zenos a+ 702 flash cards v2.1.1
TRANSCRIPT
A+ Revision
702 Flashcards
1
2
1.0 Hardware – 38%
Question 1
• If you wanted to transfer files from a video camera to a computer what port would you most likely use?
Answer 1
• IEEE 1394 (Firewire)
Question 2
• What should you wear when replacing a motherboard or CPU?
Answer 2
• An Anti-Static Wrist Strap
• Remember to also use an Antistatic Mat to place components. Connect your Wrist strap to the Mat. If you will be moving any components then use an Antistatic Bag as well.
Question 3
• What kind of card would you install on your computer if you wanted to record a TV broadcast on your computer?
Answer 3
• A TV Tuner card
Question 4
• What type of hard disk would be most reliable in a laptop that is likely to be used on a building site?
Answer 4
• Solid State
• Why would Task Manager show 2 CPUs when you only have 1?
11
Question 5
• The CPU supports Hyper Threading
12
Answer 5
• What hardware can cause multi-beep codes at start-up if not working properly?
13
Question 6
• RAM
14
Answer 6
• What could be the reason for not being able to hear sound played through CDs while sound from the PC works?
15
Question 7
• Check the Audio Cable on the Motherboard
16
Answer 7
Question 8
• Why would a system fail to recognise a single RIMM memory module you have just installed?
Answer 8
• RIMMS must be installed in pairs
OR…
• A C-RIMM needs to be used in the empty slot
Question 9
• What tool would you use to test the voltage coming from a laptop’s AC adaptor?
Answer 9
• Multimeter
Question 10
• Which of the following interfaces would provide the fastest data transfer speeds for external storage devices:– USB 2.0
– 1394B
– eSATA
Answer 10
• eSATA
Question 11
• What could cause a ghost image on a printout?
Answer 11
• Problems with the drum such as it has not been cleaned properly.
(Read the A+ manual and make sure you learn the causes of all printer faults)
Question 12
• If you don’t have any USB connectors then what can you use to connect your keyboard and mouse?
Answer 12
• PS2
Question 13
• Which connector type is used to plug into a phone jack?
Answer 13
• RJ11
Question 14
• How many Hard Disks would you need to create a RAID 5 system?
Answer 14
• 3
Question 15
• What is the Maximum Recommended distance for Bluetooth 1.0?
Answer 15
• 30 Feet (9 Metres)
Question 16
• If you install a secondary IDE disk to your computer and it does not show up in Disk Management, what could be the reason?
Answer 16
• Incorrect Jumper Settings – You might have set it to Master or
• You may not have connected the molex connector
Question 17
• If you had a CRT monitor that shows distorted images what should you do?
Answer 17
• Degauss it
• However, if it keeps doing that then you should look around to find anything that might be interfering with the display
• What could be the reason for a PC not showing accurate time?
37
Question 18
• CMOS battery is failing.
38
Answer 18
• What could be two reasons for USB not working on your computer?
39
Question 19
• You haven't plugged in the USB device properly
OR
• Its disabled in BIOS.
40
Answer 19
Question 20
• If you install additional RAM on a computer and now it keeps rebooting continuously. What could be the problem?
Answer 20
• The additional RAM may be faulty.
Question 21
• If none of the letters and numbers work on your laptop’s keyboard what should you do?
Answer 21
• Check the keyboard connector to the motherboard
• What should you do after you have installed a maintenance kit on a printer?
45
Question 22
• Print a test page and reset the Page Counter
46
Answer 22
• A customer complains that although his laptop appears to boot, the LCD screen remains blank.
• What would you try first?
Question 23
• Toggle the Fn + Screen buttons until the display appears.
Answer 23
Question 24
• If you install a new system board in a computer and the computer fails to start, what should you do?
Answer 24
• Check that all cables are connected correctly.
Question 25
• What type of Hard Drives would require jumper setting configuration?
Answer 25
• PATA
• What is the lid switch on a laptop used for?
53
Question 26
• When the lid is closed it can hibernate/shutdown or set the computer to standby based on how it is configured.
54
Answer 26
• What could be the reason for a PC shutting down shortly after starting up?
55
Question 27
• Overheating caused by problems with the Fan, Heat Sink or thermal paste
56
Answer 27
• You have a PC that had an OS installed remotely overnight.
It continues doing the same today.
What should you do?
57
Question 28
• Change the boot order in BIOS so it’s no longer booting from the network card.
58
Answer 28
• What could be the reason for the Wireless not working on a laptop anywhere you go?
59
Question 29
• The Hardware switch for Wireless is turned off/disabled.
60
Answer 29
• If you had a SATA hard disk and it had both SATA and Molex power connectors, which connector would you use?
61
Question 30
• The SATA Power connector.
62
Answer 30
• Which type of printer would you use for multi-part forms?
63
Question 31
• Impact
64
Answer 31
• If you had poor quality printouts in your inkjet printer what could you do?
65
Question 32
• Change the Print Heads
66
Answer 32
• Between SATA and PATA which drive type has the fastest speed?
67
Question 33
• SATA
68
Answer 33
• What would cause smeared printouts?
69
Question 34
• Problem with the fuser
70
Answer 34
• What are 2 ways to reset the CMOS?
71
Question 35
• CMOS Jumpers
• Removing the Battery
72
Answer 35
• If you wanted to backup your data which optical disc technology would store the most?
73
Question 36
• Blu-Ray
74
Answer 36
• Which RAID type could you use to improve performance if you only had 2 hard drives?
75
Question 37
• RAID 0
76
Answer 37
• How many hard drives do you need to set up RAID 1 (Mirroring)?
77
Question 38
• Two
78
Answer 38
• You suspect that a workstation has a power problem. The mains power is okay. What item of test equipment can you use to find the fault?
79
Question 39
• Power Supply tester
(or a multimeter could be used)
80
Answer 39
• How would you manually eject a CD from a CD-ROM drive
81
Question 40
• Use a Paper Clip
82
Answer 40
• What tool would you use for locating cables effectively at patch panels, switches, termination blocks, or hidden within bundles ?
83
Question 41
• A Tone Probe
84
Answer 41
• If you get the error “Invalid Boot Device”. Apart from a Floppy Disk what else could cause this?
85
Question 42
• If the PC is trying to boot from a USB Flash Drive
86
Answer 42
• Why would a USB cable have a Mini-USB connector on one end and two standard USB connectors on the other?
87
Question 43
• The second USB connector is for additional power.
88
Answer 43
Question 44
• Which type of Hard Disk connector is this?
Answer 44
• SATA
Question 45
• If you have a USB Hub with four USB devices plugged in. What could cause a USB Hard Drive not to function properly when connected to the Hub?
Answer 45
• Too many devices would mean that there might not be enough power to all of them.
• You could either remove some or you could replace the Hub with a Self Powered one.
Question 46
• What does the CHKDSK /R command do?
Answer 46
Question 47
• What technology allows you to support multiple PCIe display adaptors?
Answer 47
• SLI
2.0 Operating System – 34%
• What is the purpose of safe mode?
98
Question 1
• To run a minimum set of drivers to allow the start of the Operating System
99
Answer 1
• What tool is used to Disable programs and also disable start-up services.
100
Question 2
• MSCONFIG
• (System Configuration Utility)
101
Answer 2
• If you want to convert your file system from FAT32 to NTFS what command would you use?
102
Question 3
• CONVERT <drive letter>: /fs:ntfs
103
Answer 3
• If you have a missing DLL file what command would you run to fix this?
104
Question 4
• SFC/Scannow
105
Answer 4
• If you get the error “NTLDR is Missing” what should you do?
106
Question 5
• Use Recovery Console to troubleshoot and repair the problem.
• If you have a floppy disk inserted you could remove that and that would solve the issue
107
Answer 5
• What does the RED X in Device Manager mean?
108
Question 6
• Device is Disabled
109
Answer 6
• What does the yellow exclamation mark in Device Manager mean?
110
Question 7
• The device is in a problem state
• No Device Driver found
111
Answer 7
• What are two ways to restart a print spooler?
112
Question 8
• Use the Net Start Command
OR
• Use Services in Administrative Tools or MMC
113
Answer 8
• To use Vista Aero Glass effect, what version of Direct X do you need?
114
Question 9
• DirectX 9
The graphics card must also support:– A WDDM driver
– Pixel Shader 2.0 in hardware
– 32 bits per pixel
115
Answer 9
• If your Master Boot Record got corrupted due to a Virus, how would you fix this?
116
Question 10
• Use the FIXMBR command from the Recovery Console
117
Answer 10
• What is the default profile path for Windows 2000 and XP?
118
Question 11
• C:\Documents and Settings\%username%
119
Answer 11
• What is the default profile path for Windows Vista and 7?
120
Question 12
• C:\users\%username%
121
Answer 12
• If you were running out of Space on C: drive but still wanted people to store data on it. How would you resolve this?
122
Question 13
• Use a Mount Point
123
Answer 13
• Which switch do most commands support?
Question 14
• /? for help
Answer 14
• If you are experiencing Blue-Screen errors and you want to find the issue what can you run?
126
Question 15
• Driver Verifier (Verifier.exe)
127
Answer 15
• What might cause an XP PC to run in VGA 16 colour mode?
Question 16
• Incorrect/incompatible video driver.
• Choosing VGA mode in the advanced boot options.
Answer 16
• What graphical utility can be used to determine the current partition information on a computer?
130
Question 17
• Disk Management
131
Answer 17
• What tool could be used to run a task or program automatically?
132
Question 18
• Task Scheduler
133
Answer 18
• Two users share a PC. One can print the other cannot. What could be the possible reason?
134
Question 19
• Second person doesn’t have the printer installed on his profile. He might have a virtual printer e.g. Microsoft Document Image Writer.
135
Answer 19
• What would happen if you were to convert a Dynamic Disk to a Basic Disk?
136
Question 20
• Data will be permanently lost
137
Answer 20
Question 21
• Where would you find Services in the Control Panel and how would you restart a service from there?
Answer 21
• Control Panel ->Administrative Tools -> Services
• Select a service and click stop and start or click restart
Question 22
• What type of users can run Applications but don’t have full system permissions in Windows XP?
Answer 22
• Power Users
Question 23
• Which utility in Windows XP would you use to troubleshoot digital driver signatures?
Answer 23
• Sigverif
Question 24
• If you wanted another user to use your computer with minimal privileges and not able to access your files, what should you do?
Answer 24
• Get them to use the built in guest account
• Also make sure you set all you personal folders/files to be private
• What utility would you use to verify the functioning of a device in Windows? It can also be used enable and disable devices and drivers.
146
Question 25
• Device Manager
147
Answer 25
• Which command would you use to run Remote Desktop and how do you access it from the Start menu?
148
Question 26
• Mstsc
OR
• Start -> Programs->Accessories ->communications -> Remote Desktop
149
Answer 26
• If you choose enable boot logging in the Advanced Boot Menu. Where is the log stored?
150
Question 27
• Ntbtlog.txt
151
Answer 27
• What free tool can you use from Microsoft which will help you determine if there are any changes needed to increase security?
152
Question 28
• MBSA
153
Answer 28
• Which three files are need to start the Windows XP boot process?
154
Question 29
• BOOT.INI, NTLDR, NTDETECT
155
Answer 29
• How can you disable UAC in Vista?
156
Question 30
157
Answer 30
• Which Service Tab would you check in Services if several services failed to start?
158
Question 31
• Dependencies
159
Answer 31
• True or False: You can use System Information to find out the MAC Address of a network card?
160
Question 32
• True
161
Answer 32
• How do you enable Remote Desktop in Windows XP?
162
Question 33
163
Answer 33
Question 34
• Where can you edit the User and System variables including default paths in Windows XP?
Answer 34• System Properties->advanced-
>environment variables->System Variables
Question 35
• Where do you view or change the Paging File options in Windows XP?
Answer 35• System Properties->Advanced-
>Performance Options
Question 36
• Where in Windows XP would you disable the prompting of digital signatures for new device drivers?
Answer 36
Question 37
• How many minimum drive partitions do you need to run BitLocker Drive preparation tool?
Answer 37
• 2 partitions
• http://support.microsoft.com/kb/933246
Question 38
• In Windows Vista/7 if you get a error message stating a problem with Boot Configuration Data then what could have become corrupted?
Answer 38
• BCD
• Why would you not be able to transfer a 6GB file to a FAT32 Hard Disk?
174
Question 39
• FAT32 will not be able to support single files that are larger than 4GB
175
Answer 39
• When installing Windows XP on a SATA disk it gives you a no bootable media error. What would you do?
176
Question 40
• Press F6 when the CD is booting and install the SATA drivers.
177
Answer 40
Question 41
• Which switch would be used with the DIR command to display hidden files?
Answer 41
• Dir /AH
Question 42
• If you did not want Windows to display its usual splash screen at boot what switch would you use with boot.ini?
Answer 42
• /bootlogo/noguiboot
Question 43
• What are two way of opening Task Manager
Answer 43
• Press Ctrl-Alt-Del and select Task Manager or
• Right click the task bar and select Task Manager
Question 44
• Which folder in a 64 bit version of Windows is created twice to store both 32bit applications and 64 bit applications?
Answer 44
• Program Files
Question 45
• How much RAM can a Windows 7 x86 system address?
Answer 45
• Theoretically 4GB, however it usually can only address 3.5GB. If you have more than 4GB of RAM you would need the 64 Bit version of Windows 7.
Question 46
• Where can you find the processor speed for a computer running Windows XP?
Answer 46
• System Information or System Properties
Question 47
• When you move a dynamic disk from one computer to another what is it seen as and what utility would you use to import it?
Answer 47
• It is seen as a foreign disk and you would have to use Disk Management to import it.
Question 48
• In Windows which command line utility would you use to Manage Disks? (the same as Disk Management)
Answer 48
• diskpart
Question 49
• Which command would you use to repair the Boot.ini is Windows XP?
Answer 49
• Bootcfg /rebuild
Question 50
• Which command is used to duplicate entire directories from one place to another?
Answer 50
• xcopy
3.0 Networking – 15%
• Which command tells you how many steps it takes to reach another network?
199
Question 1
• TRACERT
200
Answer 1
• What can be used to resolve Fully Qualified Domain Names (FQDN)?
201
Question 2
• DNS &
• Hosts File
202
Answer 2
• If you are unable to connect to a network and want to check your cable what would you use?
203
Question 3
• A Cable Tester
204
Answer 3
• What is the command NSLOOKUP used for?
205
Question 4
• To determine the IP address of a remote host?
206
Answer 4
• Which protocol uses port 143?
207
Question 5
• IMAP (Internet Message Access Protocol )
208
Answer 5
• What port number does SMTP use?
209
Question 6
• 25
210
Answer 6
• Which command would you use if you wanted to find out if there were any problems with router connectivity?
Question 7
• TRACERT
Answer 7
• If you were using an Unsecure Wireless Network, which Network Location should you select in Windows Vista/7?
213
Question 8
• Public
214
Answer 8
• Which of the internet suite of protocols is used to move internet mail between mail servers?
• What port number does it use?
Question 9
• SMTP
• TCP 25
Answer 9
Question 10
• If you wanted to increase the coverage of your wireless network then what should you add to it?
Answer 10
• An Access Point
• What is the purpose of the filter on a broadband ADSL connection?
219
Question 11
• Its stops the telephone interfering with the broadband connection.
220
Answer 11
• Which command would you use to determine if a remote host is reachable?
221
Question 12
• PING
222
Answer 12
• What term refers to a network adapter that can only transmit in one direction at a time.
223
Question 13
224
Answer 13
• Half Duplex
Question 14
• What term is used to describe a network adapter that can transmit in both directions at the same time? (send and receive at the same time)
Answer 14
• Full Duplex
• What two commands can be used to check for basic connectivity between two devices?
227
Question 15
• PING &
• TRACERT
228
Answer 15
• What would happen if an 802.11g card connected to an 802.11b network?
Question 16
• Max transfer speed would be 11 Mbps
Answer 16
Question 17
• Which protocol is used to connect to a terminal services session?
• What port number does it use?
Answer 17
• RDP
• 3389
Question 18
• What broadband technologies could be used if you live in a remote area where you can't get ADSL or cable broadband?
Answer 18
• Satellite or cellular (3G)
Question 19
• What are some of the ways of securing wireless networks?
Answer 19
• Disable SSID broadcast• MAC Address Filtering• Encryption – WEP, WPA, WPA2
(remember WPA and WPA2 have PSK and Enterprise versions)
• Change the default Admin password on the router.
Question 20
• Which command-line tool displays network connections (incoming and outgoing), routing tables, and a number of network interface statistics?
Answer 20
• Netstat
(Learn the netstat switches)
Question 21
• If computers can communicate with each other but not access the Internet what address should be configured on them?
Answer 21
• Default Gateway
• Also an incorrect proxy server may result in this problem.
Question 22
• Which protocol uses Port 443 by default?
Answer 22
• HTTPS
Question 23
• Which command will show print and file shares on a PC?
Answer 23
• Net view
Question 24
• What information do you get when you run the ipconfig/all command?
Answer 24
Question 25
• What is used to assign IP addresses automatically?
Answer 25
• DHCP
Question 26
• What command is used to transfer files from a remote FTP server?
Answer 26
• GET
Question 27
• Which protocol is used to exchange data using a secure channel between two networked devices?
• What port does it use?
Answer 27
• SSH (Secure Shell)
• 22
Question 28
• If you can access a website by its IP address but not by its FQDN then what network service has failed?
Answer 28
• DNS
Question 29
• What would you enable if you were using VoIP and you wanted to improve the quality of the calls?
Answer 29
• QOS – Quality of Service
Question 30
• True or False: You normally Use a PSTN (Public Switched Telephone Network) when connecting using a Dial Up Connection
Answer 30
• True
Question 31
• What does the Ping –t command do?
Answer 31
• Will ping the host continuously until stopped
Question 32
• Which ports are used for FTP?
• Are they TCP or UDP?
Answer 32
• 20 and 21
• Both use TCP ports
Question 33
• Which port is used for HTTP traffic?
Answer 33
• 80
Question 34
• Which address is used to ping the localhost?
Answer 34
• 127.0.0.1
• (also known as the loopback address)
Question 35
• How do you fix a computer which has an IP address of 169.254.34.56?
Answer 35
• Ipconfig/renew
• You could also do an ipconfig/release and then ipconfig/renew
Question 36
• What does an IP address that starts with 169.254 mean?
Answer 36
• The computer/client is unable to connect to/get an IP address from a DHCP server.
• Why would a customer with a 802.11a card have a problem connecting to an 802.11g router/network?
271
Question 37
• They are not compatible
272
Answer 37
• If you want to use dynamic addresses for all computers on your network and static IP addresses for all printers. What must you do?
273
Question 38
• Create an exclusion range for the Printers’ IP addresses from the DHCP scope.
274
Answer 38
Question 39
• Where in Windows XP would you manually set an IP address or DNS address?
Answer 39
• TCP/IP (Internet Protocol) properties
Question 40
• Which command would you run to view available network commands?
Answer 40
• Net help
Question 41
• What part of the Mac address will help you identify the Manufacturer?
Answer 41
• The first three OCTETS
Question 42
• Which protocol does a port monitor use to monitor a printer device status?
Answer 42
• SNMP
4.0 Security – 13%
• True or False: In NTFS Permissions Allow overrides Deny?
284
Question 1
• False
285
Answer 1
• What would be the result of having the incorrect proxy settings in Internet Explorer?
286
Question 2
• You will have no Internet access
287
Answer 2
• What is the security centre used for?
288
Question 3
• To keep track of Antivirus, Firewall and Windows Update.
289
Answer 3
• What is the best practise for removing Malware?
290
Question 4
•Boot into safe mode and then use malware removal tools.
291
Answer 4
• What could be the reason for an application not working / communicating over the network?
292
Question 5
• Firewall is blocking the port.
293
Answer 5
• What does Quarantine mean?
294
Question 6
• Almost like putting in a vault away from the rest.
• Antivirus software Quarantines files infected with Viruses if they are unable to clean them.
295
Answer 6
• You receive an email from the network administrator asking for your password. What should you do?
Question 7
• Escalate the event according to your company’s security policy.
Answer 7
• If you wanted Visitors to use your Windows machines what type of account would you set up for them?
298
Question 8
• Guest
299
Answer 8
• Which file system allows permissions to be set?
Question 9
• NTFS
Answer 9
• What could be the reason for a user not being able to access a folder?
302
Question 10
• Permissions
303
Answer 10
• What is a guaranteed way to get rid of a virus?
304
Question 11
• Format the Drive
305
Answer 11
• On a Wireless Access Point, what option would BEST disable Guest access?
306
Question 12
• Enable MAC address Filtering
307
Answer 12
• What is the best way to prevent Malware Infections?
308
Question 13
• Train / educate users.
309
Answer 13
• You want to configure an XP PC to connect to a Wireless Access Point that is using encryption.
• What information do you require?
Question 14
• The SSID of the WAP.
• The encryption protocol being used.
• The relevant key.
Answer 14
• If you want to hide a wireless network for security. What should you do?
312
Question 15
• Disable SSID Broadcast
313
Answer 15
• What would be the advise to give to a customer whose PC was infected with a Virus after you have cleaned it up?
314
Question 16
• Advise them to buy an antivirus and update it regularly. Also tell them to be careful with email and software downloads etc…
315
Answer 16
• How can you tell if a folder is encrypted?
316
Question 17
• It will have a green FONT
317
Answer 17
• Once you get a new wireless router and set it up with an SSID and Encryption, what must you also ensure?
318
Question 18
• Change the default Admin Password.
319
Answer 18
• What would be the proper course of action if you suspect a virus has infected a computer?
320
Question 19
• Disable System Restore. Ensure you update your virus definitions. Boot into safe mode and then run a scan.
321
Answer 19
Question 20
• What are some examples of PHYSICAL security?
Answer 20
• Locks• Man-traps• Security Cameras• Guards• Fences.
• After installing an upgrade to a virus scanner on a user’s PC, the user asks whether you can also install a new application that they have on CD.
• How should you respond?
Question 21
• Check the company’s written policy on installing software and act accordingly.
Answer 21
Question 22
• Which command would you use to check which ports are open in the Windows Firewall?
Answer 22
• Netsh firewall show state
Question 23
• What are two ways of automatically updating an Antivirus Software
Answer 23
• You can use the Auto Update button
• You can use scripts to automate this
Question 24
• True or False: If you set your Windows Vista machine network profile to Public then other computers will not be able to see you on the network?
Answer 24
• True. The Public profile is used in places where you don’t want people to be able to access your machine.
Question 25
• What is the Rdisk.exe command used for?
Answer 25
• Creates an emergency repair disk in Windows 2000 Professional
Question 26
• Which utility would you use to check for open ports?
Answer 26
• netstat
• How could an administrator discover who logs on to an XP PC.
Question 27
• Set up auditing.
• Look in the Security Log using Event viewer.
Answer 27
Question 28
• In Windows XP which utility is used to backup/archive data?
Answer 28
• NTBACKUP
• Why would you use customized group accounts?
Question 29
• To give permissions to a set of people instead of giving individual permissions to every single person.
Answer 29
Question 30
• What are some rules when using NTFS and Share Permissions
Answer 30
• Deny Overrides Allow
• The Most Restrictive Permissions apply
Question 31
• What type of Malware would transparently sit, collect and transmit sensitive information?
Answer 31
• Spyware
• Which type of Server would you use to filter Internet Traffic?
Question 32
• A Proxy Server
Answer 32
Question 33
• Sort the Following out starting with those that have the least rights up to those that have the most
• Guests, Power Users, Administrators, Users
Answer 33
• Guests, Users, Power Users, Administrators
Question 34• You have the following
Permissions set for a group of users on a folder called Research:
• Students group – Read, Write and Execute
• Administrators Group – Full Control
• Users Group – Read and Execute
• If you set the share permissions to deny the everyone group, what would happen?
Answer 34
• No one would be able to access the share.
• Make sure you understand the basic principles of permissions as these will also be helpful for your Microsoft Exams.
Question 35
• What could cause your default homepage to keep changing every now and then?
Answer 35
• Adware
Question 36
• Which technology by Microsoft provides full disk encryption in Windows Vista and 7?
Answer 36
• BitLocker
• Only available in Enterprise and Ultimate versions!
Question 37
• What security feature would prompt this message?
Answer 37
• UAC
Question 38
• You want to hide a wireless network’s name. How would you do this?
Answer 38
• Disable SSID Broadcast
Question 39
• Which type of WEP requires a 10-digit network key?
Answer 39
• 64 Bit WEP
Question 40
• A friend reports unauthorised changes to their wireless router.
Why would this have happened?
Answer 40
• They may have not changed the default password and a hacker used the default password to make these changes.
Question 41
• True or False: A wireless router is an example of a Hardware Firewall.
Answer 41
• True
Question 42
• Between WEP, WPA and WPA2, what offers the most security?
Answer 42
• WPA2
Question 43
• What would happen if your Antivirus Service (e.g. Sophos Antivirus) is disabled?
Answer 43
• The Anti-Virus won’t start when Windows starts
Question 44
• Which default program in Windows Vista / 7 is installed to protect against spyware?
Answer 44
• Windows Defender
Question 45
• What would prevent an Internet application to not work when installed on a Windows PC?
Answer 45
• The Windows Firewall could be blocking the ports that the program uses to access services on the Internet
Question 46
• What feature in Windows Vista / 7 would help to control a child’s usage of a PC and access to the Internet?
Answer 46
• Parental Controls.
Question 47
• As a minimum what user group should you be in to create shares on a local PC?
Answer 47
• Power Users
Question 48
• What would be used to allow and deny Internet traffic?
Answer 48
• Firewall
Question 49
• True or False: By default files and folders will inherit permissions from their parent folder?
Answer 49
• True
Question 50
• If you had a slow response from your computer, website redirection and you are unable to display web pages.
What would you suspect?
Answer 50
• Malware infection
Question 51
• If you had the latest version of an Anti-Virus but still get infected with Viruses. What should you do?
Answer 51
• Ensure you update the virus definitions/signatures.
Question 52
• True or False: By Default the Guest group should be disabled to ensure security
Answer 52
• True