1. What contains information on how hard drive partitions are organized?

  • CPU
  • MBR
  • BOOTMGR
  • Windows Registry

2. Which net command is used on a Windows PC to establish a connection to a shared directory on a remote server?

  • net use
  • net start
  • net share
  • net session

3. Which type of startup must be selected for a service that should run each time the computer is booted?

  • Boot
  • Manual
  • Automatic
  • Start
  • Startup

4. A user creates a file with a .ps1 extension in Windows. What type of file is it?

  • PowerShell cmdlet
  • PowerShell function
  • PowerShell documentation
  • PowerShell script

5. When a user makes changes to the settings of a Windows system, where are these changes stored?

  • Control panel
  • Registry
  • win.ini
  • boot.ini

6. Which Windows version was the first to introduce a 64-bit Windows operating system?

  • Windows NT
  • Windows XP
  • Windows 7
  • Windows 10

7. Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

  • The default gateway device is configured with the wrong IP address.
  • The TCP/IP stack on the default gateway is not working properly.
  • The default gateway is not operational.
  • Security rules are applied to the default gateway device, preventing it from processing ping requests.

8. Which command is used to manually query a DNS server to resolve a specific hostname?

  • net
  • tracert
  • nslookup
  • ipconfig /displaydns

9. What is the purpose of the cd\ command?

  • changes directory to the previous directory
  • changes directory to the root directory
  • changes directory to the next highest directory
  • changes directory to the next lower directory

10. How much RAM is addressable by a 32-bit version of Windows?

  • 4 GB
  • 8 GB
  • 16 GB
  • 32 GB

11. How can a user prevent specific applications from accessing a Windowscomputer over a network?

  • Enable MAC address filtering.
  • Disable automatic IP address assignment.
  • Block specific TCP or UDP ports in Windows Firewall.
  • Change default usernames and passwords.

12. What utility is used to show the system resources consumed by each user?

  • Task Manager
  • User Accounts
  • Device Manager
  • Event Viewer

13. What utility is available on a Windows PC to view current running applications and processes?

  • nslookup
  • ipconfig
  • Control Panel
  • Task Manager

14. A user logs in to Windows with a regular user account and attempts to use an application that requires administrative privileges. What can the user do to successfully use the application?

  • Right-click the application and choose Run as root.
  • Right-click the application and choose Run as Priviledge.
  • Right-click the application and choose Run as Administrator.
  • Right-click the application and choose Run as Superuser.

15. A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

  • nslookup
  • tracert
  • netstat
  • ipconfig

16. Where are the settings that are chosen during the installation process stored?

  • in the recovery partition
  • in flash memory
  • in the Registry
  • in BIOS

17. What technology was created to replace the BIOS program on modern personal computer motherboards?

  • CMOS
  • MBR
  • RAM
  • UEFI

18. Which two things can be determined by using the ping command? (Choose two.)

  • the number of routers between the source and destination device
  • the destination device is reachable through the network
  • the average time it takes each router in the path between source and destination to respond
  • the IP address of the router nearest the destination device
  • the average time it takes a packet to reach the destination and for the response to return to the source

19. What function is provided by the Windows Task Manager?

  • It provides an active list of TCP connections.
  • It maintains system logs.
  • It selectively denies traffic on specified interfaces.
  • It provides information on system resources and processes.

20. Which type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed?

  • scripts
  • functions
  • cmdlets
  • routines

21. What would be displayed if the netstat -abno command was entered on a Windows PC?

  • all active TCP and UDP connections, their current state, and their associated process ID (PID)
  • only active TCP connections in an ESTABLISHED state
  • only active UDP connections in an LISTENING state
  • a local routing table

22. Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

  • ipconfig /flushdns
  • net cisco.com
  • nslookup cisco.com
  • ping cisco.com
  • nbtstat cisco.com

23. Refer to the exhibit. A cyber security administrator is attempting to view system information from the Windows PowerShell and recieves the error message shown. What action does the administrator need to take to successfully run the command?

  • Run the command from the command prompt.
  • Install latest Windows updates.
  • Restart the abno service in Task Manager.
  • Run PowerShell as administrator.

24. Refer to the exhibit. A cybersecurity analyst is investigating a reported security incident on a Microsoft Windows computer. Which tool is the analyst using?

  • Event Viewer
  • PowerShell
  • Task Manager
  • Performance Monitor

25. For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

  • firewall settings
  • MAC address settings
  • smartcard settings
  • file system settings

26. Consider the path representation in Windows CLI C:\Users\Jason\Desktop\mydocu.txt. What does the Users\Jason component represent?

  • file directory and subdirectory
  • current file directory
  • file attribute
  • storage device or partition

27. Which two user accounts are automatically created when a user installs Windows to a new computer? (Choose two.)

  • superuser
  • guest
  • root
  • administrator
  • system

28. What term is used to describe a logical drive that can be formatted to store data?

  • partition
  • track
  • sector
  • cluster
  • volume

29. What is the purpose of entering the netsh command on a Windows PC?

  • to create user accounts
  • to test the hardware devices on the PC
  • to change the computer name for the PC
  • to configure networking parameters for the PC

30. A technician is troubleshooting a PC unable to connect to the network. What command should be issued to check the IP address of the device?

  • ipconfig
  • ping
  • tracert
  • nslookup

31. Refer to the exhibit. Which Microsoft Windows application is being used?

  • Event Viewer
  • PowerShell
  • Task Manager
  • Performance Monitor

32. What are two reasons for entering the ipconfig command on a Windows PC? (Choose two.)

  • to review the network configuration on the PC
  • to check if the DNS server can be contacted
  • to ensure that the PC can connect to remote networks
  • to review the status of network media connections
  • to display the bandwidth and throughput of the network connection

33. What are two advantages of the NTFS file system compared with FAT32? (Choose two.)

  • NTFS allows the automatic detection of bad sectors.
  • NTFS is easier to configure.
  • NTFS allows faster formatting of drives.
  • NTFS provides more security features.
  • NTFS supports larger files.
  • NTFS allows faster access to external peripherals such as a USB drive.

34. What is the purpose of using the net accounts command in Windows?

  • to start a network service
  • to display information about shared network resources
  • to show a list of computers and network devices on the network
  • to review the settings of password and logon requirements for users

35. What are two reasons for entering the ping 127.0.0.1 command on a Windows PC? (Choose two.)

  • to check if the NIC functions as expected
  • to check if the default gateway is configured correctly
  • to display the bandwidth and throughput of the network connection
  • to check if the TCP/IP protocol suite is installed properly
  • to ensure that the PC can connect to remote networks

36. When restrictive security policy is implemented on a firewall, only certain required ports are opened

37. Match the Windows command to the description.

  • dir ~~> lists files in a directory
  • mkdir ~~> creates a new directory
  • cd ~~> changes the current directory
  • ren ~~> renames a file

38. Match the definition to the Microsoft Windows term. (Not all options are used.)

  • runs in the background to support the operating system and applications ~~> service
  • instructions executed by the processor ~~> thread
  • a currently executing program ~~> process
  • (empty) ~~> registry

39. Match the definition to the Microsoft Windows term. (Not all options are used.)

  • database of hardware, software, users, and settings ~~> registry
  • used to manage remote computers ~~> WMI
  • provides access needed by the user space process ~~> handle
  • (empty) ~~> thread

40. Match the Windows term to the description.

  • alternate data streams ~~> a method of adding information to an NTFS-based file
  • EFI ~~> upgraded firmware that stores boot code in the firmware
  • FAT32 ~~> a legacy file system
  • MACE ~~> NTFS-generated timestamps for file activity
  • NTFS ~~> most common file system

LEAVE A REPLY

Please enter your comment!
Please enter your name here