100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C394 : Practice Tests Questions and Correct Solutions| Rated A+

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
03-08-2023
Written in
2023/2024

Which of the following installation types is used to install an operating system from an image on a network server using PXE or NetBoot? A) Unattended B) Remote network C) Multiboot D) Image deployment - Remote network Which of the following is a probable cause of irregular wireless connectivity in mobile devices? A) Items blocking the signal between the device and a wireless access point. B) Broadcast settings have been misconfigured on the device. C) A failure in the network card or antenna. D) Wireless networking has been turned off. - Items blocking the signal between the device and a wireless access point Which utility shows a log of application and system messages, including errors, information messages, and warnings? A) System Restore B) Action Center C) Event Viewer D) Network and Sharing Center - Event Viewer Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder? A) Modify B) List Folder Contents C) Read & Execute D) Write - Modify Which of the following can hold digital certificates, store temporary data, or even perform cryptographic processing functions to keep its data secure? A) Magnetic stripe card B) SSO C) SLA D) Smart card - Smart card Joe, a technician in an organization, is asked to scan and repair a mobile device which has been affected by malware. In order to repair the device completely from malware, he has to put the device back again to its fresh state. Which of the following tools will Joe use to repair the mobile device? A) Backup and restore B) Factory resets C) Antimalware D) App scanner - Factory resets Which is an attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content? A) Tailgating B) Spam C) Shoulder surfing D) Spoofing - Spam Which of the following environment variables is used to access the absolute file path of the Windows system folder? A) %SystemRoot% B) %APPDATA% C) %CD% D) %TEMP% - %SystemRoot% Which of the following is the legal contract between a licenser and purchaser to govern and establish the purchaser's right to use a software? A) MDM B) DRM C) EULA D) MMC - EULA Which of the following statements are true about the homegroup sharing model? Each correct answer represents a complete solution. Choose all that apply. A) Home and business editions of Windows can join homegroups. B) Computers on a homegroup has its own list of user accounts, called local accounts. C) Homegroups are created by one user and can be joined by anyone with a shared password. D) Computers in domains can join homegroups, but not create them. - Home and business editions of Windows can join homegroups. Homegroups are created by one user and can be joined by anyone with a shared password. Computers in domains can join homegroups, but not create them. Which of the following ways writes zeros to the entire drive and restores the drive to its newly installed configuration? A) HDShredder B) Secure deletion program C) Low-level format D) SSD - Low-level format Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup? A) Action Center B) UAC C) Event Viewer D) MSConfig - MSConfig Henry, a customer, calls you to explain an issue with his computer and expressed anger about the service provided by your company. What guidelines should you follow while dealing with the customer? Each correct answer represents a complete solution. Choose all that apply. A) Avoid being judgemental. B) Dismiss irrelevant problems. C) Do not argue or become defensive. D) Ask open-ended questions. - Avoid being judgemental. Do not argue or become defensive. Ask open-ended questions. You have created a script file that runs in the Windows Command Prompt environment (CMD.EXE) or in its DOS-based predecessors. What is the extension of this script file? A) .bat B) .sh C) .ps1 D) .vbs - .bat Which of the following commands can be used to manage network shares, network print jobs, and network users? A) ping B) net C) ipconfig D) tracert - net Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space? A) Mechanical blowers B) Air filters C) Air masks D) Enclosures - Enclosures Which of the following encryption systems is included with the Business/Professional/Enterprise/Ultimate editions of Windows as well as all editions of Windows Server? A) Encrypting File System B) NT File System C) BitLocker-To-Go D) BitLocker - Encrypting File System You are a technician in an organization. You are working on a computer system. Suddenly, you felt an electric shock while operating it. You don't have an electrostatic discharge (ESD) device to protect your system. Which of the following will you use in this situation? A) Wrist strap B) Electrically grounded mat C) Self-grounding D) Antistatic bag - Self-grounding Which is a particularly intrusive sort of malware that attempts to extort money from the victim in order to undo or prevent further damage? A) Spyware B) Adware C) Ransomware D) Rootkit - Ransomware You are a network administrator of an organization. You have been given a task to maintain the right and healthy environment for the electronic equipment in the server room. What environmental guidelines should you follow? Each correct answer represents a complete solution. Choose all that apply. A) A well ventilated HVAC system should be used to dissipate heat. B) Temperatures should not fluctuate much between 65 to 85 degrees. C) Good ventilation and proper air flow should be maintained. D) Humidity should be below 30% to 40% in the server room. - A well ventilated HVAC system should be used to dissipate heat. Temperatures should not fluctuate much between 65 to 85 degrees. Good ventilation and proper air flow should be maintained. You are a support specialist in a company. While servicing a computer at a customer's location, you notice a file containing some private and confidential information of the customer. What should you do to deal appropriately with the confidential and private file? A) Inform your company members about the file. B) Open and examine the file. C) Share the content of file on social media. D) Keep the file confidential and secure. - Keep the file confidential and secure

Show more Read less
Institution
WGU C394 :
Course
WGU C394 :











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C394 :
Course
WGU C394 :

Document information

Uploaded on
August 3, 2023
Number of pages
39
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TeeGrades Louisiana State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
198
Member since
3 year
Number of followers
125
Documents
5354
Last sold
1 month ago
TeeGrades

Unlock Your Academic Success with Exceptional Study Materials Are you tired of spending endless hours searching for reliable study materials to enhance your academic performance? Look no further! Contact us for any study materials (notes, examinations, and test banks)! Please take a moment to provide a rating for the document if you found it helpful. Your feedback helps us improve our services and assists others in finding valuable information. TIA

Read more Read less
3.5

52 reviews

5
19
4
5
3
19
2
3
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions