Your mom’s computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?
C. A bad printer driver
What is a limiting factor of EFS when compared to BitLocker?
D. It only works at the file or folder level.
Which of the events below would automatically create a new restore point on your Windows 8 computer?
B. Installing a new printer
Which type of Windows updates below is strictly security-related?
A. Critical
Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?
B. TreeSize
You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?
D. Both inbound and outbound rules
Which of the instances below is an example of a Trojan horse?
D. A computer game that creates a backdoor into your computer
Which statement below is not true about EFS?
B. It requires a user to type in a PIN.
You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?
B. Use the Administrator account of the new OS to take ownership of the files.
Which of the actions below will not create more room on your hard drive?
A. Defragging your hard drive
What is the primary limitation of free versions of antivirus applications?
A. They don’t protect in real time.
Task Manager is showing an application as “Not Responding.” What can you do?
A. Right-click on the application and select “End Task.”
You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?
D. 15%
What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?
C. A WSUS server
Which type of updates should be installed in a test environment before being installed in a live enterprise environment?
A. Recommended Updates
Why is it best to run AV scans when the computer isn’t being utilized?
A. The scans consume resources and can impede computer performance.
In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:
C. be TPM-compatible.
You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?
A. CHKDSK /f
You are having trouble cleaning your computer for a troublesome virus. You decide to try to clean your computer while in safe mode. How do you access the menu to boot into safe mode?
C. Press the F8 key after the computer posts.
You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?
B. ZoneAlarm
Place an Order
Plagiarism Free!
Create an Account
Create an account at Top Tutor Online
- Allows you to track orders.
- Receive personal messages.
- Send messages to a tutor.
Post a Question/ Assignment
Post your specific assignment
- Tutors will be notified of your assignment.
- Review your question and include all the details.
- A payment Link will be sent to you.
Wait for your Answer!
Make payment and wait for your answer
- Make payment in accordance with the number of pages to be written.
- Wait for your Answer as a professional works on your paper.
- You will be notified when your Answer is ready.