Client Pro Final Study Set - Part 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The PowerShell command line interface (CLI) uses simple command construction. What is the typical form of a PowerShell command? verb-adverb verb-noun noun-verb-adverb noun-verb verb-noun -adverb

verb-noun -adverb EXPLANATION The PowerShell command line interface uses simple command construction, typically in the form of verb-noun-adverb. For example, the verb-noun portion is shown in these common commands: Get-Help, Get-Process, and Start-Service. Other common verbs used in PowerShell commands are new, add, install, and set. The adverb component is typically associated with options supplied to the command, such as name or size. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

A feature update includes new capabilities and improvements. What is the maximum number of days you can defer feature updates? 365 180 90 30

365 EXPLANATION You can delay feature updates for up to one year, or 365 days. REFERENCES TestOut Client Pro - 12.1 Windows Upda

You have a Windows 10 system. You have used the Settings app to access Windows update. From this location, how long can you pause updates? 7 days 14 days 30 days 3 days

7 days EXPLANATION When you open the Settings app and navigate to Update & Security > Windows Update, you can pause new updates for a period of 7 days. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

What is Windows Action Center? A tool that displays real-time information about the way resources are used by the installed hardware and software. A Windows utility that displays information about the system's use of resources. A central location for managing system messages and resolving issues within your system. A tool that tracks a computer's stability by maintaining historical data relating to the operating system's stability.

A central location for managing system messages and resolving issues within your system. EXPLANATION The Windows Action Center is a central location for managing system messages and resolving issues within your system. Reliability Monitor tracks a computer's stability by maintaining historical data relating to the operating system's stability. Task Manager is a Windows utility that displays information about the system's use of resources. The Resource Monitor displays real-time information about the way resources are used by the installed hardware and software. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

What tools or services rely on Security Center to be active and running to function well? (Select two.) Windows Action Center Resource Monitoring Reliability Monitor Task Manager Network Access Protection

Windows Action Center Network Access Protection EXPLANATION Windows Action Center relies upon the Security Center service being active and running. Other networking services, such as Network Access Protection, also rely on the Security Center service being active. Task Manager is a Windows utility that displays information about the system's use of resources. The utilization statistics provided in Task Manager can help resolve system problems. The Resource Monitor displays real-time information about the way resources are used by the installed hardware and software. Reliability Monitor tracks a computer's stability by maintaining historical data relating to the operating system's stability. The historical information gathered by Reliability Monitor can be useful for troubleshooting intermittent problems. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

You manage a Windows 10 system, on which File History has been turned on. You want to keep all versions of your files until space on the hard drive is needed. You have used Control Panel to access File History as shown in the image. Click on the option which will let you configure the required setting.

Advanced settings EXPLANATION To reconfigure File History to maintain all past versions of a file until space and the drive is needed, open Control Panel to File History and click Advanced settings. Next, use the Keep saved versions drop-down to select Until space is needed. Use Restore personal files to restore earlier versions of files protected with File History. Use Select drive to configure which drive File History uses to store file versions. Use Exclude folders to identify folders that should not be protected with File History. Use the Turn off button to disable File History. REFERENCES TestOut Client Pro - 12.4 Backup

What are some of the execution policies that Windows has in place to protect PowerShell against malicious users? (Select two.) Restricted and Selective Selective and AllInclusive DigitallySigned and AllSigned AllSigned and RemoteSigned Restricted and Unrestricted

AllSigned and RemoteSigned Restricted and Unrestricted EXPLANATION By default, PowerShell uses execution policies to prevent you from running scripts. In fact, the default configuration prevents you from running any scripts at all. There are four execution policies you need to be familiar with. The first one is Restricted. This means no script can run regardless of where it came from or its digital signature. This policy only allows individual cmdlets. The next execution policy is AllSigned, which allows scripts to be run if they're digitally signed by a trusted publisher. You can also use the RemoteSigned execution policy, which allows remotely signed scripts to be run. But note that any scripts downloaded from the internet must be digitally signed by a trusted publisher. Any scripts that you create locally don't need to be signed and are allowed to run. The final execution policy you should be familiar is called Unrestricted. It allows any script to run, regardless of where it came from. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

You have 400 Windows 10 workstations and a Windows Server Update Service (WSUS) in your office. Which option would you use to stop the workstations in your organization from using Microsoft's servers for system updates? Allow downloads from other PCs Pause updates for up to 35 days Limit bandwidth for downloads Download updates over metered connections

Allow downloads from other PCs EXPLANATION You can get your updates from Microsoft directly. But you can also get updates from other workstations on your network that have already downloaded that same update. By default, Allow downloads from other PCs is turned on. The remaining options may pause or delay updates, but they do not direct the workstation to get the updates without going to Microsoft. REFERENCES TestOut Client Pro - 12.1 Windows Updates

When do you need to use the full path to a script in order to run it in PowerShell? Always. When you're in the same directory as the script file. When you aren't in the same directory as the script file. Never.

Always. EXPLANATION You can't run scripts from the shell by typing the script's file name. You must specify the full path to the script, even if you're in the directory where the script resides. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

You install a new graphics application on your Windows machine. During installation, the computer reboots, but hangs during startup. Pressing F8 has no effect. To fix your computer so it will start, what should you try first? Roll back to the latest display adapter driver. Boot from the installation disc and restore the system using a system image. Boot into Safe Mode and uninstall the application. Boot from the installation disc and restore to a restore point.

Boot from the installation disc and restore to a restore point. EXPLANATION To undo changes made to applications, system settings, or drivers, you can restore the system to a restore point. You can restore to a restore point from within Windows, from within Safe Mode, or from the Windows installation disc. If you cannot boot the system either to the desktop or Safe Mode, boot to the Windows installation disc. In this scenario, you cannot boot into Safe Mode because Microsoft removed the option to press F8, and your computer will not start boot to Windows. Restoring to a restore point is faster than doing a restore to a system image, so you should try the restore point first. Rolling back to the latest display adapter driver will not help because the graphics application installation did not change your driver. REFERENCES TestOut Client Pro - 12.3 System Restore

You use a Windows 10 system with File History running. Currently, File History is configured to save copies of files every hour. However, you've been assigned to work on a high-profile project, and you would like File History to save copies of files every 15 minutes. What should you do? (Select two. Each answer is part of the complete solution.) In Control Panel, click System and Security > System > System Protection. Click Advanced settings and then set Save copies of files to Every 15 minutes. Under Protection Settings, click Configure and then set the schedule to Every 15 minutes. In Control Panel, click System and Security > File History. Under Protection Settings, click Create and then set the schedule to Every 15 minutes.

Click Advanced settings and then set Save copies of files to Every 15 minutes. In Control Panel, click System and Security > File History EXPLANATION To configure how often File History saves copies of files, launch Control Panel and click System and Security > File History. Then click Advanced settings and set Save copies of files to the frequency desired. In this example, you would select Every 15 minutes. File History in Windows is independent of System Protection restore points. Therefore, it cannot be managed using Advanced system settings. REFERENCES TestOut Client Pro - 12.4 Backup

You were having trouble with your Windows system, and you initiated a Remote Assistance session with a Help Desk technician. The technician has taken control of your system to perform several checks. She has now asked you to take back control of the system. What should you do? (Select two. Each answer is a complete solution.) Press Esc. Press Ctrl + Z. Click Novice Control. Click Stop sharing. Click Return Control.

Click Stop sharing. Press Esc. EXPLANATION During a Remote Assistance session where the expert has taken control of the system, the user can regain control of their computer at any time by pressing the Esc key or selecting Stop sharing. Pressing Ctrl + Z during a Remote Assistance session will not revert control back to the novice. The Return Control and Novice Control options don't exist in the Remote Assistance interface. However, you can use the Stop Control option mentioned above. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

Consider the Reliability Monitor output shown below. What does the red circle with the letter x represent? Warning Information Crash Critical Event

Critical Event EXPLANATION The reliability and problem history chart in Reliability Monitor provides an overview of system stability in daily or weekly increments. On the chart: - Critical event icons indicate a failure. These icons are red circles with the letter x. - Warning icons indicate a failure. These icons are yellow triangles with an exclamation point. - Information icons indicate a successful event. These icons are blue circles with the letter i. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

What is it called when the hard drive light on your PC is staying on constantly, and the applications have slowed down significantly? Disk crash Page file Swapping Disk thrashing

Disk Trashing EXPLANATION Disk thrashing can be caused by too many applications loaded on the system. The hard disk light stays on constantly, and the applications running on the system slow down to a crawl. If the system has inadequate RAM installed, the CPU spends all its time constantly swapping data between the system RAM and the paging file on disk. This condition gets so bad that the CPU can't do any useful work. A page files is used to migrate unused data from RAM to the hard disk, thereby making more physical RAM available for active applications or data. Swapping is the process of moving data from virtual memory to a page file or vice versa. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

How do you manage the items in the Windows Action Center? From the desktop, right-click and then select Windows Action Center. From the Windows taskbar, type Windows Action Center. From the Command Prompt. From the Settings app.

From the Settings app EXPLANATION The items shown in the Action Center can be managed from the Settings app by selecting System > Notification & actions. To open the Reliability Monitor: - From the Windows taskbar, type Reliability Monitor. - Select View reliability history. You can also run perfmon /rel from Command Prompt to open Reliability Monitor. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

You manage a Windows system that is a member of a Workgroup. The computer is shared by three users. Each user has a standard user account. Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection. How do you allow Remote Desktop access for Mary while granting her the least amount of privileges possible? Make Mary's user account a member of the Remote Desktop Users group. Make Mary's user account a member of the Administrators group. Grant Mary's user account the Access this computer from the network user right. Grant Mary's user account the Impersonate a client after authentication user right.

Make Mary's user account a member of the Remote Desktop Users group. EXPLANATION By default, members of the Administrators group can connect to a computer remotely. To allow other users to access the remote client, make user accounts members of the Remote Desktop Users group. You can also grant the user the Allow Log through Remote Desktop Services user right. This right is configured for members of the Administrators and Remote Desktop Users groups. If you make Mary a member of the Administrators group, this will allow remote desktop access, but this action also gives her too many privileges on the computer. By default, everyone has the Access this computer from the network user right. While this right is required to use Remote Desktop, the right by itself does not allow Remote Desktop. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

When using the Indexing Service on your Windows system, how many directories should you typically catalog? All of them. Only those containing data that is used often. Only the ones the Indexing Service suggests. As many as possible.

Only those containing data that is used often. EXPLANATION You should only index the locations on the hard disk drive where your commonly used data resides. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). Which action should you take? (Select two. Each answer is a possible solution.) Use Telnet to connect to each computer. Run Remote Shell to manage each computer. Send an assistance invitation. Establish a Remote Desktop connection to each computer. Open Computer Management and connect to each remote computer.

Open Computer Management and connect to each remote computer. Establish a Remote Desktop connection to each computer. EXPLANATION To remotely manage computers using a graphical user interface, you can use Remote Desktop or most MMC snap-ins and preconfigured consoles such as Computer Management. When using Computer Management, connect to the remote computer and then use the snap-ins to view and manage its components. You use Remote Shell and Telnet to execute commands on a remote computer. A Remote Assistance session is initiated by sending an assistance invitation. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

You have just read about a new security patch that has been made available for your Windows system. You install the patch as a Windows update. After you reboot and sign in, your computer appears to be unstable. Which action should you take? (Select two. Each answer is a complete solution.) Use Add or Remove Programs to remove the update. Use the Setting app to uninstall the update. Download and install the last good update. Use Programs and Features to remove the update. Use the Software Explorer in Windows Defender.

Use Programs and Features to remove the update. Use the Setting app to uninstall the update. EXPLANATION You can use the Settings app by selecting Update & Security > View update history > Uninstall updates. Alternatively, you could also access Programs and Features and then select View installed updates. Use Software Explorer in Windows Defender to see and remove running software applications, not updates. You cannot remove the current update by installing the last good update. Add or Remove Programs is used in legacy versions of Windows to repair or uninstall applications on the computer. REFERENCES TestOut Client Pro - 12.1 Windows Updates

Which of the following are types of operating system updates for Windows 10 provided by Microsoft? (Select two.) Feature updates Service updates Quality updates Product updates Delivery updates

Feature updates Quality updates EXPLANATION Quality updates include security fixes and software updates. These are deployed monthly and are cumulative in nature. In other words, they add any updates that may have been missed. Feature updates are new versions of the Windows operating system (also called builds). These updates are released semi-annually, usually in the spring and fall. The other options are not operating system updates provided by Microsoft. REFERENCES TestOut Client Pro - 12.1 Windows Updates

You run a regular file backup on your Windows 10 computer every Friday night, which also includes a system image backup. System Protection has been enabled for all drives on the system. On Wednesday, you receive a new version of a graphic editing application that you use regularly. You install the new application, but you find that the application does not work properly. What can you do to get things back to normal as quickly as possible? Select restore for the original application from the Backup and Restore console. In the Backup and Restore console, start a system image recovery. Uninstall the application. Reinstall the original application from the installation discs. Use System Restore to revert to a restore point before you installed the application.

Use System Restore to revert to a restore point before you installed the application. EXPLANATION Use System Restore to revert to a previous restore point. Reverting to a previous restore point removes any applications that have been installed and replaces any applications that have been deleted since the restore point was created. Restoring the entire computer using system image recovery would work, but would require too much time. Uninstalling the new application and reinstalling the old application would require more time than just using System Restore. The Backup and Restore console does not list the applications installed on a system. REFERENCES TestOut Client Pro - 12.3 System Restore

You have a Windows 10 computer configured with volumes C: and D:. You want to schedule backup jobs of the C: volume to include all user files on the C: volume as well as creating a system image of the C: volume. How do you configure the backup job and the schedule with a minimal amount of effort? Add the wbadmin command to a batch file. Use the Backup and Restore (Windows 7) console. Use Device Manager. Use the Windows Task Scheduler.

Use the Backup and Restore (Windows 7) console. EXPLANATION You can use the Backup and Restore console to create a system image backup and schedule a backup of files and folders. By default, file backups occur every Sunday at 7:00 pm. You can modify the schedule using the Backup and Restore console. However, there is only one scheduled backup with a single set of settings. By itself, you can use the wbadmin command to create a system image backup. But you cannot schedule the backup unless you also save the wbadmin command to a batch file and then use Windows Task Scheduler. Use Windows Task Scheduler to schedule a batch file. Use Device Manager to manage hardware devices. REFERENCES TestOut Client Pro - 12.4 Backup

What is WindowsUpdate.log? A log file used to deploy updates to groups of devices over a deployment timeline. A log file that can be used to see policies enforced on your Windows 10 machine. A log file that analyzes Windows Update Service, BITS, and Windows Network Diagnostics Service. A log file that can be created and saved and can be used to locate errors or problems.

A log file that can be created and saved and can be used to locate errors or problems. EXPLANATION Running Get-WindowsUPdateLog at a PowerShell command prompt runs a process to look at the Windows Update logs and compile them into a file that can be saved. This file can be reviewed to locate errors or problems. The Windows Update Troubleshooter is a tool that analyzes three different services: Windows Update Service, Background Intelligent Transfer Service, and the Windows Network Diagnostics Service. This troubleshooter looks for problems, like pending restarts, and helps you to solve them. Update rings allow you to deploy updates to groups of devices over a deployment timeline. View configured updates is an option in the Windows Update settings you can use to see the policies enforced on your Windows machine. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

Consider the Reliability Monitor output shown below. Which status does the yellow triangle icon with an exclamation point represent? Crash Information Warning Critical event

Warning EXPLANATION The reliability and problem history chart in Reliability Monitor provides an overview of system stability in daily or weekly increments. On the chart: - Warning icons indicate a failure. These icons are yellow triangles with an exclamation point. - Information icons indicate a successful event. These icons are blue circles with the letter i. - Critical event icons indicate a failure. These icons are red circles with the letter x. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

While deploying Windows updates, when would you use the critical update ring? When deploying updates for any general user within the organization. When deploying updates to users that want to stay on top of changes. When deploying updates to most of the organization when you want to monitor for feedback. When deploying updates to machines (only after the update has been vetted).

When deploying updates to machines (only after the update has been vetted). EXPLANATION The critical deployment ring is for critical machines that you don't want to update until the update has been vetted. These are machines that are critical to the running of our organization or that are running projects. You can defer feature updates for up six months and quality improvement updates for up to 30 days. The preview ring is for those users who want to stay on top of changes and are on the cutting edge. They want to see the latest and the greatest. This is called the Windows Insider Program. It allows you to get the most recent updates to the system. The broad ring includes the Semi-Annual Channel and are broadly deployed to most of the organization and monitored for feedback. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

Windows Update for Business (WUfB) lets you keep devices current with the latest security upgrades and features. Which operating system releases does WUfB support? Windows 10 Home Windows 10 Windows 8 Windows 8 Home

Windows 10 EXPLANATION Windows Update for Business (WUfB) can be used with all versions of Windows 10 except Windows Home. WUfB is not compatible with Windows 8 or earlier operating system releases. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

Which of the following is true about Windows Update? (Select two.) You can implement policy changes and push them to the clients from the Windows server using the Group Policy Editor. Group Policy removes a user's ability to determine when updates and upgrades are installed. By default, each client contacts the Microsoft website for updates. Windows 10 does not allows the user to turn security updates off using the Settings app or Control Panel. Settings for Windows Update can be made at the Windows 10 device using Group Policy Editor.

Windows 10 does not allow the user to turn security updates off using the Settings app or Control Panel. By default, each client contacts the Microsoft website for updates. EXPLANATION By default, each client contacts the Microsoft website for updates. Windows 10 does not allows the user to turn security updates off using the Settings app or Control Panel. Group Policy can be used to give users more or less leeway as to when updates and upgrades are installed. Settings for Windows Update can be made on the Windows 10 device using Group Policy Editor. Policy changes can be implemented and pushed to the clients from the Windows Server using Group Policy Editor. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

What is the tool that queues messages, checks several security and maintenance-related items, and consolidates messages and status updates for several other tools called? Resource Monitoring Windows Action Center Reliability Monitor Task Manager

Windows Action Center EXPLANATION The Action Center queues messages that require your attention, checks several security and maintenance-related items that influence the computer's overall performance, and also consolidates messages and status updates for several security-related tools into one location. Reliability Monitor tracks a computer's stability by maintaining historical data relating to the operating system's stability. The historical information gathered by Reliability Monitor can be useful for troubleshooting intermittent problems. The Resource Monitor displays real-time information about the way resources are used by the installed hardware and software. Task Manager is a Windows utility that displays information about the system's use of resources. The utilization statistics provided in Task Manager can help resolve system problems. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

Which of the following describes a system image backup? (Select two.) A system image only contains the operating system, installed programs, drivers, and user profile settings. A system image backup consists of an entire volume backed up to .vhd files. A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files. A system image does not include operating system files, program files, encrypted files, files in the Recycle Bin, user profile settings, or temporary files. A system image includes only specified files and folders backed up to a compressed file.

A system image backup consists of an entire volume backed up to .vhd files A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files. EXPLANATION A system image backup consists of an entire volume backed up to .vhd files. It contains everything on the system volume, including the operating system, installed programs, drivers, and user data files. A file backup includes specified files and folders backed up to a compressed file. File backups do not include operating system files, program files, encrypted files (including EFS-encrypted files), files in the Recycle Bin, user profile settings, or temporary files. REFERENCES TestOut Client Pro - 12.4 Backup

To protect your system and the data on your Windows 10 computer, you use the Backup and Restore console to create a system image backup. While working with a file, you accidentally delete some of the data. You need to restore the older version of the file, but you cannot find any previous versions of the file. What should you do? (Select two. Each answer is part of the complete solution.) Use Windows Explorer to browse to and then copy the file. Attach the .vhd file created from the Backup and Restore console. Create a fresh restore point. Attach the .bak file created from the Backup and Restore console. Run System Restore and use a restore point to restore the data.

Attach the .vhd file created from the Backup and Restore console. Use Windows Explorer to browse to and then copy the file. EXPLANATION The Backup and Restore console creates system images in the .vhd format. To recover files from the .vhd file: 1. Attach (mount) the .vhd file so that it displays as a disk and can have a drive letter assignment. 2. Browse to and then copy the files you need. Creating a new restore point will take a snapshot of the file, but it will not include the lost data. Restore points include shadow copies of user data files on protected volumes. However, restoring to a restore point will not restore or modify user data files. REFERENCES TestOut Client Pro - 12.5 Recovery

Why is command history so useful in PowerShell? Because it allows you to use the up arrow key to select a previously used command instead of retyping it. Because it allows you to use either side arrow key to select a previously used command instead of retyping it. Because it pulls up the entire history of commands ever used on the system, allowing you to search through them. Because it pulls up the entire history of PowerShell since its creation, giving more understanding of its functions to new users.

Because it allows you to use the up arrow key to select a previously used command instead of retyping it. EXPLANATION Command history allows you to pull up a previously used command. Instead of retyping it, you can press the up arrow key to reuse a command you've previously entered. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

You have recently made some changes to your Windows system. Things seemed to run fine for several days. Today, however, your computer has started to be unstable. Shortly after you log on on, the system crashes and hangs. Which of the following will most likely correct the problem in the least amount of time? Use previous versions to recover corrupted system files. Boot to the installation disc and use Startup Repair. Boot into Safe Mode and restore to a restore point. Boot to the installation disc and use System Image Recovery.

Boot into Safe Mode and restore to a restore point. EXPLANATION Try restoring the system to a restore point. System changes made since the restore point was taken are undone. Applications, device drivers, and patches will no longer be applied. Using a restore point is faster than trying other recovery options from the installation disc. Restoring the entire system would only be necessary if a restore point did not work. Previous versions (also called shadow copies) only takes snapshots of files and folders to protect against accidental deletion or modification of user data files. Previous versions won't resolve problems with system files. REFERENCES TestOut Client Pro - 12.3 System Restore

One of the users you support, VKumar, has just turned on File History and selected the internal D: drive as the location to which his files will be copied. By default, which directory does File History copy files from to save on the D: drive? C:\Users\VKumar C:\Users\VKumar\Profile C:\Users\VKumar\Libraries C:\Users\Profile\VKumar

C:\Users\VKumar EXPLANATION By default, File History makes backup copies of the files associated with the user's profile, which by default are found in the C:\Users\[username] directory. So the files in the C:\Users\VKumar folder will be copied to the drive that is selected for File History. REFERENCES TestOut Client Pro - 12.4 Backup

While managing the available memory for applications on your Windows system, you discover that the paging file is set below the recommended size. Which answer is a common recommendation for setting the size of the paging file? Configure the paging file equal to the amount of physical RAM. Configure the paging file to three times the amount of physical RAM. Configure the paging file as large as possible. Configure the paging file to one and a half to two times the amount of physical RAM.

Configure the paging file to one and a half to two times the amount of physical RAM. EXPLANATION Unless you are running applications that require large amounts of paging file space, the optimal setting for a virtual memory swap file size is about one and a half to two times larger than the physical RAM in the computer. As the size of the paging file exceeds this threshold, the system spends more and more time swapping memory data in and out of the paging file. Eventually, this becomes more than is made available to the user to accomplish tasks. This condition is known as disk thrashing. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

Which application would you use to include device updates with Windows Update? Software Explorer Settings app Add or Remove Programs Control Panel

Control Panel EXPLANATION The only option for adding device updates in Windows 10 is to use Control Panel. Go to Hardware and Sound > Devices and Printers > Devices. Right-click the device icon. From the menu, select Device installation settings on this system. You can use the Settings app to change settings regarding Windows Updates. Use Software Explorer in Windows Defender to see and remove running software applications, not updates. Add or Remove Programs is used in legacy versions of Windows to repair or uninstall applications on the computer. REFERENCES TestOut Client Pro - 12.1 Windows Updates

Your Windows system has two volumes defined. The C: volume contains the Windows system and is formatted with NTFS. The D: volume is formatted with FAT32. Which action must you take to create a system image backup with the D: volume as the destination? Create the WindowsImageBackup folder on the D: volume. Install an external USB hard disk to store the system image. Run wbadmin start backup -backuptarget:c: Convert the D: drive to NTFS.

Convert the D: drive to NTFS EXPLANATION You need to convert the D: volume to NTFS. You are not able to save a system image to a non-NTFS volume. You can run the wbadmin command to create scheduled system image backups. But in this scenario, it should use -backuptarget:d: to specify the D: volume as the destination. Although an external NTFS hard disk could be install, it is not necessary because you can convert the FAT32 volume to NTFS. This is faster and cheaper than purchasing a new external USB hard disk. You do not create the WindowsImageBackup folder manually. The WindowsImageBackup folder is created for system images and is found in the root of the backup destination. REFERENCES TestOut Client Pro - 12.4 Backup

Your Windows computer has system protection enabled on the system drive. By default, restore points are only created when a Windows update occurs. In the last week, since the last Windows update, you have installed a video editing application that you use every day. Today you installed a new sound card with the driver that came with it. Your system started behaving erratically after you rebooted. You tried updating to the latest driver for the sound card, but that didn't help. So you used System Restore to get your computer back to the state it was in before you installed the sound card. After you reboot your computer, you realize you have to install your video editing application again. Which action would have helped you avoid having to reinstall the application? Rolling back to the previous version of the sound card driver instead of using System Restore. Creating a manual restore point just before installing the sound card. Using the installation disk to restore a system image. Rebooting using the Last Known Good Configuration instead of using System Restore. Using the installation disk to run the Startup Repair option.

Creating a manual restore point just before installing the sound card. EXPLANATION Creating a manual restore point just before installing the sound card would have preserved a copy of your system in a stable state and with an up-to-date configuration. Without this manual restore point, your latest restore point was created before the last Windows update, which happened before you installed the video editing software. Using the Last Known Good Configuration would only undo changes that have occurred since the last successful boot, which happened after you installed the sound card. Restoring to a system image would return you to the same state your machine was in when the restore point was created at the last Windows update. Startup Repair is a utility that tries to automatically fix problems that keep the system from booting. This includes repairing the boot configuration file or locating the operating system files on the hard disk. After trying to update the driver, rolling back to the previous version of the sound card driver would only return you to the problem that the first driver started. REFERENCES TestOut Client Pro - 12.3 System Restore

You manage several Windows systems that are members of a domain. Your company uses Remote Assistance to help diagnose user desktop issues. All computers are configured to allow Remote Assistance. One day, you receive a Remote Assistance request from someone you don't know using an invitation file you created several weeks ago. What can you do to prevent this from happening again? (Select two.) Enable the Allow remote connections to this computer option. Increase the timeout for invitation files. Require a password on invitation files. Create a rule in Windows Firewall to block Remote Assistance. Decrease the timeout for invitation files.

Decrease the timeout for invitation files. Require a password on invitation files. EXPLANATION To help control Remote Assistance access, require a password on invitation files and decrease the time an invitation file is still valid. Increasing the timeout value for invitation files would make the problem worse. Blocking Remote Assistance with the Windows Firewall would block all offers, including valid ones. Remote Desktop must be manually enabled on the Remote tab in System Properties. Configure Remote Desktop by selecting one of the following settings: - Enable the Allow remote connections to this computer option. - Enable the Allow connections only from computers running Remote Desktop with Network Level Authentication option. This is the most secure method for Remote Desktop connections. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

Using the Settings app, you have accessed Windows Update > Delivery Optimization. What function does this option provide? Delivery Optimization lets you know when and if there are any urgent updates for your system and provides you with an option to download and install them. Delivery Optimization provides you with Windows and Store app updates and other Microsoft products. Delivery Optimization lets you view the updates installed. It also lets you uninstall an update if needed. Delivery Optimization lets you set the active hours to indicate the normal use of a device. The device will not reboot to install updates during this time.

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products. EXPLANATION Delivery optimization provides you with Windows and Store app updates and other Microsoft products. Clicking Advanced Options from here lets you to throttle the bandwidth for downloading and uploading updates, including the monthly limit. From Windows Update, you would use View update history to view all the updates that have been applied to your system. You can also install updates from here. From Windows Update, you would use Change active hours to set the active hours to indicate the normal use of a device. The device will not reboot to install the update during this time. From Windows Update, you would use Check for updates to access Microsoft's site and see if any new updates are available for you system. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

Which Group Policy setting, when disabled, forces users to update their system before the system is shut down? Do not display Install Updates and Shut Down option in Shut Down Windows dialog box Allow Automatic Updates immediate installation Enable client-side targeting No auto-restart for scheduled automatic updates and installations

Do not display Install Updates and Shut Down option in Shut Down Windows dialog box. EXPLANATION You will use the Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box policy setting. This policy setting allows you to manage whether the 'Install Updates and Shut Down' option is displayed in the Shut Down Windows dialog box. When you enable this policy setting, Install Updates and Shut Down will not appear as a choice in the Shut Down Windows dialog box, even if updates are available for installation when the user selects the Shut Down option in the Start menu. When you disable or do not configure this policy setting, the Install Updates and Shut Down option will be available in the Shut Down Windows dialog box if updates are available when the user selects the Shut Down option in the Start menu. The Allow Automatic Updates immediate installation policy specifies how long Automatic Updates waits before performing a restart. By default, the system waits 5 minutes before restarting. The Enable client-side targeting policy to allow clients to add themselves automatically to target computer groups on the WSUS server. The No Auto-Restart For Scheduled Automatic Updates and Installations policy allows automatic updates to disregard a required restart when a user is logged on. The user receives a notification about the required restart, but is not required to restart the machine. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

For several months, your Windows computer acted like a server in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server. Now, you want the computer to focus on applications. After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications. What should you do? Configure System Protection settings. Edit the Paging File settings. Configure Visual Effects settings. Edit the Processor Scheduling settings.

Edit the Processor Scheduling settings. EXPLANATION Configure Processor Scheduling to adjust the response times of interactive applications or background applications running as services. In this scenario, you should adjust the Processor Scheduling for programs. This option gives the active application the best response time and the greatest share of available resources. Use the Visual Effects settings to affect the appearance of window borders, window contents, mouse pointers, and text. If the system has a slow processor, low memory, or not enough video memory, using Visual Effects can make the system respond slowly. System Protection settings enable backups of system files and user data files. A paging file is an area on the hard disk that Windows uses as if it were RAM. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

Your Windows computer has two hard drives, both formatted with NTFS. You have enabled system protection on both disks. How do you delete all restore points while keeping system protection enable on both drives? Run Disk Cleanup and clean up system files. Edit the System Protection configuration in System Properties, and turn off protection for both drives. Open System Restore and select all the restore points to delete. Edit the System Protection configuration in System Properties, and delete the restore points.

Edit the System Protection configuration in System Properties, and delete the restore points. EXPLANATION To delete all restore points, open System Properties and then select the System Protection tab. Next, select Configure > Delete. Deleting restore points using the Delete feature keeps system protection enabled on the disks. Disabling system protection also deletes all restore points, but it removes system protection from the disks. Use Disk Cleanup to delete all but the last restore point. You cannot delete restore points while viewing the restore points from within System Restore. REFERENCES TestOut Client Pro - 12.3 System Restore

You have configured scheduled backups in the Backup and Restore console to take a backup each week. You save the backups to a network location. You find that backups are not being completed because the destination computer is asleep when the schedule time starts. The destination computer is not waking up to perform the backup. How can you make sure the backup destination device is awake and available? Configure the power plan settings to wake the computer for scheduled tasks. Edit the network adapter settings and enable Wake on LAN (WoL). Edit the backup task in Task Scheduler. Edit the schedule settings in the Backup and Restore console.

Edit the backup task in Task Scheduler EXPLANATION In the Backup and Restore console, you can edit settings for the backup such as the destination, what files to back up, and when to perform the backup. For more advanced settings, you can edit the task in the Task Scheduler. For example, you can configure the computer to wake when the task needs to run, configure the backup to not run when on battery power, run only when the computer is idle, or require that a network connection exists before the backup starts. You can also configure what to do when the backup is interrupted or cannot be completed, such as configure the backup to run as soon as possible or wait until the next scheduled time. The Wake on LAN (WoL) feature on the network adapter allows a signal received over the network to wake the computer. This feature is used by management stations to wake the computer to perform maintenance or remote tasks. Power plan settings control what to do when power is low or when the system is idle, but do not prevent performing scheduled tasks. REFERENCES TestOut Client Pro - 12.4 Backup

You are supporting a Windows 10 computer that has two volumes: - The C: drive is the system drive with user profiles and individual user files. - The D: drive holds data files common to all users. System Protection has been configured as follows: - A system image backup has been created that includes both the C: and D: drives. - Regular backups are scheduled to back up all user libraries. The scheduled backup includes a system image. - System Restore has been used to take a snapshot. A user has edited and saved a file on the D: drive. The user doesn't like the changes and wants to revert to a previous version of the file. The user goes to the Previous Versions tab of the file and sees nothing listed. To avoid this situation in the future, you must ensure that users can revert files on the D: drive to earlier versions of the file from the Previous Versions tab. What should you do? (Select two. Each answer is a complete solution.) Create a system image backup. Enable System Protection for the D: drive. Change the Volume Shadow Copy Service (VSS) to Disabled. Enable BackupGlobalCatalog files. Modify the backup settings in Backup and Restore to include the D: drive.

Enable System Protection for the D: drive. Modify the backup settings in Backup and Restore to include the D: drive. EXPLANATION To make sure previous version of files are available in the Previous Versions tab of a file or folder, complete one of the following options: - Enable system protection on the D: drive. By default, System Protection settings are enabled on the system drive, but must be enabled on other drives. When enabled, the System Protection settings determine what types of files can be restored from previous versions. - Use Backup and Restore settings to include the D: drive. The backups will include the specified files and folders in the .zip file. The Volume Shadow Copy Service (VSS) manages and implements shadow copies as seen in the Previous Versions tab of a file or folder. A system image backup is intended to restore a system back to its previous state after a hardware or system failure. The files in the system image will not show up in the Previous Versions tab of a file or folder. A system image is created in the WindowsImageBackup folder. This folder found at the root of the backup destination drive. It contains the following: - The folder named Catalog, containing the GlobalCatalog and BackupGlobalCatalog files to track the backup image versions. - A folder named Backup whose name includes the year, month, day, and time. This folder contains the .vhd file. REFERENCES TestOut Client Pro - 12.5 Recovery

To provide additional storage space, you have added a second internal hard drive to your Windows 10 system. For the past several weeks, you have created and changed many files stored on the new hard drive. One of the files on the new drive has become corrupted. You want to recover as much as you can by reverting to a previous version of that file. After viewing the file properties, you notice that no previous versions are available. Which action must you take to ensure that you can revert files to previous versions on the new hard drive of your Windows 10 computer? Restore the system from a restore point. Enable System Protection on the new hard drive. Delete all but the last restore point. Create a restore point.

Enable System Protection on the new hard drive EXPLANATION On a Windows 10 computer, you must enable System Protection on the new drive. When enabled, the settings in System Protection determine what types of files can be restored from previous versions. Creating a restore point creates previous version of files only on drives that have System Protection enabled. Restoring the system from a restore point will not restore a previous version of the file. Deleting previous restore points creates more disk space. Subsequent restore points will delete earlier restore points when disk space is low. REFERENCES TestOut Client Pro - 12.5 Recovery

You are supporting a Windows 10 computer that is used by three different users. The computer has the following volumes with default System Protection settings: - C: (System drive with user profiles and individual user files) - E: (Data files common to all users) Which option is the easiest way to protect the data on both volumes with restore points? Enable system protection for the E: volume. Use the Backup and Restore console to enable file restore points. Enable system protection for the C: and E: volumes. Use System Restore to enable the restore points.

Enable system protection for the E: volume. EXPLANATION You only need to enable system protection for the E: volume. By default, System Protection settings are enabled on the Windows 10 system volume, but must be enabled on other volumes before restore points for files are created. If system protection is enabled, Windows automatically creates shadow copies of files that have been modified since the last restore point was created. Use System Restore to restore system settings from a previously created restore point. Use the Backup and Restore console to create system image backups and file backups. REFERENCES TestOut Client Pro - 12.5 Recovery

You need to be able to remotely execute commands on a Windows workstation named WS1. Which commands can be used to enable remote management on this system? (Select two. Each answer is a complete solution.) winrs -r:WS1 psexec \\WS1 winrm quickconfig telnet WS1 Enable-PSRemoting

Enable-PSRemoting winrm quickconfig EXPLANATION To enable remote management on a Windows workstation, you can use one of the following commands: - winrm quickconfig - Set-WSManQuickConfig (PowerShell cmdlet) - Enable-PSRemoting (PowerShell cmdlet) The winrs, psexec, and telnet commands can be used to run commands on a remote system after remote management has been enabled using one of the above commands. REFERENCES TestOut Client Pro - 11.7 Remote Management

What are some security measures Microsoft has implemented to protect your system against users trying to use PorwerShell for malicious purposes? File extension, script's full path, and execution policies Restricted and Unrestricted execution policy options Restricted, AllSigned, RemoteSigned, and Unrestricted File name and script's partial path (beginning or ending)

File extension, script's full path, and execution policies EXPLANATION Microsoft has implemented several security measures to prevent users from using PowerShell maliciously. The first of these security measures is the file extension itself. If you go to where a script file is located and double-click it, it won't immediately launch and run on PowerShell. Instead, by default, the .ps1 file extension is associated with Notepad. If you double-click a script file, instead of running, it opens in Notepad. The second is that you can't run scripts from the shell by typing the script's file name. You must specify the full path to the script. This is even if you're on the same directory where the script resides. The third security measure is that, by default, PowerShell uses execution policies to prevent you from running scripts. In fact, the default configuration prevents you from running any scripts at all. There are four execution policies you need to be familiar with. The first one is Restricted. This means no script can run regardless of where it came from or its digital signature. This policy only allows individual cmdlets. The next execution policy is AllSigned, which allows scripts to be run if they're digitally signed by a trusted publisher. You can also use the RemoteSigned execution policy, which allows remotely signed scripts to be run. But note that any scripts downloaded from the internet must be digitally signed by a trusted publisher. Any scripts that you create locally don't need to be signed and are allowed to run. The final execution policy you should be familiar is called Unrestricted. It allows any script to run, regardless of where it came from. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

You are configuring file backups using Backup and Restore (Windows 7) in Control Panel on a Windows system. Which information can be included in the backup? (Select two.) Registry settings Files in user Documents libraries Event log data EFS-encrypted files Files on user desktops

Files in user Documents libraries Files on user desktops EXPLANATION A file backup includes specified files and folders backed up to a compressed file. Files in each user's profile can be included in the backup, including files on the desktop and files in the Documents library. File backups do not include system files, registry settings, program files, encrypted files (including EFS-encrypted files), files in the Recycle Bin, or temporary files. REFERENCES TestOut Client Pro - 12.4 Backup

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer? Run the netsh winhttp import proxy source command. Check the Local Security Policy. Go to Programs and Features in Control Panel. Run the wuauclt.exe /listupdates command.

Go to Programs and Features in Control Panel. EXPLANATION To check a computer for a specific update, you click the View update history link in Windows Update. You can also click View installed updates in Programs and Features (both available through the Control Panel). The Wuauclt.exe command is the client component for Windows Update. One of the functions of this program is to check for updates using settings configured locally or through Group Policy. You can run the wuauclt /detectnow command to force the computer to check for updates immediately. However, there is no option for seeing which updates have been installed. The netsh winhttp import proxy source command can be used to import Internet Explorer's Internet Options settings directly. The Local Security Policy shows you the update settings that would be controlled locally. In this scenario, because Group Policy is being used, these settings would tell you nothing about the configuration of the computer. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

You use a Windows 10 system with File History enabled. You've been working on the index.html file in the HTML Files folder in your Temp\HTML library. You realized this evening that you've made many erroneous changes during the day that will require a great deal of work to correct. You decide that the best option is to restore the version of this file as it was this afternoon. You've used File History to identify the version of the file you want to restore. Click the option you would use to restore version 6 of the file shown.

Green reload button EXPLANATION To restore an earlier version of a file using File History, launch Control Panel, click System and Security, and then under File History, click Restore your files with File History. Use the file browser interface to locate the file in question. Use the forward and back buttons to identify which previous version of the file is the one you want to restore, and then click the green Restore button. To restore the earliest version, you would use the left back button. Selecting the green Restore button without navigating back to the previous version will restore the version of the file shown, which may not be the oldest version. Clicking or double-clicking on the file shown lets you view the contents of the file (if possible). Clicking on the right (forward) button will take you to a more recent version of the file than the one being displayed. REFERENCES TestOut Client Pro - 12.4 Backup

Microsoft offers three different servicing channels for Windows 10. Match each channel on the left with its description on the right. (Each channel may be used once, more than once, or not at all.) Drag Windows Insider Program (WIP) Semi-Annual Channel Long-Term Servicing Channel Drop Ideal for pilot deployment and lab testing of Windows updates. For highly sensitive systems that can't tolerate any down time. Give system administrators a chance to give feedback to Microsoft on any bugs before Microsoft releases the update. New updates are typically released every 2-3 years. Feature updates are automatically installed as soon as they are released unless deferred. Provides very early pre-released Windows builds or feature updates.

Ideal for pilot deployment and lab testing of Windows updates. Semi-annual Channel For highly sensitive systems that can't tolerate any down time. Long-term Servicing Channel Give system administrators a chance to give feedback to Microsoft on any bugs before Microsoft releases the update. Windows Insider Program (WIP) New updates are typically released every 2-3 years. Long-term Servicing Channel Feature updates are automatically installed as soon as they are released unless deferred. Semi-annual Channel Provides very early pre-released Windows builds or feature updates. Windows Insider Program (WIP) EXPLANATION Windows Insider Program - Provides very early pre-released Windows builds or feature updates. - Gives system administrators a chance to test updates before deployment to their systems. - Give system administrators a chance to give feedback to Microsoft on any bugs before Microsoft releases the update. Semi-Annual Channel - Feature updates are automatically installed as soon as they are released. (Unless they have been deferred). - Can be deferred up to 365 days. - Ideal for pilot deployment and lab testing of Windows updates. - Typically used by system administrators and software developers. Long-Term Servicing Channel - Available only through Windows 10 Enterprise LTSB edition. - For highly sensitive systems that can't tolerate any down time (like ATMs, cash registers, and medical equipment). - Doesn't include many of the Windows applications like Edge, Office, Microsoft Store, and Mail because it is designed for systems that don't need frequent updates. - New updates are typically released every 2-3 years. - Has the option to install updates or skip for up to 10 years. REFERENCES TestOut Client Pro - 12.1 Windows Updates

You have a computer running Windows 10. The C: drive holds all system files and is the boot volume. The D: volume holds only user data files. You want to schedule a backup that includes everything on the C: and D: drives so you could restore your entire computer if necessary. How do you configure the backup to run on Monday, Wednesday, and Friday? In Windows Task Scheduler, create a task to run wbadmin. In the Backup and Restore console, create a system repair disc. In the Backup and Restore console, configure a system image backup. In the Backup and Restore console, schedule a file backup.

In Windows Task Scheduler, create a task to run wbadmin EXPLANATION If you need to schedule backups to occur more than once a week, use the Task Scheduler to create a task that runs wbadmin. You can schedule backups that include all files on a drive or a system image. But, you can only schedule the backup to occur once every day, week, or month. Use the Task Scheduler to perform the backup more than once a day, week, or month. With a system image backup in the Backup and Restore console, you can include other volumes besides the system volumes. However, you cannot schedule the backup. A system repair disc is used to boot the computer if something prevents it from starting. The system repair disc does not include data backups. It is used in conjunction with data backups to restore your system if necessary. REFERENCES TestOut Client Pro - 12.4 Backup

You need to connect to a remote Windows system using Remote Desktop. How can you copy files from your local hard drives to the remote computer with the least amount of effort? In System Properties, add yourself to the Remote Desktop Users group. Map a network drive to the remote machine. In the Remote Desktop Connection options, edit the local devices and resources options. In the Remote Desktop Client Properties, change your connection speed to optimize performance.

In the Remote Desktop Connection options, edit the local devices and resources options. EXPLANATION To copy files from your local hard drives to the remote computer with the least amount of effort, from the Remote Desktop Connection, show the options. From the Local Resources tab, under Local devices and resources, click More and then mark the drives required. Mapping a network drive would solve the problem, but not with least administrative effort. You need to be a member of the Remote Desktop Users group on the remote machine to connect in the first place, and changing your connection speed only improves the graphical experience of your connection. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do? Enable system protection on D: Manually create a restore point on C: Manually create a restore point on D: Increase the amount of disk space reserved for restore points on C: Delete old restore points on C:

Increase the amount of disk space reserved for restore points on C: EXPLANATION By increasing the amount of disk space reserved for restore points on C:, you increase the number of restore points that you can choose from should an issue arise. Deleting older restore points for C: would temporarily increase the amount of space available for future restore points, but it doesn't provide a long-term solution. Manually creating restore points on C: isn't necessary unless a significant system change is about to take place, such as installing a new application. In older versions of Windows, it was advisable to enable system protection on secondary hard disks because restore points were used to store previous versions of files on that disk. In Windows 8 and later, file versions are handled by File History. File History works independently of system protection. REFERENCES TestOut Client Pro - 12.3 System Restore

You have opened the Indexing Options dialog and navigated to Advanced > File Types tab. From this page, you can specify how the file should be indexed. Which of the following options are available? (Select two.) Index Properties Only Name and File Contents Index Properties and File Contents Encrypted files File Contents Only

Index Properties Only Index Properties and File Contents EXPLANATION Under Indexing Options > Advanced > File Types, you can specify not only the extensions of the files you want to index, but also how much of a file should be indexed. Under How should this file be indexed?, you can choose Index Properties Only or Index Properties and File Contents. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

Why does virtual memory play an important role in the Windows OS? It allows you to modify applications on the system that you can't modify in the physical memory. It allows you to run less applications on the system than you have physical memory to support. It allows you to install more hardware on the system than you have physical space to support. It allows you to run more applications on the system than you have physical memory to support. Mark this question for review

It allows you to run more applications on the system than you have physical memory to support. EXPLANATION Virtual memory plays an important role in the Windows operating system because it allows you to run more applications on the system than you have physical memory to support. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

What are the benefits of the Indexing Service on a Windows system? (Select two.) It searches every location on the system's hard drive and catalogs a few of the files and programs it finds. It makes the search process much faster. It eliminates the need to save files and programs. It makes the search process much slower and more careful. It searches specified locations on the system's hard disk drives and catalogs all the files and programs it finds.

It makes the search process much faster. It searches specified locations on the system's hard disk drives and catalogs all the files and programs it finds. EXPLANATION The Indexing Service on a Windows system searches specified locations on the system's hard disk drives and catalogs all the files and programs it finds. This makes the search process much faster. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

What happens when you double-click a PowerShell script file? It displays an error message. It opens and runs in PowerShell. It opens as a Notepad file. It opens in PoweShell but doesn't run.

It opens as a Notepad file. EXPLANATION Microsoft has implemented several security measures to prevent users from using PowerShell maliciously. The first of these security measures is the file extension itself. If you go to where a script file is located and double-click it, it won't immediately launch and run on PowerShell. Instead, by default, the .ps1 file extension is associated with Notepad. If you double-click a script file, instead of running, it opens in Notepad. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

How do you increase the size of the paging file on your Windows system? Modify the Processor Scheduling settings. Modify the Disk Thrashing settings. Modify the System Protection settings. Modify the Advanced system settings.

Modify the Advanced system settings. EXPLANATION Edit Advanced system settings to increase the size of a paging file. The paging file is an area on the hard disk that Windows uses as if it were RAM. The paging file is used to move unused data in RAM to the hard disk, thereby making more space available in memory for other running applications or data. Processor Scheduling determines the response times of interactive applications or background applications running as services. System Protection settings enable backups of system files and user data files. If too many applications are loaded on the system, the CPU spends all its time swapping data between the system RAM and the paging file on disk. This condition can get so bad that the CPU can't perform any real, useful work. When this happens, we call it disk thrashing. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

You manage two Windows systems named Computer1 and Computer2. Both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers. Which steps do you need to perform so you can use Computer2 to create an additional disk volume on Computer1? On Computer1, install the Telnet Client. On Computer2, use diskmgmt.msc On Computer2, run winrs and then run diskmgmt.msc On Computer1, install the Telnet Client. On Computer2, run diskpart On Computer2, run winrs and then run diskpart

On Computer2, run winrs and then run diskpart EXPLANATION To create an additional disk volume on a remote computer, run winrs and then run diskpart from the local computer. Windows Remote Shell (WinRS) uses the command line interface to manage a remote computer. DiskPart is a command line utility used to configure and manage disks and volumes. The Disk Management MMC snap-in (diskmgmt.msc) performs disk-related tasks similar to DiskPart. However, it requires the use of a mouse as it is graphically based instead of command line based. You would also need Remote Desktop or Remote Assistance in order to use Disk Management on a remote computer. The Microsoft Telnet Client is a text-based program that runs in Command Prompt. It allows you to connect to another computer. In this scenario, you are not working from Computer1 and cannot install the Telnet Client. If you were working from Computer1, you could use Disk Management or DiskPart to create the additional disk volume as required in the scenario. REFERENCES TestOut Client Pro - 11.7 Remote Management

Your Windows 10 computer has two hard drives. The C: drive is the system drive, and the D: drive holds data files. You perform a system image backup that includes both drives using the Backup and Restore console. Your computer takes regular restore point snapshots. One day, you find that the D:\finances folder has been deleted. You check previous versions of the drive, but find nothing listed. Which action can you take to restore the folder and its contents as quickly as possible? Mount the .vhd file in the backup and then copy the folder to the drive. In the Backup and Restore console, click Restore my files. Browse to and restore the folder. Restart the computer from the installation disc and restore the system from the system image backup. Revert the system to a restore point prior to the folder's deletion.

Mount the .vhd file in the backup and then copy the folder to the drive. EXPLANATION You can restore individual files and folders from a system image backup by mounting the .vhd file in Disk Management. Then you use Windows Explorer to browse to and copy the file or the folder. This is faster than doing a complete system image restore. Restoring to a restore point does not revert to previous versions of files. Instead, use the Previous Versions tab to restore to previous versions of files or folders. The Restore my files option only recovers files that are part of scheduled backups. It cannot be used to restore individual files or folders from a system image backup or system image. Because you do not see previous versions listed for the drive, you can assume that restore points are not enabled for the drive. In addition, file backups do not have a copy of the folder because those copies would be listed on the Previous Versions tab even if restore points had not been enabled. REFERENCES TestOut Client Pro - 12.5 Recovery

In the Windows Action Center, notifications are provided for which of the following? (Select two.) Network firewall Driver installation Windows Defender System hibernation Software installation

Network Firewall Windows Defender EXPLANATION The Windows Action Center is a central location for managing system messages and resolving issues with your system. The Action Center sends a notification when the status of a monitored item changes. Notifications are provided for the following: - Windows Defender - Windows Update - Internet security settings - Network firewall - Spyware protection - User Account Control (UAC) - Windows Backup - Windows troubleshooting REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

You manage two Windows systems named Computer1 and Computer2. You need to use the command line to remotely manage Computer1 from Computer2. What should you do? (Select two. Each answer is part of the complete solution.) Authenticate Computer2 to Computer1 On Computer2, run winrm qc On Computer1, install PsExec On Computer1, run winrm qc On Computer2, install PowerShell

On Computer1, run winrm qc Authenticate Computer2 to Computer1 EXPLANATION In this scenario, you must: 1. Run winrm qc on Computer1. This enables the Windows Remote Management (WinRM) service so you can execute commands on the remote computer. 2. Authenticate Computer2 to Computer1. You need to authenticate the local computer to the remote computer because authentication credentials will be forwarded to the remote computer. In a domain, Active Directory provides authentication for remote management. However, in this scenario, there is no domain. You should authenticate the computers with the winrm set winrm/config/client @{TrustedHosts="computername"} command. Running winrm qc on Computer2 is not necessary. Before executing the commands on the remote computer, you must enable the Windows Remote Management (WinRM) service on the remote computer. PsExec is a remote management application that is part of the PsTools tool suite from Microsoft. PsExec does not require client-side software (software for the remote computer). Windows PowerShell is a command line shell and scripting language designed for system administration and automation. It enables IT professionals and developers to control and automate remote systems. REFERENCES TestOut Client Pro - 11.7 Remote Management

You manage two Windows systems named Computer1 and Computer2. Both computers are members of a domain. Which steps do you need to perform so you can remotely execute commands on Computer2 from Computer1? On Computer2, run winrm qc On Computer1, enable Windows Remote Management (WinRM) through Windows Firewall On Computer1, run winrm qc On Computer2, enable Windows Remote Management (WinRM) through Windows Firewall

On Computer2, run winrm qc EXPLANATION To execute the commands on a remote computer, the Windows Remote Management (WinRM) service must first be enabled on the remote computer with the winrm qc command. Enabling WinRM configures necessary firewall exceptions. REFERENCES TestOut Client Pro - 11.7 Remote Management

You are using a Windows desktop system to connect to a remote system using Remote Desktop. How do you prevent the desktop background on the remote computer from displaying on the local computer? Use the Control Panel's display settings to remove the desktop background. On the Experience tab of the Remote Desktop Connection, clear the Desktop Background checkbox. Set the connection speed of the Remote Desktop connection to the LAN (10 Mbps or higher) option. Remove the desktop background image from the remote computer.

On the Experience tab of the Remote Desktop Connection, clear the Desktop Background checkbox. EXPLANATION From the Remote Desktop Connection's Experience tab, clear the Desktop Background checkbox to prevent the desktop background on the remote computer from displaying on the local computer. Use the display settings in the Control Panel to extend your display to an external monitor or to change the screen resolution. Removing the image from the desktop background will still display the background from the remote computer. Using the LAN (10 Mbps or higher) connection speed setting automatically selects the Desktop Background checkbox and will display the remote computer's background. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important events for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures. What is the simplest way to view this information? Open Reliability Monitor. Configure a Data Collector Set with performance counter data collectors. Add objects and counters to Performance Monitor. Create a Custom View in Event Viewer.

Open Reliability Monitor. EXPLANATION The reliability and problem history chart in Reliability Monitor keeps track of overall server health on a daily basis. It shows you a historical record of system changes and events. It assigns an overall server health value to each day (1 being the least stable and 10 being the most stable). You might be able to create filters or a Custom View in Event Viewer to see the same kind of information. However, if the event logs were full or cleared, data might be missing. In addition, you would have to configure the Custom View and then possibly interpret the events that you see. With Performance Monitor, you can configure objects and counters to see current information. But, you cannot go back and review past information. You can use a Data Collector Set to capture information. However, the collector must be configured and running in order to view historical data. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

You have a Windows system that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop. Using the port numbers assigned by default, how can you configure the firewall to allow a Remote Desktop connection to the system? Open port 23 in the network firewall. Open port 3389 in the network firewall. Open ports 135 and 445 in the network firewall. Open port 22 in the network firewall.

Open port 3389 in the network firewall. EXPLANATION By default, Remote Desktop requires port 3389. Secure Shell (SSH) uses port 22. Telnet uses port 23. MMC snap-ins require an exception for Remote Administration, which opens ports 135 and 445. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

You want to enable Data Execution Protection (DEP) for all programs and services on your Windows system. Click the option you would use in System Properties to configure this function.

Perforamnce>>Settings... EXPLANATION Configure DEP in the Data Execution Protection tab within the Performance settings of the System Properties screen. Data Execution Protection (DEP) helps to prevent damage to your computer from viruses and other security threats. Use the System Protection tab to manage System Restore. Use the User Profiles settings to configure desktop settings for your user account. Use Startup and Recovery settings to configure system startup settings and how to respond to system failures. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

You have a computer running Windows 10. You have just enabled Remote Desktop on the computer so you can connect to it using a low-speed broadband connection from home and run a few reports. You need to optimize the performance of your Remote Desktop session for your slow connection. Select the Experience setting(s) that will optimize performance.

Persistent bitmap caching EXPLANATION Enabling Persistent bitmap caching caches graphics locally, improving the load time of commonly used graphics. Leave the remaining settings on the Experience tab unchecked to improve performance by not displaying graphic-intensive operations that the host system may be using. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

You have been having trouble with your Windows notebook system crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file. How can you configure the system to create a memory dump file the next time it crashes? Increase the paging file size from the default to at least two times the amount of physical RAM. Place the paging file on a drive other than where the operating system files are stored. Place the paging file on the system drive. Place the paging file on a USB flash device.

Place the paging file on the system drive. EXPLANATION You must place the paging file on the system drive if you want the system to be able to create a memory dump file when it crashes. The system cannot create a memory dump if the paging file is not on the system volume. The paging file must be at least the same size as the amount of physical memory. REFERENCES TestOut Client Pro - 11.6 Windows Optimization

Which of the following tools can be used to troubleshoot and validate Windows updates? (Select three.) Device Manager Windows Transfer Service Windows Server Troubleshooter PowerShell Windows Update Troubleshooter Windows Defender Windows Server Update Service (WSUS)

PowerShell Windows Update Troubleshooter Windows Server Update Service (WSUS) EXPLANATION You can use PowerShell to look at and compile Windows Update logs. This creates a file that is deposited onto a desktop. Windows Server Update Service (WSUS) is a role that can be added to a server to manage updates. Rather than have all the PCs in the organization go to Microsoft to get their updates, you can have the updates deposited into the WSUS server. Windows Update Troubleshooter analyzes the Windows Update Service, the Background Intelligent Transfer Service, and the Windows Network Diagnostics Service. The other answers are not tools that can be used to troubleshoot and validate Windows updates. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

Match each operating system updates on the left with its description on the right. (Each update may be used once or more than once.) Drag Quality updates Feature updates Drop Released semi-annually in the spring and fall. Include security fixes and software updates. Deployed monthly (usually second Tuesday of the month). New version of Windows operating system. Cumulative in nature, adds any missed updates.

Released semi-annually in the spring and fall. Feature updates Include security fixes and software updates. Quality updates Deployed monthly (usually second Tuesday of the month). Quality updates New version of Windows operating system. Feature updates Cumulative in nature, adds any missed updates. Quality updates EXPLANATION Quality updates: - Are deployed monthly (usually second Tuesday of the month). - Include security fixes and software updates. - Are cumulative in nature, add any missed updates. - Are identified using a number that is preceded by KB, which stands for Knowledge Base. This number is associated with a specific Microsoft article that uses the same designation. - Can be uninstalled either through Programs & Features in the Control Panel or through Update & Security in the Settings app. They can be uninstalled with Command Prompt as well. Feature updates: - Are also called builds. - Are a new version of Windows operating system. - Are released semi-annually in the spring and fall. - Are identified through their build number which indicates when it was released (i.e. 1903 means it was released in the third month of the year 2019). - Can be uninstalled within first 10 days using the Settings app and then selecting Update & Security > Recovery. REFERENCES TestOut Client Pro - 12.1 Windows Updates

Which path would you use to uninstall an update that was automatically installed by Windows Update? Settings > System > View Update History > Uninstall Updates Settings > Update & Security > Advanced Options > Uninstall Updates Settings > System > Advanced Options > Uninstall Updates Settings > Update & Security > View Update History > Uninstall Updates

Settings > Update n Security > View Update History > Uninstall Updates EXPLANATION You may need to uninstall an update that was automatically installed by Windows Update. You can do this from the Settings app. Select Update & Security > View Update History > Uninstall Updates. The other paths are invalid. REFERENCES TestOut Client Pro - 12.1 Windows Updates

You need to configure Remote Assistance on your Windows system so that invitations can only be used from computers running Windows Vista or later. Click the System Properties option you would use to do this.

Remote Assistance >> Advanced EXPLANATION You can configure Remote Assistance so that invitations can only be used from computers running Windows Vista or later by clicking the Advanced button in the Remote Assistance section under the Remote tab in System Properties. In the Remote Assistance Settings dialog, click Create invitations that can only be used from computers running Windows Vista or later. The Allow Remote Assistance connections to this computer option enables or disables Remote Assistance. The Select Users and Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended) options are used to configure Remote Desktop, not Remote Assistance. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

Which of the following is true regarding Restore points? Restore points protect all user data files. It is not possible to create a restore point manually. Restore points are enabled automatically. Restore points only works on NTFS partitions.

Restore points only works on NTFS partitions. EXPLANATION The following are true regarding restore points: - Restore points only works on New Technology File System (NTFS) partitions. - Restore points do not protect user data files. - It is possible to create a restore point manually. - System Restore is not enabled automatically but can be easily enabled by a user. REFERENCES TestOut Client Pro - 12.3 System Restore

You are supporting a Windows 10 computer that has the following volumes: - The C: drive is the system drive with user profiles and individual user files. - The D: drive holds data files common to all users. System Protection has been configured as follows: - A system image backup has been created that includes both the C: and D: drives. - Regular backups are scheduled to back up all user libraries. The scheduled backup includes a system image. - System Restore has been used to take a snapshot. A user has edited and saved a file on the D: drive. The user doesn't like the changes and wants to revert to a previous version of the file. The user goes to the Previous Versions tab of the file and sees nothing listed. How can you help the user restore the previous version of the file? Restore the system to the restore point. Enable system protection on the D: drive. Restore the file from the system image. Use the Backup and Restore console to browse for the file from the scheduled backup.

Restore the file from the system image. EXPLANATION In this scenario, the only option to get the file back is to use the copy of the file included in the system image backup. However, instead of restoring to the system image, you should mount the system image and browse to the file you want to restore. Any file included in a snapshot will show up on the Previous Versions tab. Because the file does not show up, System Protection probably isn't enabled for the D: drive. Enabling system protection will help you recover previous versions in the future, but it will not help you get back the previous version of the file. Restoring to a restore point restores system settings, but does not affect files. Use Previous Versions (if available) to revert to earlier versions of a file. Any file included in a scheduled backup will show up on the Previous Versions tab. Because the file does not show up, the scheduled backups do not include the file (backups do not include data on the D: drive). If the file does not show up on the Previous Versions tab, it also won't exist when browsing using the Backup and Restore console. REFERENCES TestOut Client Pro - 12.5 Recovery

As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the problem. How can you quickly restore the computer to its state before the updates? Use the Previous Versions feature for the system disk. Use the Previous Versions feature to restore the system registry settings. Restore the system using a system image. Restore the system using a restore point.

Restore the system using a restore point. EXPLANATION Use System Restore to reset your computer's configuration to a point in time when the operating system was stable. System restore rolls back operating system configuration settings, drivers, and applications, but they do not affect user data files. Restoring to a system image would work, but this would take more time than using a restore point. Restore previous versions is a Windows 7 feature used to restore previous versions of files. This includes things like reverting back to a version of a file that you have modified. It has been replaced by the File History feature in Windows 8 and Windows 10. REFERENCES TestOut Client Pro - 12.3 System Restore

Your Windows 10 computer has two hard drives formatted with NTFS. You have enabled System Restore on both disks. How can you delete all restore points except for the last restore point? Run System Restore. Run Backup and Restore. Edit the System Protection configuration in System Properties. Run Disk Cleanup.

Run Disk Cleanup EXPLANATION Use Disk Cleanup to delete all but the last restore point. In Disk Cleanup, click the Clean up system files button and then use the More Options tab to delete older restore points. Edit System Protection configuration in System Properties to delete all existing restore points. You can also remove system protection from a drive (which deletes all restore points). In this scenario, you wanted to keep the last restore point, so this option is not the correct one to choose. Use System Restore to restore to a restore point (you cannot delete restore points within System Restore). Run Backup and Restore to back up the computer or user files. You can also initiate a restore. REFERENCES TestOut Client Pro - 12.3 System Restore

You have just added a new 300 GB hard drive to a Windows computer. You create a single volume named Data and format the volume using FAT32. The volume is assigned drive letter D:. You copy several files to the new hard disk. Which action must you take first to include the disk in restore points created on the computer? Run System Restore. Edit System Protection settings in System Properties. Edit the Previous Versions settings in the D: drive properties. Run convert.exe to change the drive to NTFS. Run Backup and Restore.

Run convert.exe to change the drive the NTFS EXPLANATION Restore points can only be taken from drives formatted with NTFS. Before you can enable system protection on the disk, run convert.exe to convert the drive to NTFS. After the drive has been converted, enable system protection on the drive by opening System Properties and going to System Protection to enable restore points on the drive. Use System Restore to restore to a restore point. Run Backup and Restore to back up the computer or user files or to initiate a restore. REFERENCES TestOut Client Pro - 12.3 System Restore

You are the Windows desktop administrator for your company. You would like to manage your computers remotely using the Windows Remote Shell. You need to enable remote management on each target computer. What should you do? Run netsh to open the Remote Administration firewall exception Run winrm quickconfig Run netsh to open the Remote Desktop firewall exception Start the Telnet Client on each computer

Run winrm quickconfig EXPLANATION If you want the target computer to support Remote Shell connections, run winrm quickconfig to enable this. Because Remote Shell sets up HTTP listeners on ports 80 or 443, you will not need to open any additional firewall ports. To connect to the target computer, run winrs along with the command you want to execute. Open the Remote Administration firewall exception to enable MMC consoles to communicate with the servers remotely. Open the Remote Desktop firewall exception to allow Remote Desktop connections. The Microsoft Telnet Client is a text-based program that runs in Command Prompt. It allows you to connect to another computer. REFERENCES TestOut Client Pro - 11.7 Remote Management

Where can you find the Windows Update settings in Windows 10? Settings > System > Windows Update Settings > Update & Security > Windows Update Settings > Windows Update Settings > System > Update & Security > Windows Update

Settings > Update and Security > Windows Update EXPLANATION To manage updates on a Windows 10 system, go to Settings > Update & Security > Windows Update. All other options include incorrect paths. REFERENCES TestOut Client Pro - 12.1 Windows Updates

What data on a Windows system is monitored to create the reliability and problem history chart in Reliability Monitor? (Select two.) System memory failures Software installs/uninstalls Hard disk interface throughput System memory utilization CPU utilization

Software installs/uninstalls Memory failures EXPLANATION Reliability Monitor maintains a timeline of system changes. Data is stored daily and displayed in a stability index from 1 to 10. The stability index is based on the following metrics: - Software installs/uninstalls - Application and Windows failures - Hardware and driver failures - Memory failures - Miscellaneous failures - Operating system patches - Operating system driver installations REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

What tool can be used to automatically fix common startup problems? Startup Repair Update & Security Automatic Repair System

Startup Repair EXPLANATION Startup Repair can be used to automatically fix common startup problems. If your computer is able to boot to the Windows 10 operating system, you can initiate Startup Repair from the Settings app by selecting Update & Security > Recovery. Under Advanced startup, select Restart now. If your computer is not able to boot to Windows 10, boot from a Windows 10 installation device (DVD or ISO). After you configure the language, time, and keyboard settings, click Next. Then select Repair your computer. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

Which of the following are true regarding Remote Assistance? (Select two.) The helper can take control of the user's computer without permission. The helper cannot copy files from a user's computer. By default, members of the Administrators group can connect to a computer remotely. Remote Assistance must be enabled on the helper's computer. Invitations require a password and have an expiration date.

The helper cannot copy files from a user's computer. Invitations require a password and have an expiration date. EXPLANATION When working with Remote Assistance, consider the following: - Remote Assistance uses the Remote Desktop Protocol (RDP) to access the remote target computer. - Remote Assistance must be enabled on the target computer. - The firewalls on both computers must be configured to allow Remote Assistance connections. - By default, the requester must initiate the invitation. - Invitations require a password and have an expiration date. - With permission, the helper can take control of the user's computer. - The helper cannot copy files from a user's computer. With Remote Desktop, by default, members of the Administrators group can connect to a computer remotely. REFERENCES TestOut Client Pro - 11.8 Remote Desktop and Remote Assistance

You are viewing the reliability and problem history chart in Reliability Monitor on a Windows system. Some sections of the graph are displayed with a dotted line. What does the dotted line indicate? A system update was installed. Monitored values exceeded configured threshold values. A system crash occurred. There is not enough data to calculate the stability index.

There is not enough data to calculate the stability index. EXPLANATION A dotted line in the reliability and problem history chart indicates there is not enough data to calculate a stability index, which can be caused by a variety of factors. A dotted line in the reliability and problem history chart does not indicate that monitored values exceeded configured threshold, a system crash occurred, or that a system update was installed. REFERENCES TestOut Client Pro - 11.5 Reliability and Performance Maintenance

Drag each PowerShell feature or function on the left to the appropriate description on the right. Drag These let you access data stores, such as the registry and certificate store, in a way similar to accessing the file system. This is text-based and uses a simple command syntax. You can use this to redirect the output of one PowerShell cmdlet to the input of another. These contain one or more PowerShell cmdlets. These are executed at a PowerShell prompt to perform system management tasks. Drop Command line interface Providers Piping Script files Cmdlets

These let you access data stores, such as the registry and certificate store, in a way similar to accessing the file system. Providers This is text-based and uses a simple command syntax. Command line interface You can use this to redirect the output of one PowerShell cmdlet to the input of another. Piping These contain one or more PowerShell cmdlets. Script files These are executed at a PowerShell prompt to perform system management tasks. Cmdlets EXPLANATION The following features and functions are associated with PowerShell: - The command line interface (CLI) is used to interact with a computer program. The CLI is text-based and uses a simple command syntax. - Cmdlets are PowerShell commands and are executed at a PowerShell prompt to perform system management tasks. - Providers let you access data stores, such as the registry and certificate store, in a way similar to accessing the file system. - Piping can be used to redirect the output of one PowerShell cmdlet to the input of another. - Script files are nothing more than simple text files that contain one or more PowerShell cmdlets. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

Your Windows 10 computer has the following drives: - C: (System drive with user profiles) - E: (Data files) - F: (External USB hard drive) You enable system protection on the C: drive. You also schedule regular backups with the following settings: - Back up all user libraries - Back up the C: and E: drives - Include a system image - Save the backup to the F: drive Last night the E: drive crashed. How can you restore the data files found in the E: drive? Use the Previous Versions tab on the files' or folder's properties to restore the data. Run System Restore and use a restore point to restore the data. Attach a system image and use Windows Explorer to browse to and copy the files from the image. Use the Backup and Restore console to restore data from a backup.

Use the Backup and Restore console to restore data from a backup EXPLANATION Use the Backup and Restore console to restore the data from backup. The Backup and Restore console can restore all of the data from the backup files. Because the drive crashed, you cannot access the files and folders. Therefore, you cannot use the Previous Versions tab to restore the data. When you include a system image in a scheduled backup, only the boot and system partitions are included in the backup (an image of the E: drive is not included in the scheduled backup). Restore points include shadow copies of user data files on protected volumes. However, restoring to a restore point will not restore or modify user data files. REFERENCES TestOut Client Pro - 12.5 Recovery

To protect the data on your Windows 10 computer from loss or corruption, you enable system protection on all drives in your computer. You also schedule regular backups with the following settings: - Back up all user libraries - Back up all drives - Include a system image Today, you notice that your user profile settings are corrupt. How can you restore the user profile settings with the least amount of effort? Run System Restore and use a restore point to restore the data. Use the Previous Versions tab on the files' or folder's properties in the user profile. Attach a system image and use Windows Explorer to browse to and copy the file from the image. Use the Backup and Restore console to restore the user profile from backup.

Use the Backup and Restore console to restore the user profile from backup EXPLANATION The Backup and Restore console can restore all of the user profile settings from the backup files. Using the system image or previous versions to restore the user profiles will work, but requires too much work. Restore points include shadow copies of user data files on protected volumes. Restoring to a restore point will not restore or modify user data files. REFERENCES TestOut Client Pro - 12.5 Recovery

You support a Windows 10 computer that has the following volumes: - The C: drive is the system drive with user profiles and individual user files. - The D: drive holds data files common to all users. The user has taken the following actions: - Scheduled regular backups to back up all user libraries. The scheduled backup includes the entire D: drive as well as a system image. - Used System Restore to take a snapshot. After working with a file on the D: drive, the user has accidentally deleted most of the data in the file. The user needs your help to recover the file as it existed before making the changes. You check the System Protection settings and find that System Protection is not enabled for the D: drive. How can you restore the data in the file with the least amount of effort? Restore the system using the system image. Attach the system image and use Windows Explorer to browse to and then copy the file from the image. Use the Previous Versions tab of the file properties to restore the file. Run System Restore and restore to the restore point.

Use the Previous Versions tab of the file properties to restore the file. EXPLANATION Use the Previous Versions tab of the file properties to restore the file. Previous versions of files that are included in a scheduled backup appear on the Previous Versions tab for the file even if System Protection has not been enabled for the drive. When you view the previous versions, you'll see that the earlier version of the file exists in a backup, not a snapshot. You can also use the Backup and Restore console to browse to and restore the file. When you create a scheduled backup that includes a system image, only the boot and system partitions are included in the image, so the version of the file will not exist in the system image backup. Restoring to a restore point restores system settings, but does not affect files. In addition, because system protection is not enabled for the drive, restoring to the restore point will not affect the D: drive. REFERENCES TestOut Client Pro - 12.5 Recovery

To protect the data on your Windows 10 computer from loss or corruption, you enable system protection on all the drives in your computer. You also schedule regular backups of the system drive and all other drives using the Backup and Restore (Windows 7) console. After working with a file, you notice that you accidentally deleted most of the data. How can you restore the file to the state it was in before you modified it? (Select two. Each answer is a complete solution.) Run System Restore and use a restore point to restore the data. Use Windows Explorer to browse to the Backup Set folder and then copy the file. Use the file's properties to restore a previous version of the file. Use Windows Explorer to browse to and then copy the file from a .vhd file. Use the Backup and Restore (Windows 7) console to locate and restore the file.

Use the file's properties to restore a previous version of the file. Use the Backup and Restore (Windows 7) console to locate and restore the file. EXPLANATION To restore the data in this scenario, you can: - Edit the file properties and use the Previous Version tab to use shadow copies or file backups. - Use the Backup and Restore (Windows 7) console to locate and restore the file by selecting Restore my files. You can use File Explorer to navigate to the zipped backup file located on the backup destination. When you do, it runs the Restore Files wizard, allowing you to restore the file. You cannot manually copy the file from the destination. Restore points include shadow copies of user data files on protected volumes. Restoring to a restore point will not restore or modify user data files. To restore files from a .vhd file, you must first attach the .vhd file. Then you can use Windows Explorer to browse to and copy the file from the .vhd file. When you include a system image in a scheduled backup, only the boot and system partitions are included in the backup. REFERENCES TestOut Client Pro - 12.5 Recovery

Which of the following syntax examples is used by a PowerShell cmdlet? Verb - noun Verb - pronoun Adverb - noun Adverb - pronoun

Verb - noun EXPLANATION PowerShell commands are referred to as cmdlets. The syntax starts with a verb. The verb specifies what you want PowerShell to do, such as get, start, or set. This is followed by a dash and a noun that specifies what you want to get, set, or start. For example, get - help, get - process, and start - service are all commands. REFERENCES TestOut Client Pro - 11.7 Remote Management

Which of the following channels are provided by Microsoft to manage deployment of updates to your Windows 10 system? (Select three.) Windows Insider Program Semi-Annual Windows Developer Program Long-Term Servicing Channel Short-Term Servicing Channel Annual Service Update Channel

Windows Insider Program Long-term Servicing Channel Semi-annual EXPLANATION The Semi-Annual Channel is typically used by system administrators and software developers. It is ideal for pilot deployment and for lab testing of Windows Updates. Feature updates are automatically installed. These updates can be deferred for up to 365 days. The Windows Insider Program provides very early pre-released Windows builds or feature updates and gives system administrators a chance to provide feedback on any bugs before the update is released to the general public. The Long-Term Servicing Channel is available only through Windows 10 Enterprise LTSB edition. It is designed for highly sensitive systems such as ATMs, cash registers, and medical equipment that cannot tolerate any downtime. New updates are typically released every 2-3 years. All other options are not channels provided by Microsoft. REFERENCES TestOut Client Pro - 12.1 Windows Updates

You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports. Which remote management solution does not require additional firewall ports opened? Windows Remote Shell (WinRS) Telnet Remote Desktop An MMC console connected to the remote computer instead of the local computer

Windows Remote Shell (WinRS) EXPLANATION Windows Remote Shell (WinRS) sets up HTTP listeners on ports 80 or 443. These ports are allowed by most firewalls. MMC snap-ins require an exception for Remote Administration, which opens ports 135 and 445. Remote Desktop requires port 3389. The Microsoft Telnet Client is a text-based program that runs in Command Prompt. It allows you to connect to another computer. Telnet uses port 23. REFERENCES TestOut Client Pro - 11.7 Remote Management

Which of the following are true about Windows Update for Business? (Select three.) Windows Update for Business provides the latest features for your Windows 10 devices, but it does not include security upgrades. Windows Intune is a Group Policy management tool. Windows Update for Business can only be configured with Group Policy. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. Windows Update for Business can be used with all versions of Windows 10. Windows Update for Business can be used with all versions of Windows 10 except Windows 10 Home.

Windows Update for Business can be used with all versions of Windows 10 except Windows 10 Home. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. EXPLANATION Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. Windows Update for Business can be used with all versions of Windows 10 except Windows 10 Home. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Microsoft Intune is a Mobile Device Management tool. REFERENCES TestOut Client Pro - 12.2 Advanced Windows Updates

What are two ways you can run PowerShell cmdlets remotely? (Select two.) Directly from the command, use get-help followed by the name of the computer. Use get-command and then pipe the output of that cmdlet to the input of the remote computer's name. Use invoke-command followed by the name of the remote computer and then the PowerShell cmdlet within brackets. Use get-help followed by the name of the remote computer and then the PowerShell cmdlet within brackets. Directly from the command, use the computername parameter.

directly from the command, use the computername parameter. Use invoke-command followed by the name of the remote computer and then the PowerShell cmdlet within brackets. EXPLANATION To run PowerShell cmdlets on a remoter computer, you can do it directly from a Command Prompt by using the computername parameter in a cmdlet. You can also use invoke-command followed by the name of the remote computer you want to run the cmdlet on. Then use the PowerShell cmdlet itself within brackets. REFERENCES TestOut Client Pro - 11.7 Remote Management

Which tool can you use to remotely manage a system using a graphical user interface? Graphical Windows Management Console Graphical Interface Management Console Graphical Microsoft Management Console Graphical User Interface Console

graphical Microsoft Management Console EXPLANATION If you don't like working on the command line, you can also remotely manage Windows client systems using the Graphical Microsoft Management Console. Consoles such as Computer Management and Event Viewer allow you to select which computer you want to manage. The local computer is selected by default. But you can use the Connect to Another Computer option to select which computer you want the snap-in to manage. This allows you to manage a remote system with the usual graphic user interface. REFERENCES TestOut Client Pro - 11.7 Remote Management

How should cmdlets in a PowerShell script be organized? In the order that they should run In reverse order of what they should run From simple to advanced From advanced to simple

in the order that they should run EXPLANATION When creating a PowerShell script, you put the cmdlets in the order you want them run in the script file. Then you set your execution policy and run the script from the PowerShell prompt. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

What are some of the resources you can look at first when troubleshooting startup issues with your PC? (Select two.) Cortana Resource Monitoring msconfig Task Manager System

msconfig Task Manager EXPLANATION There are several things you can do to troubleshoot startup problems. Some of the first resources you can check include System Restore, Task Manager, msconfig, Update & Security, and Command Prompt. System can help you with such things as apps, device settings, and network. Cortana can help you with language permissions and notifications. The Resource Monitor displays real-time information about the way resources are used by the installed hardware and software. REFERENCES TestOut Client Pro - 11.9 System Troubleshooting Tools

You need to interactively access Command Prompt on a remote Windows system named WS1 from your Windows workstation. Which command should you use to do this? winrm \\WS1 cmd ssh WS1 telnet WS1 psexec \\WS1 cmd

psexec \\WS1 cmd EXPLANATION The psexec \\WS1 cmd command can be used to open an interactive Command Prompt on the remote WS1 workstation. PsExec is a remote management application that is part of the PsTools tool component of the Windows Sysinternals Suite from Microsoft. PsExec is similar to WinRS in that you can execute programs on remote systems. It provides full interactivity for console applications. This makes the applications appear to be running locally. The winrm command is used to enable remote management on the target system. The telnet command can be used to establish an interactive Command Prompt on the remote system. However, telnet sends all information as clear text and should not be used for security reasons. Windows workstations do not include an SSH server or client component by default. Such functionality would have to be added using third-party packages such as PuTTY. REFERENCES TestOut Client Pro - 11.7 Remote Management


Kaugnay na mga set ng pag-aaral

Rat Dissection - arteries functions

View Set

Unit 1: The Revelation of Jesus Christ, Quiz 1: Glorious Christ and His People

View Set