C10.V.8.3 Introduction to Computers Online Exam 8_07

Part 1 of 1 – 100.0/ 100.0 Points
Question 1 of 205.0/ 5.0 PointsYou install a new antivirus application on your computer and it keeps quarantining a legitimate application file in that application’s directory. How can you prevent this from happening while still being able to protect your system?A. Run the AV application in safe mode so the application is turned off. B. Create a custom scan and exclude the application’s directory. C. Run the AV application in defrag mode during all scans. D. Exclude all .exe file types when scanning the computer.
Question 2 of 205.0/ 5.0 PointsYou want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?A. CHKDSK /f B. CHKDSK /r C. CHKDSK /e D. CHKDSK /RD
Question 3 of 205.0/ 5.0 PointsWhich of the instances below is an example of a Trojan horse?A. An attachment in an email that is really a malicious file B. A link in an email that downloads a virus C. An executable file that replicates throughout the network D. A computer game that creates a backdoor into your computer
Question 4 of 205.0/ 5.0 PointsWhat do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?A. A domain controller B. A BitLocker Server C. A WSUS server D. A Proxy Server
Question 5 of 205.0/ 5.0 PointsYour computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?A. Ccleaner B. TreeSize C. MalwareBytes D. Auslogics Disk Defrag
Question 6 of 205.0/ 5.0 PointsYou have just purchased a brand new Windows 8 computer. What should you do right away with the Administrator account?A. Disable it B. Enable EFS for the account C. Encrypt its logon D. Change its username
Question 7 of 205.0/ 5.0 PointsYou are configuring the local Windows Firewall on your Windows 7 computer. Which network category needs to have the most stringent rule set?A. Public B. Private C. Home D. Domain
Question 8 of 205.0/ 5.0 PointsIn order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:A. be 32-bit. B. host a virtualized enabled BIOS. C. be TPM-compatible. D. have a USB 3.0 interface.
Question 9 of 205.0/ 5.0 PointsWhich type of Windows updates below includes new features and extends the functionality of the operating system?A. Critical B. Optional C. Recommended D. Service Pack
Question 10 of 205.0/ 5.0 PointsYou are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?A. Inbound rules only B. Outbound rules only C. Neither inbound nor outbound rules D. Both inbound and outbound rules
Question 11 of 205.0/ 5.0 PointsWhat is a limiting factor of EFS when compared to BitLocker?A. It only works on 32-bit operating systems. B. It only works with a public certificate. C. It only works under the Administrator account. D. It only works at the file or folder level.
Question 12 of 205.0/ 5.0 PointsWhat type of hard drive does not require defragging?A. A hard drive for a server B. A hard drive for a 64-bit operating system C. A solid-state drive hosting Windows 7 D. An SCSI drive hosting Server 2008
Question 13 of 205.0/ 5.0 PointsWhich of the events below would automatically create a new restore point on your Windows 8 computer?A. Deleting the temporary files B. Installing a new printer C. Downloading music files D. Creating a new Internet favorite
Question 14 of 205.0/ 5.0 PointsYour AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this?A. CCleaner B. Disk Cleanup C. MalwareBytes D. Auslogics Disk Defrag
Question 15 of 205.0/ 5.0 PointsTask Manager is showing an application as “Not Responding.” What can you do?A. Right-click on the application and select “End Task.” B. Right-click on the application and select “End Application.” C. Right-click on the application and select “Kill Process Tree.” D. Right-click the application from an elevated prompt and close it.
Question 16 of 205.0/ 5.0 PointsA spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?A. From the Processes tool in the Control Panel B. From the Process tab in Task Manager C. From the Performance tab in Task Manager D. From the Windows Defrag console
Question 17 of 205.0/ 5.0 PointsYou run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?A. 3% B. 5% C. 10% D. 15%
Question 18 of 205.0/ 5.0 PointsHow is a worm different from a virus?A. It only targets the windows operating system. B. It only monitors Internet behavior and is not malicious. C. It doesn’t require human intervention to spread. D. It is only distributed through email messages.
Question 19 of 205.0/ 5.0 PointsWhich type of Windows updates below is strictly security-related?A. Critical B. Optional C. Recommended D. Service Pack
Question 20 of 205.0/ 5.0 PointsWhy is it best to run AV scans when the computer isn’t being utilized?A. The scans consume resources and can impede computer performance. B. Executable files can’t be scanned if a user is using them within an application. C. The Windows directory can’t be scanned if the computer is being used. D. AV applications can only do full scans if the computer is in safe mode.

Place an Order

Plagiarism Free!

Scroll to Top