one or more damaged files in Windows 10? Choose the best response. A. sfc B. chkdsk C. gpupdate D. chkimg E. dism E Copyright © 2022 30 Bird Media LLC Assessment: Command-line tools What command will change a Linux Terminal session to administrator privileges? Choose the best response. A.admin B.cls C.su D.sudo C Copyright © 2022 30 Bird Media LLC Assessment: Operating system troubleshooting When troubleshooting failure to boot and “missing operating system” error messages, which steps would you take? Choose all that apply. A. Verify in the BIOS/UEFI that the computer is booting to hard disk or device with a system partition. B. Boot to safe mode, if possible. Use Event Viewer to attempt to isolate the problem. Use Device Manager to investigate and repair problems with devices and drivers. C. Boot to the Windows Recovery Environment and use REGEDIT or REGEDT32 to restore the Registry from backup. If you can’t use Win RE, use the command prompt. D. Use MSCONFIG to choose different types of startups to help isolate which files or services might be causing startup problems. A and D Copyright © 2022 30 Bird Media LLC Assessment: Operating system troubleshooting Which system utility would you use to repair the computer if it continues to improperly shutdown after a reboot? Choose the best response. A. Device Manager B. REGEDIT C. REGSRV32 D. System File Checker D Copyright © 2022 30 Bird Media LLC Assessment: Operating system troubleshooting Which can cause a kernel panic error to occur on a Macintosh computer? Choose the best response. A. Application error B. Hardware or software failure C. Insufficient memory D. Slow processor B Copyright © 2022 30 Bird Media LLC Assessment: Operating system troubleshooting GRUB is the boot loader in newer Linux systems. True or false? A. True B. False A Copyright © 2022 30 Bird Media LLC Assessment: Operating system troubleshooting Specify the order of the Windows 10 boot process. 1. UEFI starts. 2. Ntoskrnl.exe loads all the necessary operating system processes. 3. The login screen displays. 4. Boot Manager reads the Boot Configuration Data file and presents a list of options to choose from. 5. Winload.exe loads the hardware abstraction layer, the Registry, and boot device drivers into memory. 14523 Copyright © 2022 30 Bird Media LLC Assessment: Network shares You're setting up a small office LAN that uses Windows 10 computers, and you want individual users to independently share individual folders and printers. What kind of sharing model should you use? Choose the best reply. A. Domain B. Homegroup C. Private D. Workgroup D Copyright © 2022 30 Bird Media LLC Assessment: Network shares What network locations have network discovery enabled by default? Choose all that apply. A. Domain B. Home C. Private D. Public E. Work A, B, and C Copyright © 2022 30 Bird Media LLC Assessment: Network shares What can you manage with the net command? Choose all correct answers. A. Network print jobs B. Network security settings C. Network shares D. Windows services E. Wireless network connections A, C, and D Copyright © 2022 30 Bird Media LLC Assessment: Network shares Your office has enabled workgroup sharing of files and printers, and for security reasons password-protected file sharing will remain on. What rules will you need to keep in mind when supporting user problems? Choose all that apply. A. Once a folder is shared, it's uploaded to a central file servers. B. To access network resources, you must know a user name and password for the specific host computer. C. To access network resources, you must know a shared password. D. You can only access folders if the computer which originally shared them is powered on and connected to the network. E. Your user name and password are good across the entire workgroup. B and D Copyright © 2022 30 Bird Media LLC Assessment: Network shares Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't work as well for travelling employees in locations with unreliable or no internet access. What steps could remote users take to keep access to important folders on the road? Choose the best response. A. Change the network location to Work B. Configure a homegroup C. Designate those folders as offline files D. Map the shared folders as a network drive C Copyright © 2022 30 Bird Media LLC Assessment: Network connections Users from your office want to connect to the workplace LAN through their existing home internet connections. What kind of connection would allow them to do it? Choose the best response. A. Dial-up B. PPPoE C. VLAN D. VPN D Copyright © 2022 30 Bird Media LLC Assessment: Network connections Your company doesn’t use Internet Explorer anymore. Why should you still know how to configure its browser options? Choose the best response. A. To configure dialup connections B. To configure proxy settings C. To manually connect to wireless networks D. To use Remote Assistance B Copyright © 2022 30 Bird Media LLC Assessment: Network connections Which window would show you bindings for “Local Area Connection 2”? A. Ethernet Properties B. Local Area Connection 2 Properties C. Local Area Connection 2 Status D. Network Connections B Copyright © 2022 30 Bird Media LLC Assessment: Network connections Which is true when configuring a static IPv4 address for a Windows workstation? Select all that apply. A. You can still use DHCP configuration for IPv6. B. You can use DHCP to configure a DNS server automatically. C. You must also configure a valid default gateway. D. You must manually configure a DNS server. E. Your IPv6 address must also be manually configured. A, C, and D Copyright © 2022 30 Bird Media LLC Assessment: Network connections Which Windows editions can receive incoming Remote Desktop connections? Select all that apply. A. Windows 10 Home B. Windows 10 Pro C. Windows 8.1 D. Windows 11 E. Windows 11 Pro for Workstation B and E Copyright © 2022 30 Bird Media LLC Assessment: Connection troubleshooting Which network tools are found in Windows but not typically in Unix-like operating systems? Select all that apply. A. ifconfig B. ipconfig C. nbtstat D. ping E. traceroute F. tracert B, C, and F Copyright © 2022 30 Bird Media LLC Assessment: Connection troubleshooting You can’t ping any other hosts, even on the local subnet. What should you check next? Choose the best response. A. Application settings B. DNS server C. IP address settings D. MTU settings C Copyright © 2022 30 Bird Media LLC Assessment: Connection troubleshooting You can connect to the internet, but not to local network shares. What should you check first? A. DNS settings B. IP address settings C. Network location D. Windows Firewall C Copyright © 2022 30 Bird Media LLC Assessment: Connection troubleshooting On your laptop, you can see a couple of hotspots, but not the one you want to connect to. What can you try to fix it? Select all that apply. A. Double-check the encryption standard being used. B. Make sure the adapter is turned on. C. Move the laptop closer to the WAP. D. Set the network to connect without SSID broadcast. C and D Copyright © 2022 30 Bird Media LLC Assessment: Connection troubleshooting You are troubleshooting a network connection on a Windows 10 computer. This Network icon is displayed in the taskbar. What does it indicate? A. The computer is using an Ethernet connection that is successfully connected to the internet. B. The computer is using an Ethernet connection that is not connected to the internet. C. No network adapters are detected or enabled. D. No Wi-Fi adapters are detected or enabled. E. A wireless adapter is recognized, but no Wi-Fi networks are found and the computer is not connected to Wi-Fi. C Copyright © 2022 30 Bird Media LLC Assessment: Threats and vulnerabilities Which types of attacks are thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters? Select all that apply. A. Brute force B. Dictionary C. Malware D. Man-in-the-middle E. Zero-day A and B Copyright © 2022 30 Bird Media LLC Assessment: Threats and vulnerabilities As a user, what can you do to protect yourself from man-in-the-middle attacks? A. Avoid connecting to open Wi-Fi routers. B. Avoid following links in emails when possible. C. Enable Firewall protection. D. Install only the application software you need. E. Use complex passwords that are combinations of upper and lower case letters, numbers, and special characters. A Copyright © 2022 30 Bird Media LLC Assessment: Threats and vulnerabilities You receive an email about a new feature for an online service you use, and click the link for more information. Just before you sign into your account you notice the URL is wrong: it’s actually a different site made to imitate the one you belong to. What attack were you targeted by? Choose the best response. A. DoS B. Evil twin C. Phishing D. Spoofing C Copyright © 2022 30 Bird Media LLC Assessment: Threats and vulnerabilities The Chief Financial Officer for a company received an email from the CEO asking them to carry out a fund transfer. Just before transferring the funds, the CFO notices that the email address for the CEO is using.co instead of.com. What type of attack was the CFO targeted by? Choose the best response. A. Spoofing B. Whaling C. Evil twin D. Piggybacking B Copyright © 2022 30 Bird Media LLC Assessment: Threats and vulnerabilities Which type of attack uses a web form to send malicious requests to a database? Choose the best response. A. Trojan horse B. Cross-site scripting C. SQL injections D. On-path attack C Copyright © 2022 30 Bird Media LLC Assessment: Security controls You require your users to log on using a username, password, and rolling 6-digit code sent to a keyfob device. They are then allowed computer, network, and email access. What type of authentication have you implemented? Select all that apply. A. Access control lists B. Basic single-factor authentication C. Principle of least privilege D. Single sign-on E. Multi-factor authentication D and E Copyright © 2022 30 Bird Media LLC Assessment: Security controls ACLs are based on which assumption? Choose the best response. A. Explicit Allow B. Explicit Deny C. Implicit Allow D. Implicit Deny D Copyright © 2022 30 Bird Media LLC Assessment: Security controls Right after you install an endpoint security suite it scans your computer and generates a database it can later use to detect any alterations to critical system files. What cryptographic method is it most likely using? Choose the best response. A. Asymmetric encryption B. Certificates C. Hashing D. Symmetric encryption C Copyright © 2022 30 Bird Media LLC Assessment: Security controls Which user group has different default permissions depending on which Windows version you're using? Choose the best response. A. Administrators B. Guests C. Power Users D. Standard Users C Copyright © 2022 30 Bird Media LLC Assessment: Security controls The door to your floor's server room has an electronic lock; anyone on the approved list can swipe their ID badge to get in. After a temp worker got in with a “borrowed” badge, management wants to tighten security. What added feature would prevent that from happening again? Choose the best response. A. Biometric lock B. Entry control roster C. Keyfob D. Access control vestibule A Copyright © 2022 30 Bird Media LLC Assessment: Operating system security You share a folder on your computer and assign the following permissions: 1. Share permission "Change" to the Everyone group. 2. NTFS permission "Read" to the Accounting user group. 3. NTFS permission "Full Control" to Tamara, who is a member of the Accounting group. When Tamara connects to the shared folder, what are her effective permissions? Choose the best response. A. Read B. Read & Execute C. Change D. Full Control C Copyright © 2022 30 Bird Media LLC Assessment: Operating system security You have a folder called Accounting with a dozen subfolders, each of which will have its own custom access restrictions. To start, you broke permissions inheritance so you can configure them individually, but you want to give the Accounting user group Modify access to both the Accounting folder and all of its subfolders. What is the quickest way to make that change? Choose the best answer. A. It is not possible to make the change at the parent Accounting folder and have it automatically apply the change down to the subfolders. You must make the change at each folder individually. B. Make the change to the Accounting folder, re-enable inheritance on the Accounting folder, and then apply the settings from the parent folder to the child folders. C. Make the change to the Accounting folder, then propagate that change from the parent folder to the child folders. D. Select all folders in File Explorer, open the Properties window, and apply the permissions you want. C Copyright © 2022 30 Bird Media LLC Assessment: Operating system security What password policies can you enforce from the Local Security Policy Console? Select all that apply. A. Account lockout settings B. BIOS/UEFI password C. Minimum password length D. Password complexity E. Screen saver password protection A, C, and D Copyright © 2022 30 Bird Media LLC Assessment: Operating system security In an Active Directory environment, what order does Windows process GPOs in? A. Child OU GPO B. Site GPO C. Organizational Unit GPO D. Domain GPO E. Local GPO 5, 2, 4, 3, 1 Copyright © 2022 30 Bird Media LLC Assessment: Operating system security Why would you set a minimum password age in the GPO? Choose the best response. A. To keep users from choosing simple passwords B. To keep users from bypassing history requirements C. To prevent attackers from easily cracking passwords D. To make sure users change their passwords regularly B Copyright © 2022 30 Bird Media LLC Assessment: Security hardware and software You want to prevent unauthorized traffic from entering your network by disabling unused ports on your firewall. The best way to accomplish this is to go down the port list and close each one you aren't using. True or false? A. True B. False B Copyright © 2022 30 Bird Media LLC Assessment: Security hardware and software Which set of Windows Defender Firewall rules is generally least permissive? A. Incoming connections on private networks B. Incoming connections on public networks C. Outgoing connections on private networks D. Outgoing connections on public networks Copyright © 2022 30 Bird Media LLC Assessment: Security hardware and software Which of the following describes a network scenario where a secure connection to your internal network is made over an insecure external network? A. Data loss prevention (DLP) B. Digital security C. Hardware firewall D. Virtual private network (VPN) D Copyright © 2022 30 Bird Media LLC Assessment: Security hardware and software Your wireless network is configured in 802.1X mode. What kind of server does it most likely use as a backend? Choose the best response. A. KERBEROS B. RADIUS C. TACACS+ D. TKIP B Copyright © 2022 30 Bird Media LLC Assessment: Security hardware and software You want to replace the network firewall, IDS, and content filter with a single device which will provide comprehensive network security protection. What sort of product should you look for? Choose the best response. A. DLP B. Endpoint security suite C. TACACS+ D. UTM D Copyright © 2022 30 Bird Media LLC Assessment: Workstation security Which are characteristics of EFS? Select all that apply. A. Encrypts entire drives, including removable drives. B. Encrypts files based on user account, which provides security for an individual's files on a multiuser computer. C. Requires administrative-level privileges to turn encryption on and off. D. Doesn't require any special hardware. B and D Copyright © 2022 30 Bird Media LLC Assessment: Workstation security Which Windows encryption feature can you use to encrypt files on your USB drive? Choose the best response. A. BitLocker B. BitLocker-To-Go C. EFS D. EFS-To-Go B Copyright © 2022 30 Bird Media LLC Assessment: Workstation security Low account lockout thresholds are __________. Choose the best response. A. Less secure, and less trouble for users B. Less secure, but more trouble for users C. More secure, but less trouble for users D. More secure and more trouble for users Copyright © 2022 30 Bird Media LLC Assessment: Workstation security Which of the following are signs of an adware infection in your browser? Select all that apply. A. Constant and unavoidable popup ads B. Fast-loading web pages C. Redirection to an unfamiliar home page D. Redirection to an unfamiliar search engine A, C, and D Copyright © 2022 30 Bird Media LLC Assessment: Workstation security Which of the following are true about the Windows Hello feature in Windows 10/11? Select all that apply. A. It is a more secure way to sign-in for local Windows accounts. B. It is a more secure way to sign-in for Microsoft accounts. C. It uses a PIN, facial recognition, or fingerprint during the sign-in to Windows. D. Setting up a PIN is required for Windows Hello. E. A PIN is not required if you are setting up fingerprint or facial recognition sign-ins. B, C, and D Copyright © 2022 30 Bird Media LLC Assessment: Mobile device security What mobile operating system includes pattern lock in a default installation? Choose the best answer. A. Android B. iOS C. Windows Phone D. All three A Copyright © 2022 30 Bird Media LLC Assessment: Mobile device security Both iOS and Android include a built-in feature to find and secure a lost device. True or false? A. True B. False A Copyright © 2022 30 Bird Media LLC Assessment: Mobile device security What are important security steps on all mobile devices? Select all that apply. A. Configuring antivirus software B. Configuring remote backup features C. Installing a firewall app D. Regularly applying operating system updates E. Using biometric authentication B and D Copyright © 2022 30 Bird Media LLC Assessment: Mobile device security What kind of policy governs a user- owned device on the corporate network? Choose the best response. A. Acceptable Use B. BYOD C. MDM D. Offboarding B Copyright © 2022 30 Bird Media LLC Assessment: Mobile device security What kind of policy governs removal of sensitive data and credentials when a user device is no longer used for company business? Choose the best response. A. Asset tracking B. Offboarding C. Onboarding D. Storage segmentation B Copyright © 2022 30 Bird Media LLC Assessment: Network security Defense in depth is a good idea for any network, but not all layers are equally important on every network. True or false? A. True B. False A Copyright © 2022 30 Bird Media LLC Assessment: Network security You’ve set a Wi-Fi password, but you’d like some extra protection against unauthorized clients connecting to the network. What feature should you enable? Choose the best response. A. Content filtering B. DHCP server C. MAC filtering D. Port forwarding C Copyright © 2022 30 Bird Media LLC Assessment: Network security You’ve just installed a router fresh out of the box. Which configuration changes should you make to improve its default security? Select all that apply. A. Change the default user name and password B. Close unnecessary ports and services C. Configure QoS D. Disable remote administration E. Enable UPnP A, B, and D Copyright © 2022 30 Bird Media LLC Assessment: Network security Your WAP uses WPA3-AES and WPS. SSID is disabled. Which change should you make to increase security? Choose the best answer. A. Disable WPA B. Disable WPS C. Enable SSID D. Enable TKIP B Copyright © 2022 30 Bird Media LLC Assessment: Network security Which of the following are the best practices for dealing with IoT devices on a network? Select all that apply. A. Allow IoT devices to initiate unnecessary network connections that their programs specify. B. Use network segmentation to keep IoT devices and the systems that control them separated from other traffic. C. Allow IoT networking technologies to bridge gaps in the enterprise network. D. Deploy IoT devices with consistent standards that allow you to monitor and manage them with unified tools and policies B and D Copyright © 2022 30 Bird Media LLC Assessment: Security troubleshooting What is the name of the built-in antivirus with Windows 10/11? Choose the best response. A. Internet Security Antivirus B. Windows Defender Antivirus C. Edge Antivirus D. Windows Security Antivirus B Copyright © 2022 30 Bird Media LLC Assessment: Security troubleshooting Order the steps of the malware removal process in Windows. A. Identify symptoms B. Repair the system C. Educate the end user D. Enable System Restore E. Update the system F. Disable System Restore G. Quarantine the system A, G, F, B, E, D, C Copyright © 2022 30 Bird Media LLC Assessment: Security troubleshooting When quarantining a system, you should consider disconnecting from the network entirely. True or false? A. True B. False A Copyright © 2022 30 Bird Media LLC Assessment: Security troubleshooting Disabling System Restore also deletes existing restore points. True or false? A. True B. False A Copyright © 2022 30 Bird Media LLC Assessment: Security troubleshooting On scanning a system, you’ve recognized a spyware program that inserted a malicious service into Windows startup. Apart from a malware scanner, what tool could disable the program? Choose the best reply. A. Event Viewer B. MSCONFIG C. Recovery Console D. WinPE B Copyright © 2022 30 Bird Media LLC Assessment: IT Operations What is most likely to be part of an AUP? Choose the best response. A. How often employee evaluations should be conducted B. What to do when a workstation shows signs of malware infection C. Whether you can access streaming music services from your workstation D. Who is in charge of a critical database C Copyright © 2022 30 Bird Media LLC Assessment: IT Operations Order the steps of the change management process. A. Preparation B. Change request C. Identification D. Follow up E. Implementation F. Approval CBFAED Copyright © 2022 30 Bird Media LLC Assessment: IT Operations Your company’s network topology diagrams aren’t very detailed so you’re helping to improve them. The new set will have separate physical and logical diagrams. Which of the following should you make sure to put in the logical diagrams? Select all that apply. A. Ethernet cable standards B. IP subnets C. Patch panel port mappings D. VLAN trunk links E. WAP serial numbers B and D Copyright © 2022 30 Bird Media LLC Assessment: IT Operations Your organization uses a ticketing system. You just finished resolving ah issue that generated multiple tickets. What is the next logical step? Choose the best response. A. Mark the original ticket as resolved and delete all the additional tickets B. Delete all of the tickets related to the issue C. Mark the issue as resolved so all the tickets are automatically closed D. Mark the issue as resolved and manually update all of the tickets C Copyright © 2022 30 Bird Media LLC Assessment: IT Operations Which of the following ticketing system features can you implement to help properly identify a problem or issue so support agents can prioritize and route tickets to the most relevant team or agent? Select all that apply. A. Using multi-channel support B. Tagging C. Adding a knowledge base D. Creating multiple escalation levels E. Creating ticket categories B and E Copyright © 2022 30 Bird Media LLC Assessment: Incident response A few years ago, a disgruntled employee at your organization caused a major data breach by sabotaging network security systems. Even worse, there were several errors in the incident response process. One of the most serious meant that the activity logs proving the employee’s involvement were ruled inadmissible in court. Which of the following errors was the biggest contributor to that ruling? Choose the best response. A. Confusion in the reporting process meant the incident was escalated to the wrong department and law enforcement was not quickly informed. B. First responders initially identified the sabotage as a software bug. C. The activity logs were stored unattended, in an easily editable format. D. The incident report didn’t clearly state the policies which were being violated. C Copyright © 2022 30 Bird Media LLC Assessment: Incident response Which of the following is not true about writing an incident summary report? A. It isn’t the appropriate place to point out shortcomings the response process. B. It should contain a detailed list of actions taken during the response process. C. It should list any remaining vulnerabilities or steps that could be taken to prevent recurrence. D. It should list exactly which policies were violated by involved parties. A Copyright © 2022 30 Bird Media LLC Assessment: Incident response In which stage of the incident response process should you begin documenting your actions? Choose the best response. A. Identifying the incident B. Preserving systems and data C. Reporting the incident D. Writing an incident report A Copyright © 2022 30 Bird Media LLC Assessment: Backup and recovery In terms of time, how does a differential backup plan generally differ from an incremental backup plan? A. It's quicker both to create backups and to restore data B. It's quicker to create backups, but slower to restore data C. It's slower to create backups, but quicker to restore data D. It's slower both to create backups and to restore data C Copyright © 2022 30 Bird Media LLC Assessment: Backup and recovery While most of the Windows 10 computers at your workplace use Pro or Enterprise editions, some use Windows 10 Home. You want to use a standard backup method for all of them. What built-in utilities can you use? Choose the best response. A. Backup and Restore B. File History C. Either, depending on your specific needs D. Neither; you will need a third-party utility C Copyright © 2022 30 Bird Media LLC Assessment: Backup and recovery For years, the network administrator at your company performed off-site backups by putting a set of tapes in his home safe every weekend. Now that he's retired, his replacement is evaluating cloud backups instead. What drawbacks is this likely this have? Choose all that apply. A. Incompatibility with conventional archival formats and software B. Increased network bandwidth C. More labor intensive D. More vulnerability to natural disaster E. Potential regulatory violations B, E Copyright © 2022 30 Bird Media LLC Assessment: Backup and recovery Your personal workstation has a variety of applications with additional plugins and custom configuration options. Even if you only use those applications occasionally, it would take a long time to configure them on a new computer. What kind of backup would save you that time on restoring from a hard drive failure? Choose the best response. A. Application-aware B. Continuous C. File D. Image D Copyright © 2022 30 Bird Media LLC Assessment: Backup and recovery You are using backup tapes that are big enough to perform a week’s worth of full and incremental backups for your server, you want to cycle through eight tapes in a first-in, first- out (FIFO) rotation. How many weeks of daily backups does this allow you to keep? Choose the best response. A. 5 weeks B. 6 weeks C. 8 weeks D. 10 weeks C Copyright © 2022 30 Bird Media LLC Assessment: Safety Which safety device is used to protect sensitive components from electrostatic discharge during transport and storage? Choose the best response. A. Antistatic bags B. ESD straps C. ESD mats D. Self-grounding A Copyright © 2022 30 Bird Media LLC Assessment: Safety Which class of fire extinguishers is used on electrical fires? Choose the best response. A. Class A B. Class B C. Class C D. Class D C Copyright © 2022 30 Bird Media LLC Assessment: Safety Which items can cause soil and water contamination if they are sent to a landfill? Select all that apply. A. Batteries B. CRTs C. Magnetic tapes D. Toner cartridges A and B are correct Copyright © 2022 30 Bird Media LLC Assessment: Environmental factors Humidity above which percentage can cause condensation, potentially destroying electronic equipment? A. 10-20% B. 20-25% C. 25-45% D. 50-60% D Copyright © 2022 30 Bird Media LLC Assessment: Environmental factors Which of the following describes a long- term drop in voltage, typically lasting longer than just a few minutes? A. Blackout B. Brownout C. Grayout D. Surge suppression E. Power surge B Copyright © 2022 30 Bird Media LLC Assessment: Environmental factors To clean accumulated debris from around and inside equipment, such as computer cases, you must use a special vacuum meant specifically for electronics. True or false? A. True B. False False Copyright © 2022 30 Bird Media LLC Assessment: Environmental factors Your coworker has splashed isopropyl alcohol he is using to clean a computer in his eye. Which section of the isopropyl alcohol SDS would you want to refer to immediately? A. Section 2: Hazard(s) Identification B. Section 4: First-Aid Measures C. Section 8: Exposure Controls D. Section 11: Toxicological Information B Copyright © 2022 30 Bird Media LLC Assessment: Environmental factors You're installing a CPU and CPU fan when you accidently drop the thermal grease container and get some on the floor. What should you do? A. Call 911. B. Refer to the SDS for the thermal grease on proper clean-up methods. C. Report the incident to your immediate supervisor. D. Wipe it up immediately with a water dampened cloth. B Copyright © 2022 30 Bird Media LLC Assessment: Professionalism Which of the following are appropriate addresses for a customer? Choose all that apply. A. Buddy B. Dr. Smith C. Jimmy D. Ms. Jenkins E. Dude B, D Copyright © 2022 30 Bird Media LLC Assessment: Professionalism An end user has reported a system problem and you're trying to figure out its cause. Which of the following pieces of advice would be a mistake? Choose the best response. A. Allow the customer to explain the problem fully at first, only asking questions for clarification. B. Always use detailed technical language when asking for clarifying information. C. Speak clearly, with an even tone, and loud enough to be heard. D. While listening to the customer's description, take notes and nod without interrupting. B Copyright © 2022 30 Bird Media LLC Assessment: Professionalism Personally identifiable information includes which of the following? Select all that apply. A. Address B. Name C. Names of co-workers D. Phone number E. Ticket number A, B, C, and D Copyright © 2022 30 Bird Media LLC Assessment: Professionalism You were just hired as an IT support technician and will often need to work under desks. The organization has a business casual dress code. It’s acceptable to show up in jeans and sneakers. True or false? A. True B. False B Copyright © 2022 30 Bird Media LLC

Use Quizgecko on...
Browser
Browser