QUESTIONS & ANSWERS 2024/2025
What is the Windows RE command that can be used to manage hard drives, partitions, and volumes -
ANSWERSdiskpart
What command searches for and replaces corrupted system files. - ANSWERSsfc/scannow
What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and
manages the initial startup of the OS? - ANSWERSWindows Boot Manager
What should be the first thing to try if the hard drive is not spinning at startup? - ANSWERSCheck power
connections and switches
Which Windows RE tool is considered to be the least intrusive? - ANSWERSStartup Repair
Which command is used to check and repair the hard drive? - ANSWERSchkdsk c:/r
Which diskpart command is used to remove any partition or volume information from the selected disk?
- ANSWERSClean
Which key should be pressed during the boot in order to display the Advanced Boot Options? -
ANSWERSF8
Which of the following Windows RE commands can be used to scan for Windows installations not stored
in the BCD? - ANSWERSbootrec /scanOS
Which of the following keys will cause the Windows Boot Manager to appear as long as it is pressed
during the boot process? - ANSWERSspacebar
, Which of the following symptoms might indicate that the MBR record is damaged? - ANSWERSInvalid
partition table error
Which option should be enabled in order to view what did and did not load during the bootup? -
ANSWERSBoot Logging
Which program is responsible for reading motherboard settings and running the POST? -
ANSWERSStartup BIOS
Which program is used to start the part of the Win32 subsystem that displays graphics? -
ANSWERSSmss.exe
How are IP addresses available to the Internet classified? - ANSWERSpublic
If the computer you are using is a laptop that moves from one network to another, you can click the
_____ tab and configure static IP address settings for a second network. - ANSWERSAlternate
Configuration
The solution for securing private data traveling over a public network, such as the Internet, is a ____. -
ANSWERSVirtual Private Network
Using a ______________, packets are delivered to a single node on a network. - ANSWERSUnicast
Address
What is it called when a router is configured to open or close certain ports so they can or cannot be
used. - ANSWERSPort Filtering
What is the name of a 32-bit or 128-bit number that is used to identify a device? - ANSWERSIP Address
What is used to identify a wireless access point? - ANSWERSSSID
What type of IP address should be configured on a wireless access point so that it can always be