WGU C394 : Practice Tests Questions and Correct Solutions| Rated A+
Which of the following installation types is used to install an operating system from an image on a network server using PXE or NetBoot? A) Unattended B) Remote network C) Multiboot D) Image deployment - Remote network Which of the following is a probable cause of irregular wireless connectivity in mobile devices? A) Items blocking the signal between the device and a wireless access point. B) Broadcast settings have been misconfigured on the device. C) A failure in the network card or antenna. D) Wireless networking has been turned off. - Items blocking the signal between the device and a wireless access point Which utility shows a log of application and system messages, including errors, information messages, and warnings? A) System Restore B) Action Center C) Event Viewer D) Network and Sharing Center - Event Viewer Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder? A) Modify B) List Folder Contents C) Read & Execute D) Write - Modify Which of the following can hold digital certificates, store temporary data, or even perform cryptographic processing functions to keep its data secure? A) Magnetic stripe card B) SSO C) SLA D) Smart card - Smart card Joe, a technician in an organization, is asked to scan and repair a mobile device which has been affected by malware. In order to repair the device completely from malware, he has to put the device back again to its fresh state. Which of the following tools will Joe use to repair the mobile device? A) Backup and restore B) Factory resets C) Antimalware D) App scanner - Factory resets Which is an attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content? A) Tailgating B) Spam C) Shoulder surfing D) Spoofing - Spam Which of the following environment variables is used to access the absolute file path of the Windows system folder? A) %SystemRoot% B) %APPDATA% C) %CD% D) %TEMP% - %SystemRoot% Which of the following is the legal contract between a licenser and purchaser to govern and establish the purchaser's right to use a software? A) MDM B) DRM C) EULA D) MMC - EULA Which of the following statements are true about the homegroup sharing model? Each correct answer represents a complete solution. Choose all that apply. A) Home and business editions of Windows can join homegroups. B) Computers on a homegroup has its own list of user accounts, called local accounts. C) Homegroups are created by one user and can be joined by anyone with a shared password. D) Computers in domains can join homegroups, but not create them. - Home and business editions of Windows can join homegroups. Homegroups are created by one user and can be joined by anyone with a shared password. Computers in domains can join homegroups, but not create them. Which of the following ways writes zeros to the entire drive and restores the drive to its newly installed configuration? A) HDShredder B) Secure deletion program C) Low-level format D) SSD - Low-level format Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup? A) Action Center B) UAC C) Event Viewer D) MSConfig - MSConfig Henry, a customer, calls you to explain an issue with his computer and expressed anger about the service provided by your company. What guidelines should you follow while dealing with the customer? Each correct answer represents a complete solution. Choose all that apply. A) Avoid being judgemental. B) Dismiss irrelevant problems. C) Do not argue or become defensive. D) Ask open-ended questions. - Avoid being judgemental. Do not argue or become defensive. Ask open-ended questions. You have created a script file that runs in the Windows Command Prompt environment (CMD.EXE) or in its DOS-based predecessors. What is the extension of this script file? A) .bat B) .sh C) .ps1 D) .vbs - .bat Which of the following commands can be used to manage network shares, network print jobs, and network users? A) ping B) net C) ipconfig D) tracert - net Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space? A) Mechanical blowers B) Air filters C) Air masks D) Enclosures - Enclosures Which of the following encryption systems is included with the Business/Professional/Enterprise/Ultimate editions of Windows as well as all editions of Windows Server? A) Encrypting File System B) NT File System C) BitLocker-To-Go D) BitLocker - Encrypting File System You are a technician in an organization. You are working on a computer system. Suddenly, you felt an electric shock while operating it. You don't have an electrostatic discharge (ESD) device to protect your system. Which of the following will you use in this situation? A) Wrist strap B) Electrically grounded mat C) Self-grounding D) Antistatic bag - Self-grounding Which is a particularly intrusive sort of malware that attempts to extort money from the victim in order to undo or prevent further damage? A) Spyware B) Adware C) Ransomware D) Rootkit - Ransomware You are a network administrator of an organization. You have been given a task to maintain the right and healthy environment for the electronic equipment in the server room. What environmental guidelines should you follow? Each correct answer represents a complete solution. Choose all that apply. A) A well ventilated HVAC system should be used to dissipate heat. B) Temperatures should not fluctuate much between 65 to 85 degrees. C) Good ventilation and proper air flow should be maintained. D) Humidity should be below 30% to 40% in the server room. - A well ventilated HVAC system should be used to dissipate heat. Temperatures should not fluctuate much between 65 to 85 degrees. Good ventilation and proper air flow should be maintained. You are a support specialist in a company. While servicing a computer at a customer's location, you notice a file containing some private and confidential information of the customer. What should you do to deal appropriately with the confidential and private file? A) Inform your company members about the file. B) Open and examine the file. C) Share the content of file on social media. D) Keep the file confidential and secure. - Keep the file confidential and secure
Written for
- Institution
- WGU C394 :
- Course
- WGU C394 :
Document information
- Uploaded on
- August 3, 2023
- Number of pages
- 39
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c394 practice tests questions and correct so
Also available in package deal