Ucertify lesson 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Remote Desktop comes with all editions of Windows 10; however, a user can only connect to computers running all of the following editions except for which one? A Home B Education C Enterprise D Professional

A

When you right-click a program you want to run that requires elevated or administrative privileges, which of the following commands can be chosen from the shortcut menu? A Run as administrator B Run with permission C Run protected D Run elevated

A

Remote Assistance

A Windows 10 feature that enables an administrator, trainer, or support person to connect to a remote user's computer, chat with the user, and either view all of the user's activities or take complete control of the system. Similar to Remote Desktop, it also uses TCP port 3389.

Windows Remote Management (WinRM)

A Windows 10 service that enables administrators to execute commands on remote computers using Windows PowerShell or the Windows Remote Shell (WinRS.exe) command-line program.

Windows PowerShell

A command-line interface used mainly by IT professionals to run cmdlets (pronounced command-lets), complete background jobs (processes or programs that run in the background without a user interface), and run scripts to perform administrative tasks.

Windows Mobility Center

A control panel of sorts that gives a user access to several laptop settings, from volume to screen brightness to power options to Wi-Fi and Bluetooth settings—all in one place.

phishing

A fraudulent technique based on social engineering. With phishing, users are enticed (usually through email or other websites) to go to illegitimate websites that look similar to legitimate websites in an effort to persuade users to supply personal information, such as passwords and account numbers.

Microsoft Edge

A new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser. It integrates with Cortana, annotation tools, Adobe Flash Player, a PDF reader, and a reading mode. Extension support was developed and added to the Windows 10 Anniversary Update in July 2016.

Computer Management

A popular snap-in that includes several tools, such as Disk Management, which is used to configure hard disks and their partitions, and Event Viewer, which allows a user to view computer event information, such as program starting and stopping (including program crashes) and security problems.

Windows Media Player 12

A program that allows a user to play back music and video files and view photos. Files stored in the Music, Pictures, and Videos libraries appear in the Windows Media Player file list by default.

Remote Desktop Protocol (RDP)

A proprietary protocol that was developed by Microsoft to connect to another computer over a network connection using the same graphical interface that a user would use if they were sitting in front of the physical server. RDP uses TCP port 3389.

proxy server

A server that acts as an intermediary for clients seeking resources outside their networks.

PowerShell Remoting

A server-client application that allows a user to securely connect to a remote PowerShell host and run script interactively. It allows a user to run commands on a remote system as though they were sitting physically at its console.

dynamic security

A set of tools and technology that protects the computer as users browse the Internet with Internet Explorer. It includes ActiveX opt-in, Security Status Bar, Phishing Filter, Address Bar Protection, and Protected Mode.

Snipping Tool

An accessory program that comes with Windows 10 that allows a user to take screen shots, annotate them, and save them. When using Snipping Tool, a user can capture the entire screen, a window, rectangular portion of the screen, or a free‐form image.

Common Information Model (CIM)

An industry standard to represent systems, applications, networks, devices, and other managed components.

Which Remote Assistance method uses Peer Name Resolution to allow for quick and easy connection? A Invitations via email B Easy Connection C Auto Connect D Invitation via files

B

Which of the following locations allows you to configure security zones in Internet Explorer 11? A Tracking Protection window B Internet Options Security tab C Internet Options Privacy tab D Safety menu

B

Which of the following tools can be used when you want to access your home computer from work to get a file you worked on last night? A Windows Remote Assistance B Remote Desktop Connection C Disk Management D Sync Center

B

Which of the following tools is not accessible from the Computer Management window? A Performance Monitor B Remote Desktop Connection C Disk Management D Event Viewer

B

Which of the following utilities runs the ps cmdlet? A Computer Management B Windows PowerShell C Windows Remote Assistance D MS-DOS command window

B

Which programming environment can be used to create complicated PowerShell scripts? A Remote PowerShell B Windows PowerShell Integrated Scripting Environment C PowerShell Dev Center D Windows Management Instrumentation

B

Question 9 :Which of the following actions can be performed with the Snipping Tool? A Add typed callouts B Save in PDF format C Annotate an image with the pen tool D Change the color of a captured image

C

Which option gives access to several laptop settings, such as volume, screen brightness, power options, Wi‐Fi, and Bluetooth settings? A Remote Desktop Connection B Computer Management C Windows Mobility Center D Microsoft Management Console

C

Which of the following actions cannot be performed with Windows Media Player 12? A Rip music from a CD B Play a slide show C Create playlists D Convert doc file to mp3 E Stream video files over the Internet

D

Which of the following statements is not true about the tools that allow to access clients and servers remotely? A Remote Assistance is used to view and interact with a user session remotely. B Using the Remote Desktop Connection, computers are accessed remotely. C Remote Assistance enables an administrator, trainer, or support person to connect to a remote user's computer. D Remote Assistance is used to open a session with a computer.

D

two-way sync

Data is transferred in both directions.

one-way sync

Data kept in a primary location is synchronized with data in another location.

Your co‐worker is finalizing a big project for a medical client and has many sensitive client files on her computer. She asks you to help her make her computer as safe as possible while accessing the Internet. Describe your recommended solution.

In Internet Explorer 11 on her computer, you should increase her Internet zone security level to High (Tools > Internet options > Security tab). Ensure that Pop-up Blocker, ActiveX Filtering, and the SmartScreen Filter are enabled. Download and install at least one Tracking Protection list. Finally, instruct her to use InPrivate Browsing when she accesses any websites by selecting Tools > Safety > InPrivate Browsing.

Favorites

It allows a user to keep track of websites that they visit frequently so that they can visit them quickly in the future.

Remote Desktop Services (RDS)

It allows users to access a remote computer just as if they were sitting in front of the computer.

Sync Center

It enables a user to sync certain mobile devices as well as files stored in folders on network servers (offline files).

SmartScreen Filter

It examines traffic for evidence of phishing activity and displays a warning to the user if it finds any.

Windows PowerShell Integrated Scripting Environment (ISE)

It helps a user to create Windows PowerShell scripts.

InPrivate Browsing

It helps to prevent anyone who might be using a user's computer from seeing where they visited and what they looked at on the web.

screen shot

It is also referred to as a snip or screen grab, a screen shot is a snapshot of whatever is displayed on the computer screen.

cmdlets

It is pronounced as command-lets, cmdlets are native commands available in Windows PowerShell. They follow a Verb-Noun naming pattern, such as get-process, get-service, get-help, set-date, or stop-process.

WinRS.exe

It is used to execute a command from the Windows 10 command prompt.

Network Address Translation (NAT)

It is used with masquerading to hide an entire address space behind a single IP address.

sync conflict

It occurs when a user has two copies of a file stored in different locations (for example, locally and in a network folder) that have both changed since the last sync.

ActiveX Filtering

It prevents sites from installing and using ActiveX applications.

Component Object Model (COM)

It provides a platform-independent, distributed, object-oriented system for creating software components. Software can call these components at will.

Web Services for Management

It structures the packets and requires a port to be made accessible via the firewall.

pop-up blocker

It suppresses some or all pop-ups.

Secure Sockets Layer (SSL)

It uses a cryptographic system that uses two keys—one key to encrypt the data and another key to decrypt the data.

ActiveX controls

Small applications that allow websites to provide content, such as videos and games to allow a user to interact with content, such as those used in toolbars and stock tickers.

Tracking Protection

Some websites can be used to gather information about which pages a user visits on the Internet. Tracking Protection blocks this content from websites that appear on Tracking Protection Lists.

cookie

Text stored by a user's web browser.

snap-ins

The Microsoft Management Console (MMC) is a collection of administrative tools called snap-ins. An MMC snap-in is a utility provided by Microsoft or a third party that's accessible through a common interface. Administrators use MMC tools for managing hardware, software, and network components on a computer. Administrative Tools is a popular collection of tools that use the MMC.

Windows Management Instrumentation (WMI)

The Microsoft implementation of Web-Based Enterprise Management (WBEM) that allows accessing management information in an enterprise environment.

Internet Explorer

The traditional Microsoft browser that offers a number of features to protect the security and privacy while users browse the web, including phishing filters, Protected Mode, Pop-up Blocker, Add-on Manager, download files or software notification, and the use of digital signatures and 128-bit secure (SSL) connections when using secure websites.

add-ons

They are extra toolbars, animated mouse pointers, stock tickers, and pop-up blockers for Internet Explorer. Add-ons are downloaded from the Internet and installed as an executable program.

security zones

To help manage Internet Explorer security when visiting websites, Internet Explorer divides the network connection into security zones based on four content types. For each zone, a security level is assigned.

Windows Remote Assistance sessions are encrypted for safety. A False B True

True

Remote Desktop Connection (RDC)

Typically, computers are accessed remotely using the Remote Desktop Connection (RDC), which allows a user to connect to a Remote Desktop Session Host or to a Remote Application.

Compatibility View

When a user has activated Compatibility View for a website, Internet Explorer automatically shows that site in Compatibility View each time they visit. They can turn it off by removing it from their compatibility list.

You provide technical support to a small dental practice. The office manager hands you several company‐owned music CDs. She wants the music piped to the lobby area where patients wait to be seen for their appointments. The computer used at the receptionist's desk is running Windows 10 and has wireless speakers that can be set up in the waiting area. Describe how you can provide the requested music without investing in further resources.

You can use Windows Media Player to rip the music to the receptionist's hard drive (or attached storage). Then you can set up a playlist in Windows Media Player. Show the office manager and the receptionist how to launch Windows Media Player and start the playlist.

Joe has been having problems with his system and you have been assigned a ticket to investigate those problems. However, Joe is a very busy person who always needs to use his machine. Therefore, you don't have access to the machine to look through the system logs. Describe how you can look at the Event Viewer logs without interrupting Joe.

You can use a Computer Management console (or Event Viewer console) on your machine to remotely connect to Joe's computer and access the logs.

The sales staff travels extensively and often needs technical assistance with configuration settings on their Windows 10 laptops. Which feature or program is used to provide remote support for these employees?

You should show the sales staff how to initiate a Windows Remote Assistance session. With this program, you can view their desktop and watch while they perform an action, giving them advice over the phone or through a chat session. You can also take control of their desktop to show them how to perform an action.


Kaugnay na mga set ng pag-aaral

microbiology test #1 study guide ch 4-5

View Set

Organic Compounds Structure & Nomenclature

View Set

Chapter 23 Endocrine System Drugs

View Set