You try to run the CHKDSK utility from a command prompt but you keep getting an error message that you need to run it in Elevated Mode. How do you correct this?

Reboot the computer in SAFE Mode and then run CHKDSK from a command prompt.

Open command prompt from the Windows directory and run CHKDSK.

Open a command prompt with the selection “Runs as Administrator.”

Open the 64-bit version of command prompt and run the CHKDSK command.

hat type of hard drive does not require defragging?

A hard drive for a server

A hard drive for a 64-bit operating system

A solid-state drive hosting Windows 7

An SCSI drive hosting Server 2008

What is the primary limitation of free versions of antivirus applications?

They don’t protect in real time.

They only perform quick scans.

They cannot scan the Windows directory.

They only install on 64-bit operating systems.

What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?

A domain controller

A BitLocker Server

A WSUS server

A Proxy Server

A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?

From the Processes tool in the Control Panel

From the Process tab in Task Manager

From the Performance tab in Task Manager

From the Windows Defrag console

Why is it best to run AV scans when the computer isn’t being utilized?

The scans consume resources and can impede computer performance.

Executable files can’t be scanned if a user is using them within an application.

The Windows directory can’t be scanned if the computer is being used.

AV applications can only do full scans if the computer is in safe mode.

Which type of updates should be installed in a test environment before being installed in a live enterprise environment?

Updates for Windows XP

Recommended Updates

Service Packs

Security updates

What is a limiting factor of EFS when compared to BitLocker?

It only works on 32-bit operating systems.

It only works with a public certificate.

It only works under the Administrator account.

It only works at the file or folder level.

You have just purchased a brand new Windows 8 computer. What should you do right away with the Administrator account?

Disable it

Enable EFS for the account

Encrypt its logon

Change its username

Which of the events below would automatically create a new restore point on your Windows 8 computer?

Deleting the temporary files

Installing a new printer

Downloading music files

Creating a new Internet favorite

Task Manager is showing an application as “Not Responding.” What can you do?

Right-click on the application and select “End Task.”

Right-click on the application and select “End Application.”

Right-click on the application and select “Kill Process Tree.”

Right-click the application from an elevated prompt and close it.

Which type of Windows updates below is strictly security-related?

Critical

Optional

Recommended

Service Pack

Your mom’s computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?

A fragmented volume

Spyware

A bad printer driver

Not enough memory

Which of the actions below will not create more room on your hard drive?

Defragging your hard drive

Uninstalling an application

Deleting temporary Internet files

Deleting image and video files

Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?

Ccleaner

TreeSize

MalwareBytes

Auslogics Disk Defrag

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:

be 32-bit.

host a virtualized enabled BIOS.

be TPM-compatible.

have a USB 3.0 interface.

You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?

CHKDSK /f

CHKDSK /r

CHKDSK /e

CHKDSK /RD

You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?

3%

5%

10%

15%

Which type of Windows updates below includes new features and extends the functionality of the operating system?

Critical

Optional

Recommended

Service Pack

You are configuring the local Windows Firewall on your Windows 7 computer. Which network category needs to have the most stringent rule set?

Public

Private

Home

Domain

2 answers

Online Exam 8_07

Question 1 of 20
5.0/ 5.0 Points

What type of hard drive does not require defragging?


C. A solid-state drive hosting Windows 7


Question 2 of 20
5.0/ 5.0 Points

How is a worm different from a virus?

C. It doesn’t require human intervention to spread.

Question 3 of 20
5.0/ 5.0 Points

What is the primary limitation of free versions of antivirus applications?

A. They don’t protect in real time.


Question 4 of 20
5.0/ 5.0 Points

You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?

D. Both inbound and outbound rules

Question 5 of 20
5.0/ 5.0 Points

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:


C. be TPM-compatible.



Question 6 of 20
5.0/ 5.0 Points

Why is it best to run AV scans when the computer isn’t being utilized?

A. The scans consume resources and can impede computer performance.

Question 7 of 20
5.0/ 5.0 Points

Which type of Windows updates below is strictly security-related?

A. Critical

Question 8 of 20
5.0/ 5.0 Points

Task Manager is showing an application as “Not Responding.” What can you do?

A. Right-click on the application and select end task
Question 9 of 20
5.0/ 5.0 Points

A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?

B. From the Process tab in Task Manager

Question 10 of 20
5.0/ 5.0 Points

You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?
B. ZoneAlarm

Question 11 of 20 5.0/ 5.0 Points

Which of the events below would automatically create a new restore point on your Windows 8 computer?

B. Installing a new printer

Question 12 of 20
5.0/ 5.0 Points

Which of the instances below is an example of a Trojan horse?

D. A computer game that creates a backdoor into your computer

Question 13 of 20
5.0/ 5.0 Points

You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?

B. Use the Administrator account of the new OS to take ownership of the files.

Question 14 of 20
5.0/ 5.0 Points

What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?


C. A WSUS server



Question 15 of 20
5.0/ 5.0 Points

Which type of Windows updates below includes new features and extends the functionality of the operating system?

D. Service Pack

Question 16 of 20
5.0/ 5.0 Points

You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?

A. CHKDSK /f


Question 17 of 20
0.0/ 5.0 Points

Your mom’s computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?


B. Spyware


Question 18 of 20
5.0/ 5.0 Points

Which of the actions below will not create more room on your hard drive?

A. Defragging your hard drive


Question 19 of 20
0.0/ 5.0 Points

Which type of updates should be installed in a test environment before being installed in a live enterprise environment?


A. Recommended Updates


B. regular and optional


C. Service Packs


D. Security updates




Question 20 of 20
0.0/ 5.0 Points

You are having trouble cleaning your computer for a troublesome virus. You decide to try to clean your computer while in safe mode. How do you access the menu to boot into safe mode?


A. Press the F5 key before the computer posts.


B. Press the F8 key before the computer posts.


C. Press the F8 key after the computer posts.


D. Press the F9 key after the computer boots the operating system.
You are configuring the local Windows Firewall on your Windows 7 computer. Which network category needs to have the most stringent rule set?

A.Public

You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?

D.15%