IT Essentials v7.01 Chapter 11 Quiz Answers

1. Match the commands to the task.

IT Essentials 8.0 Module 11.8.1.2 Windows Configuration Quiz

  • ping —> verifies basic connectivity to the targeted IP or host name
  • nslookup —> verifies the successful name resolution of a host name
  • tracert —> verifies the route taken by a packet
  • ipconfig —> verifies the default gateway configured on a host

2. In which folder are application files for 32-bit programs typically located on a computer that is running a 64-bit edition of Windows 7?

  • C:\Application Data
  • C:\Program Files
  • C:\Users
  • C:\Program Files (x86)

Explanation: The C:\users folder contains all the user profiles. The C:\Application Data folder contains application data related to all users. The 32 bit program files are located in the C:\Program Files(x86) folder while 64 bit program files are located in the C:\Program Files folder.

3. A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly. What can the user do to fix this problem?

  • Change the file system to FAT16.
  • Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.
  • Reinstall the programs in Compatibility Mode.
  • Update the driver for the graphics card.

Explanation: UAC is used to change user account settings while converting the file system to FAT16 and updating the driver for the graphics card will not resolve the issue. Compatibility mode in Windows 7 allows for the running of a program created for previous versions of the Windows environment.

4. A corporation has expanded to include multiple remote offices around the globe. Which technology should be used to allow the remote offices to communicate and share network resources privately?

  • Remote Desktop
  • Remote Assistance
  • administrative share
  • VPN

Explanation: A Virtual Private Network (VPN) is used to connect remote sites together securely over a public network.

5. Why would an administrator use Windows Remote Desktop and Windows Remote Assistant?

  • to provide secure remote access to resources on another network
  • to connect to a remote computer over the network to control its applications and data
  • to enable sharing of files and presentations with a group of users over the Internet
  • to connect to an enterprise network across an unsecured connection and act as a local client of that network

Explanation: Windows Remote Desktop and Remote Assistant allow an administrator to connect a local computer with a remote computer across the network and to interact with it as though it were the local computer. The administrator sees and can interact with the desktop of the remote computer. With Remote Desktop, the administrator logs onto the remote computer using an existing user account and starts a new user session. No user is required at the remoter computer to allow this access. With Remote Assistant, the purpose is for a technician to interact with a remote computer with the assistance of a remote user. The remote user must allow the remote access to the current user session and is able to observe what the technician is doing.

6. How many Libraries are created for each user by default on a new Windows 10 installation?

  • 6
  • 4
  • 5
  • 2

Explanation: When Windows 10 is installed, it creates six default libraries for each user.

7. Which two issues are likely to cause BSOD errors? (Choose two.)

  • power supply failure
  • lack of antivirus software
  • device driver errors
  • RAM failing
  • out-of-date browser

Explanation: Device driver errors are the most likely cause of BSOD errors. Failing RAM can also create BSOD errors. Software issues such as browsers and antivirus do not produce BSOD errors. A power supply failure would prevent the machine from starting.

8. A user wants to configure a password on a Windows 10 PC when the PC is woken from hibernation. Where can the user configure this?

  • Control Panel, Power Options
  • Settings, Privacy
  • Settings, Accounts
  • Control Panel, User Accounts

Explanation: In Windows 10, the configuration of a password for a PC woken from hibernation or sleep can be set in Settings->Accounts.

9. Which Windows utility can be used to schedule a regular backup for preventive maintenance?

  • Windows Task Manager
  • Disk Cleanup
  • System Restore
  • Windows Task Scheduler

Explanation: Windows Task Scheduler is a tool that helps scheduling repetitive tasks, such as backups, antivirus scans, and more.

10. Which TCP port number would be used for remotely connecting to a network switch and configuring it via an unencrypted connection?

  • 20
  • 22
  • 3389
  • 443

Explanation: The server listens on TCP port 3389 and UDP port 3389 for remote connections.

11. What are two file attributes in the Windows environment? (Choose two.)

  • read-only
  • archive
  • security
  • general
  • details

Explanation: The file attributes are read-only, archive, hidden, and system. Details, security, and general are tabs on the file Properties applet.

12. A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Event Viewer
  • Add or Remove Programs
  • System Restore
  • Task Manager

Explanation: Use the Task Manager Performance tab to see a visual representation of CPU and RAM utilization. This is helpful in determining if more memory is needed. Use the Applications tab to halt an application that is not responding.

13. What is true about restore points?

  • Restore points should always be created before making changes to a system.
  • Restore points back up personal data files.
  • Once System Restore is used to restore a system, the change is irreversible.
  • Restore points recover corrupted or deleted data files.

Explanation: Any change from a system restore is reversible. A restore point only contains information about the system and registry settings and therefore cannot be used to backup or recover data files.

14. After solving a problem on a computer, a technician checks the event log to ensure that there are no new error messages. At which step of the troubleshooting process is this action taking place?

  • Determine an exact cause.
  • Establish a theory of probable cause.
  • Verify the solution and full system functionality.
  • Document the findings.

Explanation: In this situation, the probable cause has been identified and the exact cause has been acted upon. Documenting the findings is the last action in the process and happens after checking that the problem has been solved by the solution implemented.

15. A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?

  • rstrui
  • tasklist
  • runas
  • gpupdate
  • gpresult

Explanation: The functions of the listed commands are as follows:

  • runas – runs a program or tool with different permissions
  • rstrui – starts the System Restore utility
  • gpresult – displays group policy settings
  • gpupdate – refreshes group policy settings
  • tasklist – displays currently running applications

16. A help desk technician is talking to a user to clarify a technical problem that the user is having. What are two examples of open-ended questions that the technician might use to help determine the issue? (Choose two.)

  • What updates have you performed lately?
  • Can you boot the operating system?
  • Has anyone else used the computer recently?
  • Can you boot up in safe mode?
  • What happens when you try to access your files?

Explanation: Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.

17. What are three common causes of operating systems problems? (Choose three.)

  • a corrupted registry
  • loose cable connections
  • virus infection
  • CMOS battery problem
  • incorrect IP addressing information
  • failed service pack installation

Explanation: Typical causes of operating system problems are as follows:

  • corrupted or missing system files
  • incorrect device driver
  • failed update or service pack installation
  • corrupted registry
  • failing of faulty hard drive
  • incorrect password
  • virus infection
  • spyware

18. A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan?

  • Only clean equipment that is requested by the customer.
  • Avoid performing maintenance operations on plug and play devices that are controlled by the operating system.
  • Schedule and document routine maintenance tasks.
  • Omit performing maintenance operations on components until the equipment malfunctions.

Explanation: The type of tasks that need to be scheduled include operating system and antivirus updates as well as hard drive routines.

19. Which utility would be used to find the default gateway configured on a host?

  • ipconfig
  • ping
  • nslookup
  • tracert

Explanation: The functions of the listed commands are as follows:

  • ping: Determines basic connectivity to the targeted IP address or hostname
  • nslookup: Finds the successful name resolution of a hostname
  • tracert: Finds the route taken by a packet
  • ipconfig: Finds the default gateway configured on a host

 

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments