What type of hard drive does not require


Question 1
What is the primary limitation of free versions of antivirus applications?


A. They don't protect in real time.

B. They only perform quick scans.

C. They cannot scan the Windows directory.

D. They only install on 64-bit operating systems.


Question 2
Which selection below lists two operating systems that include BitLocker?


A. Windows XP Professional and Windows 7 Professional

B. Vista Ultimate and Windows 8 Enterprise

C. Windows 7 Professional and Windows 8 Professional

D. Windows 7 Ultimate and Windows 8 Professional

 

Question 3
You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?


A. Use BitLocker with the new OS to copy and paste the files to a USB drive.

B. Use the Administrator account of the new OS to take ownership of the files.

C. Decrypt the files using the encryption key of the new OS on the system volume.

D. Decrypt the files using the newly installed certificate from the new OS.


Question 4
Your mom's computer is running extremely slow. She asks you what might be causing this. Which of the options below is not a reason for her slow performance?


A. A fragmented volume

B. Spyware

C. A bad printer driver

D. Not enough memory

Question 5
Your AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this?


A. CCleaner

B. Disk Cleanup

C. MalwareBytes

D. Auslogics Disk Defrag

Question 6
Why is it best to run AV scans when the computer isn't being utilized?


A. The scans consume resources and can impede computer performance.

B. Executable files can't be scanned if a user is using them within an application.

C. The Windows directory can't be scanned if the computer is being used.

D. AV applications can only do full scans if the computer is in safe mode.

Question 7
What type of hard drive does not require defragging?


A. A hard drive for a server

B. A hard drive for a 64-bit operating system

C. A solid-state drive hosting Windows 7

D. An SCSI drive hosting Server 2008

Question 8
Which statement below is not true about EFS?


A. It can only be implemented on an NTFS partition.

B. It requires a user to type in a PIN.

C. It is supported by the Windows operating system.

D. It doesn't require TPM compatibility.

Question 9
You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?


A. Inbound rules only

B. Outbound rules only

C. Neither inbound nor outbound rules

D. Both inbound and outbound rules

Question 10
Which of the events below would automatically create a new restore point on your Windows 8 computer?


A. Deleting the temporary files

B. Installing a new printer

C. Downloading music files

D. Creating a new Internet favorite


Question 11
What is a limiting factor of EFS when compared to BitLocker?


A. It only works on 32-bit operating systems.

B. It only works with a public certificate.

C. It only works under the Administrator account.

D. It only works at the file or folder level.


Question 12
Which of the actions below will not create more room on your hard drive?


A. Defragging your hard drive

B. Uninstalling an application

C. Deleting temporary Internet files

D. Deleting image and video files

Question 13
You want to run CHKDSK and have it repair any errors it identifies, if possible. What is the command you would type?


A. CHKDSK /f

B. CHKDSK /r

C. CHKDSK /e

D. CHKDSK /RD

Question 14
In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:


A. be 32-bit.

B. host a virtualized enabled BIOS.

C. be TPM-compatible.

D. have a USB 3.0 interface.


Question 15
A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?


A. From the Processes tool in the Control Panel

B. From the Process tab in Task Manager

C. From the Performance tab in Task Manager

D. From the Windows Defrag console

Question 16
Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?


A. Ccleaner

B. TreeSize

C. MalwareBytes

D. Auslogics Disk Defrag

Question 17
Which type of Windows updates below is strictly security-related?


A. Critical

B. Optional

C. Recommended

D. Service Pack


Question 18
You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?


A. CCleaner

B. ZoneAlarm

C. Microsoft Security Essential

D. MalwareBytes

 

Question 19
You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?


A. 3%

B. 5%

C. 10%

D. 15%


Question 20
Which of the instances below is an example of a Trojan horse?


A. An attachment in an email that is really a malicious file

B. A link in an email that downloads a virus

C. An executable file that replicates throughout the network

D. A computer game that creates a backdoor into your computer

 

 

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: What type of hard drive does not require
Reference No:- TGS01149720

Now Priced at $20 (50% Discount)

Recommended (98%)

Rated (4.3/5)