শুক্রবার, ২৬ জুলাই, ২০১৩

Cisco IT Essentials V 5 [CHAPTER 5]

Correct answers have  in front of the answer

erating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality?

Run chkdsk on the affected drive to restore system files to their post-installation state.

Use an incremental backup to restore the system.

Use a system image that was created prior to the failure to restore the system.

Use a differential backup to restore the system.

13
After upgrading a computer to Windows 7, a user notices that the UAC (User Account Control) panel appears more frequently. How can the user reduce the frequency with which the UAC appears?

Replace the graphics card with one that meets the minimum hardware requirements for Windows 7.

In the Performance Options dialog box of the Performance Information and Tools control panel, choose Adjust for Best Performance.

Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control panel.

Reinstall all user programs in Compatibility Mode.

14
How much RAM can theoretically be addressed by a 64-bit operating system?

32 GB maximum

64 GB maximum

16 GB maximum

4 GB maximum

128 GB or more

15
What is the term for the ability of a computer to run multiple applications at the same time?

multitasking

multiuser

multiprocessing

multimedia

16
A Windows XP system is unable to boot properly. What is the procedure to use to boot this system into Safe Mode?

Reboot the system and press Del or F2 depending on the system.

Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode.

From the command prompt run the shutdown -r -s command.

Run the MSCONFIG utility and choose the option Selective Startup.

17
A technician has installed a new video driver on a Windows XP computer and now the monitor shows distorted images. The technician needs to install a different video driver that is available on a network server. What startup mode should the technician use to access the driver on the network?

Debugging Mode

Safe Mode

Safe Mode with Networking

Safe mode with Command Prompt

18
A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS without losing user data. Which course of action should be taken to upgrade the file system to NTFS?

Use the Disk Management utility to convert the drive from Basic to Dynamic, which changes the file system to NTFS automatically.

Reformat all of the existing partitions and use the NTFS file system.

Run the CONVERT.EXE utility to convert the file system to NTFS.

Reinstall Windows XP and to format the drive choose NTFS when prompted .

19
To which category of hypervisor does the Microsoft Virtual PC belong?

Type 1

Type 2

Type 3

Type 4

20
A college uses virtualization technology to deploy information security courses. Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs?

The viruses and worms will have limited functionality inside the virtualized environment.

Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack.

The virtualization environment has better tools to develop mitigation solutions.

The lab exercises are performed faster inside of the virtualized environment.

21
What are two advantages of the NTFS file system compared with FAT32? (Choose two.)

NTFS is easier to configure.

NTFS provides more security features.

NTFS supports larger files.

NTFS allows faster access to external peripherals such as a USB drive.

NTFS allows faster formatting of drives.

NTFS allows the automatic detection of bad sectors.

22
Which two statements are true about restore points? (Choose two.)

A technician should always create them after updating the operating system.

They are useful to restore the computer to an earlier time when the system worked properly.

They recover personal files that have been corrupted or deleted.

They contain information about the system and registry settings that are used by the Windows operating system.

They back up personal data files.

23
A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom?

The video card does not support the resolution that is being used.

A recently installed device driver is incompatible with the boot controller.

A process is using most of the CPU resources.

One or more program files have been deleted.

24
What would be the result of having a corrupt Master Boot Record?

The printer will function incorrectly.

The operating system will fail to start.

A new application will fail to install.

The keyboard will be unresponsive to the user.

কোন মন্তব্য নেই:

একটি মন্তব্য পোস্ট করুন