1102Core2practice questions C66-C86

1102Core2practice questions C66-C86

12th Grade

20 Qs

quiz-placeholder

Similar activities

Computer Knowledge

Computer Knowledge

12th Grade - University

20 Qs

ITN 101 Lesson 2 Test Review

ITN 101 Lesson 2 Test Review

9th - 12th Grade

19 Qs

App Lab

App Lab

7th - 12th Grade

20 Qs

CIW

CIW

9th - 12th Grade

15 Qs

Unit 9 - Windows Installation Review

Unit 9 - Windows Installation Review

9th - 12th Grade

18 Qs

Computer Maintenance

Computer Maintenance

1st Grade - Professional Development

20 Qs

A+ 1101 PM B 26-45

A+ 1101 PM B 26-45

12th Grade

21 Qs

Digital Storage Vocabulary Quiz

Digital Storage Vocabulary Quiz

10th Grade - University

20 Qs

1102Core2practice questions C66-C86

1102Core2practice questions C66-C86

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Hasina Hafner

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user in the marketing department needs to move data between macOS and Windows computers using a USB flash drive. Which of the following file systems would be the BEST way to easily transfer files between these operating systems?

A. exFAT

B. APFS ❍

C. NTFS

D. ext4

Answer explanation

A. exFAT The exFAT (Extended File Allocation Table) file system is designed for flash drives and can be used across Windows, Linux, macOS, and other operating systems. The incorrect answers: B. APFS APFS (Apple File System) is used exclusively on macOS and other Apple devices. A flash drive formatted with APFS would not be accessible from the Windows operating system. C. NTFS The NTFS (NT File System) file system is the standard for Windows devices. Although it can be read by macOS, it is not completely compatible with the macOS operating system. D. ext4 The ext4 (Fourth Extended Filesystem) is commonly associated with Linux and Android operating systems. A USB drive formatted with ext4 would not be the best way to transfer files between Windows and macOS. More information: 220-1102, Objective 1.8 - File Systems https://professormesser.link/1102010802

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a user starts their desktop computer, the Windows splash screen is shown with a rotating circle, but the login screen is never displayed. A technician researches the issue and finds the computer was just updated to the latest set of Windows patches. Which of the following would be the NEXT step the technician should follow to help solve this issue?

A. Restart the computer

B. Perform a Startup Repair

C. Start in VGA mode

D. Rebuild the user's profile

Answer explanation

B. Perform a Startup Repair The Windows Startup Repair is an automated feature that will examine each phase of the startup process and reconfigure any invalid or incorrect settings. This is a common repair to use when the startup process is not working properly after an application or operating system update. The incorrect answers: A. Restart the computer It's most likely the Windows patches caused this login problem, so restarting the system would still cause the system to exhibit the same issue. C. Start in VGA mode If Windows was displaying a completely black screen instead of the login prompt, then starting in VGA mode may be useful. In this example, the Windows splash screen and rotating circle are visible on the screen. D. Rebuild the user's profile A bad user profile might cause the desktop to appear differently than normal and user files may not be visible from the File Explorer. In this example, the desktop and other user files were not accessible because the login prompt did not appear. More information: 220-1102, Objective 3.1 - Troubleshooting Solutions https://professormesser.link/1102030102

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A desktop technician is moving hard drives from one set of training room computers to another. Which of the following would allow the drives to be used in the new computers but prevent any of the existing data from being recovered?

A. Shredder

B. Quick format

C. Drill

D. Standard format

Answer explanation

D. Standard format The Windows standard format will overwrite each sector of the drive and prevent any recovery tools from restoring any of the previous data. The incorrect answers: A. Shredder A shredder will physically cut the drive into small pieces. This certainly prevents the recovery of the data, but it also causes the drive to be permanently damaged and unusable. B. Quick format A Windows quick format overwrites the file system table and marks all of the data on the drive as "deleted." None of the sectors are overwritten, and recovery software can often restore the remaining data. C. Drill A drill will ensure that the data cannot be recovered, but it physically damages the drive so that it cannot be used by others. More information: 220-1102, Objective 2.8 - Data Destruction https://professormesser.link/1102020801

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A workstation technician manages a training center with thirty student computers in each room. All of the computers have the same hardware configurations. Which of these installation methods would be the BEST choice for quickly resetting the training rooms at the end of each week?

A. In-place upgrade

B. Image installation

C. Repair installation

D. Clean install

Answer explanation

B. Image installation An image installation can install an operating system, applications, and customized system configurations to multiple devices in a single step. With a pre-built images, a large training room of systems can be updated with a specific configuration very efficiently. The incorrect answers: A. In-place upgrade An in-place upgrade will modify the version of Windows running on a system. In this example, the systems need to be reset to their original state. C. Repair installation A repair installation is used to fix an installation that cannot boot properly to a Windows desktop. The repair installation will attempt to repair portions of the startup process, but it will not modify the user's files or applications. D. Clean install A clean install would provide a fresh starting point, but it doesn't include any of the applications required for the training facility. Most systems will require additional configurations and application installations after a clean install. More information: 220-1102, Objective 1.9 - Installing Operating Systems https://professormesser.link/1102010901

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user would like to use their smartphone for a payment during checkout at the grocery store, but the smartphone is not seen by the payment system. Which of the following would be the BEST next troubleshooting step?

A. Restart the smartphone

B. Replace the battery

C. Perform a factory reset

D. Enable Wi-Fi

Answer explanation

A. Restart the smartphone There are limited troubleshooting options available for NFC (Near Field Communication) connections, and most smartphones enable the NFC feature by default. If the NFC feature is not seen at all, a restart of the smartphone may enable the functionality. The incorrect answers: B. Replace the battery The NFC features are not directly associated with the battery, and replacing the battery will not resolve this issue. C. Perform a factory reset A factory reset would delete all user information from the phone. Although this may be an option for future troubleshooting, it would not be the best next step for this issue. D. Enable Wi-Fi NFC features are not part of the 802.11 Wi-Fi network. Modifying the Wi-Fi configuration and settings will not resolve issues with NFC. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is troubleshooting a problem with user’s laptop and very high utilization, even with no activity on the screen or user input to the operating system. Task Manager shows the CPU is operating at 100% utilization, memory utilization is slightly elevated, and there is a large amount of outbound network communication. Which of the following would be the MOST likely reason for these issues?

A. System RAM is faulty

B. User has not properly authenticated

C. Laptop is part of a DDoS attack

D. Network adapter is faulty

Answer explanation

C. Laptop is part of a DDoS attack High CPU utilization, memory use, and network traffic with no user intervention indicates a possible malware infection and participation in a DDoS (Distributed Denial of Service) attack. Of the available options, this would be the most likely reason for these symptoms. The incorrect answers: A. System RAM is faulty Bad system memory usually causes the system to fail with a Windows stop error or to simply hang. Bad system RAM would not cause the CPU, memory, or network issues on this user's laptop. B. User has not properly authenticated A user who has not authenticated would be expected to have less CPU, memory, and network resource usage. It would not be common for an authentication issue to cause this resource activity. D. Network adapter is faulty A bad network adapter might cause errors to accumulate on the network link, but it would not commonly cause an increase in CPU and memory usage. More information: 220-1102, Objective 2.4 - Denial of Service https://professormesser.link/1102020402

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user's smartphone app shows a splash screen but disappears after a few seconds. Which of the following would be the BEST way for the a technician use to view logs and memory statistics for the app?

A. Developer mode

B. Cloud storage

C. Jailbreaking

D. Application spoofing

Answer explanation

A. Developer mode Developer mode enables features commonly used by developers but can be used by anyone to help with troubleshooting and information gathering. The incorrect answers: B. Cloud storage Cloud storage is useful for backing up a mobile device, but it doesn't provide any additional statistics or troubleshooting information. C. Jailbreaking Jailbreaking is an unsupported method to gain direct access to the smartphone operating system, and it's a direct violation of the software's end user license agreement. Jailbreaking should never be used on a corporate smartphone. D. Application spoofing An application that looks legitimate but is instead malicious is an application spoofing attack. Application spoofing does not provide any additional troubleshooting tools. More information: 220-1102, Objective 3.5 Troubleshooting Mobile Device Security https://professormesser.link/1102030501

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?