10.3, 10.4, 10.5, 11.1, 11.2, 11.3, 11.4, & 11.5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files On a 32-bit operating system, all programs are installed in the Program Files directory (the Program Files [x86] directory doesn't exist).

Which of the following file extensions indicates a Windows system file?

-.dll -.vxd Windows system file extensions include .dll (dynamic link library), .drv (device driver), and .vxd (virtual device driver). Program file extensions include .exe and .com. Document file extensions include .rtf (rich text). Windows installer files use the .msi extension.

Which of the following file extension types can be run from the command prompt?

-.exe -.com -.bat .exe, .bat, and .com files can all run stand-alone from the command prompt, while .dll and .sys files work in conjunction with other programs.

Which of the following statements are true regarding administrative shares?

-By default, Windows automatically creates an administrative share for every volume. -To connect to an administrative share, you must use the UNC path. By default, Windows automatically creates an administrative share for every volume. The share name is the volume letter plus the dollar sign (such as C$). Because administrative shares are not visible when browsing the network, you must use the UNC path to connect to an administrative share. Default administrative shares can only be accessed by a member of the Administrators group.

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next?

-Configure both share and NTFS permissions. -Place the files on an NTFS partition. To control both local and network access, you will need to use both NTFS and share permissions. The folder must be located on an NTFS partition to be able to configure NTFS permissions. Configuring only NTFS permissions will not allow network access. Configuring only shared permissions with the files on a FAT32 partition will not control local access.

Which of the following are true of libraries?

-Each library can contain multiple folders from different file system locations. -A single folder can be added to multiple libraries.

Which of the following statements about virtual NICs are true?

-Multiple virtual NICs can be added to a virtual machine. -Virtual NICs need the appropriate driver installed to function. Within each virtual machine, you can configure one or more virtual network interfaces, which function in much the same manner as physical network interfaces. Virtual interfaces use Ethernet standards to transmit and receive frames on the network. The operating system within the virtual machine must have the appropriate driver installed to support the virtual network interface, just as with a physical network interface. When you configure a virtual network interface within a virtual machine's configuration, you can specify: -The type of physical network interface to emulate. This allows for the best possible driver support by the operating system within the virtual machine. -A MAC address. Most hypervisors automatically assign a MAC address to each virtual network interface. However, some hypervisors allow you to use a custom MAC address, if needed. -The network to connect to. Most hypervisors allow you to define many different virtual networks. -When you configure a virtual network interface, you will select which virtual network you want it to be connected to.

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access?

-Network -File explorer -PC In Windows 10, Network acts as a built-in network browser showing all networks and shared folders to which the user has access. This same information can be viewed in This PC and File Explorer. Network Neighborhood was used in previous Windows versions, but was replaced by My Network Places in Windows 2000, Me, and XP and by Network in Windows Vista, Windows 7, and Windows 8. Computer Management and Device Manager are used to manage hardware and software in the Windows system and can't be used to browse the network. Windows Explorer was replaced by File Explorer in Windows 10.

You've just opened a text file in the vi editor, and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode?

-Press the S key and then press Insert -Press Insert and then press Insert again -Press the 'i' key and then press Insert In Command Mode, you need to press either the I key, the S key, or the Insert key to enter Insert Mode; then, just as with GUI word processors, if you press the Insert key again, the cursor will change to Replace Mode. Pressing Esc while in Command Mode will switch vi to Command Line Mode.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's accounting department. She received a single Windows 10 installation disc with the licenses. Which of the following would be the BEST installation methods to use?

-Use a network installation. -Install one system and image it to the other systems. The best installation options in this scenario is to either perform a network installation or use imaging. In a network installation, you would copy the installation media to a Windows Deployment Services (WDS) server, configure each new workstation to use PXE boot, boot them from the WDS server over the network, and then run the install. Alternatively, you could install Windows on one of the systems and then use imaging software to take an image of that system and copy it to the remaining 99 systems over a network connection. Installing one system at a time from the installation disc would take a considerable amount of time. Burning multiple copies of the installation disc or creating multiple flash drives and then installing 100 systems from them would be time-consuming.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page?

-more /var/log/auth.log -less /var/log/auth.log Using the more command, the contents of the file is output to the screen one page at a time to give you a chance to read the contents of the file; press the space bar to go through the file one page at a time. Using the less command does the same thing as the more command, except that is allows you to use the Pg Up and Pg Dn keys to scroll up and down through the file.

After installation, you Windows 10 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this?

-w32tm /query /source -w32tm /query /status The w32tm /config /update command notifies the time service that its configuration has been modified and that changes need to be applied. The w32tm /debug command is used to enable or disable the local Windows time service provider log. The net time /querysntp command was used in earlier versions of Windows to view time provider information, but is now deprecated and no longer works.

Your Windows client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?

-w32tm /tz To view the time zone settings used by a domain-joined Windows workstation, you can use the w32tm /tz command. The w32tm /monitor command notifies the time service that its configuration has been modified and that changes need to be applied. The w32tm /register command is used to run w32tm as a registered service, which adds its default configuration to the Windows registry. The w32tm /query /status command is used to view the status of the time service.

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi The .msi extension identifies installation packages formatted for use by the Windows Installer. The .exe extension indicates a program file. The .bat extension indicates a batch file. The .dll extension indicates a dynamic link library system file.

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

/v The copy /v command verifies files after they are copied. The copy /a specifies that the file is an ASCII text file. The copy /n command copies files using short filenames. The copy /y command will not prompt you before each overwrite operation.

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y The copy /y command will not prompt you before each overwrite operation. The copy /v command verifies files after they are copied. The copy /a command specifies that the file is an ASCII text file.

Which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs on in a virtualization environment?

A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor manages access to system resources such as: -CPU -Storage -RAM A virtual machine is a software implementation of a computer system that executes programs like a physical machine. A Virtual hard disk is a disk file used by a virtual machine. Workload management relates to the portability of virtual machines.

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports. -Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control to both. Users have Allow Full Control to both files in the C:\PublicReports folder. When you move or copy files to an NTFS partition, the files inherit the permissions configured for the parent folders. If you had configured explicit permissions for the files, then moving the file would retain the explicit permissions assigned to the file. Copying files to new folders or partitions removes any existing permissions, and only inherited permissions apply.

You manage two folders in your computer as follows: -C:\Confidential -D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control to both. Users have Allow Full Control to both files. Moving or copying files to a different NTFS partition removes any existing NTFS permissions so that only inherited permissions apply.

You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following MUST you complete to accomplish this task?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data. The only way to go from NTFS to FAT32 is to reformat the drive. Because reformatting destroys all data, you should back up the drive before formatting and then restore the data after formatting the drive.

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file. When evaluating the interaction between Share and NTFS permissions, remember that the most restrictive set of permissions takes precedence. In this case, the NTFS permissions (Read and Write) are more restrictive than the Full Control permission granted to the Everyone group through the share, so the effective permissions are Read and Write.

Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?

C:\Users\username On Windows 10, user profiles are stored on the system root drive in the Users\username directories. If C: is the system root drive, user profiles are stored in C:\Users\username.

Which file system path is the default location for system files in Windows 10?

C:\Windows In Windows 10, the default location of system files is C:\Windows.

Where system root is the C: drive, where are fonts stored on a Windows 10 system?

C:\Windows\Fonts\ On all versions of Windows, fonts are stored in the %systemroot%\Fonts\ directory. For Windows 10, %systemroot% is C:\Windows by default. The %systemdrive% variable identifies the drive where Windows is installed (by default the C:\ drive).

What type of resources offer the following advantages? -Flexibility of access -Ease of use -Self-service provisioning of resources -API availability -Metering of services -Ability to try out software applications

Cloud

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: Allow Full Control to the D:\Reports folder. Deny Full Control to the D:\Sales folder. Deny Full Control to the D:\Reports\2010reports.doc file. Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc. Rachel has Deny Full Control to D:\Reports\2010reports.doc and Allow Full Control to D:\Sales\2010sales.doc because the permissions are explicitly assigned to the file. With NTFS permissions, explicitly assigned permissions take precedence over inherited permissions, even inherited Deny permissions.

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports. -Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc. Users have Deny Read to the Reports.doc file; moving the file to the new folder on the same drive preserves the NTFS permissions assigned to the file. Users have Allow Full Control to the Costs.doc file; copying the file to the new folder removes any existing NTFS permissions so that only inherited permissions apply.

You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected?

During the installation, browse to and select the appropriate driver for your RAID controller when prompted. During the installation, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows. Windows requires the drivers for the RAID controller to be able to access the RAID array. When using a RAID array, the SATA mode in the UEFI configuration should be set to RAID. This mode must be selected for you to access the motherboard RAID configuration utility and create the array. Using IDE or AHCI for the SATA mode would disable the RAID controller on the motherboard, and each storage device would be seen as a separate disk. Booting to the hard drive would not work because the installation files are stored on the optical disc, not the hard drive.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users? Incorrect response:

Edit the properties for the file; assign Rachel the Deny Full Control permission. To prevent Rachel from accessing the one file, assign the user account the Deny Full Control permission to the file. Deny permissions override Allow permissions. Removing Rachel from the group or denying permissions to the folder would prevent her from accessing all files in the folder. Denying permissions for the group would affect all group members, not just the one user.

Rachel, an employee in the support department, wants to run a virtual machine on her computer from which she can troubleshoot customer issues. Which of the following must you complete before virtualization will work on her computer?

Enable virtualization support in the BIOS settings. For virtualization to work on Rachel's PC, you must ensure that the virtualization support is enabled in the BIOS settings. Some CPUs will have Virtualization Support turned on by default, and others will not. Although additional memory will increase performance of a computer using virtualization, it may not be required depending on the amount of memory currently installed. Likewise, an additional hard disk may be advantages in storing or running virtual machines, but they are not a requirement. Most modern CPUs support virtualization and do not require the BIOS to be flashed.

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

Full Control A user must have the Full Control permission to set NTFS security permissions. Write permissions allow a user to change folder or file data and attributes. Modify permissions include all Read & Execute and Write actions and the ability to add or delete files. Read permissions allow a user to view folder details and attributes.

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfil Ben's needs?

Hidden share An hidden share is a form of a network share that cannot be viewed by others when they are searching for the shared location. These shares are created by adding a dollar sign ($) to the end of the share when it is created. By using this type of share, Ben could send the path to those requiring access, and then those with rights could see and access the files. A network share would fulfill all of Ben's requirements except making it hidden from those that may want to search for their location. Using a network share would make a hacker's job one step easier. Administrative shares are created by the operating system. Specific share permissions and file security cannot be set. A VPN, or virtual private network, allows you to create a secure tunnel between your company network and a remote location over an existing connection, usually the internet. A VPN is not required to share folders with fellow employees in the same local network. A remote desktop connection gives someone the ability to log on to another computer from their computer. This would not be a suitable solution, as it would be difficult to limit rights.

You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use?

IaaS Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment. Software as a Service (SaaS) delivers software applications to the client either over the Internet or on a local area network. Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops?

Image deployment -Since only two types of computers are being offered, using an image preloaded with the correct drivers, applications, and files is the quickest and easiest way to deploy Windows and any supplemental software (such as Microsoft Office). -A recovery partition is used to restore a corrupt computer back to the state it was in at purchase. This option would not provide all the customizations needed for the company software. -An upgrade is only used to migrate from an existing operating system to a newer operating system. Since these are new computers, an upgrade in not necessary or possible. -A clean install is the process of installing Windows over the top of an existing operating system and, in the process, cleaning or erasing all of the existing data. This would require more time and would not install any of the supplemental software required.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor. Virtualized hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. By implementing a virtual firewall within the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows between virtual machines. While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient. A virtual router with VRF is used to create multiple networks from a single router interface. Configuring VLAN membership would not allow you to monitor and filter traffic.

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the library. When you include a folder in a library, the files in the folder are available through the library. To add folders to a library: -Edit a library's properties and click Include a folder. -Right-click a folder and select Include in library. Copying the folder into the library would give you two different copies of the folder. Moving the folder into the D:\Stats folder would change the original path to the folder. Creating a new library would not include the folder in the first library you created.

You're using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert Mode In the vi editor, you need to switch to Insert Mode to be able to type new text in the file and have existing text that comes after the cursor pushed down. In Replace Mode, the existing text that comes after the cursor would be replaced when you typed new text. In Command Line Mode, you can enter commands to save the file and exit, exit the file without saving, save the file with a new name, etc. In Command Mode, you can perform many useful editing tasks in this mode, such as cut and paste, copy and paste, deleting text, etc. There is no Text Mode in vi.

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 10 on this system?

Install Windows the same way you would a system that uses a standard hard disk drive. Because the SSD drive uses a SATA interface, you can install Windows on it the same way that you would on a standard hard disk drive. It's unlikely that you would need to load special drivers to access the SSD device. Setting the SATA configuration to RAID in the UEFI firmware would require at least one more identical SSD device to be added to the system and a RAID array be configured before you could install Windows.

You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. Which of the following will BEST resolve this issue?

Instruct the employees to activate their Windows installation. You have a 30-day grace period in which to activate your Windows product installation. If the grace period expires and you have not completed activation, all features of Windows except the product activation feature will stop working. All customers who purchase retail packaged products or a new computer from an original equipment manufacturer (OEM) have to activate the product.

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem? Incorrect response:

Make Manuel the owner of the file. Make Manuel the owner of the file. The file owner has all permissions to the file. Deleting Susan's user account will change the file owner, but will not make Manuel the owner. Making Manuel a member of the Power Users group would not typically increase file permissions, although making Manuel a member of the Administrators group would typically work. User rights in the local security policy control the ability to perform actions on the system such as shutting the system down. File access is controlled through permissions.

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. Which of the following is the BEST next step?

Make sure that all installed applications run correctly. When you perform an in-place upgrade, user data and installed applications are preserved following the upgrade. You should make sure that necessary applications still run, but you do not need to reinstall applications or copy user settings.

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer. Which of the following steps is the BEST course of action?

Manually install applications, copy data, and configure settings on the new computer. There are no built-in Windows tools to transfer applications, user data, and settings from Windows 7 to Windows 10. This has to be done manually or using third-party tools. You will then need to reinstall any applications on the new computer. Windows Easy Transfer is not compatible with Windows 10. Moving the hard disk will not reinstall the applications for Windows 10. Moving the hard disk from the old computer and reinstalling Windows onto the old hard disk will not keep installed applications.

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder. Access to shared folders on a Windows system are controlled through the combination of share and NTFS permissions. Even though the necessary share permissions have been granted, you need to verify that the NTFS permissions also allow access. Modifying users and groups will not affect the ability to access the files unless the NTFS permissions are also modified. Use Samba to share folders on a Linux system.

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document. You should modify the permissions on the document. When Mary saved the document, she became the document owner and has all permissions to the document. Pablo does not have the correct permissions to the folder or the document. User rights in the local security policy control the ability to perform actions on the system such as shutting the system down. File access is controlled through permissions.

What key advantage does a virtual router have over a physical router?

Multiple networks can be connected to a single interface. The key advantage of a virtual router is it can support multiple networks on a single router interface. It does this by using a different routing table for each network. Physical routers are limited to a single network on each interface. Like physical routers, virtual routers use routing protocols to route data between networks. The Virtual Router Redundancy Protocol is used by physical routers to specify backup routers in the case of a failure. Virtual routers do not offer significant performance increases.

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

Network share By creating a network share to Jane's folder that contains her documents, you can grant the managers the ability to see and read these documents. All other employees will not have access if the rights are granted appropriately. If a manager forgets the path, they will still be able to easily find the folder by looking for shared folders on her computer. Administrative shares are created by the operating system. Specific share permissions and file security cannot be set. A hidden share is a form of a network share, but cannot be viewed by others when they are searching for the shared location. These shares are created by adding a dollar sign ($) to the end of the share when it is created. Although this could be used to share Jane's files, it would require that Jane give the path to each manager. Since Jane wanted to make this process as simple as possible, using a network share would be easier. A VPN, or Virtual Private Network, allows you to create a safe secure tunnel between your company network and a remote location over an existing connection, usually the internet. This is not required to share folders with fellow employees in the same local network. A remote desktop connection gives someone the ability to log on to another computer from their computer. This would not be a suitable solution, as it would be difficult to limit rights.

You are an IT administrator for your company. You have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances?

PXE Performing the install from the network by means of PXE (pre-boot execution) will allow you to quickly install the required 300 computers from one location. Depending on the PXE environment used, you can often remotely reboot specific computers, and they will automatically know that an install is required and will perform the desired steps with minimal intervention from an IT administrator. External solid state/flash drives, USB, and DVD boot methods all require the IT administrator to visit each computer and perform some of the setup steps manually. Therefore, these methods can be slower and more time consuming.

You manage two folders in your computer as follows: -C:\Confidential -D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc You then take the following actions: -Move Reports.doc from C:\Confidential to D:\PublicReports. -Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files. Permissions are removed from both files. Moving or copying files to a non-NTFS partition removes any permissions (FAT32 does not support NTFS permissions). Moving files to the same NTFS partition preserves any permissions. Copying files to another partition (NTFS or otherwise) removes existing permissions. Copied files to an NTFS partition inherit the permissions assigned to the drive or folder; copied files to a non-NTFS partition do not inherit permissions because no permissions exist.

Match each cloud computing definition on the left with the appropriate characteristic on the right. Each characteristic may be used once, more than once, or not at all.

Provides resources to a single organization. Private cloud Combines public, private, and community cloud resources from different service providers. Hybrid cloud Designed to be shared by several organizations. Community cloud Provides computing resources that are accessible by the general public. Public cloud Keeps one organization data separate and secure from any other organization using the same service provider. Private cloud

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services to these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent?

Rapid elasticity Rapid elasticity describes the cloud provider's ability to increase or decrease service levels to meet customer needs without requiring hardware changes. Measured service refers to the way cloud services are measured or metered for billing purposes or according to a service level agreement. An on-demand cloud service is available to user at any time. Cloud services providers use resource pooling to supply services to multiple customers using shared physical resources.

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder. The Libraries feature is used to group files and folders stored both locally and on network locations into a single logical folder. When you open a library, you see the files and folders associated with that library as if they were in a single folder, even though the library contents might exist in several different locations in the file system. While Libraries can be used to group files of the same type, that is not their only purpose. System folders (such as My Pictures or My Videos) are typically used to group files by type. All files in these folders are within the same folder, unlike Libraries that logically group files from multiple locations. HomeGroups are a simple way of sharing resources and managing authentication to resources on a home network.

A technician is unable to install virtualization software on a host computer. The host has more free disk space than required. Which of the following is MOST likely to be the cause?

The motherboard UEFI/BIOS doesn't support hardware assisted virtualization. Most virtualization software requires that the motherboard UEFI/BIOS supports hardware assisted virtualization. While a CPU with multiple core processors will increase performance, it is not usually a requirement for virtualization software. Virtualization software may require a minimum amount of physical memory. However, it is not likely that it would not install if there were not enough memory to support both the host and any VM. While placing VM files on an auxiliary hard drive may increase performance, it is unlikely to be a requirement to install the virtualization software.

Match the virtualization implementations on the left with the appropriate characteristic on the right. Each type of implementation may be used once, more than once, or not at all.

The virtual machine completely simulates a physical computer system. Full virtualization Operating systems do not need modification to run within virtual machines. Full virtualization Only some of the components of a virtual machine are virtualized. Partial virtualization Guest operating systems directly access hardware resources in the hypervisor host system. Paravirtualization

You have been asked to install Windows 10 on 30 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend?

Unattended To simplify and speed up installation, perform an unattended installation. The unattended answer file contains responses to common setup questions. You simply start the installation and direct it to reference the answer file, and the installation completes without your intervention. You cannot use an image-based solution because this requires that all hardware be similar. A network or optical disc-based install will not simplify the installation. You must still move from system to system to answer all of the installation prompts during the installation process.

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file. The C$ administrative share (\\computername\C$) is available to technicians with administrator privileges. This share is the FASTEST way to transfer a file. It takes extras steps to have the user create local shares, and the user may not have permissions to the folder where the file should be copied.There are several steps to creating an email and attaching a file. In addition, depending on the file type, the file may be blocked by email filtering.The C$ administrative share is available to the technician. Setting up a remote assist session would add extra steps.

You recently purchased a copy of Windows 10 from a retail store. The system you want to install Windows on doesn't have an optical drive. What is the BEST option for installing Windows in this scenario?

Use the Windows USB/DVD Download Tool to copy the installation files to a USB flash drive. The best option in this scenario is to run the Windows USB/DVD Download Tool on a different computer to copy the Windows 10 installation media to a USB flash drive. Then you can boot the system where you want to install Windows from the flash drive and complete the install. While a network install using a WDS server is possible in this scenario, it would require considerably more time, expertise, and hardware. The same is true of using an imaging solution. You can only perform a Reset installation on an existing Windows 10 system.

The servers for the company are all virtual machines and hosted on the same hypervisor. You need to keep users in all other departments from accessing the virtual servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

VLANs A virtual LAN (VLAN) uses switch ports to define a broadcast domain. When you define a VLAN, you assign devices on different switch ports to a separate logical (or virtual) LAN. NIC teaming is used to combine two or more physical connections into one logical connection and does not isolate networks. While MAC filtering could be used to control access, it is easily bypassed by MAC spoofing. Subnetting is used to divide large networks into smaller networks. Subnetting can be used to isolate sensitive systems, but it is not as secure as using VLANs.

Which term refers to a software implementation of a computer system that executes programs like a physical machine?

Virtual machine A virtual machine is a software implementation of a computer system that executes programs like a physical machine. A virtual machine functions as a self-contained and autonomous system. A hypervisor is a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on. Workload management relates to the portability of virtual machines.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\Home1\Pictures Use \\Home1\Pictures to access the shared folder. The UNC format is \\Servername\sharename.

You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which of the following commands will display the entire contents of the cpuinfo text file on the screen?

cat /proc/cpuinfo Using the cat command will display the entire contents of a text file on the screen. The vi command opens text files in the vi editor. The grep utility is used to inspect the contents of a file to find lines that match a specified search term.

Which Windows command displays a list of files and subdirectories in a directory?

dir Use the dir command to display a list of files and subdirectories in a directory on a Windows system. Use the cd command to work with the current directory. Use the md (and mkdir) command to create a directory. Use the attrib command to change or view the attributes of one or more files. The ls command is used on Linux systems. List is not a command line command.

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

grep The grep command is used to search text. The technician could save the output of the ps command in a text file and then search the files, or the technician could pipe the output from the ps command into the grep command. The ls command list the contents of a directory. The cd command is used to change the current directory, or the directory in which the user is currently working. The sudo command is short for "superuser do" or "substitute user do." It allows a user with proper permissions to execute a command as another user, such as a superuser.

While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md The md command (Make Directory) creates a directory/folder or subdirectory/subfolder. The rd command removes a directory. The cd command changes which directory you are working in. The del command (delete) deletes files and directories. The sfc command scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions.

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use Use the net use command to list the current connected shared folders and drive letters. Ipconfig displays the TCP/IP configuration of network interfaces. Netstat displays protocol connections that have been established by the system, as well as what incoming TCP/IP ports are in use by the system. Tracert displays information on the route that a packet takes as it traverses the network to a remote host.

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su - At the command prompt, enter su -, and the system will switch you to the root user and require you to enter the root password. You will then be able to perform tasks that require root user administrative privileges. After completing these tasks, you should log out as root and return to the standard user account.

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e Use xcopy /e to copy directories and subdirectories, including empty ones. xcopy /s copies directories and subdirectories, but not empty ones. Use copy /n to copy a single directory with the short filenames. Use copy /v to verify the files after the copy.


Kaugnay na mga set ng pag-aaral

Ch. 1 Defining and Collecting Data (cont) BUS 352 GCU

View Set

Alabama Real Estate: National Core Classes

View Set

Bresser; Animal Cells v. Plant Cells

View Set

Networking Essentials Chapter 9 Quiz

View Set

Assessment in the Classroom (Professional Knowledge)

View Set

Module 9: Interprofessional Collaborative teamwork

View Set