A. Identify the problem.
B. Establish a theory.
C. Establish a plan of action.
D. Document findings.
A. Identify the problem.
A. Task Manager
B. Windows RE
C. Safe Mode
D. Msconfig
D. Msconfig
A. “What is the administrator password?”
B. “Are there any current backups?”
C. “Do you want me to shut down the server?”
D. “Which version of Windows Server is this?”
B. “Are there any current backups?”
A. Access Windows RE.
B. Boot into Safe Mode and roll back the driver.
C. Reinstall the operating system.
D. Boot into Directory Services Restore mode.
B. Boot into Safe Mode and roll back the driver.
A. Device Manager
B. DxDiag
C. Services.msc
D. USMT
B. DxDiag
A. UAC
B. Aero
C. Application dock
D. Sidebar
C. Application dock
A. \% systemroot%\ Windows
B. \% systemroot%\ Windows\ System32\ Config
C. \% systemroot%\ System32
D. \% systemroot%\ System32\ Config
D. \% systemroot%\ System32\ Config
A. Enter net stop spooler and then net start spooler in the command line.
B. Enter net stop print spooler and then net start print spooler in the command line.
C. Go to Computer Management > Services and restart the Print Spooler service.
D. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service.
A. Enter net stop spooler and then net start spooler in the command line.
D. Go to Computer Management > Services and Applications > Services and restart the Print Spooler service.
A. Change C: /FS:NTFS
B. Change C: NTFS /FS
C. Convert C: /FS:NTFS
D. Convert C: NTFS /FS
C. Convert C: /FS:NTFS
A. System stability may be compromised.
B. Files might be cross-linked.
C. The drive might become fragmented.
D. Physical damage to devices might occur.
A. System stability may be compromised.
A. Ipconfig
B. Ping
C. Regedit
D. DxDiag
C. Regedit
A. He can run the Disk Defragmenter in Computer Management.
B. He can run defrag.exe –f in the command-line.
C. He can run defrag.exe –v in the command-line.
D. He can run defrag.exe –A in the command-line.
B. He can run defrag.exe –f in the command-line.
A. The brand of access point
B. The wireless standard used
C. The encryption standard used
D. The SSID of the access point
C. The encryption standard used
D. The SSID of the access point
A. XCOPY
B. SYSPREP
C. Ghost
D. Image Clone
B. SYSPREP
A. When the wrong processor is installed B. When a device is missing drivers
C. When the computer was shut down improperly
D. When the computer detects a condition from which it cannot recover
D. When the computer detects a condition from which it cannot recover
16. When a person takes control of a session between a server and a client, it is known as which type of attack? A. DDoS B. Smurf C. Session hijacking D. Malicious software
C. Session hijacking
A. bootrec /fixboot
B. bootrec /fixmbr
C. bootrec /rebuildbcd
D. boot\ bcd
C. bootrec /rebuildbcd
A. Completely erase the old drive prior to disposal.
B. Format the new hard drive twice prior to installation.
C. Only use FAT32 file systems when formatting the new drives.
D. Install antivirus software on the computer before removing the old hard drive.
A. Completely erase the old drive prior to disposal.
A. Host-based firewall
B. Application baselining
C. Patch management
D. Virtualization
C. Patch management
A. Document findings, actions, and outcomes
B. Verify full system functionality and, if applicable, implement preventative measures
C. Establish a plan of action to resolve the problem and implement the solution
D. Question the user and identify user changes
C. Establish a plan of action to resolve the problem and implement the solution
A. Backup and Restore
B. Backup Status and Configuration
C. Time Machine
D. File History
D. File History
A. 800 MHz
B. 1 GHz
C. 2 GHz
D. 2 GB
B. 1 GHz
A. Drive image installation
B. USB installation
C. Multiboot installation
D. Unattended installation
D. Unattended installation
A. 20 GB
B. 2 GB
C. 4 GB
D. 15 GB
D. 15 GB