Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Final Exam Study Guide IT109 Part 1

1. What is the purpose of exFAT?


a. The Extended File Allocation Table. Also known as FAT64. 64-bit FAT implementation
intended for large usb flash drives. Does not support encryption like NTFS does.
2. Difference between FAT16 and NTFS?
a. NTFS is more secure and modern. FAT16 was used on floppy disks.
3. When you move a file within NTFS volume and the file is compressed, what happens to the
permissions of the file?
a. Their existing permissions move with the file. When copied however, the file inherits the
permissions of the destination folder.
4. What is encryption?
a. The process of encoding files in a way so that when someone has them, they will not be
able to read it; basically.
5. When you copy a file within NTFS volume and the file is compressed, what happens to the
permissions of the file?
a. The file inherits the permissions of the destination folder.
6. A user is unable to connect to any network resource; you cannot ping the user’s IP and cant
determine if the problem is localized to just this user. What is the best option to troubleshoot
the problem?
a. Running the Network Diagnostics tool.
7. What protocol is supported by Linux, Windows, and Apple?
a. Ipconfig
8. What is ipconfig?
a. Displays all the information regarding the host device and network
9. What is the purpose of incremental backup?
a. Backs up only the files that have changed since the last backup wa preformed.
10. What is the purpose of Traverse Folder Options?
a. Allows or denies permissions to navigate in a folder.
11. Easy
12. To accommodate older web pages, IE8 includes a feature called Compatibility View which
enables the browser to display older pages.
13. A System Restore Point is a copy of various OS configurations and regedit settings from a point
in time
14. A Fragmentation is when files are written and re-written to a disk which takes up space. Drive is
forced to split files into clusters in different locations.
15. The Win7 AIK tool that you use to distribute and create answer files is called The Windows
System Image Manager (SIM).
16. What is a virtual machine?
a. is a software implementation of a machine (i.e. a computer) that executes programs like
a physical machine.
17. What is a protocol?
a. Language that all computers understand. Rules and guidelines.
18. A Dynamic Disk is able to contain an unlimited amount of volumes that function like primary
partitions on a basic disk.
19. What is a BYTE?
a. byte is a unit of digital information in computing and telecommunications, that most
commonly consists of eight bits
20. What is Windows PE 3.0?
a. A stripped down version of the Win7 kernel, that enables sysadmins to boot a pc that
has no OS installed and start the setup process
21. What is the function of a Disk Cleanup?
a. Process of deleting unnecessary files that take up disk space.
22. Function of RDP?
a. Remote into the damn pc
23. What is the function of the virtualization layer?
a. Data virtualization, the presentation of data as an abstract layer, independent of
underlying database systems, structures and storage
b. Database virtualization, the decoupling of the database layer, which lies between
the storage and application layers within the application stack
24. Define Desktop.
a. Really?!...
25. The Event Viewer is the primary Win7 operational log that provides general info about system
problems.
Final Exam Study Guide IT109 Part 2

1. What is the purpose of the print permission on Win7?


a. This question is retarded; Just think “printer” related.
2. ACPI stands for..
a. Advanced Config. and Power Interface
3. ACPI
a. Ability to configure all power settings using either the GUI, Group Policy, or CMD
4. What is the purpose of offline files?
a. A form of fault tolerance that individual users can employ to maintain access to their
server files, even in the event of a network service failure.
5. What is the purpose of a processor?
a. to receive data and instructions and output data after those instructions have been
carried out.
6. What does USMT stand for?
a. User State Migration Tool
7. USMT?
a. Same as Win Easy Transfer just without GUI
8. What does UTP stand for?
a. Unshielded Twisted Pair
9. UTP Cable?
a. Used for cabled networks. Four pairs of wires with each pair twisted individually.
10. What is the purpose of windows mobility center?
a. Quick access to config settings most commonly adjusted.
11. Difference between:
a. Peer-to-peer system
b. Client Server system
i. In peer-to-peer networks all computers have same rights and roles. In client-
server networks servers define rights and roles for client computers.
12. Which wireless networking standard uses spatial multiplexing to increase bandwidth?
a. IEEE 802.11
13. What criteria are used either to allow or block access to resources?
a. Publisher
b. Path
c. File Hash
14. What is the purpose of the ‘diskpart.exe’ command?
a. Used to manage disks. Can perform all Disk Management can. Create partitions. Etc.
15. MBR stands for?
a. Master Boot Record
16. What is the default partition style used in Win7?
a. MBR - Default partition style for x86 and x64- based PCs
17. A user interface that provides only a text-based view of the OS is called the Command Line
Interface.
18. What is the purpose of permission inheritance?
a. Parent elements pass their permissions down to their subordinate elements.
19. Purpose of a firewall?
a. Software program that protects a computer by allowing certain types of network data
traffic in n out of the system while blocking others.
20. Purpose of Remote Assistance?
a. Allows another non-local user to view, control, chat, etc with the local user.
21. What is the Maximum amount of ram supported by Win7 in a 32-bit mode regardless of the
edition?
a. 2 GB for starter; 4GB for all other 32-bit
22. SSL stands for?
a. Secure Sockets Layer
23. SSL?
a. Protocol most Web sites use when establishing secure connections with clients over the
internet. Via Digital Certificates and such…
24. NAT stands for?
a. Network Address Translation
25. NAT?
a. Built into many routers; takes internet packets, substitutes the registered address for
the computer’s private address, and forwards the packets to its internet destination
26. EFS stands for?
a. The Encrypting File System
27. EFS?
a. Encrypts files as user works. A feature of NTFS that encodes the files so only those
permitted can read it.
i. Public key
ii. Private key
28. The User Accounts Control Panel can create local users only. T / F ?
29. Win7 is available in 6 editions.

You might also like