C10V Lesson 8 Exam

Your mom’s computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?

 

C. A bad printer driver

What is a limiting factor of EFS when compared to BitLocker?

 

D. It only works at the file or folder level.

Which of the events below would automatically create a new restore point on your Windows 8 computer?

B. Installing a new printer

Which type of Windows updates below is strictly security-related?

 

A. Critical

Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?

 

B. TreeSize

You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?

 

D. Both inbound and outbound rules

Which of the instances below is an example of a Trojan horse?

D. A computer game that creates a backdoor into your computer

Which statement below is not true about EFS?

B. It requires a user to type in a PIN.

You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?

B. Use the Administrator account of the new OS to take ownership of the files.

Which of the actions below will not create more room on your hard drive?

 

A. Defragging your hard drive

What is the primary limitation of free versions of antivirus applications?

A. They don’t protect in real time.

Task Manager is showing an application as “Not Responding.” What can you do?

A. Right-click on the application and select “End Task.”

You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?

 

D. 15%

What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?

 

C. A WSUS server

Which type of updates should be installed in a test environment before being installed in a live enterprise environment?

 

A. Recommended Updates

Why is it best to run AV scans when the computer isn’t being utilized?

A. The scans consume resources and can impede computer performance.

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:

C. be TPM-compatible.

You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?

A. CHKDSK /f

You are having trouble cleaning your computer for a troublesome virus. You decide to try to clean your computer while in safe mode. How do you access the menu to boot into safe mode?

 

C. Press the F8 key after the computer posts.

You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?

 

B. ZoneAlarm

Place an Order

Plagiarism Free!

Scroll to Top