ASHWORTH C10 ONLINE EXAM 8

ASHWORTH C10 ONLINE EXAM 8

Offered Price: $ 20.00 Posted on: 09/04/2015 03:12 AM Due on: 09/05/2015
Question # 00100650 Subject Business Topic General Business Tutorials: 1
Question Purchase it
Dot Image

Question 1 of 20

5.0/ 5.0 Points

You have a Windows 2000 computer that has no built-in firewall so you are looking for a third-party firewall to install. Which of the selections below will accommodate this?

A. CCleaner

B. ZoneAlarm

C. Microsoft Security Essential

D. MalwareBytes

Question 2 of 20

5.0/ 5.0 Points

You run a Defrag utility on your computer to see if you need to defrag your system volume. What fragmentation level represents a threshold at which point you need to defrag it?

A. 3%

B. 5%

C. 10%

D. 15%

Question 3 of 20

5.0/ 5.0 Points

In order for BitLocker to protect the System Volume without the aid of an external drive, your computer must:

A. be 32-bit.

B. host a virtualized enabled BIOS.

C. be TPM-compatible.

D. have a USB 3.0 interface.

Question 4 of 20

5.0/ 5.0 Points

What type of hard drive does not require defragging?

A. A hard drive for a server

B. A hard drive for a 64-bit operating system

C. A solid-state drive hosting Windows 7

D. An SCSI drive hosting Server 2008

Question 5 of 20

5.0/ 5.0 Points

What do enterprise environments use to centrally manage Windows updates for all of the devices within their networks?

A. A domain controller

B. A BitLocker Server

C. A WSUS server

D. A Proxy Server

Question 6 of 20

5.0/ 5.0 Points

Which selection below lists two operating systems that include BitLocker?

A. Windows XP Professional and Windows 7 Professional

B. Vista Ultimate and Windows 8 Enterprise

C. Windows 7 Professional and Windows 8 Professional

D. Windows 7 Ultimate and Windows 8 Professional

Question 7 of 20

5.0/ 5.0 Points

Your computer is once again out of hard drive space and you want to see which folders are consuming the most space on your hard drive. Which application below will do this?

A. Ccleaner

B. TreeSize

C. MalwareBytes

D. Auslogics Disk Defrag

Question 8 of 20

5.0/ 5.0 Points

A spyware application is consuming a lot of memory on your Windows 7 computer. You want to end this process. Where can you do this from?

A. From the Processes tool in the Control Panel

B. From the Process tab in Task Manager

C. From the Performance tab in Task Manager

D. From the Windows Defrag console

Question 9 of 20

5.0/ 5.0 Points

Which type of Windows updates below includes new features and extends the functionality of the operating system?

A. Critical

B. Optional

C. Recommended

D. Service Pack

Question 10 of 20

5.0/ 5.0 Points

You install a new antivirus application on your computer and it keeps quarantining a legitimate application file in that application’s directory. How can you prevent this from happening while still being able to protect your system?

A. Run the AV application in safe mode so the application is turned off.

B. Create a custom scan and exclude the application’s directory.

C. Run the AV application in defrag mode during all scans.

D. Exclude all .exe file types when scanning the computer.

Question 11 of 20

5.0/ 5.0 Points

You try to run the CHKDSK utility from a command prompt but you keep getting an error message that you need to run it in Elevated Mode. How do you correct this?

A. Reboot the computer in SAFE Mode and then run CHKDSK from a command prompt.

B. Open command prompt from the Windows directory and run CHKDSK.

C. Open a command prompt with the selection “Runs as Administrator.”

D. Open the 64-bit version of command prompt and run the CHKDSK command.

Question 12 of 20

5.0/ 5.0 Points

Which of the actions below will not create more room on your hard drive?

A. Defragging your hard drive

B. Uninstalling an application

C. Deleting temporary Internet files

D. Deleting image and video files

Question 13 of 20

5.0/ 5.0 Points

Your AV software is unable to detect a recent virus that has infected your computer. You want to download another AV application to see if it can detect the virus. Which application below will do this?

A. CCleaner

B. Disk Cleanup

C. MalwareBytes

D. Auslogics Disk Defrag

Question 14 of 20

0.0/ 5.0 Points

Which statement below is not true about EFS?

A. It can only be implemented on an NTFS partition.

B. It requires a user to type in a PIN.

C. It is supported by the Windows operating system.

D. It doesn’t require TPM compatibility.

Question 15 of 20

5.0/ 5.0 Points

You have just purchased a brand new Windows 8 computer. What should you do right away with the Administrator account?

A. Disable it

B. Enable EFS for the account

C. Encrypt its logon

D. Change its username

Question 16 of 20

5.0/ 5.0 Points

You own a laptop with Windows 8 installed on it. How is someone able to access your files by installing another copy of Windows 8?

A. Use BitLocker with the new OS to copy and paste the files to a USB drive.

B. Use the Administrator account of the new OS to take ownership of the files.

C. Decrypt the files using the encryption key of the new OS on the system volume.

D. Decrypt the files using the newly installed certificate from the new OS.

Question 17 of 20

5.0/ 5.0 Points

Why is it best to run AV scans when the computer isn’t being utilized?

A. The scans consume resources and can impede computer performance.

B. Executable files can’t be scanned if a user is using them within an application.

C. The Windows directory can’t be scanned if the computer is being used.

D. AV applications can only do full scans if the computer is in safe mode.

Question 18 of 20

5.0/ 5.0 Points

Which type of updates should be installed in a test environment before being installed in a live enterprise environment?

A. Updates for Windows XP

B. Recommended Updates

C. Service Packs

D. Security updates

Question 19 of 20

5.0/ 5.0 Points

You are configuring the local firewall for your Windows 8 computer. Which types of rules should you create for your computer?

A. Inbound rules only

B. Outbound rules only

C. Neither inbound nor outbound rules

D. Both inbound and outbound rules

Question 20 of 20

5.0/ 5.0 Points

You are having trouble cleaning your computer for a troublesome virus. You decide to try to clean your computer while in safe mode. How do you access the menu to boot into safe mode?

A. Press the F5 key before the computer posts.

B. Press the F8 key before the computer posts.

C. Press the F8 key after the computer posts.

D. Press the F9 key after the computer boots the operating system.

Tutorials for this Question
  1. ASHWORTH C10 ONLINE EXAM 8

    Available for: $ 20.00 Posted on: 09/04/2015 03:12 AM
    Tutorial # 00095018 Puchased By: 4
    Tutorial Preview
    xXxM xxxxxxxxxxxxxxx C10…
    * - Additional Paypal / Transaction Handling Fee (5% of Tutorial price + $0.30) applicable
    Attachments
    ASHWORTH_C10_ONLINE_EXAM_8.docx (109.88 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    Rating Well-structured work 02/07/2016
    Rating Excellent tutors with great information 02/03/2016
Loading...
Whatsapp Lisa
##