Term
|
Definition
| It manages hardware, runs applications, provides an interface for users, and stores, retrieves, and manipulates files. |
|
|
Term
| Using Aero Snap, what happens when you drag a window to the top of the Windows 7 desktop? |
|
Definition
|
|
Term
| How can you add a program icon to the Windows 7 taskbar so the program can quickly be launched at any time? |
|
Definition
| First locate the program in the Start menu. Then right-click the program and select Pin to Taskbar from the shortcut menu. |
|
|
Term
| What might happen to the Windows system if too many services are running, as indicated by multiple icons in the notification area of the taskbar? |
|
Definition
| The system might slow down and not perform well. |
|
|
Term
| What is the keyboard shortcut to the flip 3D view? |
|
Definition
|
|
Term
| What are the four libraries that Windows 7 creates by default? |
|
Definition
| Documents, Music, Pictures, and Videos libraries |
|
|
Term
| What part of a file name does Windows use to know which application to open to manage the file? |
|
Definition
|
|
Term
| What file extension is used to name a compressed folder? |
|
Definition
|
|
Term
| Which folder does Windows use to store files a user puts in the Documents library? |
|
Definition
|
|
Term
| Which Windows 7 edition(s) come only in a 32-bit version? |
|
Definition
| Windows 7 Starter and Windows 7 Home Basic |
|
|
Term
| What is the memory limitation for a 32-bit operating system? |
|
Definition
| The OS can address no more than 4GB of memory. |
|
|
Term
| How do you access the Properties box for a file to change a file attribute? |
|
Definition
| In Explorer, right-click the file and select Properties from the shortcut menu. |
|
|
Term
| What is the program name for the System Information utility? |
|
Definition
|
|
Term
| Which Windows 7 window can be used to get a report of the history of problems on a computer? |
|
Definition
|
|
Term
| When does a user need to enter a password into the UAC box in order to continue? |
|
Definition
| When the user is logged on as a standard user. |
|
|
Term
| What is the symbol or icon that represents an Apple product? What is the symbol or icon that represents Android? |
|
Definition
| The Apple icon is an apple with a bite out of it. Android icon is a robot. |
|
|
Term
| What are the last three releases of the Android OS in number and in name? |
|
Definition
| Gingerbread(ver 2.x), Honeycomb(ver 3.x), Ice Cream Sandwich(4.x) |
|
|
Term
| What company provides and oversees the Android marketplace? What is the website of this marketplace? |
|
Definition
| Google at play.google.com or google.com/play |
|
|
Term
| List three Apple devices that use the iOS. |
|
Definition
| iPhone, iPad and iPod touch |
|
|
Term
| Who is the sole distributor of apps for the iOS? |
|
Definition
|
|
Term
| What is one disadvantage to users when using an open-source operating system on a mobile device? |
|
Definition
| Answers can vary. One answer is apps might not be high quality or bug-free. |
|
|
Term
| Which mobile device OS supports an SD card and a USB port, iOS or Android? |
|
Definition
|
|
Term
| Which programming language is used to write most Android apps? Apple requires that iOS apps be written in one of which three programming languages? |
|
Definition
| Java. Objective-C, C, or C++ |
|
|
Term
| How can you configure a mobile device so it cannot connect to any network? |
|
Definition
|
|
Term
| Which type of network connection requires that two devices pair before the connection is completed? |
|
Definition
|
|
Term
| Which email protocol downloads email to be managed on the client machine? Manages email on the server? |
|
Definition
|
|
Term
| Which email protocol uses port 110? 143? 993? 995? |
|
Definition
| POP, IMAP, IMAP over SSL, POP over SSL |
|
|
Term
| Which security protocol is used to encrypt email? |
|
Definition
|
|
Term
| Which email server uses ActiveSync to sync all email, contacts, and calendar updates on the server and client machines, including mobile devices? |
|
Definition
|
|
Term
| What software must be installed on your computer before you can upgrade the version of iOS on your mobile device? |
|
Definition
|
|
Term
| What are the steps to configure an iPhone so it can be located if it is lost? |
|
Definition
| Tap Settings, iCloud, Find My iPhone |
|
|
Term
| How many failed logins on an iPad must happen before the device is locked? |
|
Definition
|
|
Term
| Which procedure is the least-intrusive solution to a problem with the iOS, to reset an iOS device or to restore an iOS device? |
|
Definition
|
|
Term
| When you attempt to set up an email account on an Android device using the automatic configuration feature and the setup fails, what do you do next? |
|
Definition
| Try to set it up manually by unchecking Automatically configure account |
|
|
Term
| List the steps to update the Android OS on a smart phone. |
|
Definition
| Open the Settings app, tap About phone and tap System updates |
|
|
Term
| What are the three methods you can use on an Android to lock the screen? Which method is the most secure? |
|
Definition
| Pattern, PIN, and Password lock. The pattern is the most secure. |
|
|
Term
| Which type of client-side virtualization creates a virtual environment in memory for an application to run on a client machine? |
|
Definition
| Application virtualization |
|
|
Term
| What Microsoft software can be used to create an application virtualization environment? |
|
Definition
| Microsoft Application Virtualization (App-V) |
|
|
Term
| List two types of hypervisors and describe their fundamental differences. |
|
Definition
| A Type 1 hypervisor installs before any OS installs. A Type 2 hypervisor installs as an application in an OS. |
|
|
Term
| What are the three main ways to secure a VM? |
|
Definition
| Use security features within the VM as you would for a physical machine, isolate the VM, protect the underlying files that are used to hold the VM. |
|
|
Term
| Which edition of Windows 7 comes only in a 32-bit version? |
|
Definition
|
|
Term
| What is the maximum amount of memory a 64-bit version of Windows 7 Home Premium can support? |
|
Definition
|
|
Term
| How much free space on the hard drive is required to install a 64-bit version of Windows 7? |
|
Definition
|
|
Term
| How do you start the process to reinstall an OS on a laptop computer using the backup files stored on a recovery partition? |
|
Definition
| Press a key combination at the beginning of the boot |
|
|
Term
| What are three free applications mentioned in the chapter that can be used to create virtual machines? |
|
Definition
| Windows Virtual PC, Oracle VirtualBox, and VMware Player |
|
|
Term
| When upgrading from Windows XP to Windows 7, can you perform an in-place upgrade of Windows 7? |
|
Definition
| No, you must perform a clean install |
|
|
Term
| What must be installed in Windows Vista before you can perform an in-place upgrade from Vista to Windows 7? |
|
Definition
| Service Pack 1 or a later service pack |
|
|
Term
| Which file system is used on the volume where Windows is installed? |
|
Definition
| Windows is installed on a NTFS volume |
|
|
Term
| What is the minimum number of partitions required on a hard drive that is to be set up as a dual boot with Windows 7 and Windows XP? |
|
Definition
|
|
Term
| Is the built-in administrator account in Windows 7 enabled or disabled by default? In Windows XP? |
|
Definition
| Disabled in Windows 7. Enabled in Windows XP |
|
|
Term
| Which gives better security, workgroup sharing or homegroup sharing? Why? |
|
Definition
| A workgroup gives better security because sharing is limited to individual users rather than to entire computers, which is done with homegroup sharing. |
|
|
Term
| Why will homegroup sharing not work on a network that has a mix of Windows XP, Vista, and 7 computers? |
|
Definition
| Because homegroup sharing is not supported by Windows Vista and XP |
|
|
Term
| During a Windows 7 installation, what network location should you choose when you intend to join the computer to a domain? When you intend to join a homegroup? |
|
Definition
| Work network, Home network |
|
|
Term
| What is the name of the domain controller database used by Windows Server 2011? |
|
Definition
|
|
Term
| If you suspect a PC is infected with a virus, why is it not a good idea to perform an upgrade installation of Windows rather than a clean install? |
|
Definition
| The virus might carry into the new installation |
|
|
Term
| After setting up a dual boot installation with Windows 7 and Vista, how do you boot the system into Vista? |
|
Definition
| Select the Vista operating system when the boot loader menu appears during startup |
|
|
Term
| What dialog box can you use to change the computer name after Windows 7 is installed? |
|
Definition
| The System Properties dialog box |
|
|
Term
| Is the Windows 7 setup disc a CD or DVD? Vista setup disc? XP setup disc? |
|
Definition
| Win 7 DVD, Vista DVD, and XP CD |
|
|
Term
| After a Windows installation, what is the easiest way to determine that you have Internet access? |
|
Definition
| Open Internet Explorer and browse to a Web site. |
|
|
Term
| How many days do you normally have after a Windows installation to activate the OS? |
|
Definition
|
|
Term
| What window in Windows 7 is used to solve connectivity problems on the network? |
|
Definition
| The Network and Sharing Center |
|
|
Term
| What Windows 7 tool can you use to migrate user data and settings from a Windows Vista installation on one computer to the new Windows 7 installation on a different computer? |
|
Definition
|
|
Term
| What is your primary Windows tool for managing hardware devices? |
|
Definition
|
|
Term
| What window is used to uninstall an application in Windows 7? |
|
Definition
| Programs and Features window |
|
|
Term
| Are you required to enter the product key during the Windows 7 installation? During the XP installation? |
|
Definition
|
|
Term
| Using an unattended installation of Windows, what is the name of the file that holds the responses a technician would normally give during the installation? |
|
Definition
|
|
Term
| What are the two commands used by the User State Migration tool? |
|
Definition
|
|
Term
| To use the User State Migration tool, how must a computer join the network? |
|
Definition
| Connect through a Windows domain |
|
|
Term
| Where is the PXE programming code stored that is used to boot a computer when it is searching for an OS on the network? |
|
Definition
| PXE is part of the BIOS which is stored on the motherboard |
|
|
Term
| Which boot device should be set as the first boot device in BIOS setup when a technician is configuring a computer to launch Windows PE on the deployment server? |
|
Definition
|
|
Term
| What are the three Window settings critical to securing a computer that need to be verified as part of regular maintenance? |
|
Definition
| Windows updates happen automatically, antivirus software is up to date and is protecting the system, and the network location is set correctly. |
|
|
Term
| What folder holds the Windows registry? What folder holds a backup of the registry? |
|
Definition
C:\Windows\system32\config
C:\Windows\system32\config\RegBack |
|
|
Term
| What folder holds 32-bit programs installed in a 64-bit installation of Windows? |
|
Definition
|
|
Term
| What file in the user account folder stores user settings? |
|
Definition
|
|
Term
| What is the purpose of the C:\Windows\CSC folder? |
|
Definition
| It holds offline files and folders maintained by Windows Offline Files |
|
|
Term
| What is the purpose of the Windows.old folder? |
|
Definition
| Created by Windows 7/Vista during the installation, it holds the previous installation of Windows |
|
|
Term
| How can you delete the Windows.old folder? |
|
Definition
| From the drive properties box, when you click Disk Cleanup |
|
|
Term
| By default, how often does Windows 7 automatically defrag a drive? |
|
Definition
|
|
Term
| What is another name for a file allocation unit, which is used to hold parts of a file on the hard drive? |
|
Definition
|
|
Term
| On what type of hard drive does Windows 7 disable defragmenting? |
|
Definition
|
|
Term
| What are two reasons to uninstall software you no longer use? |
|
Definition
| To free up space on the hard drive and to speed up Windows startup |
|
|
Term
| What is the filename and normal path of the Windows paging file used for virtual memory? |
|
Definition
|
|
Term
| What type of storage media must be used to create a Windows 7 system image? |
|
Definition
| An internal or external hard drive |
|
|
Term
| What two Windows utilities are used to create previous versions of files that can be recovered from the file properties dialog box? |
|
Definition
| Backup and Restore utility and System Protection utility |
|
|
Term
| Why is it important to not store a backup of drive C on to another partition on the same hard drive? |
|
Definition
| If the hard drive fails, both partitions will be lost |
|
|
Term
| What does Windows XP call a backup of the critical system files it needs for Windows operations? |
|
Definition
|
|
Term
| What is the %SystemRoot% folder as used in Microsoft documentation? |
|
Definition
| The folder in which Windows is installed, usually C:\Windows |
|
|
Term
| What Windows 7/Vista utility creates restore points? |
|
Definition
|
|
Term
| How can you delete all restore points? |
|
Definition
| Turn off System Protection |
|
|
Term
| In what folder are restore points kept? |
|
Definition
| C:\System Volume Information |
|
|
Term
| Which dialog box can you use to manually create a restore point? |
|
Definition
| The System Properties dialog box |
|
|
Term
| What is the difference between the file allocation table used by the exFAT file system and the one used by the FAT32 file system? |
|
Definition
| The exFAT file allocation table is 64 bits wide and the FAT32 file allocation table is 32 bits wide |
|
|
Term
| List the steps to open an elevated command prompt window. |
|
Definition
| Click Start, All Programs, Accessories, and right-click Command Prompt. Then select Run as administrator from the shortcut window. |
|
|
Term
| In a command line, what is the purpose of the ? in a filename? |
|
Definition
| It represents a single wildcard character. |
|
|
Term
| What is the purpose of the more parameter at the end of a command line? |
|
Definition
| To list information one screen at a time. |
|
|
Term
| What is the command to list all files and subdirectories in a directory? |
|
Definition
|
|
Term
| Using Windows 7 or Vista, what type of command prompt window is needed to run the Chkdsk command? |
|
Definition
| Elecated command prompt window |
|
|
Term
| When you want to use Chkdsk to fix file system errors and the drive is not locked, when does Windows schedule the Chkdsk command to run? |
|
Definition
| The next time Windows is started |
|
|
Term
| What command is intended to replace Xcopy? |
|
Definition
|
|
Term
| Which Windows tool can you use to split a partition into two partitions? |
|
Definition
|
|
Term
| Which is more stable, RAID implemented by Windows or RAID implemented by hardware? |
|
Definition
| Hardware RAID is more stable |
|
|
Term
| When you move a dynamic disk to a new computer, what status will Disk Management first assign the drive? |
|
Definition
|
|
Term
| Which editions of Windows 7 allow you to install a language pack by using Windows Update? |
|
Definition
| Windows 7 Ultimate and Windows 7 Enterprise |
|
|
Term
| List four ways to start Task Manager |
|
Definition
-CTRL+ALT+DEL -Right-click a blank area on the taskbar, and then select Start Task Manager on the shortcut menu -CTRL+SHIFT+ESC -Enter taskmgr.exe in the search box |
|
|
Term
| If a program is not responding, how can you stop it? |
|
Definition
| In Task Manager, select the process and click the End Task button |
|
|
Term
| If a necessary program is using too much of the system resources and bogging down other applications, what can you do to fix the problem? |
|
Definition
| Use Task Manager to lower the priority level of the program |
|
|
Term
| How can you view a list of users currently ogged onto the computer? |
|
Definition
| Use the Users tab on the Task Manager window |
|
|
Term
| What is the program filename and extension of the System Configuration? |
|
Definition
|
|
Term
| Which Windows 7 tool can be used to see a history of problems a computer has had since Windows was installed? |
|
Definition
|
|
Term
| What tool in Windows Vista, used to temporarily disable a startup program , is not available in Windows 7 or Windows XP? |
|
Definition
|
|
Term
| If a nonessential services is slowing down startup, how can you permanently disable it? |
|
Definition
| Use the Services console and set the startup type to Disabled |
|
|
Term
| What should be the startup type of a service that should not load at startup but might be used later after startup? What tool can you use to set a service's startup type? |
|
Definition
|
|
Term
| List three snap-ins that can be found in the Computer Management console that are used to manage hardware and track problems with hardware. |
|
Definition
| Event Viewer, Device Manager, and Disk Management |
|
|
Term
| What is the file extension of a console that is managed by Microsoft Management Console? |
|
Definition
|
|
Term
| Name the program file name and file extension for the Microsoft Management Console. |
|
Definition
|
|
Term
| Which log in Event Viewer would you use to find out about attempted logins to a computer? |
|
Definition
|
|
Term
| Which log in Event Viewer would you use if you suspect a problem with the hard drive? |
|
Definition
|
|
Term
| Which three Windows 7 tools are contained in the Vista Reliability and Performance Monitor? |
|
Definition
| Performance Monitor, Resource Monitor, and Reliability Monitor |
|
|
Term
| What is the path to the Ntuser.dat file in Windows 7? |
|
Definition
| C:\Users\username\Ntuser.dat |
|
|
Term
| How is the Ntuser.dat file used? |
|
Definition
| Holds the preferences and settings of a user |
|
|
Term
| Which registry key contains information that Device Manager uses to display information about hardware? |
|
Definition
|
|
Term
| Which Windows 7/Vista tool can give you a quick report of the overall performance of the system expressed as a single number? |
|
Definition
|
|
Term
| To improve Windows performance, you decide to disable the indexer used for Windows search. Will Windows search still work? |
|
Definition
|
|
Term
| What three indicators in Task Manager can be used to find which program has a memory leak? |
|
Definition
| Memory - Private Working Set, Handles, and Threads |
|
|
Term
| What key do you press at startup to load the system in Safe Mode? |
|
Definition
|
|
Term
| If performance improves when Windows is loaded in Safe Mode, what can you conclude? |
|
Definition
| The problem is caused by non-essential startup services or programs |
|
|
Term
| If performance does not improve when Windows is loaded in Safe Mode, what can you conclude? |
|
Definition
| The problem is caused by a hardware device, a critical driver, or a Windows component |
|
|
Term
| When using MSconfig to stop startup services including Microsoft services, which service should you not stop so that restore points will not be lost? |
|
Definition
|
|
Term
| In what folder does Task Scheduler keep scheduled tasks? |
|
Definition
| C:\Windows\System32\Tasks |
|
|
Term
| What are the two folders where, by default, Windows stores installed software? |
|
Definition
C:\Program Files
C:\Program Files (x86) |
|
|
Term
| What must you do first before you can delete the program folder containing software that is running in the background? |
|
Definition
| You must first stop the software |
|
|
Term
| What is the purpose of the Wow6432Node subkey in the Windows registry? |
|
Definition
| This key is used by 32-bit programs installed in a 64-bit OS |
|
|
Term
| What is the name of the window used to uninstall software in Windows 7/Vista? |
|
Definition
| Programs and Features window |
|
|
Term
| What are the six steps that you can use to solve any computer problem? |
|
Definition
1 - Interview the user and back up data 2 - Examine the system and form a theory of probable cause or your best guess 3 - Test your theory 4 - plan a solution and implement it 5 - Verify all works and take appropriate preventive measures 6 - Document what happened and the outcome |
|
|
Term
| Blue Screen errors happen when which type of processes encounter an error? |
|
Definition
| Processes running in kernel mode |
|
|
Term
| In what folder are the driver files stored? |
|
Definition
| C:\Windows\System32\drivers |
|
|
Term
| What is the command to use the Memory Diagnostics tool? |
|
Definition
|
|
Term
| What method can you use to test memory on a Windows XP system by using the Memory Diagnostics tool without having to install Windows 7 or Vista on the system? |
|
Definition
| Boot the system from the Windows 7/Vista DVD and click Windows Memory Diagnostics Tool under the System Recovery Options |
|
|
Term
| What is the command to use the System File Checker to immediately verify system files? To verify system files on the next restart? |
|
Definition
| sfc /scannow, sfc /scanonce |
|
|
Term
| How many bits does an x86-based operating system process at one time? |
|
Definition
|
|
Term
| What GUI tool can you use to stop a program that is hung? |
|
Definition
|
|
Term
| What command-line tool can you use to stop a program that is hung? |
|
Definition
|
|
Term
| How can you eliminate the possibility that an application error is caused by another application or service running in the background? |
|
Definition
| Run the application after starting the system in Safe Mode |
|
|
Term
| How does Windows know which application to use to open a file when you double-click the file in Windows Explorer? |
|
Definition
| Windows uses the file extension and associates a file extension to an application |
|
|
Term
| Which Windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file? |
|
Definition
|
|
Term
| Which two tools might a software developer or system administrator use to register a component of an application in the Windows registry? |
|
Definition
| Component Services (COM+) and Regsvr32 |
|
|
Term
| If an application works when the system is loaded in Safe Mode, but does not work when Windows is loaded normally, what can you assume? |
|
Definition
| The problem is not with the application but with the OS, device drivers, or other programs loaded at startup. |
|
|
Term
| When an application written for Windows XP does not work in Windows 7, which tool should you attempt to use first to solve the problem, Compatibility Mode or XP Mode? Why? |
|
Definition
| Compatibility Mode because it uses less system resources than XP Mode. |
|
|
Term
| What test does startup BIOS perform when you first turn on a computer to verify it can communicate with essential hardware devices? |
|
Definition
| POST (Power-On Self Test) |
|
|
Term
| Where is the partition table on a hard drive found? |
|
Definition
| In the first sector on the drive called the Master Boot Record (MBR) |
|
|
Term
| Is the BootMgr file stored in the boot partition or the system partition? |
|
Definition
|
|
Term
| Where is the master boot record (MBR) located? |
|
Definition
| First sector of the hard drive |
|
|
Term
| What is the name of the Windows 7 boot loader program? Where is the program located? |
|
Definition
| WinLoad.exe, C:\Windows\System32 |
|
|
Term
| What is the name of the Windows 7 kernel program? |
|
Definition
|
|
Term
| What is the name of the program that manages Windows logon? |
|
Definition
|
|
Term
| Which registry hive is loaded first during Windows startup? |
|
Definition
|
|
Term
| Where does Windows store device driver files? |
|
Definition
| C:\Windows\System32\Drivers |
|
|
Term
| During Windows 7 startup, how can you know when the Windows kernel has loaded successfully? |
|
Definition
| When the Windows 7 flag appears |
|
|
Term
| Blue screen errors happen when which type of processes encounter an error? |
|
Definition
| Processes running in kernel mode |
|
|
Term
| What method can you use to test memory on a Windows XP system by using the Windows 7 Memory Diagnostics tool without having to install Windows 7 on the system? |
|
Definition
| Boot the system from the Windows 7 DVD and use the Windows Memory Diagnostics Tool under the System Recovery Options |
|
|
Term
| What is the command to use the System File Checker to immediately verify system files? To verify system files on the next restart? |
|
Definition
| sfc /scannow, sfc /scanonce |
|
|
Term
| Which key do you press to launch the Advanced Boot Options window during Windows startup? |
|
Definition
|
|
Term
| A blue screen error halts the system while it is booting, and the booting starts over in an endless loop of restarts. How can you solve this problem using the Advanced Boot Options screen? |
|
Definition
| Press F8 at startup and select Disable automatic restart on system failure on the Advanced Boot Options menu. |
|
|
Term
| What can you assume about the Windows 7 startup when you see the Windows 7 flag on-screen? |
|
Definition
| The Windows graphics subsystem is running and the kernel has successfully loaded |
|
|
Term
| When is the Windows startup process completed? |
|
Definition
| The Windows startup is officially completed when the Windows desktop appears and the wait circle disappears. |
|
|
Term
| At what point in Windows startup are the settings that are called the Last Known Good Configuration saved? |
|
Definition
| When the user logs onto Windows. |
|
|
Term
| What command in Windows RE can you use to rebuild the BCD file? |
|
Definition
|
|
Term
| What command in Windows RE gives you the opportunity to manage partitions and volumes installed on the system? |
|
Definition
|
|
Term
| Which log in Event Viewer only tracks errors and warnings? |
|
Definition
| The Administrative Events log |
|
|
Term
| If you are having a problem with a driver, which of the following is the least invasive solution: update the driver or use System Restore? |
|
Definition
|
|
Term
| What are the three stages of the Windows 7/Vista startup process? |
|
Definition
| Before the progress bar appears, after the progress bar appears and before logon, after logon |
|
|
Term
| What is the name of the log file and its location that created when you enabled boot logging from the Advanced Boot Options startup menu? |
|
Definition
|
|
Term
| What information is contained in the C:\Windows\System32\LogFiles\SRT\SRTTrail.txt file? |
|
Definition
| The file contains a list of items examined and actions taken by the Startup Repair process |
|
|
Term
| How many bits are in a MAC address? |
|
Definition
|
|
Term
| How many bits are in an IPv4 IP address? In an IPv6 address? |
|
Definition
|
|
Term
| How does a client application identify a server application on another computer on the network? |
|
Definition
|
|
Term
| What are the IP addresses called that begin with 10, 172.16, or 192.168? |
|
Definition
|
|
Term
| In what class is the IP address 185.75.255.10? |
|
Definition
|
|
Term
| In what class is the IP address 193.200.30.5? |
|
Definition
|
|
Term
| Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet? |
|
Definition
| Public IP addresses are licensed authorized to use the Internet. Private IP addresses are not authorized or licensed to use the Internet. A computer with a private IP address uses a NAT router to access the Internet. |
|
|
Term
| Why is it unlikely that you will find the IP address 192.168.250.10 on the internet? |
|
Definition
| IP addresses that begin with 192.168 are private IP addresses |
|
|
Term
| If no DHCP server is available when a computer configured for dynamic IP addressing connects to the network, what type of IP address is assigned to the computer? |
|
Definition
| Automatic Private IP Address (APIPA) |
|
|
Term
| If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address? |
|
Definition
| The IP address was automatically assigned by Windows when it failed to lease an address from the DHCP server. The computer received an APIPA IP address |
|
|
Term
| What are the last 64 bits of a IPv6 IP address called? How are these bits used? |
|
Definition
| The Interface ID which is used to uniquely identify the network connection on the local link. |
|
|
Term
| Name at least three tunneling protocols that are used for IPv6 packets to travel over an IPv4 network. |
|
Definition
|
|
Term
| How is an IPv6 IP address used that begins with 2000::? That begins with FE80::? |
|
Definition
| IP addresses that begin with 2000:: are global addresses used on the Internet. Addresses that begin with FE80:: are link local addresses used on a private network. |
|
|
Term
| How many bits are in the Subnet ID block? What are the values of these bits for a link-local IP address? |
|
Definition
| The Subnet ID block contains 16 bits. The value of these bits for a link-local address are 0000 0000 0000 0000. |
|
|
Term
| Which type of IPv6 address is used to create multiple sites within a large organization? |
|
Definition
|
|
Term
| What type of server serves up IP addresses to computer on a network? |
|
Definition
|
|
Term
| Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? |
|
Definition
|
|
Term
| At what port does an SMTP email server listen to receive email from a client computer? |
|
Definition
|
|
Term
| Which protocol does a web server use when transmissions are encrypted for security? |
|
Definition
| HTTPS uses either HTTP together with SSL or TLS encryption protocols |
|
|
Term
| What type of server resolves fully qualified domain names to IP addresses? |
|
Definition
|
|
Term
| Which email protocol allows a client application to manage email stored on an email server? |
|
Definition
|
|
Term
| What type of protocol is used to present a public IP address to computers outside the LAN to handle requests to use the Internet from computers inside the LAN? |
|
Definition
|
|
Term
| Which protocol is used when an application queries a database on a corporate network such as a database of printers? |
|
Definition
|
|
Term
| What type of encryption protocol does Secure FTP (SFTP_ use to secure FTP transmissions? |
|
Definition
|
|
Term
| What two Windows applications use the RDP protocol and port 3389? |
|
Definition
| Remote Desktop and Remote Assistance |
|
|
Term
| Which version of 802.11 technologies can use two antennas at both the access point and the network adapter? |
|
Definition
|
|
Term
| Which wireless encryption standard is stronger, WEP or WPA? |
|
Definition
|
|
Term
| When securing a Wi-Fi wireless network, which is considered better security: to filter MAC addresses, use encryption, or not broadcast the SSID? |
|
Definition
|
|
Term
| Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)? |
|
Definition
|
|
Term
| Which editions of Windows can be used to serve up Remote Desktop? |
|
Definition
| Business, Professional, Ultimate, and Enterprise editions |
|
|
Term
| What is the listening port for Remote Desktop? |
|
Definition
|
|
Term
| Explain the difference when a user sees http:// in a browser address box and when the user sees https:// in the address box. |
|
Definition
| HTTPS indicates the data passed from the user to the website will be encrypted. HTTP data is not encrypted |
|
|
Term
| Which has more rights, a standard account or a guest account? |
|
Definition
|
|
Term
| What folder in Windows 7/Vista is intended to be used for folders and files that all users share? |
|
Definition
|
|
Term
| When using the Control Panel in Windows 7, what two types of user accounts can be created? |
|
Definition
| Administrator and standard accounts |
|
|
Term
| Which Windows console is used to create a new user group? |
|
Definition
| Computer Management console |
|
|
Term
| Why doesn't the Properties box for a file have a Sharing tab? |
|
Definition
| Share permissions do not apply to files |
|
|
Term
| When you view the Properties box for a folder, why might the Security tab be missing? |
|
Definition
| Because the folder's volume is not NTFS |
|
|
Term
| What is the term Windows XP uses to describe sharing files in a way that gives no control over which users have access to a shared file? |
|
Definition
|
|
Term
| What type of permission does a folder receive from its parent folder? |
|
Definition
|
|
Term
| What type of permissions must be used for a folder on a FAT volume? |
|
Definition
|
|
Term
| If a folder has 10 subfolders, what is the easiest way to change the permissions for all 10 folders? |
|
Definition
| Change the permissions of the parent folder |
|
|
Term
| If you are having a problem changing the permissions of a folder that was created by another user, what can you do to help solve the problem? |
|
Definition
| Take ownership of the folder |
|
|
Term
| A shared folder whose name ends with a $ is called a(n) _____. |
|
Definition
|
|
Term
| What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin? |
|
Definition
|
|
Term
| What is the full command line to use ipconfig to release the current IP address? |
|
Definition
|
|
Term
| What is the full command line for the loopback address test command? |
|
Definition
|
|
Term
| What command can tell you if two computers on the same network have the same computer name? |
|
Definition
|
|
Term
| What command lists the shared resources on a remote computer on the network? |
|
Definition
|
|
Term
| Which type of net command can be used to map a network drive? |
|
Definition
|
|
Term
| Which command tests for connectivity between two computers? |
|
Definition
|
|
Term
| Which command is used to find the host name of a computer when you know its IP address? |
|
Definition
|
|
Term
| Which command can give you the hop count from your computer to another? |
|
Definition
|
|
Term
| What parameter can be added to the netstat command so that you can see what programs are using a network connection? |
|
Definition
|
|
Term
| What TCP/IP utility would you use to display the route taken over the Internet by a communication between a web browser and web server? |
|
Definition
|
|
Term
| What utility would you use to display information about the name space kept by a DNS server for a particular domain name? |
|
Definition
|
|
Term
| How can you physically tell if a network card is not working? |
|
Definition
| Check the status indicator lights |
|
|
Term
| To know if Windows recognizes a NIC without errors, which tool do you use? |
|
Definition
|
|
Term
| List the steps to recycle the connection to an ISP when using a cable modem and router. |
|
Definition
1 - Unplug the cable modem, DSL modem, or other device that you use to connect to your ISP. Unplug the router 2 - Plug in the cable modem, DSL mode, or other ISP device. Wait until the lights settle. Then plug in your router. 3 - On any PC on your network, repair the network connection. Open your browser and try to browse some websites. |
|
|
Term
| Why is it more secure to require a user press Ctrl+Alt+Delete to log on rather than displaying the Windows Welcome screen? |
|
Definition
| Because malware can sometimes fake the Windows Welcome screen to trick a user into giving his Windows password |
|
|
Term
| Which window in Control Panel is used to require a Windows password to wake up a sleeping computer? |
|
Definition
|
|
Term
| Which two tools can be used to reset a Windows password for another user when using Windows 7 Home Premium? |
|
Definition
| The netplwiz utility and the Change Password window in Control Panel |
|
|
Term
| Why is PINE963$&apple not a strong password? |
|
Definition
| Because it contains real words |
|
|
Term
| Which link in the Windows Firewall window allows you to add a port to the list of exceptions allowed through the firewall? |
|
Definition
|
|
Term
| Which polocy in Group Policy must be enabled before you can monitor failed attempts at logging onto a Windows system? |
|
Definition
|
|
Term
| What hardware component is needed to set up BitLocker Encryption so that you can authenticate the computer? |
|
Definition
| A TPM chip on the motherboard |
|
|
Term
| What Windows utility can you use to change the name of the built-in Administrator account? |
|
Definition
|
|
Term
| What type of employee badge does not have to be swiped by a card reader to allow the employee through a door? |
|
Definition
|
|
Term
| Which type of biometric data is considered the most secure? |
|
Definition
|
|
Term
| Which is better to destroy sensitive data on a hard drive, a low-level format, drill, or degausser? |
|
Definition
|
|
Term
| What tool is best to use when destroying data on an SSD drive? Where can you get this tool? |
|
Definition
| ATA Secure Erase utility provided by the drive manufacturer |
|
|
Term
| What device can be installed on a laptop to prevent shoulder surfing? |
|
Definition
|
|
Term
| Define and explain the differences between a virus, worm, and Trojan. |
|
Definition
| A virus is a program that can replicate by attaching itself to another program. A worm can spread copies of itself throughout a network without a host program. A Trojan, like a worm, does not need a host program to work; it substitutes itself for, and pretends to be, a legitimate program. |
|
|
Term
| What are the two best ways to protect a computer or network against worms? |
|
Definition
| Use a firewall and run AV software |
|
|
Term
| What is the best way to determine if an email message warning about a virus is a hoax? |
|
Definition
| Check websites that track virus hoaxes |
|
|
Term
| What is the first thing you should do when you discover a computer is infected with malware? |
|
Definition
| Quarantine the computer so it will not infect other computers on the network |
|
|
Term
| What does AV software look for to determine that a program or a process is a virus? |
|
Definition
|
|
Term
| Which antispyware software is embedded in Windows 7? |
|
Definition
|
|
Term
| Why is it helpful to run AV software in Safe Mode? |
|
Definition
| Because malware is less likely to be running in the background to prevent AF software from running or detecting the malware |
|
|
Term
| What registry key keeps information about services that run when a computer is booted into Safe Mode? |
|
Definition
| HKLM\System\CurrentControlSet\Control\SafeBoot |
|
|
Term
| What folder is used by Windows to hold restore points? |
|
Definition
| System Volume Information folder |
|
|
Term
| What must you do to allow AV software to scan and delete malware it might find in the data storage area where restore points are kept? |
|
Definition
| Turn off System Protection |
|
|
Term
| What is the best tool to use to find out the purpose of a program that is running on your system? |
|
Definition
| The web, especially the Microsoft websites |
|
|
Term
| What software can you use to fidplay a process tree that shows how processes relate, yielding more information than given by Task Manager? |
|
Definition
| Process Explorer at technet.microsoft.com |
|
|