IT Essentials 8 Module 11 Quiz Answers: Windows Configuration

IT Essentials 8.0 Module Windows Configuration Quiz Answers

1. A help desk technician is talking to a user to clarify a technical problem that the user is having. What are two examples of open-ended questions that the technician might use to help determine the issue? (Choose two.)

  • What happens when you try to access your files?
  • What updates have you performed lately?
  • Can you boot the operating system?
  • Can you boot up in safe mode?
  • Has anyone else used the computer recently?

Explanation: Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.

2. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Task Manager
  • Add or Remove Programs
  • Event Viewer
  • System Restore

Explanation: Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.

3. A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?

  • Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
  • Only clean equipment that is requested by the customer.
  • Omit performing maintenance operations on components until the equipment malfunctions.
  • Schedule and document routine maintenance tasks.

Explanation: The type of tasks that need to be scheduled include operating system and antivirus updates as well as hard drive routines.

4. After solving a problem on a computer, a technician checks the event log to ensure that there are no new error messages. At which step of the troubleshooting process is this action taking place?

  • Verify the solution and full system functionality.
  • Document the findings.
  • Establish a theory of probable cause.
  • Determine an exact cause.

Explanation: In this situation, the probable cause has been identified and the exact cause has been acted upon. Documenting the findings is the last action in the process and happens after checking that the problem has been solved by the solution implemented.

5. What is true about restore points?

  • Once System Restore is used to restore a system, the change is irreversible.
  • Restore points back up personal data files.
  • Restore points recover corrupted or deleted data files.
  • Restore points should always be created before making changes to a system.

Explanation: Any change from a system restore is reversible. A restore point only contains information about the system and registry settings and therefore cannot be used to backup or recover data files.

6. Which two issues are likely to cause BSOD errors? (Choose two.)

  • out-of-date browser
  • RAM failing
  • device driver errors
  • lack of antivirus software
  • power supply failure

Explanation: Device driver errors are the most likely cause of BSOD errors. Failing RAM can also create BSOD errors. Software issues such as browsers and antivirus do not produce BSOD errors. A power supply failure would prevent the machine from starting.

7. What are three common causes of operating systems problems? (Choose three.)

  • a corrupted registry
  • incorrect IP addressing information
  • loose cable connections
  • failed service pack installation
  • CMOS battery problem
  • virus infection

Explanation: Typical causes of operating system problems are as follows:

  • corrupted or missing system files
  • incorrect device driver
  • failed update or service pack installation
  • corrupted registry
  • failing of faulty hard drive
  • incorrect password
  • virus infection
  • spyware

8. Why would an administrator use Windows Remote Desktop and Windows Remote Assistant?

  • to provide secure remote access to resources on another network
  • to connect to an enterprise network across an unsecured connection and act as a local client of that network
  • to enable sharing of files and presentations with a group of users over the Internet
  • to connect to a remote computer over the network to control its applications and data

Explanation: Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing.

9. A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?

  • VPN
  • Remote Desktop
  • Administrative share
  • Remote Assistance

Explanation: A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network.

10. A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?

  • rstrui
  • runas
  • tasklist
  • gpresult
  • gpupdate

Explanation: The functions of the listed commands are as follows:

  • runas – runs a program or tool with different permissions
  • rstrui – starts the System Restore utility
  • gpresult – displays group policy settings
  • gpupdate – refreshes group policy settings
  • tasklist – displays currently running applications

11. What are two file attributes in the Windows environment? (Choose two.)

  • details
  • archive
  • read-only
  • security
  • general

Explanation: The file attributes are read-only, archive, hidden, and system. Details, security, and general are tabs on the file Properties applet.

12. How many Libraries are created for each user by default on a new Windows 10 installation?

  • 2
  • 4
  • 5
  • 6

Explanation: When Windows 10 is installed, it creates six default libraries for each user.

13. A user wants to configure a password on a Windows 10 PC when the PC is woken from hibernation. Where can the user configure this?

  • Control Panel, Power Options
  • Control Panel, User Accounts
  • Settings, Accounts
  • Settings, Privacy

Explanation: In Windows 10, the configuration of a password for a PC woken from hibernation or sleep can be set in Settings->Accounts.

14. Match the commands to the task.

IT Essentials 8.0 Module Windows Configuration Quiz

IT Essentials 8.0 Module Windows Configuration Quiz

15. Which TCP port number would be used for remotely connecting to a network switch and configuring it via an unencrypted connection?

  • 20
  • 22
  • 443
  • 3389

Explanation: The server listens on TCP port 3389 and UDP port 3389 for remote connections.

16. In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 10?

  • C:\Users
  • C:\Program Files
  • C:\Application Data
  • C:\Program Files (x86)

Explanation: The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder.

Notify of

Inline Feedbacks
View all comments