1.
Which of the following can you type in the Start menu in Windows to open a command prompt?
(Choose two.)
Correct Answer(s)
B. B. cmd
C. C. command
Explanation
*##*B, C. You can open a command prompt by typing cmd or command in the Start menu. The command prompt utility will pop up in the search results. B, C. You can open a command prompt by typing cmd or command in the Start menu. The command prompt utility will pop up in the search results.*##*Run is not a command; it is a dialog box. Open is not
a command; it is an operating system action.
2.
How do you increase the size of the taskbar?
Correct Answer
C. C. Move the mouse pointer to the top of the taskbar, pausing until the pointer turns into a double-headed arrow, and then click and drag.
Explanation
*##*. C. You can increase the size of the taskbar size placing the cursor over the top of the taskbar and dragging it up.*##*A,B & D does not apply.
3.
In Windows, a deleted file can be retrieved using which of the following?
Correct Answer
B. B. Recycle Bin
Explanation
B. The Recycle Bin is a temporary spot that files are deleted to but from where they can be retrieved if deleted mistakenly. The My Computer icon is another way to start the File Explorer. The Control Panel and Settings app are used to customize the operating system.
4.
What is the minimum amount of free hard drive space required for the installation of Windows 764-bit?
Correct Answer
C. C. 20 GB
Explanation
C. The minimum amount of free hard drive space required for Windows 7 64-bit is 20 GB.
5.
Which of the following utilities is used to update Group Policy settings and replaces some of the functionality that previously existed with secedit?
Correct Answer
B. B. gpupdate
Explanation
*##*. B. The gpupdate utility is used to update Group Policy from the command line. *##*. The clobber
command is a Linux command. The extract command is used to extract files from .cab files.
6.
In Windows, which of the following is the filesystem of choice for CD media?
Correct Answer
D. D. CDFS
Explanation
*##*D. The CDFS filesystem is used for CD media.*##*. NTFS is the native filesystem for the Windows operating system. FAT32 is a filesystem that was popular with Windows 9x operating systems. EFS is a technology that encrypts files.
7.
What is the minimum required memory for a 64-bit installation of Windows 10?
Correct Answer
C. C. 2 GB
Explanation
. C. The minimum amount of memory required for the 64-bit installation of the Windows 10 is 2
GB
8.
Virtual memory is configured through which system tool?
Correct Answer
B. B. System Properties
Explanation
*##*B. Virtual memory is configured in the System Properties applet. *##*The taskbar is an element of the
desktop; the memory manager is a process in the operating system for memory management; and
virtual configuration is an invalid answer.
9.
What can you do if a program is not responding to any commands and appears to be locked up?
Correct Answer
D. D. Open Task Manager, select the appropriate task, and then click End Task.
Explanation
*##*. D. When a program is not responding to any commands, the process must be terminated via the
Task Manager. You can end the process by opening the Task Manager, right-clicking the
application, and selecting End Task.
*##*. Viewing the performance will not make the process respond.
Adding more memory is not possible without shutting down the computer. Pressing Ctrl+Alt+Del
without any further action will not reboot the computer.
10.
You believe that your system files are corrupted in Windows. You run the System File Checker. Which command should you run in order to make the System File Checker automatically repair your system files?
Correct Answer
D. D. sfc /scannow
Explanation
*##*. D. The System File Checker (sfc) will scan for and fix missing or corrupted operating systems
files.
*##*. The command used to initiate an immediate scan is sfc /scannow. SFC /recover and SFC
/repair are not valid options. SFC /verifyfile will check a single file, but the path must be
specified.
11.
Which of the following Registry hives contains information about the computer’s hardware?
Correct Answer
B. B. HKEY_LOCAL_MACHINE
Explanation
*##*B. The HKEY_LOCAL_MACHINE Registry hive contains information about the computer’s hardware. It
is also known as HKLM
*##*HKEY_CURRENT_MACHINE and HKEY_MACHINE are not valid Registry hives.
HKEY_RESOURCES was used with Windows 9x operating systems but is no longer used.
12.
You have a computer with four physical CPUs and 4 TB of RAM. Which edition of Windows 10 should you install?
Correct Answer
D. D. Pro for Workstations
Explanation
*##*D. Only Windows 10 Pro for Workstations supports four physical CPUs*##*Windows 10 Education
supports two physical CPUs and 2 TB of RAM. Windows 10 Enterprise supports two physical
CPUs and 2 TB of RAM. Windows 10 Pro supports two physical CPUs and 2 TB of RAM.
13.
You used the winver.exe utility and it reported Windows 10 Version 1703 (OS Build 15063.145). What is the current date of the last update?
Correct Answer
C. C. March of 2017
Explanation
*##*. C. The date code of the edition is yymm, so 1703 is March of 2017. *##*The 63rd day of 2015 and the
145th day of 2015 are incorrect answers, because the build number is the number of builds of
Windows 10. The build number does translate to a version of Windows, but that information is in
the date code and does not need to be looked up.
14.
You want to upgrade from 32-bit Windows 7 Professional to a 64-bit version of Windows 10. What are your options?
Correct Answer
D. D. You must perform a clean installation of Windows 10 Pro 64-bit.
Explanation
When upgrading from a 32-bit version of Windows 7 to a 64-bit version of Windows 10, a clean installation is required. This means that you cannot directly upgrade from Windows 7 to Windows 10, nor can you upgrade from a 32-bit version of Windows 10. Instead, you must perform a clean installation of the 64-bit version of Windows 10 Pro. This involves backing up your files, formatting the hard drive, and installing the new operating system from scratch.
15.
Which editions of Windows 8 support EFS? (Choose all that apply.)
Correct Answer(s)
A. A. Enterprise
B. B. Pro
Explanation
A, B. Both the Enterprise and Pro editions of Windows 8 support EFS. The RT edition is
preinstalled on tablets and does not support EFS. The Core edition does not support EFS.
16.
Which of the following is the online/cloud storage account (to which you can save or move files) that comes with your Microsoft account?
Correct Answer
C. C. OneDrive
Explanation
OneDrive is the online/cloud storage account that comes with your Microsoft account. It allows you to save or move files to the cloud, making them accessible from any device with an internet connection.
17.
Which editions of Windows 7 cannot create a HomeGroup?
Correct Answer
A. A. Windows 7 Starter
Explanation
*##*A. Windows 7 Starter edition can join a HomeGroup, but it cannot create a HomeGroup*##*Only Windows 7 Home Premium, Professional, Enterprise, and Ultimate can both create and join a
HomeGroup.
18.
Where in Windows 7 can you manually create a restore point?
Correct Answer
B. B. The System Protection tab of System Properties
Explanation
*##*B. System Restore allows for both the automated and manual creation of restore points. You can manually create restore points via the System Protection tab of System Properties*##*. Windows 7 does not include a System Tools applet. The option to create manual restore points does not exist
19.
Which utility allows you to choose the default operating system to boot to in a multiboot installation?
Correct Answer
C. C. msconfig.exe
Explanation
MSConfig.exe is a utility that allows users to configure several aspects of the Windows operating system, including the boot options. In a multiboot installation, where multiple operating systems are installed on the same computer, MSConfig.exe can be used to choose the default operating system that will be booted into. This utility provides a user-friendly interface to select the default operating system from a list of available options, making it convenient for users to manage their multiboot setup.
20.
Which of the following is a macOS feature for password management?
Correct Answer
B. B. Keychain
Explanation
Keychain is a macOS feature for password management. It securely stores passwords, encryption keys, and certificates for applications, websites, and servers. Keychain allows users to easily access and manage their passwords, automatically fill in login information, and generate strong passwords. It provides a convenient and secure way to store and retrieve passwords, ensuring that they are protected and easily accessible when needed.
21.
Which statement about scripting languages is true?
Correct Answer
C. C. Scripting languages are interpreted.
Explanation
Scripting languages are interpreted, meaning that they are executed line by line without the need for a separate compilation step. This allows for more flexibility and faster development, as changes can be made and tested in real-time. Interpreted languages also tend to have simpler syntax and are easier to learn and use compared to languages that require compilation. Additionally, interpreted languages often have built-in error handling and debugging features, making them ideal for tasks such as automation, web development, and rapid prototyping.
22.
On which network protocol and port does SSH operate?
Correct Answer
B. B. TCP port 22
Explanation
SSH (Secure Shell) operates on TCP port 22. SSH is a network protocol that provides secure remote access to systems and secure file transfers. It is commonly used in the administration of network devices and servers. TCP port 22 is the default port for SSH, and it is used for establishing a secure connection between the client and the server.
23.
Which type of attack denies authorized users access to network resources?
Correct Answer
A. A. DoS
Explanation
A Denial of Service (DoS) attack is a type of cyber attack that aims to deny authorized users access to network resources. It does this by overwhelming the target system with a flood of illegitimate requests or by exploiting vulnerabilities in the system to crash it. This effectively renders the network or service unavailable to legitimate users. Social engineering, on the other hand, involves manipulating individuals to gain unauthorized access to systems or sensitive information, but it does not directly deny access to network resources.
24.
Internal users suspect repeated attempts to infect their systems, as reported to them by pop-up messages from their antivirus software. According to the pop-up messages, the virus seems to be the same in every case. What is the most likely culprit?
Correct Answer
A. A. A server is acting as a carrier for a virus.
Explanation
The most likely culprit in this scenario is that a server is acting as a carrier for a virus. The internal users are receiving pop-up messages from their antivirus software indicating repeated attempts to infect their systems with the same virus. This suggests that the virus is being transmitted from a common source, which is likely a server within the network. This explanation aligns with the symptoms described and the information provided.
25.
Which of the following has the goal of allowing a username/password combination to be entered once, and then allowing claims to be used for consecutive logins? (Choose the best answer.)
Correct Answer
C. C. Single sign-on
Explanation
Single sign-on (SSO) is a mechanism that allows users to authenticate themselves once and then use those credentials to access multiple applications or systems without having to enter their username and password again. This eliminates the need for users to remember multiple sets of login credentials and improves user experience. SSO typically uses claims-based authentication, where a security token is issued upon initial authentication, and this token is then used to assert the user's identity and access rights to other applications or systems.