12.1, 12.2, 12.3, 12.4, 12.5, 12.5, 12.6, 12.7, 12.8, & 12.9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Drag each definition on the left to its corresponding performance counter on the right. Each definition may be used once, more than once, or not at all.

*Disk queue length The number of read and write requests that are waiting to be processed. *Processor utilization The amount of time the processor spends performing non-idle tasks. *Commit charge The amount of memory that has been assigned to running processes. *Disk time The amount of time that the disk subsystem is busy reading from and writing to disk. *Page file usage *Memory pages per second The number of hard faults that occur each second.

Match the Active Directory definition on the left with its corresponding term on the right. (Some definitions do not have an associated term on the right.)

*Domain Controller A server that holds a copy of the Active Directory database that can be written to. *Site Represents a group of networks that are connected with high-speed links. *Subnet Represents a physical network segment. *Forest Root Domain The first domain created in an Active Directory forest. *Tree Root Domain The highest-level domain in a tree.

Match each Active Directory term on the left with its corresponding definition on the right.

*Logical organization of resources Organizational unit *Collection of network resources Domain *Collection of related domain trees Forest *Network resource in the directory Object *Group of related domains Tree

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business?

-A workgroup If you only have five PCs and the network is not growing, a Windows workgroup will let you organize your computers in a peer-to-peer network. This workgroup network lets you share files, internet access, and printers between the five employees. A domain would do the same thing, but in this case, it is not a good idea because Windows Server brings in a bunch of new costs and complexity that probably wouldn't pay off for such a small company. In addition, you are introducing a single point of failure, the server. Trees and forests are subsets, or components, of a domain.

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.

-Buttons Mouse properties can be set in Control Panel by going to Hardware and Sound >Devices and Printers> Mouse. You use the Pointer Options tab to configure the pointer speed, snap-to, and visibility settings. You use the Pointer Options tab to configure the pointer speed, snap-to, and visibility settings. The Pointers tab configures the pointer scheme. The Wheel tab configures vertical and horizontal scrolling settings. The Hardware tab is used to configure driver settings.

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to Active Directory?

-Centralized authentication -Centralized configuration control *Installing an Active Directory database provides several advantages: -Improved scalability -Centralized configuration control -Reduced data backup complexity -Centralized authentication -Centrally applied security settings *Active Directory also include some drawbacks: -Increased cost -Specialized hardware and software needed -Increased planning time for implementation

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application?

-Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs. -Run the application in Compatibility Mode. Use Compatibility Mode in Windows to run older applications as if they were running under a different operating system version. Older applications are often written to require full system access, which is not allowed on newer versions of Windows because of UAC. Compatibility Mode creates a shim, or a layer, that makes the application think it has access to the system that is typically denied in Windows 10. On Windows 10, you can also run a virtual machine of Windows 7 for applications that cannot run using Compatibility Mode or other solutions. Granting users administrative privileges gives them rights to the entire system, not just to the single application. On Windows 7 and later, most applications already run in a separate memory space. Purchasing a new application could be costly. You should explore other options before investing in new software.

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

-Default Domain Policy The Default Domain Policy GPO contains a policy you can enable for all computers in a domain that prevents anyone from trying multiple passwords to see if they can guess login information. Group Domain Policy, Group Security Policy, and Domain Security Policy are not default GPOs in Active Directory.

Which of the following paths opens the Computer Management tool in Windows 10?

-In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon. -Right-click the Windows icon and select Computer Management. Some common ways to start Computer Management include: -Right-click the Windows icon and select Computer Management. -In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon. On a Windows 10 system, you open the command prompt by right-clicking the Windows icon, selecting Run, and then entering cmd in the Run field. To see System Properties, right-click the Windows icon and then select System.

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop?

-In the Control Panel, select System and Security and then Security and Maintenance. -In the Control Panel, select User Accounts and then User Accounts. To configure UAC in Windows 10: -In Control Panel, go to User Accounts. -Select User Accounts, then Change User Account Control settings. -In the Control Panel, go to System and Security. -Select Security and Maintenance > Security and then select Change settings under User Account Control. You can also use the Change User Account Control settings link in System and Security. Edit the local security policy to configure UAC and control settings not available through the Control Panel.

You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running?

-Performance -Processes The Processes and Performance tabs both show the overall performance of the main areas of the computer, including CPU, memory, disk, network, and GPU. App history only displays performance and statistics for Microsoft applications. Details only shows individual CPU utilization for each program running. Users show the same statistic as Processes and Performance, but they are divided by each individual user instead of for the entire computer. Services only shows whether services are running or stopped. It does not display statistics.

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

-Performance In this scenario, you would access the Performance tab and then select the Memory graph. When you do, various memory utilization statistics are displayed. The Processes tab displays a list of running applications on the system. The App History tab displays performance statistics for apps from the Microsoft Store that are running on the system. The Startup tab displays a list of applications that are automatically launched at system boot. The Users tab displays utilization statistics for each user logged into the system. The Details tab displays extended information about each process running on the system. The Services tab is used to view information about the services configured on the system.

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this?

-Performance Monitor -Task Manager Use Performance Monitor to view statistics about the operation of your computer. Performance Monitor lets you choose the statistics you want to track in real time or create a log. You can also do this using Task Manager; however, you must manually add disk I/O parameters to be monitored. Use the Services console to manage system services. Use Device Manager to manage hardware devices. Use Disk Management to manage volumes and partitions.

Which of the following is true of online software activation?

-Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. -Before running a newly installed application, the user must activate their license online on the software vendor's website. -With personal software licenses, the limit is usually one to three online activations. *Online software activation: -Requires users to activate their software online with the vendor before they can run a newly installed application. For personal software licenses, the limit is usually one to three activations. -Allows the software vendor to track how many times each license code is activated and to block further activations after the license limit has been met. -Can be done as a one-time activation. With one-time activation, the license is activated once, usually right after the product is installed. Once activated, the product remains activated. -Can require persistent activation. With persistent activation, the license is continuously re-activated online at a preconfigured interval. This allows the software vendor to deactivate installations if the conditions of the license agreement have been violated. -Can be affected by operating system upgrades or migrations, which can deactivate the software.

While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this.

-Pointer Options Mouse properties can be set in Control Panel by going to Hardware and Sound >Devices and Printers> Mouse. You use the Pointer Options tab to configure the pointer speed, snap-to, and visibility settings. The Buttons tab configures the button configuration, double-click speed, and ClickLock settings. The Pointers tab configures the pointer scheme. The Wheel tab configures vertical and horizontal scrolling settings. The Hardware tab is used to configure driver settings.

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how her computer is running?

-Processes -Performance The Processes and Performance tabs both show the overall performance of the main areas of the computer, including CPU, memory, disk, network, and GPU. App history only displays performance and statistics for Microsoft applications. Details only shows individual CPU utilization for each program running. Users show the same statistic as Processes and Performance, but they are divided out by each individual user instead of for the entire computer. Services only shows whether services are running or stopped; it does not display statistics.

What is the purpose of the Microsoft Management Console (MMC)?

-Provide a common user interface for performing system administration tasks. -Provide a shell for running snap-ins. The Microsoft Management Console (MMC) is a framework that provides a common user interface for performing system administration tasks. You can manage a set of related features by adding snap-ins to the console. The MMC provides the shell for running these snap-ins, while the snap-ins provide the details for performing specific management tasks. A service is a program that processes requests from other applications or users. Services can start automatically, or they might be constantly running in the background, waiting for service requests. Use the Services snap-in to view and manage running services. Performance Monitor displays statistics that tell you about the operation of your computer. Reliability Monitor maintains historical data that describe the operating system's stability.

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration?

-Remote Desktop Users -Administrators Only users who are members of the Administrators or Remote Desktop Users groups are allowed to establish Remote Desktop sessions with a Windows system. Either group may be used; however, in this scenario, the best option would probably be to make her a member of the Remote Desktop Users group instead of Administrators to avoid granting her too many permissions and rights. Members of the Power Users, Users, and Guests groups are not allowed to establish Remote Desktop connections with a Windows system.

A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform?

-Rename the Administrator account. -Disable the Guest Account. When securing a Windows computer that is in a home office and not part of a domain, a best practice is to rename the Administrator account and disable the Guest account. Beginning with Windows Vista, the Power Users group is only present for backwards compatibility with previous versions. It has no bearing on the security of a Windows computer. Moving all accounts in the Administrators group to the Users group will eliminate the ability of the accounts to perform administrative functions. Moving all accounts in the Guests group to the Users group may not change the effective security of the accounts, but the profiles for these accounts will not be deleted when the users sign out.

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

-Startup In this scenario, you would access the Startup tab and then disable any undesired startup applications. The Processes tab displays a list of running applications on the system. The Performance tab displays graphs for CPU, memory, disk, and network utilization. The App History tab displays performance statistics for apps from the Microsoft Store that are running on the system. The Users tab displays utilization statistics for each user logged into the system. The Details tab displays extended information about each process running on the system. The Services tab is used to view information about the services configured on the system.

Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages?

-System Starting at the Control Panel's System Settings, you can select Advanced System Settings and then navigate to Virtual Memory Performance Options. From there, you can change the way your computer handles virtual memory (page files). If needed, an initial and maximum size can be set. Since no additional RAM can be added to the computer, increasing these sizes should reduce or eliminate the low virtual memory error messages. Program lets you view the programs installed and, if needed, uninstall, change, or repair an application. These options will not increase the amount of virtual memory used. Although the Troubleshooting option can be used to locate and fix many issues, such as fixing problems with Windows Update, running maintenance tasks, and more, it will not let you increase the virtual memory settings. Device Manager allows users to view and control the hardware attached to the computer. It does not let you increase the virtual memory settings.

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology?

-They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files. -They are moving away from DRM because of several key shortcomings in the technology. *Many large digital media vendors are moving away from DRM because it has several key shortcomings, including: -A lack of portability. For example, DRM-protected digital files from a given vendor would only play using software or hardware from that same vendor. -A lack of backup support. DRM protection frequently made it such that protected digital files could not be backed up. -Weak encryption. Many applications are available on the internet that can strip DRM protection from digital files. -Risk of obsolescence, which could cause older digital files to no longer be playable on newer hardware. *To address these shortcomings, many vendors have adopted DRM alternatives such as: -Encouraging customers to not illegally share digital files. -Making digital files so inexpensive and easy to access that it doesn't make sense to make illegal copies.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem?

-Use Resource Monitor to monitor memory utilization. -Use Task Manager to monitor memory utilization. In this scenario, you should use either Task Manager or Resource Monitor to monitor memory utilization. Most likely, you will see that the physical RAM is being over-utilized. When physical memory is low, the computer must swap data from memory to hard disk (to the paging file) to make physical memory available for other applications. If you hear the hard drive constantly operating as you work, or if the hard drive light on the front of the system case stays illuminated for long periods of time, the computer is constantly working moving data into and out of memory. The only long-term solution is to add more physical RAM. Monitoring disk activity with Resource Monitor or Task Manager will not reveal the true source of the problem in this scenario (which is a shortage of physical RAM). Reliability Monitor monitors system errors and is not the appropriate tool to use in this scenario.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision?

-You risk losing your job. -You expose your company to litigation by violating the software license agreement. Circumventing license agreements exposes your company to litigation and puts your job at risk. Even without a mechanism for tracking the number of users that are using the software, the enterprise agreement limits the number of licenses you are legally entitled to use. Using more licenses than you are entitled to is an act of theft. Your best course of action is to ask purchasing to pay for 10 more licenses. The software company is likely to learn of the violation. One way they can learn of violations like this is when your users have to register their their copy of the software so they can get software support, patches, and bug fixes. Since there is no mechanism that enforces a limit to the number of times the key can be used, the software will probably continue to function. The one to three activations per user usually pertains to the personal software licensing model or is meant to be used when users have more than one computer on which they need to use the software. These activations are not meant to be shared with other users.

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task?

-gpupdate gpupdate refreshes the local and Active Directory-based Group Policy settings, including security settings. gpresult only displays the Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer. fsutil displays or configures the file system properties. assoc displays or modifies file extension associations. popd restores the previous value of the current directory saved by pushd.

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

-yum install httpd On a Linux distribution that uses RPM for package management, entering yum install httpd at the command line will install the Apache HTTP Server package and all its dependencies. yum automatically locates and downloads RPM packages for you by searching one or more repositories on the internet. It can install a software package and all of its dependencies at the same time.

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM To protect the intellectual property rights of publishers, several Digital Rights Management, or DRM, technologies have been implemented over the years. The goal of these technologies is to restrict the use of copyrighted works to only those who have paid the necessary licensing fees.

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389 The firewall on a Windows system must be configured to allow Remote Desktop traffic through. This is done by opening TCP port 3389 (by default). This port is opened automatically on the Remote Desktop host when remote connections are enabled. Port 22 is used by the SSH protocol. Port 23 is used by the Telnet protocol. Port 123 is used by the Network Time Protocol.

When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use?

A runaway application does not respond to user input. The Mac OS Force Quit functions and the Linux kill command can be used to stop a runaway application does not respond to user input. Force Quit and kill are not used to cancel a print job. Force Quit and kill are not used when the operating system needs to be rebooted. Force Quit and kill are not used to close a remote desktop connection.

You are the IT administrator for a small corporate network. You recently added an Active Directory domain to the CorpDC server to manage network resources centrally, and now you need to add user accounts in the domain. In this lab, your task is to create the following user accounts on CorpDC: Juan Suarez-Marketing manager Susan Smith-Permanent sales employee Mark Burnes-Sales manager Borey Chan-Temporary sales employee Use the following user account naming standards and specifications as you create each account. *User account name: First name + Last name. *Logon name: first initial + last name with @CorpNet.com as the domain. *Original password: 1234abcd$ (must change after the first logon). *Place the user account in the departmental OU (Organizational Unit) corresponding to the employee's department. For example: -The Marketing\MarketingManagers OU for the marketing manager. -The Sales\PermSales OU for the permanent employee. -The Sales\SalesManagers OU for the sales manager. -The Sales\TempSales OU for the temporary employee. Configure the following for the temporary sales employee:Limit the logon hours to allow logon only from 8:00 a.m. to 5:00 p.m., Monday through Friday.Set the user account to expire on December 31st of the current year.

1.In Hyper-V Manager, select CORPSERVER. 2.Under Virtual Machines, right-click CorpDC and select Connect. 3.Create a domain user account as follows: a.In Server Manager, select Tools > Active Directory Users and Computers. b.Maximize the window for easier viewing. c.In the left pane, expand CorpNet.com. d.Browse to the appropriate OU. e.Right-click the OU and select New > User. f.In the First name field, enter the user's first name. g.In the Last name field, enter the user's last name. h.In the User logon name field, enter the user's logon name which should be the first letter of the user's first name together with their last name. (e.g. jsuarez)The domain, @CorpNet.com, is appended automatically to the end of the logon name. i.Click Next. j.In the Password field, enter 1234abcd$. k.In the Confirm password field, enter 1234abcd$. l.Make sure User must change password at next logon is selected; then click Next. m.Click Finish to create the object. n.Repeat steps 3e-3m to create the additional users. 4.Modify user account restrictions for the temporary sales employee as follows: a.Right-click Borey Chan and select Properties. b.Select the Account tab. c.Select Logon hours. d.In the Logon Hours dialog, select Logon Denied to clear the allowed logon hours. e.Select the time range of 8:00 a.m. to 5:00 p.m., Monday through Friday. f.Select Logon Permitted to allow logon. g.Click OK. h.Under Account expires, select End of. i.In the End of field, enter 12/31 of the current year. j.Click OK.

You are the IT administrator for a small corporate network. You've installed Active Directory on a new Hyper-V guest server named CorpDC. You've created an Active Directory structure based on the company's departmental structure. While creating the structure, you added an OU named Workstations in each of the departmental OUs. Now you would like to use one Workstations OU for the company. As a result, you need to delete the departmental workstation OUs. In this lab, your task is to delete the following on CorpDC: -In the Marketing OU, delete the Workstations OU. -In the Research-Dev OU, delete the Workstations OU. -In the Sales OU, delete the Workstations OU.

1.In Hyper-V Manager, select CORPSERVER. 2.Under Virtual Machines, right-click CorpDC and select Connect. 3.In Server Manager, select Tools > Active Directory Users and Computers. 4.From the top menu. select View > Advanced Features. 5.Maximize the Active Directory Users and Computers window. 6.From the left pane, expand CorpNet.com. 7.From the left pane, select the OU that you wish to open. 8.In the right pane, right-click Workstations and select Properties. 9.Select the Object tab. 10.Unmark Protect object from accidental deletion. 11.Click OK. 12.Right-click Workstations and select Delete. 13.Click Yes to confirm deletion. 14.Repeat steps 7-13 to delete the additional OUs. 15.Select View > Advanced Features again to turn off the advanced features view.

You are the IT administrator for a small corporate network. You have several services you need to prevent from loading, applications that should not start when the system starts up, and other services that need to start up automatically when the system starts. In addition, you have a application that needs to run on an older operating system. In this lab, your task is to complete the following on Office1: *Use System Configuration to prevent the following services from loading at system startup:Link- -Layer Topology Discovery Mapper -SNMP Trap -Telephony *Use Task Manager to prevent the following applications from running at system startup: -Compy DVD Apps -DIRE Event Monitor -inTune -SM66 Win32 Utility *Use Computer Management to start the following services and configure them to start automatically when the system starts: -Bluetooth Support Service -Offline Files -Print Spooler *Configure compatibility settings for the C:\Program Files (x86)\AccountWizard\AccountWizard.exe application using the following compatibility mode settings: -Run in Windows 8 mode -Run in 640 x 480 resolution -Run as administrator every time

1.Prevent services from running at startup as follows: a.Select Start. b.Select Windows Administrative Tools. c.Select System Configuration. d.Select the Services tab. e.Unmark Link-Layer Topology Discovery Mapper. f.Unmark SNMP Trap. g.Unmark Telephony. h.Select Apply. i.Close System Configuration. 2.Prevent applications from running as follows: a.Right-click Start and select Task Manager. b.Select Compy DVD Apps; then select Disable. c.Select DIRE Event Monitor; then select Disable. d.Select inTune; then select Disable. e.Select SM66 Win32 Utility; then select Disable. f.Close Task Manager. 3.Start and modify services as follows: a.Right-click Start and select Computer Management. b.Maximize the window for easier viewing. c.In the left pane, double-click Services and Applications. d.In the middle pane, double-click Services. e.Right-click the service and select Properties. f.From the Startup type drop-down list, select Automatic. g.Select Apply. h.Select Start to get the service started. i.Click OK. j.Repeat steps 3e-3i for additional services. Close Services. 4.To modify compatibility settings for an application: a.Open File Explorer. b.Expand This PC. c.Expand the C: drive. d.Double-click Program Files (x86). e.Double-click AccountWizard. f.Right-click AccountWizard.exe and select Properties. g.Select the Compatibility tab. h.Under Compatibility mode, select Run this program in icompatibility mode for. i.From the drop-down list, select Windows 8. j.Select Run in 640 x 480 resolution. k.Select Run this program as an administrator. l.Click OK.

You are the IT administrator for a small corporate network. You have recently re-imaged the computer in Office 1, and now you need to add it to the domain. In this lab, your task is to complete the following on Office1: *In Windows Settings, add Office1 to the CorpNet.com domain: -Administrative user: jgolden -Password: PCProR@cks *Restart the computer and verify that it is a member of the domain.

1.Select Start. 2.Select Settings. 3.Select Accounts. 4.Select Access work or school. 5.Under Access work or school, select Connect. 6.Select Join this device to a local Active Directory domain. 7.In the Domain name field, enter CorpNet.com. 8.Click Next. 9.In the User name field, enter jgolden. 10.In the Password field, enter PCProR@cks 11.Click OK. 12.Click Restart. 13.After the computer restarts, hover over the Network icon. 14.Verify that Office1 is connected to the CorpNet.com domain and has internet access.

You are having problems with the Security Evaluator program on your computer. In this lab, your task is repair the Security Evaluator program in Apps & features.

1.Select Start. 2.Select Settings. 3.Select Apps. 4.Maximize the window for easier viewing. 5.Under Apps & features, select Security Evaluator. 6.Select Modify. 7.Click Next. 8.Click Finish.

As a part of your daily maintenance, you scan for and kill any zombie processes on the system. In this lab, your task is to complete the following: -Use the ps aux command to find zombie processes. Zombie processes have a Z in the STAT column of the ps aux output. -Use kill -9 PID to terminate the zombie processes.

1.Use the ps aux command to find zombie processes as follows: a.At the prompt, type ps aux | less to view the list of processes. b.Use the up/down arrows to find the processes with status z. c.Type q to exit the process list and return to the command prompt. 2.Terminate the processes as follows: a.Type kill -9 1301 and press Enter. b.Type kill -9 1570 and press Enter. c.Type kill -9 1980 and press Enter.

Which port does Telnet use?

23 Telnet uses port 23. However, you should avoid using the Telnet protocol for remote access connections because it opens a plain text, unsecured, remote console connection that is easy for an attacker to monitor or hijack. Port 25 is used by the SMTP protocol. Port 34 is not used by default by any network protocol. Port 80 is used by the HTTP protocol.

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators The user should be a member of the Administrators group. No other group can add new device drivers or install new applications.

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details Use the Details tab to adjust the priority of a specific process (either application or service). The App History tab lets you monitor apps from the Microsoft Store that are running on the system. The Performance tab shows you overall system utilization and statistics. The Services tab lets you view all running services; you can use this tab to start and stop services. The Processes tab displays a list of running applications; you can use this tab to stop an application that is not responding.

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable Secure Desktop When you select the Notify me only when programs try to make changes to my computer (do not dim my desktop) option, the following happens: -Notification happens when programs make changes. -Notification does not occur when you make changes. -The desktop is not dimmed, which means Secure Desktop is disabled.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver. As long as it is set up correctly, you can use Remote Desktop to connect to the user's system remotely. You can then perform tasks as if you were at the computer.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a Remote Assistance connection and watch what the user is doing. Use Remote Assistance to watch what another user is doing. In the remote session, you can also take control and show the user how to complete the task. With Remote Desktop, you could try to do the task on the user's computer, but the other user would not be able to see what you were doing.

Which tool lets you view and directly edit the registry?

Regedit Use Regedit to view and directly edit the registry. The System Configuration Utility (msconfig) configures the way your system boots to enable optimal troubleshooting to diagnose technical issues. Although it does make registry changes, it doesn't allow you to directly edit the registry. Msinfo32 is used to view information about the hardware and software installed in the system. Control Panel makes changes to the registry, but it does not allow you to do so directly.

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D:\ drive. The Windows file search tool runs relatively quickly because it does not search the entire storage device. Instead, it searches for a file within an index that is maintained by the operating system. You can use the indexing options in Control Panel to customize which file locations are included in the index. Storage Spaces are used to pool available storage space from multiple storage devices in the system. Use Work Folders to make files on the system available across all devices used by users, even when the system is offline. Visual effects controls how window contents and fonts appear on the screen.

You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager?

Control Panel The best way to add the device driver required for your SSD is to use the Device Manager. The Control Panel is the only listed Windows console that will give you access to the Device Manager console.

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?

Edit settings in the Local Security Policy. To see the prompt without dimming the desktop, you need to disable the Secure Desktop. The Secure Desktop dims the desktop and forces you to respond to the UAC prompt before you can do anything else. You can configure the Local Security Policy to disable the Secure Desktop. The only UAC setting available under User Accounts is to enable or disable UAC (disabling UAC prevents all prompts). Choose Notify me only when programs try to make changes to my computer (do not dim my desktop) to notify you when programs make changes (but not when you make changes) and without dimming the desktop.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object. You should look at GPOs linked to organizational units that contain this user's object to see where the Hide Programs and Features Page policy might be enabled. If the policy was enabled in a GPO linked to the domain, it would be applied to all users in the domain. The next level GPOs are applied from is GPOs linked to organizational units that contain the user's object.

On a Windows system, which of the following is true of groups?

Group members have the access rights assigned to the group. A Windows group is used to identify groups of user accounts that have similar access needs. Group members have the permissions and rights assigned to the group. Using groups simplifies administration. Instead of assigning permissions to each individual user account, you can assign permissions to the group and then make user accounts members of the group. Group accounts cannot be used for logon on a Windows system. Local hardware resources cannot be made members of a group on Windows.

A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software. Members of the Users group are not allowed to make system-wide changes to the system, such as installing new applications. Only users who are members of the Administrators group can install new applications. On modern versions of Windows, users who are members of Power Users are not allowed to install applications. In fact, the Power Users group is only included for backwards compatibility with older versions of Windows. Windows 10 can run traditional desktop applications as well as apps from the Microsoft Store.

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor The Local Group Policy Editor is the administration tool used to enable local computer behavior policies and the tasks users are allowed to perform. Therefore, the policy that turns off the Store application for all users on this computer would is found under computer configuration settings. Under Programs, you can uninstall, change, or repair applications that are already installed. Control Panel can be used to access many administration tools, but none that are used to edit group policies. Windows Firewall can be used to deny or allow network traffic access to the computer, but not to enable group policies. The Settings app does not provide group policy administration tools.

You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability?

MMC The Microsoft Management Console (MMC) is an application that provides a graphical user interface (GUI) and a programming framework in which consoles (collections of administrative tools) can be created, saved, and opened. As such, you can use MMC to create one console that gives you quick access to the other consoles already created by Microsoft. MSINFO32 opens the Windows System Information console, allowing you to view such things as the Windows OS name and version. You cannot customize this console to link to other system utilities.SERVICES.MSC opens the Services console, from which you can disable or enable Windows services. You cannot customize this console to link to other system utilities.MSTSC, or the Microsoft Terminal Services Client, lets you connect to a remote PC and your work resources. For example, you can connect to your work PC and have access to all of your apps, files, and network resources as if you were sitting at your desk. You cannot customize this client to link to other system utilities.

Which utility allows you to choose Selective Startup in Windows?

Msconfig (System Configuration) Use Msconfig to configure how the system boots, including the Normal startup, Diagnostic startup, and Selective startup options. Event Viewer is used to access Windows system logs. Msinfo32 is used to view information about the hardware and software implemented in the system. Regedit is used to edit the Windows Registry. Performance monitor is used to track system performance.

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32 Use MSinfo32 (System Information) to gather information about your computer, to diagnose issues with your computer, or to access other tools that are included with Windows. You can only view, but not modify, configuration settings in Msinfo32. Use the System Configuration Utility (Msconfig.exe) to configure the system startup options. Use Event Viewer to view logs about programs, system events, and security. Each entry is listed as a warning, error, or information event. The System option in Control Panel can be used to manage system settings such as Remote Desktop and System Protection.

Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system?

Performance Monitor Performance Monitor gathers and displays statistics that help you monitor the operation of a Windows system. Statistics gathered include items such as memory and CPU use, disk throughput, and network utilization. Use Event Viewer to view log messages generated by applications, system events, and security incidents. Use MSinfo to view system information, such as hardware status. Computer Management is an MMC console that is used to manage the Windows system, such scheduling tasks, sharing folders, and managing device drivers.

Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?

Remote Assistance Within a Remote Assistance session, you can see what a user is doing, or you can take control of the desktop and perform configuration actions while the user watches. Remote Desktop lets you connect to a remote system and perform configuration tasks. However, you cannot watch what others do at the desktop, and they will not be able to see what you are doing. Telnet and SSH only provide remote access to the console prompt, not the entire graphical desktop.

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor Resource Monitor displays statistics that tell you about the operation of your computer. Statistics include memory and CPU use, disk access, and network utilization. Use Event Viewer to view logs about programs, system events, and security. Use Advanced System Settings to configure settings such as remote access and the location of your paging file. Computer Management is a saved Microsoft Management Console (MMC) console that is used to manage your computer.

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running?

Right-click > End task From the Processes page, you can right-click on the offending application and select End task. This will stop the program from running, and the computer's CPU should return to a more normal utilization. Right-click > Switch to is used from the App history tab open a Microsoft application. Right-click > Disable is used from the Startup tab to stop a program from running on the next boot. Right-click > Disconnect is used from the Users tab to disconnect a user from a computer. Right-click > Stop is used from the Services page to stop a service from running.

Which of the following network services or protocols uses TCP/IP port 22?

SSH The Secure Shell (SSH) service uses TCP/IP port 22. SSH is a terminal emulation program that provides a secure authenticated connection to a remote system over the network. It is most commonly used with UNIX and Linux systems, but can be used on Windows as well. The Trivial File Transfer Protocol (TFTP) is a connectionless service for downloading files from a remote system. TFTP uses TCP/IP port 69. The Network News Transfer Protocol (NNTP) is used to access and download messages from newsgroup servers. NNTP uses TCP/IP port 119. The Internet Message Access Protocol version 4 (IMAP4) is used to download email from remote servers. IMAP 4 uses TCP/IP port 143.

Which of the following can be used to create a secure connection to a remote server?

SSH You can use Telnet or SSH to remotely log on to a server and complete configuration tasks. However, SSH provides a secure connection; Telnet does not. You use FTP to transfer files; FTP by itself is not secure. The ICMP protocol is used to transmit error messages on an IP network. SMTP is the protocol email servers use to send email between mail servers.

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?

Screen Sharing You can use screen sharing to access your Mac while you're away, solve a problem on someone else's Mac, or collaborate with others on a project such as a website or presentation. Remote Desktop Protocol is a Windows solution. SSH is used to establish a secure terminal connection over a network. Telnet is used to establish an unsecure connection over a network.

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution?

Set login time restrictions. Setting login time restrictions will allow logins during normal business hours. Restricting user permissions will do nothing to protect from unauthorized users. Requiring strong passwords with make it harder for unauthorized users to gain access, but is not the best solution in this scenario. Changing the default account names and passwords will make the computers more secure, but is not the best solution in this scenario.

Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation?

User Account Control (UAC) User Account Control (UAC) prompts the user for credentials or permission in an effort to minimize the dangers of unauthorized actions or unintended software installations. Windows SmartScreen is used to warn the user before running unrecognized apps and files downloaded from the internet. Windows Firewall protects the system from network attacks. Windows Defender scans software for malicious software, such as viruses or spyware.

A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change?

System Properties > Computer Name The Computer Name tab lets you view, change, or join a computer to a domain. The System Protection tab lets you configure and create system restore points. The Advanced tab lets you configure settings such as Performance, User Profiles, and Startup and Recovery. The Remove tab lets you configure Remote Assistance and Remote Desktop settings.

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. Click the Control Panel option you use to accomplish this task.

System and Security To enable Remote Desktop on a Windows 10 system, you access Control Panel and select System and Security > Allow remote access. The Network and Internet option in Control Panel is used to manage network connections. The User Accounts option is used to manage user accounts.

You manage a Windows system. You want to view information about all of the programs running on your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?

Task Manager You can use Task Manager to view a list of processes running on your system. You can sort processes by CPU and memory use. Use the Services console to start and stop services. Use Device Manager to manage hardware devices. Use msconfig to customize the way the system boots.

Your computer has a quad-core processor that supports multithreading installed. Given that the system is running Windows, how can you verify whether multithreading has been enabled?

Task Manager can display CPU utilization graphs for eight processors. For a processor that supports multithreading, Task Manager can be configured to display two CPU utilization graphs per core. Multithreading creates an additional virtual CPU for each core and allows the CPU to execute two threads at the same time. Because the system in this scenario has four cores, Task Manager can be configured to display eight utilization charts on the Performance tab. Many applications launch multiple processes that are associated with the same application. The number of processes for an application depends on how the application is designed, as well as the number of running instances of that application.

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler The Task Scheduler is a tool that you can use to automatically start an application or run a script when certain events occur. Triggers identify conditions that start the task. Triggers include day and time, logon, and responses to other system events. Use the Services MMC to view and manage services on your computer. Use the msconfig utility to configure how the Windows operating system will boot. Use msinfo32 to view system information. You can use Task Manager to configure startup applications, but you can't use it to automatically run an application at a specific time.

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task Scheduler Use the Task Scheduler to schedule actions (such as a backup) to occur on a regular basis. You can use the Schedule option in Backup and Restore (Windows 7) in Control Panel to schedule when backups occur. (This approach actually creates a scheduled task.) Use Task Manager to view current operating statistics, such as the running processes and CPU and memory usage. Use Disk Management to manage hard disks, partitions, and volumes on your storage devices.

The Hide Programs option setting is configured for a specific user as follows: Policy|Setting Local Group Policy-Enabled Default Domain Policy GPO-Not configured GPO linked to the user's organizational unit-Disabled After logging in, the user is able to see the Programs option. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence. The GPO linked to the user's organizational unit is applied last, so the setting that disables the policy to the hide the Programs and Features page takes precedence. In this question's scenario, Local Group Policy enables the policy to hide the Programs and Features page. When the Default Domain Policy GPO is applied, this policy is set to Not configured, so it doesn't change anything. When the GPO linked to the user's organizational unit is applied, the setting for this policy is disabled, which reverses the setting in the Local Group Policy and makes the Programs and Features page visible to the user. The Local Group Policy is applied first. GPOs linked to the user's domain are applied second and take precedence over settings in the Local Group Policy. GPOs linked to the user's organizational unit are applied last and take precedence over any preceding policy settings.

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

Users Members of the Users group can use the computer, but they cannot perform system administration tasks. They also may not be able to run legacy applications. Members of the Users group can save files to their own directories and run installed applications. They cannot share directories or install printers if the driver is not yet installed. They also cannot view or modify system files. Making the user a member of the Administrators groups would give the user too many rights. Members of the Remote Desktop Users group are only allowed to access the system remotely using the Remote Desktop Client.

What is the purpose of the Services snap-in?

View and manage software programs running in the background. Use the Services snap-in to view and manage running services. A service is a program that runs in the background (usually without a user interface) to provide the services necessary for the operating system to function. Performance Monitor displays statistics about the operation of your computer. Use Event Viewer to view program, system event, and security logs. Reliability Monitor maintains historical data that describe the operating system's stability. Computer Management is a saved Microsoft Management Console (MMC) console that is used to manage your computer.

What is the purpose of the dxdiag tool?

View information related to DirectX operation. The DirectX Diagnostic Tool (dxdiag) shows information related to DirectX operation. DirectX is a set of programming interfaces for multimedia (video and audio). Use MSinfo32 (System Information) to gather information about your computer, to diagnose issues with your computer, or to access other tools that are included with Windows. Use the System Configuration Utility (msconfig) to configure your system to enable optimal troubleshooting and diagnosis of technical issues. Use Event Viewer to view logs about programs, system events, and security. Each entry is listed as a warning, error, or information event.

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt-get install httpd On a Linux distribution that uses Debian Package Manager (dpkg) for package management, entering apt-get install httpd at the command line will install the Apache HTTP Server package and all its dependencies. The apt-get command can automatically locate and download Debian packages for you by searching one or more repositories on the internet. It installs the package and all of its dependencies at the same time.

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?

ps -e The ps utility is used to display running processes on a Linux system. Entering ps -e will display a simple list (without extended information) of all processes running on the system. ps -ef will display a list with extended information about all the processes running on the system. yum and apt-get are package management tools. They are not used for process management.

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system?

yum list available On a Linux distribution that uses RPM for package management, entering yum list available at the command line will display a list of all packages available for installation within the internet repositories yum is configured to use on this system.

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd On a Linux distribution that uses RPM for package management, entering yum list installed httpd at the command line will check to see if the Apache HTTP Server package is installed.


Ensembles d'études connexes

Chapter 13 Disability Income Insurance

View Set

Economics of Finance and Banking Chapter 5

View Set

Marketing 3310 - Ch. 11-14 - Video Questions

View Set

Present Value, Future Value, Annuities, Amortization, Net Present Value

View Set

Final English American Literature

View Set

Ch 5 PrepU: Cultural and Spiritual Assessment

View Set