Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ON902 - Misc Stuff 3

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
902 - Misc Stuff 3

Description:
902 - Misc Stuff 3

Author:
BA
(Other tests from this author)

Creation Date:
01/04/2018

Category:
Others

Number of questions: 40
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Quick! Tell me the fastest tool for force stopping a program....
Quick Tell me the fastest way to stop a program from launching at startup....
Quick! Tell me whats the command line command for adding a DLL file to the registry....
Quick! Tell me the quickest way to see all the information about the hardware on a computer...
You've been asked to look at a new computer that's having problem, but you're not sure what storage devices, volumes, or drive letters have been configured. What command line would allow you to view this information?.
Which Linux or Mac OS command line command would allow you to Change the IP address inside of text file?.
What Windows command is used to check the integrity of all operating system files?.
You want to identify any logical file system problem. What command line command do you use in Windows?.
The ___ command in Linux would allow you to count the the number of files contained in a directory.
A tech wants to initialize the NTFS file system on a USB connected drive. He should use the _____ command line command.
The ____ command line command will extract a device drives SYS file.
A drive in your RAID 5 array has failed. Which of these would be the best next step? Replace the drive and restore from a known good backup Replace the drive and resync the array Replace the bad drive and all other devices associated with that array controller and restore from backup Perform a backup, replace the drive, and restore from a backup.
You just downloaded a new calendar program. Now when you boot up your machine, it tells you "No boot device is available". What just happened? You executed a trojan horse You have ransomware A rootkit is installed A botnet is now using your computer.
What is the name of the program that boots Windows? regsvr32 msconfig bootmgr registry.
There are 4 main "groups" of users by default in Windows: Administrators, Power Users, Users, and Guests. Administrator can do anything. Power User is close, but a key thing it cannot do is: A key thing a standard User cannot do is:.
Quick! Tell me how to get to the Local Users and Groups manager tool in Windows 7.
In a Windows, a _______ is a group of computers that share a common user account database. On the other hand, ______ are simply groups of computers that can share resources with each other. domain, workgroups workgroup, domains cluster, homegroups homegroup, clusters.
Windows created ______ which enables standard users to do common tasks and provides a permissions dialog box when certain things are done, such as running certain programs or installing programs, that could potentially harm the computer.
A Windows Administrator can utilize ______ to monitor and limit activities of any standard user. The feature gives managers and parents an excellent control over the content that employees and children can see.
John wants to limit the time one of his employees is allowed to spend on a computer at work. He can manage this using which Control Panel Applet? Activity Center Parental Controls Administrative Tools Microsoft Managment Console.
Beginning with Windows 8, Microsoft started managing accounts in an internet based fashion (global account). When you login, you use your Microsoft account which must be a hotmail or outlook account. True False.
The process of determining NTFS permissions any newly created file or subfolder contained in a folder receive is called _____.
In NTFS folder permissions, the deny checkbox always overrides inheritance. True False.
The only type of permissions propagation where a file or folder KEEPS the original permissions is: MOVE to within the same volume COPY to within the same volume MOVE to a different volume COPY to a different volume.
Which of the following is an advantage of running Windows on NTFS as opposed to FAT32? Security Support for DOS applications Long filenames Network support .
Ricardo’s Windows XP installation has failed. What file should he check to see what files failed to copy? Install.log Setup.log Setup.txt Setuplog.txt.
If you do not complete the activation process for Windows XP, Vista, or 7, what will happen to your computer? Nothing. Activation is optional. The computer will work fine for 30 days and then Windows will be disabled. Microsoft will not know how to contact you to provide upgrade information. You will have to use a floppy disk set to boot to Windows.
If you get an error message saying that the Setup program cannot read the CAB files, what should you do? Copy the CAB files from the Windows installation disc to your local hard drive and run the Setup program from there. Skip this step because the CAB files are not necessary to install Windows successfully. Go to the Microsoft Web site and download the latest version of the CAB File Wizard. Cancel the installation process and keep your old operating system because your hardware does not meet the minimum requirements.
If you right click a folder and go to Folder Properties, then the General Tab and the Advanced button, there is a check box there for encrypting the contents. If you check this, you're using ______.
BitLocker is used for security on laptops, because if one is stolen, the whole hard drive is encrypted. It requires to use of a ____ chip on the motherboard to function. Memory TPM BIOS Intel.
What is the version of BitLocker used on removable flash drives called?.
All versions of Windows have the Local Security Policy utility. True False.
What special symbol (icon) do actions that require permission under User Account Control show?.
Which tool or mechanism defines what resources a user may access and what he or she may do with those resources? Authentication through user accounts and passwords. Authorization through user accounts and passwords. Authentication through NTFS. Authorization through NTFS.
Which tool would you use to quickly get rid of temporary internet files?.
There are 2 areas you should consider for scheduled maintenance:.
Line the tools up below for scheduling maintenance. Windows Apple Linux.
Apple Tools: Time Machine Boot Camp Net Boot.
Open source technology commonly used to allow multiple operating systems to boot on a single machine. It is commonly used as the default boot loader for Linux, but it is compatible with Windows also. GRUB WAIK AUP PAAS.
The type of disk that refers to partitions as "volumes" is: Basic Dynamic.
Report abuse Consent Terms of use