A+ Practical Unit 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidentally delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files? -Create a network share to which Lily can copy her files -Purchase a third-party backup software -Configure scheduled disk maintenance -Back up her files using File History

-Back up her files using File History

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration Which advantages would you gain by switching to Active Directory? (Select TWO) -Centralized configuration control -Centralized authentication -Increased local control of workstation settings -Reduced need for specialized hardware -Decreased implementation cost

-Centralized configuration control -Centralized authentication

You are an IT Technician for you company. Jodie, a receptionist, think her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running? (Select TWO) -Users -Processes -App history -Details -Services -Performance

-Performance -Processes

What is the purpose of the Microsoft Management Console (MMC)? (Select TWO) -Display statistics that ell you about the operation of your computer -Process request from other applications or users -Provide a shell for running snap-ins -Provide a common user interface for performing system administration task -View historical data that describes the operating system's stability

-Provide a common user interface for performing system administration tasks. -Provide a shell for running snap-ins

Which of the following paths open the Computer Management tool in Windows 10? (Select TWO) -Right-click the Windows icon and select Run. Then enter cmd in the Run field. -Right-click the Windows icon and select Computer Management -In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon -Right-click the Windows icon and then select System

-Right-click the windows icon and select computer management. -In the control panel, open system and security > administrative tools and then double-click the computer management icon

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select TWO) -Task Manager -Performance Monitor -Disk Management -Services -Device Manager

-Task Manager -Performance Monitor

Which port does Telnet use? -34 -23 -80 -25

23

Which port must be opened in the firewall of a Windows system in order Remote Desktop connections to be established with it? -23 -123 -3389 -22

3389

Domain Controller

A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources.

When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use? -A runaway application does not respond to user input - The operating system needs to be rebooted - A user accidentally sends a large job to a printer - A remote desktop connection needs to be closed

A runaway application does not respond to user input

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business? -A domain -A forest -A tree -A workgroup

A workgroup If you only have five PCs and the network is not growing, a Windows workgroup will let you organize your computers in a peer-to-peer network. This workgroup network lets you share files, internet access, and printers between the five employees A domain would do the same thing, but in this case, it is not a good idea because Windows Server brings in a bunch of new costs and complexity that probably wouldn't pay off for such a small company. In addition, you are introducing a single point of failure, the server. Trees and forests are subsets, or components, of a domain.

You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decided to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

Accounts

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information? -Access -SQL -Active Directory -Active Desktop

Active Directory is the centralized database that is included with the Windows Server operating system. is used to store information about a network, such as user accounts, computers, printers, and security policies

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of? -Administrator -Guest -Users -Power Users

Administrators

A user works primarily in you organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration?

Administrators Remote Desktop Users

While using the new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.

Buttons

You want to make sure that you always have the latest patches installed on you workstation for an order entry application created by DataComLink corporation. What should you do? -Download any patches from the company as you are notified of them -Check the DataComLink Website regularly for patches and updates to the software -Configure Windows Update to download and install updates automatically -Configure Windows Update to download updates for other Microsoft products when Windows is updated -Configure the application to automatically download and install updates as they are released

Check the DataComLink Website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.

You want to configure your Windows 10 workstation such that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft.

Choose how updates are delivered

Which category can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer? -Advanced System Settings -Appearance and Personalization -Clock and Region -Administrative Tools

Clock and Region

Domain

Collection of network resources

Forest

Collection of related domain trees

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do? -Configure visual setting to optimize performance -Add an additional drive to the system and configure a new Storage Space using the files from the old D:\drive -Configure indexing to include the D:\Drive -Configure Work Folders for the folders on the D:\drive

Configure indexing to include the D:\drive

You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager? -Services -Component Services -System Configuration -Control Panel

Control Panel

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach? -Domain Security Policy -Group Security Policy -Default Domain Policy -Group Domain Policy

Default Domain Policy Contains a policy you can enable for all computers in a domain that prevents anyone from trying multiple passwords to see if they can guess login information

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue. What should you do next? -Deploy the hotfix on a test computer -Deploy the hotfix for users who have experienced problems -Wait until the next service pack comes out -Deploy the hotfix immediately on all company computers

Deploy the hotfix on a test computer.

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do? -Configure UAC to Never notify -Disable Secure Desktop -Disable UAC -Configure UAC to Always notify

Disable Secure Desktop Explanation: When you select the Notify me only when programs try to make changes to my computer (do not dim my desktop) option, the following happens: -Notification happens when programs makes changes -Notifications does not occur when you make changes. -The desktop is not dimmed, which means Secure Desktop is disabled

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do? -In the Control Panel, select System and Security and then System. Click System protection -Edit settings in the Local Security Policy -In the Control Panel, select Programs, then Programs and Features -In the Control Panel, go to System and Security, then System

Edit settings in the Local Security Policy

Description of how the setting is enforced Causes the policy to be enforced Does not change the current setting for the policy Prevents the policy from being enforced

Enabled Not configured Disabled

You proved desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding you directions and is becoming frustrated. What should you do? -Tell the user to wait until you are scheduled to be in that location -Establish a Remote Desktop connection and update the driver -Drive to the other location as soon as possible and update the driver -Escalate the call to another technician or your supervisor

Establish a Remote Desktop connection and update the driver

You proved desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding you directions and is becoming frustrated. What should you do? -Establish a Remote Desktop connection and update the driver. -Schedule the user to get more training on using the application -Drive to the other location as soon as possible and then watch as the user performs the task 0Establish a Remote Desktop connection and perform the task on the user's system

Establish a Remote Desktop connection and update the driver.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option To determine whether the policy is enabled, where should you look next? -The Default Domain Policy GPO -GPOs linked to organizational units that contain this user's object -The Local Group Policy -GPOs linked to the domain that contains this user's object

GPOs linked to organizational units that contain this user's objects You should look at GPOs linked to organizational units that contain this user's object to see where the Hide Programs and Features Page policy might be enabled. If the policy was enabled in a GPO linked to the domain, it would be applied to all users in the domain. The next level GPOs are applied from is GPOs linked to organizational units that contain the user's object

On a Windows system, which of the following is true of groups? -Users and local resources, such as printers and shared folders, can be made members of a group. All Group members have access to all resources in the same group -Group members have the access rights assigned to the group -A group allows multiple users to share a single logon -Users can log on as the group and have all access rights assigned to the group

Group members have the access rights assigned to the group

Tree

Group of related domains

A user calls to report a problem. She is trying to install an application on a Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue? -Only apps from the Microsoft Store can be installed on a Windows 10 system -The application is incompatible with Windows 10 -She is not a member of the Power Users group -Her group membership does not allow her to install new software

Her group membership does not allow her to install new software

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis? -Kernel fix kit -Targeted software patch -Hotfix -Service pack

Hotfix

Page file usage

Identifies the amount or percentage of the page file that is being used.

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enabled UAC on the laptops? (Select TWO. Each choice is complete solution.) -In the Control Panel, select User Accounts and then Credential Manager -In the Control Panel, select System and Security and then System. Click System protection. -In the Control Panel, select User Accounts and then User Accounts -In the Control Panel, select System and Security and then Security and Maintenance -In the Control Panel, select System and Security and then System. Click Advanced system settings

In the Control Panel, select User Accounts, then User Accounts. In the Control Panel, select System and Security and Maintenance.

Which of the following actions directly improves system security on a Windows workstation? -Disable automatic reboot on error -Install the latest updates -Create a password reset disk -Create regular restore points

Install the latest updates

Don is an accountant in the Finance department, and for the last several months has been testing an online account program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. After downloading, Don tries to install the application on his Windows 10 workstation, but the operating system does not allow it. Out of frustration, he calls the Help Desk. The Help Desk personnel comes to Don's machine and installs the application without issue. Which of the following is the most likely reason Don could not install the application? -Insufficient system RAM -Insufficient disk space -Insufficient permissions -Failed device Driver

Insufficient Permissions

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer? -Local Group Policy Editor -Windows Firewall -Control Panel -Programs -Settings

Local Group Policy Editor the administration tool used to enable local computer behavior polices and the tasks users are allowed to perform

Organizational Unit

Logical organization of resources

You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want on location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability? -MSTSC -MSINFO32 -SERVICES.MSC -MMC

MMC

Which utility allows you to choose Selective Startup in Windows? -Performance Monitor -Msinfo32 -Event Viewer -Regedit -Msconfig (System Configuration)

Msconfig

Which tool can you use to view (but not modify) hardware and configuration information for your computer? -The System applet in Control Panel -Msinfo32 -Event Viewer -Msconfig

Msinfo32

Objects

Network resource in the directory

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model? -Personal -Persistent -Enterprise -Proprietary -Open source

Open source

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

Performance

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctions application. To help troubleshoot Rachel's computer you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how her computer is running? (Select TWO)

Performance Processes

Which tool can you use to gather and display statistics that hep you monitor the operation of a Windows system? -Event Viewer -Performance Monitor -MSinfo -Computer Management

Performance Monitor

While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this

Pointer Options

Which tool lets you view and directly edit the registry? -System Configuration Utility -Control Panel -Msinfo32 -Regedit

Regedit

A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO) -Rename the Administrator Account -Disable the Guest Account -Move all accounts in the Administrators group to the Users group -Remove the Power Users group -Move all accounts in the Guest group to the Users group

Rename the Administrator account Disable the Guest Account Explanation: When securing a Windows computer that is in a home office and not part of a domain, a best practice is to rename the Administrator account and disable the Guest account. Beginning with Windows Vista, the Power Users group is only present for backwards compatibility with previous versions. It has not bearing on the security of a Windows computer. Moving all accounts in the Administrators group to the User group will eliminate the ability of the account to perform administrative functions. Moving all accounts in the Guests group to the User group may not change the effective security of the accounts, but the profiles for these accounts will not be deleted when the users sign out.

Site

Represents a group of networks that are connected with high-speed links

Subnet

Represents a physical network segment.

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor (Performance Monitor)

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running? -Right-Click >Stop -Right-click > Disable -Right-click >Switch to -Right-click > End task -Right-click >Disconnect

Right-click > End Task

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization Which of the following actions can you take from Task Manager to stop the application from running?

Right-click > End task

Which of the following can be used to create a secure connection to a remote server? -FTP SSH -ICMP -SMTP -Telnet

SSH

Which of the following network services or protocols uses TCP/IP port 22? -TFTP -IMAP4 -SSH -NNTP

SSH

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her Mac? -Screen Sharing -Telnet -Remote Desktop Protocal -SSH

Screen Sharing

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution? -Require strong passwords -Change the default account names and passwords -Set login time restrictions -Restrict user permissions

Set login time restictions

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

Startup

Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? -Programs -Device Manager -Troubleshooting -System

System

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from you office.

System and Security

A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change? -System Properties > Advanced -System Properties > System Protection -System Properties > Computer Name -System Properties > Remote

System properties > computer name tab lets you view, change, or join a computer to a domain

You manage a Windows system. You want to view information about all of the programs running on your systems and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?

Task Manager

Your computer has a quad-core processor that supports multi threading installed. Given that the system is running Windows, how can you verify whether multi threading has been enabled? -Task Manager can report CPU utilization values up to 800% -Task Manager will show a single process running on multiple processors simultaneously -Task Manager will show each application running with two processes -Task Manager can display CPU utilization graphs for eight processors

Task Manager can display CPU utilization graphs for eight processors.

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)? -Task Manager -Disk Management -Event Manager -Task Scheduler

Task Scheduler

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? -msconfig -msinfo32 -Task Manager -Services -Task Scheduler

Task Scheduler

You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? -Services -Startup folder -Task Scheduler -Msconfig

Task Scheduler

The Hide Programs option setting is configured for a specific user as follows: Policy Setting Local Group Policy Enabled Default Domain Policy GPO Not configured GPO linked to the user's OU Disabled After logging in, the user is able to see the Programs option. Why does this happen? -The GPO linked to the user's organizational unit is applied last, so this setting takes precedence -The Local Group Policy is applied last. It is set to Enabled, which makes the Programs option visible -The Default Domain GPO is applied last. It is set to Not configured, so it doesn't change the configuration. -The GPO linked to the user's organizational unit is applied first, so this setting takes precedence over settings that are applied later.

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence The GPO linked to the user's organizational unit is applied last, so the setting that disables the policy to the hide the Program and Features page takes precedence. In this question's scenario, Local Group Policy enables the policy to hide the Programs and Features page. When the Default Domain Policy GPO is applied, this policy is set to Not configured, so it doesn't change anything. When the GPO linked to the user's organizational unit is applied, the setting for this policy is disabled, which reverses the setting in the Local Group Policy and makes the Programs and Features page visible to the user. The Local Group Policy is applied first. GPOs linked to the user's domain are applied second and take precedence over settings in the Local Group Policy. GPOs linked to the user's organizational unit are applied last and take precedence over any preceding policy settings.

Commit charge

The amount of memory that has been assigned to running processes

Disk time

The amount of time that the disk subsystem is busy reading from and writing to disk.

Processor utilization

The amount of time the processor spends performing non-idle tasks.

Forest Root Domain

The first domain created in an Active Directory forest.

Tree Root Domain

The highest level domain in a tree

Memory pages per second

The number of hard faults that occur each second.

Disk queue length

The number of read and write requests that are waiting to be processed.

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select TWO) -They are moving to strengthen the encryption used to protect their digital files -They are adopting alternatives to DRM such as encouraging customers to not illegally share files -They are offering free backup copies of protected digital files -They are cooperating with other vendors to make their digital files more portable to other vendeos' hardware and software -They are moving away from DRM because of several key shortcomings in the technology

They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files. They are moving away from DRM because of several key shortcomings in the technology.

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards? -Personalization -Apps -Time & Language -Devices

Time and Language

Your computer seems to be running slow. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem?

Use Task Manager to monitor memory utilization. Use Resource Monitor to monitor memory utilization.

Which Windows component prompt the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation? -Windows Defender -User Account Control (UAC) -Windows Firewall with Advanced Security -Windows SmartScreen

User Account Control (UAC)

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of? -Guest -Administrators -Users -Remote Desktop Users

Users

What is the purpose of the Services snap-in? -View historical data that describes the operating system's stability -View logs about programs, system events, and security -View and manage software programs running in the background -Display statistics that ell you about the operation of your computer -Manage end-user applications running on your computer

View and manage software programs running in the background

What is the purpose of the dxdiag tool? -Configure your system to enable optimal troubleshooting and diagnosis of technical issues. -View information related to DirectX operation -Gather information about you computer and diagnose issues with your computer -View logs about programs, system events, and security

View information related to DirectX operation

Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.

View your update history

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? -Antivirus updates -Scheduled backups -Scheduled disk maintenance -Windows update

Windows updates

Which of the following is true of online software activation? (Select THREE) -Before running a newly installed application, the user must activate their license online on the software vendor's website -Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations -The software vend does not track how many times each license code is activated, but uses persistent activation to annually audit the number of licenses being used -With personal software licenses, the limit is usually one to three online activation -With enterprise licenses, the software vendors tracks how many times each license code is activated and automatically charges the enterprise for activations above the license limit -Persistent activation may require the license to be continuously re-activated online at a preconfigured interval

With personal software licenses, the limit usually 1-3 online activations. Before running newly installed application, the user must active their license online on the software vendor's website. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval.

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies? 1) ps -e 2) dpkg install httpd 3) ps -ef 4) yum install httpd -dep 5) yum install httpd -dep 6) apt-get install httpd

apt-get install httpd Explanation On a Linux distribution that uses Debian Package Manager (dpkg) for package management, entering apt-get install httpd at the command line will install the Apache HTTP Server package and all its dependencies. The apt-get command can automatically locate and download Debian packages for you by searching one or more repositories on the Internet. It installs the package and all of its dependencies at the same time.

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task? -gpupdate -gpresult -asoc -popd -fsutil

gpupdate Refreshes the local and Active Directory-based Group Policy settings, including security settings.

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management? 1) ps -ef 2) yum process info 3) apt-get -ef 4) apt-get -e 5) yum -e 6) yum info 7) yum -ef 8) ps -e

ps -e Explanation The ps utility is used to display running processes on a Linux system. Entering ps -e will display a simple list, without extended information, of all processes running on the system.

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies? 1) apt-get install httpd 2) yum update httpd 3) yum install httpd 4) apt-get update httpd 5) yum install httpd -dep

yum install httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system?

yum list available Explanation On a Linux distribution that uses RPM for package management, entering yum list available at the command line will display a list of all packages available for installation within the Internet repositories yum is configured to use on this system.

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system? 1) apt-get list 2) yum show all 3) ps -e 4) apt-get list available 5)yum show available 6) yum show available 7) yum list all 8) ps -ef

yum list available Explanation On a Linux distribution that uses RPM for package management, entering yum list available at the command line will display a list of all packages available for installation within the Internet repositories yum is configured to use on this system.

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed? 1) yum list installed 2) yum list installed httpd 3) yum search httpd 4) yum info httpd

yum list installed httpd Explanation On a Linux distribution that uses RPM for package management, entering yum installed httpd at the command line will check to see if the Apache HTTP Server package is installed.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO) -You expose your company to litigation by violating the software license agreement -The software company will never detect the violation, so negative consequences are unlikely -Because you should be allowed one to three activation per user, this decision does not put you at risk for negative consequences -You risk losing your job -The software will eventually stop working properly for the 10 extra updates you installed

• You risk losing your job. • Your company is exposed to litigation by violating the software license agreement.


Ensembles d'études connexes

biology 121 final exam, final exam BLY 121

View Set

Introduction to Anatomy and Physiology: Learning the Language and Customs

View Set