You try to run the CHKDSK utility from a command prompt but you keep getting an error message that you need to run it in Elevated Mode. How do you correct this?

Reboot the computer in SAFE Mode and then run CHKDSK from a command prompt.

Open command prompt from the Windows directory and run CHKDSK.

Open a command prompt with the selection “Runs as Administrator.”

Open the 64-bit version of command prompt and run the CHKDSK command.

hat type of hard drive does not require defragging?

A hard drive for a server

A hard drive for a 64-bit operating system

A solid-state drive hosting Windows 7

An SCSI drive hosting Server 2008

What is the primary limitation of free versions of antivirus applications?

They don’t protect in real time.

They only perform quick scans.

They cannot scan the Windows directory.

They only install on 64-bit operating systems.

What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?

A domain controller

A BitLocker Server

A WSUS server

A Proxy Server

A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?

From the Processes tool in the Control Panel

From the Process tab in Task Manager

From the Performance tab in Task Manager

From the Windows Defrag console

Why is it best to run AV scans when the computer isn’t being utilized?

The scans consume resources and can impede computer performance.

Executable files can’t be scanned if a user is using them within an application.

The Windows directory can’t be scanned if the computer is being used.

AV applications can only do full scans if the computer is in safe mode.

Which type of updates should be installed in a test environment before being installed in a live enterprise environment?

Updates for Windows XP

Recommended Updates

Service Packs

Security updates

What is a limiting factor of EFS when compared to BitLocker?

It only works on 32-bit operating systems.

It only works with a public certificate.

It only works under the Administrator account.

It only works at the file or folder level.

You have just purchased a brand new Windows 8 computer. What should you do right away with the Administrator account?

Disable it

Enable EFS for the account

Encrypt its logon

Change its username

Which of the events below would automatically create a new restore point on your Windows 8 computer?

Deleting the temporary files

Installing a new printer

Downloading music files

Creating a new Internet favorite

Task Manager is showing an application as “Not Responding.” What can you do?

Right-click on the application and select “End Task.”

Right-click on the application and select “End Application.”

Right-click on the application and select “Kill Process Tree.”

Right-click the application from an elevated prompt and close it.

Which type of Windows updates below is strictly security-related?

Critical

Optional

Recommended

Service Pack

Your mom’s computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?

A fragmented volume

Spyware

A bad printer driver

Not enough memory

Which of the actions below will not create more room on your hard drive?

Defragging your hard drive

Uninstalling an application

Deleting temporary Internet files

Deleting image and video files

Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?

Ccleaner

TreeSize

MalwareBytes

Auslogics Disk Defrag

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:

be 32-bit.

host a virtualized enabled BIOS.

be TPM-compatible.

have a USB 3.0 interface.

You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?

CHKDSK /f

CHKDSK /r

CHKDSK /e

CHKDSK /RD

You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?

3%

5%

10%

15%

Which type of Windows updates below includes new features and extends the functionality of the operating system?

Critical

Optional

Recommended

Service Pack

You are configuring the local Windows Firewall on your Windows 7 computer. Which network category needs to have the most stringent rule set?

Public

Private

Home

Domain

You are configuring the local Windows Firewall on your Windows 7 computer. Which network category needs to have the most stringent rule set?

A.Public

You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?

D.15%

To correct the error message when trying to run CHKDSK in Elevated Mode, you should open a command prompt with the selection "Runs as Administrator".

As for the type of hard drive that does not require defragging, a solid-state drive (SSD) hosting Windows 7 does not need to be defragmented.

The primary limitation of free versions of antivirus applications is that they don't protect in real time. They usually only perform quick scans and lack real-time protection.

Enterprise environments use WSUS (Windows Server Update Services) servers to centrally manage Windows updates for all devices within their networks.

To end a spyware application that is consuming a lot of memory on a Windows 7 computer, you can do this from the Process tab in Task Manager.

It is best to run antivirus (AV) scans when the computer isn't being utilized because the scans consume resources and can impede computer performance.

In a test environment, updates should be installed and tested before being deployed in a live enterprise environment. This includes recommended updates, service packs, and security updates.

A limiting factor of EFS (Encrypting File System) when compared to BitLocker is that it only works at the file or folder level, whereas BitLocker can encrypt entire drives.

When you have just purchased a brand new Windows 8 computer, you should change the username of the Administrator account right away instead of disabling or enabling it.

Installing a new printer would automatically create a new restore point on a Windows 8 computer.

If an application is "Not Responding" in Task Manager, you can right-click on the application and select "End Task" to terminate it.

Critical updates are strictly security-related updates for Windows.

A bad printer driver is not a reason for slow performance on a computer. Slow performance may be caused by factors such as a fragmented volume, spyware, or insufficient memory.

Defragging the hard drive will create more room on the hard drive, so this option is incorrect.

To see which folders are consuming the most space on your hard drive, you can use the TreeSize application.

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must be TPM-compatible (Trusted Platform Module).

To run CHKDSK and repair any errors it identifies, you would type the command "CHKDSK /f".

The fragmentation level threshold at which you need to defrag the system volume is typically around 10%.

Optional updates include new features and extend the functionality of the operating system.

The network category that needs to have the most stringent rule set on the local Windows Firewall is the Public network category.

To correct the error message that you need to run the CHKDSK utility in Elevated Mode, you should open a command prompt with the selection "Run as Administrator." This will give you the necessary elevated privileges to run CHKDSK.

For the type of hard drive that does not require defragging, it is a solid-state drive (SSD) hosting Windows 7. Unlike traditional hard drives, SSDs do not have mechanical moving parts and therefore do not require defragmentation.

The primary limitation of free versions of antivirus applications is that they usually do not provide real-time protection. Real-time protection continuously scans for threats and provides immediate protection against malware. Free versions often only perform on-demand scans, meaning you have to manually initiate the scan.

Enterprise environments use a WSUS (Windows Server Update Services) server to centrally manage Windows updates for all devices within their networks. WSUS allows IT administrators to download, manage, and distribute updates to all connected devices, ensuring consistent and controlled update deployment.

To end a spyware application that is consuming a lot of memory on a Windows 7 computer, you can do this from the Process tab in Task Manager. Open Task Manager, navigate to the Processes tab, find the process related to the spyware application, right-click on it, and select "End Process" or "End Task," depending on the version of Windows.

It is best to run antivirus scans when the computer isn't being utilized because the scans consume resources and can impede computer performance. Running scans while the computer is in use may slow down other processes and affect overall performance.

Updates that should be installed in a test environment before being installed in a live enterprise environment include recommended updates, service packs, and security updates. Testing these updates in a controlled environment helps identify any potential issues or conflicts they may have with existing systems or applications before rolling them out to the entire network.

A limiting factor of EFS (Encrypting File System) when compared to BitLocker is that it only works at the file or folder level. EFS allows users to encrypt individual files or folders, while BitLocker provides full disk encryption at the volume level.

When you have just purchased a brand new Windows 8 computer, it is recommended to change the username of the Administrator account right away. This helps enhance security by avoiding the use of default or commonly known usernames that can be targeted by attackers.

Installing a new printer would automatically create a new restore point on a Windows 8 computer. Restore points are created automatically before major system changes, such as software installations or updates, to allow for easy recovery if any issues arise.

If an application is shown as "Not Responding" in Task Manager, you can right-click on the application and select "End Task" to close it. This will terminate the unresponsive application.

Critical updates are strictly security-related Windows updates. They address critical vulnerabilities and provide necessary patches to protect against known security threats. It is important to keep critical updates up to date to maintain system security.

A bad printer driver is not a reason for slow computer performance. Slow performance can be caused by factors such as fragmented volume, spyware, or not enough memory.

Defragging your hard drive will create more room on your hard drive. Defragmentation optimizes the file system and rearranges fragmented files to free up space and improve performance.

To see which folders are consuming the most space on your hard drive, you can use the application "TreeSize." TreeSize allows you to analyze disk space usage and provides a detailed overview of folder sizes.

For BitLocker to protect the System Volume without the aid of an external drive, your computer must be TPM (Trusted Platform Module) compatible. TPM is a hardware chip that provides additional security features, including encryption keys used by BitLocker.

To run CHKDSK and have it repair any errors it identifies, you would use the command "CHKDSK /f." The "/f" flag instructs CHKDSK to fix any errors it encounters.

The fragmentation level that represents a threshold at which point you need to defrag the system volume is typically around 10%. When the fragmentation level reaches or exceeds this threshold, it is recommended to defragment the volume to optimize file access and improve performance.

Optional updates include new features and extend the functionality of the operating system. These updates are not critical for security but may enhance the user experience or introduce new capabilities.

The network category that needs to have the most stringent rule set when configuring the local Windows Firewall on a Windows 7 computer is the public network category. Public networks are considered less secure and require stricter firewall rules to protect against potential threats.

Online Exam 8_07


Question 1 of 20
5.0/ 5.0 Points

What type of hard drive does not require defragging?


C. A solid-state drive hosting Windows 7


Question 2 of 20
5.0/ 5.0 Points

How is a worm different from a virus?

C. It doesn’t require human intervention to spread.

Question 3 of 20
5.0/ 5.0 Points

What is the primary limitation of free versions of antivirus applications?

A. They don’t protect in real time.


Question 4 of 20
5.0/ 5.0 Points

You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?

D. Both inbound and outbound rules

Question 5 of 20
5.0/ 5.0 Points

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:


C. be TPM-compatible.



Question 6 of 20
5.0/ 5.0 Points

Why is it best to run AV scans when the computer isn’t being utilized?

A. The scans consume resources and can impede computer performance.

Question 7 of 20
5.0/ 5.0 Points

Which type of Windows updates below is strictly security-related?

A. Critical

Question 8 of 20
5.0/ 5.0 Points

Task Manager is showing an application as “Not Responding.” What can you do?

A. Right-click on the application and select end task
Question 9 of 20
5.0/ 5.0 Points

A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?

B. From the Process tab in Task Manager

Question 10 of 20
5.0/ 5.0 Points

You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?
B. ZoneAlarm

Question 11 of 20 5.0/ 5.0 Points

Which of the events below would automatically create a new restore point on your Windows 8 computer?

B. Installing a new printer

Question 12 of 20
5.0/ 5.0 Points

Which of the instances below is an example of a Trojan horse?

D. A computer game that creates a backdoor into your computer

Question 13 of 20
5.0/ 5.0 Points

You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?

B. Use the Administrator account of the new OS to take ownership of the files.

Question 14 of 20
5.0/ 5.0 Points

What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?


C. A WSUS server



Question 15 of 20
5.0/ 5.0 Points

Which type of Windows updates below includes new features and extends the functionality of the operating system?

D. Service Pack

Question 16 of 20
5.0/ 5.0 Points

You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?

A. CHKDSK /f


Question 17 of 20
0.0/ 5.0 Points

Your mom’s computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?


B. Spyware


Question 18 of 20
5.0/ 5.0 Points

Which of the actions below will not create more room on your hard drive?

A. Defragging your hard drive


Question 19 of 20
0.0/ 5.0 Points

Which type of updates should be installed in a test environment before being installed in a live enterprise environment?


A. Recommended Updates


B. regular and optional


C. Service Packs


D. Security updates




Question 20 of 20
0.0/ 5.0 Points

You are having trouble cleaning your computer for a troublesome virus. You decide to try to clean your computer while in safe mode. How do you access the menu to boot into safe mode?


A. Press the F5 key before the computer posts.


B. Press the F8 key before the computer posts.


C. Press the F8 key after the computer posts.


D. Press the F9 key after the computer boots the operating system.