1) What must be included in an OS end-to-end test plan? a) The result of each test is recorded b) Any test failure cause c) Corrective action in the event of a pass d) Pass and fail criteria for later use 2) What is a key part of an end-to-end test plan? a) Select what is tested b) Test as documented in the test plan c) Outline the approach on how to carry out the test plan d) Outline the scope of the test plan 3) An anti-malware tool is mainly used to protect against a) Non encrypted software b) Hacking c) Malicious software d) Blocking unwanted IP  4) Which one of the following is the most likely reason to wipe a secure mobile device remotely? a) It has been handed to the police as lost property b) It has been lost on public transport c) It has been left at the user’s home d) It has been left in a secure office 5) What does User Access Control (UCA) refer to? a) Management of network services b) Management of user and group accounts c) Management of server roles d) Management of Internet access 6) Patch management is used to  a) Change the overall settings of an operating system b) Assess, identify and repair faults c) Update, fix and/or improve a software program d) Deal with non-preventative maintenance 7) A technician has been using commands ipconfig, ping and tracert. What problem has been trying to solve? a) Software b) Hard disk drive c) Printer d) Network 8) Which command is used to provide network information of all NIC adapters on a Windows PC? a) ifconfig b) ifconfig /a c) ipconfig d) ipconfig /all 9) WSUS is Microsoft's software solution for management of which IT function? a) Remote logins b) Group Policy c) Windows updates d) Active Directory 10) Which one of the following anti-malware statements is not correct? a) Update new security fixes b) Focus on newer security threats c) Remove all non-essential files and utilities d) Protect users from latest threats 11) Which method enables a technician to boot for a network server and not from the local drive? a) Safe boot b) Disc boot c) USB boot d) PKE boot 12) Network technicians are required to manage user accounts within their organisation to achieve which of the following? a) Improve network speed b) Prevent unauthorised access to the network c) Allow staff to bring and use their own devices d) Improve system encryption

End to End Testing and Security Principles for running OS

Leaderboard

Visual style

Options

Switch template

Continue editing: ?