Question
click below
click below
Question
Normal Size Small Size show me how
Inform.Tech. Exam
Question | Answer |
---|---|
A product key is a code used to register a person to an operating system | False. |
Before installing a new operating system, users are asked to select their settings. What are three settings users must choose? | Language to install, time and currency format, keyboard or input method. |
Which account type uses an email to sign in? | Microsoft account. |
What three options are given to users when signing into a Microsoft system for the first time? | Customizing their experience, privacy settings, linking a phone. |
Which Windows account type has the highest level of control? | Administrator. |
When activated. the night light toggle keeps the computer's screen on all night. | False. |
Which Multiple displays setting creates a panoramic display? | Extend these displays. |
What are two items located in the start menu? | Search bar, pinned apps and folders. |
How can users display apps alphabetically in the Windows 11 start menu? | Select All Apps in the start menu. |
Which power mode keeps a computer powered and the apps open and ready for use? | Sleep. |
On a Windows 10 computer, which three options are available when a user selects their account name at the bottom of the Start menu? | Change account settings, sign out, lock. |
How can users customize a taskbar? | Showing it on multiple displays, changing the location on the screen, locking it. |
Apps snapped into position cannot be resized without being closed first. | False |
Which function allows users to view more than one app simultaneously in Windows 10 and 11? | Snap. |
User can select Ease of Access and _______ to alter the length of time a notification appears. | Display. |
Which accessibility settings are offered for the mouse pointer? | Color, Visual feedback, Size. |
Which two color filters are offered under Ease of Access? | Red-green, grayscale. |
In what ways can users display visual alerts? | Flash the title bar of the active window, Flash the entire screen, Flash the active window. |
Dimming window content in Closed caption settings dims which window? | Caption Window. |
Which section of Ease of Access includes Magnifier? | Vision. |
One way to reduce the risk of repetitive strain injuries is to use the on-screen keyboard. | False. |
A ________ or other input device can be used to interact with an on-screen keyboard. | Mouse. |
Pausing Windows updates offers users unlimited freedom from updates. | False. |
In Advanced options on the Windows Update page, users can select an end date for __________. | Paused updates. |
Which updates are used to repair specific vulnerabilities in an operating system? | Patches. |
What are the purposes of the Microsoft store? | Purchase and install applications, Purchase and install music, Purchase and install games. |
Which of these are Microsoft user account types? | Administrative users, Standard users, Child users. |
What does an HDMI connector transmit? | Both digital video and audio. |
Which data types are transmitted by Display port connectors? | Digital audio, Digital video. |
Which type of data is transmitted by VGA connectors? | Analog video. |
What does USB stand for? | Universal serial bus. |
Which peripherals are commonly connected to computers with USB connectors? | Keyboards, Tablets, Mice. |
Which of these are USB connector types? | USB-C, USB-A, Micro-USB. |
Which service allows a user to access documents while offline and automatically updates them when they back online? | Sync center. |
Which drop down arrow should a user select to set the document permission to Viewing? | Editing. |
When creating a virtual machine, users select the operating system they want to use. | True. |
Which providers offer virtual machine management? | Hyper-V Manager, Microsoft Azure, Oracle Virtual Boxes. |
Advanced Sharing on the Sharing tab of the Properties menu allows users to Allow or Deny which permission levels? | Change, Read, Full Control. |
Which permissions take precedence in a shared folder? | The most restrictive. |
A set of guidelines that determine how long data will be stored. | Data retention policy. |
A bilateral agreement between parties to communicate expectations. | Memorandum of understanding (MOU). |
A document listing specific rules and consequences users must agree to for access to a corporate network. | Acceptable Use Policy (AUP). |
A security feature for erasing mobile devices. | Remote wipe. |
Determines what data should be archived. | Data retention policy. |
Possession of and responsibility for information. | Data ownership. |
A document stipulating constraints and practices users must observe. | Acceptable Use Policy (AUP). |
A security feature commonly used to remove personal data stored on a lost or stolen mobile device. | Remote wipe. |
Create one or more copies of selected data. | Full backup. |
Automatically create copies of data as it changes. | Mirror backup. |
Only back up data that is new or different since the initial full backup. | Differential backup. |
Only back up data that is new or different since the last backup. | Incremental backup. |
Which of these authentication tools are biometric? | Fingerprints, retina scans, voice readers. |
What could be used as a secondary form of authentication to establish high-security multifactor authentication for the company? | Fingerprints. |
Which of these are considered favorable in a password? | Symbols, Numbers, Uppercase letters. |
Malicious software that allows a third party to collect data and track activity on a computer. | Spyware. |
Malicious software that self-replicates and spreads throughout a network. | Worms. |
Malicious code that spreads itself, infecting devices to damage or steal data. | Viruses. |
Malicious computer programs similar to viruses that users must execute. | Trojan horses. |
Which of these is a type of social engineering attack? | Phishing. |
Which actions will reduce the risk of a virus or malware infection? | Enabling Windows Defender, Visiting websites with HTTPS protocol. |
Spyware that is used to capture keystrokes, including during sign in. | Keyloggers. |
Software that runs like a virus or trojan horse and can copy personal information, transmit credit card numbers, passwords, and other information | Adware. |
Malicious code that systematically encrypts the hard drive, locking out legitimate users | Ransomware. |
Which of these are mitigation techniques used to protect against computer threats? | Windows Defender, Antivirus software, Antimalware software. |
The move toward working from home has lightened the load for IT and security departments. | False. |
Which of these sites offer downloadable MDM software? | iTunes, Google Play store, MDM server |
Companies often implement security guidelines only for top-level employees transporting mobile devices outside the office. | False. |
Which lock screen options found on a mobile device would help ensure its data is secure if lost or stolen? | Biometric lock, Pin lock, Pattern lock. |
Windows troubleshooters are a last resort; you need a new computer if they cannot fix the issues. | False. |
Position 1. | Local policy. |
Position 2. | Site policy. |
Position 3. | Domain Group Policy. |
Position 4. | Organizational unit groups. |
Which Group Policy type covers passwords and lockout policies? | Domain policy. |
The Command Prompt can be opened by using the _______ keyboard shortcut and then typing _________. | Windows+R; cmd |
What does the gpresult /r command do? | Show policies applied to user's groups. |
Which two actions occur when a device is reset? | Applications a user has installed on the device are removed, Applications a manufacturer has installed on the device are removed. |
A limited amount of drivers and files are used, there is no networking, and the desktop is not loaded. | Windows Safe Mode with Command Prompt. |
Only loads the minimum amount of drivers required to connect to other computers during startup. | Safe Mode with Networking. |
Windows creates a special file that logs and generates a list of drivers that are used during each step of the reboot process. | Boot logging. |
Loads the last successful set of driver and registry settings used to start and shut down your computer previously. | Last Known Good Configuration. |
After uninstalling an application, one should restart the computer to remove any leftover ___________. | Files. |
What does an unavailable Roll Back Driver option indicate? | Windows does not have a previous version of the driver to roll back to. |
Uninstalling a device removes the driver from a computer's _______. | Operating system. |
What can an Automatic Private IP Addressing (APIPA) address indicate? | The cable is not connected or functioning properly, The network card is configured incorrectly. |
What command should one use when troubleshooting a device capable of joining a domain? | ipconfig /all. |
What does a red exclamation mark next to a device indicate when viewing USB Connector Managers? | A port error. |
Where should a user go to see if a device has the most recent driver installed? | Device Manager. |
What should a user do to troubleshoot a computer not recognizing a device after updating the drivers? | Switch the connector to a different port, Only plug in the device or devices that are needed, Remove the connector from the port, restart the computer, and plug it back in. |
Large collection of public networks. | Internet. |
Internal network of devices. | Intranet. |
A network with limited, authenticated public access. | Extranet. |
Utilized by home and small office networks in which each device is responsible for managing access to its own resources. | Peer-to-peer network. |
Utilized by medium and large-sized businesses that require a central server for hosting user accounts, devices, and permissions. | Client-server network. |
Provides VMs the same access permissions of the host PC . | External. |
Provides VMs access to other VMs and the host machine. | Internal. |
Provides VMs access only to other VMs. | Private. |
A user accidentally sends sensitive data to all the devices in a company network. Which type of data transmission is described in the scenario? | Broadcast. |
Which statements are true of Type ll hypervisors? | Type ll hypervisors allocate system resources such as RAM to virtual machines, Type ll hypervisors are located within existing operating systems such as Windows 10 Pro. |
What remote tool allows someone to see what a remote user is doing when connected to a machine? | Remote Assistance. |