click below
click below
Normal Size Small Size show me how
ITC 191
Week 8 (8.08, 9.01 -9.03)
| Question | Answer |
|---|---|
| Which of the following actions occur during the PRE-EFI Initialization (PEI) stage of the UEFI boot process? | The CPU and chipset are verified and fully initialized; System memory is initialized, verified, and allocated |
| Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS? | POST |
| Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner | Boot the system in Safe Mode. Disable the TV turner driver in device Manager |
| You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving | Disable and then enable devices and services one by one |
| You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot log in information now written? | Ntbtlog.txt |
| You experience startup errors after you install a new device. What should you do FIRST to resolve the issue? | Boot in Safe Mode and roll back the driver |
| Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows insta | System Restore |
| You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system | bootrex/fixmbr |
| Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you | Verify that the BIOS/UEFI is configured to use the correct video adapter |
| Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is MOST likely source of the problem? | Corrupt MBR or partition table |
| You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry confer | The file will no longer be encrypted |
| After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file? | EFS encrypts the FEK by creating a key pair (private and public) |
| Which of the following security solutions would prevent you from reading a file that you did not create? | EFS |
| Which of the following protocols establish a secure connection and encrypt data for a VPN? | IPsec; PPTP; L2TP |
| You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to ulock the hard drive in the TPM chip? | You can boot the hard drive without providing the startup key |
| A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file? | EFS |
| Which of the following is true of the Windows BitLocker program? | BitLocker is designed to protect files against offline access only |
| You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption? | BitLocker To Go |
| Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys? | Trusted Platform Module (TPM) |
| When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security | BitLocker with TPM |
| Which of the following statements are true regarding administrative shares? | By default, Windows automatically creates an administrative share for every volume; To connect to an administrative share, you must use the UNC path |
| Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the | Allow Full Control for both |
| The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent | Edit the file properties and assign Rachel the Deny Full Control permission |
| A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer? | Use the C$ administrative share to copy the file |
| Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible | Network share |
| A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the share folders are not currently connected. Which of the following commands will MOST l | net use |
| You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following t | Permissions are removed from both files |
| You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following woul | Place the files on an NTFS partition; Configure both share and NTFS permissions |
| Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the Weekl | Bob can open, read, and write changes to the file |
| You want to use the Universal Naming Convention (UNC) format to access a share folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format? | \\Home1\Pictures |
| You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? | %systemdrive%\Program Files (x86) |
| Which file attribute identifies the file as having been modified since the last backup? | Archive |
| A user needs a copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permission and the Read-only(R) and Encryption attributes. Which of the following will be true when the file is copied? | Only the R attribute is retained on the file |
| You have installed Windows 11 on your C: drive. What is the directories that hold user profiles in Windows 11? | C:\Users\username |
| You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal | The wrong file extensions was used when saving the file |
| You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use? | attrib +r -h |
| While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BES | It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll |
| Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories? | xcopy/e |
| While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools wou | md |
| You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the ser | robocopy |