Building/Upgrading/Repairing
grep Correct. The grep command is used to search a text-based file line-by-line for a specific pattern.
A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?
First Aid Correct. First Aid is a disk management tool used to locate and repair problems with disks.
A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?
Updates are found in the App Store.
A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?
The file will lose all permissions.
A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?
dir e:\*.doc /s Correct. The dir command lists all files and folders in the current directory. Adding the filename e:\*.doc tells dir to start in the e: root folder and show all files that use the file extension doc. Appending the command with the /s parameter tells dir to recurse (perform the same sequence) through all subdirectories under the e: root.
A Windows 10 user wants to display all the files in all the subdirectories on the E: drive with the file extension of doc. What command would perform this function?
Update network settings. Correct. The network settings should be checked and updated as needed after the physical connections are verified.
A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have been tested and verified to be working properly. What step should be considered next to resolve this problem?
Use the Services Console to stop and start the Spooler service. Correct. The Services Console (services.msc) is used to stop and start services. The Spooler service is one of the components responsible for passing print jobs from the computer to the printer.
A Windows computer stopped printing to a directly connected printer, and the technician suspects a service may be at fault. Which of the following steps can the technician take to verify her suspicion?
The user had previously encrypted her data files and folders using EFS.
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?
Security tab Correct. Your coworker should use the Security tab to set the zone security level for the Internet zone. Setting the level to medium-high will prompt users before they download ActiveX controls that are not digitally signed by Microsoft.
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?
Run a virus scan. Correct. Derek should run an antivirus scan to determine if a virus is on the computer. The symptoms of a slow computer and slow processes that are not recognized would lead you to believe a virus is causing the problems. You should run the anti-virus scan before updating RAM or a processor.
A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger. Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize. What should Derek perform next on the client's computer?
IaaS Correct. With IaaS (infrastructure as a service), the customer leases the underlying hardware, including servers, networking, and storage. These underlying services are then used virtually. The customer is responsible for providing and managing the applications, data, and backups. The customer may also be responsible for its own operating systems.
A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employees working from their homes and is looking to hire an additional 20 employees in the next six to eight months. The owners of the company are asking you to obtain a business service that will meet the needs of the current staff as well as scale up when the company grows. The service must provide adequate and scalable computing power and storage. Which cloud service model should you implement?
Linux Correct. Linux is an open source operating system that can be modified as required.
A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?
The command needs to be preceded by sudo. Correct. The sudo (substitute user) command is used to perform a command as superuser when logged in as a normal user.
A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?
mmc.exe Correct. The Microsoft Management Console (mmc.exe) can be used to create, save, and open tools commonly used by technicians. After the tool is customized, it can be distributed to other computers.
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to create a custom console containing only the tools she regularly launches and then distribute this custom console to each computer. Which of the following Windows tools will allow the technician to configure a custom console?
Use the tasklist utility to locate the PID for the explorer.exe process.
A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt. Which of the following steps should the technician take next?
The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot. Correct. A benchmark should be used to determine how long it takes the system to perform a clean boot and compare that time against the time the system takes to perform a normal boot. If the time for a clean boot is significantly shorter, the technician should consider the startup processes as a possible cause of slow startup.
A technician is troubleshooting a Windows computer experiencing slow startup. Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup?
Click the Advanced button to open Advanced Security Settings for the file.
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?
Services Console Correct. The Services Console (services.msc) tool is located in Administrative Tools used to control Windows and third-party background services installed on a system.
A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use?
macOS Recovery Correct. Using the macOS Recovery tool, the technician can reinstall the macOS from the Internet or from a Time Machine backup. She can also erase the HDD before reinstalling the OS.
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?
The Lock Screen timeout setting needs to be made in the AD OU GPO.
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?
The disk is using the MBR partitioning scheme. Correct. Drives larger than 2.2 TB must use the GPT or GUID partitioning scheme. MBR limits volumes to approximately 2.2 TB.
A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 TB. What is the most likely reason the user is unable to format the disk to its full capacity?
The user must open the command-line interface using Run as administrator. Correct. The sfc command must be launched using an elevated command prompt.
A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt. Which of the following best describes the reason for this issue?
System image backup Correct. A system image is a backup of the entire Windows volume, including the Windows installation, applications, user settings, and user data.
A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all its apps were initially installed. Which backup type will be most useful in this scenario?
Certificate Manager Correct. You can use the Certificate Manager to view and delete root certificates. To use Certification Manager, type certmgr.msc in the search box. Certification Manager is a Microsoft Management Console that is used only for managing certificates.
An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed. Where do you go in the Windows operating system to view and delete root certificates?
Access control list Correct. The computer allows members of the company to log in to the network by means of a user name and password. After the user has logged in, the ACL tells the computer or server the access the users have to specific resources on the network.
Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network?
Windows\System32\drivers folder Correct. The drivers are stored in the Windows\System32\drivers folder.
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet. Where can Eric go to look up the device driver's filename to determine what device uses the device driver?
Advanced system settings
From this window, where do I click next to get to the following window?
Excuse himself and check back when the call is complete. Correct. Accept personal inconvenience to accommodate the user's urgent business needs. Even if George has other trouble calls to work on, he is there to support the client.
George is working onsite at a client's desk. The client's phone rings during George's visit, and the client explains that she must take the call. What should George do in this situation?
Train the employees on why these issues are security concerns. Correct. When possible, training the employees, instead of confronting them, is the better solution.
Henry is sent to work with a customer at the company's satellite branch in another town. During his visit, he notices that most of the computer users are not following the corporate guidelines on password safety and are looking at their personal emails, which is not allowed for security reasons. What can Henry do about these corporate policy issues?
High-end video card Correct. Henry will not need a high-end video card to run a virtual machine. Virtual machines run a standard video driver, so Henry would not see a performance increase with a high-end video card.
Henry wants to build a computer that will allow him to run a hypervisor program. What does Henry not need on his computer?
Use a third-party remote access app that uses a browser. Correct. Using a browser-based screen sharing app will typically transmit traffic on TCP port 443, which is already open for HTTPS web traffic.
How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?
sfc /scannow Correct. The sfc /scannow command is used to verify and restore corrupted system files.
If you suspect corrupted system files are causing issues, what command can be run to verify and restore the corrupted files?
Dual Correct. A dual boot, or multiboot, allows you to install a new OS without disturbing the old one, so that you can boot to either OS.
If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?
Avoided distractions. Correct. Whenever possible, Isaac should avoid being distracted by text and email messages when working with a client. If a text or email is important enough that he needs to address it, he should excuse himself before dealing with it and then return and focus on the client's problem.
Isaac was assigned to work on a computer in his company's R&D department. While working on the system, Isaac received several text messages and emails from his coworkers about another issue in the data center. Isaac answered the text messages as they came in and finished working on the computer system in the R&D department. The next day Isaac was called into his supervisor's office. His supervisor told him that he received a complaint that Isaac was on his phone instead of working on the problem with the computer. What should Isaac have done differently to avoid this complaint?
Cable lock Correct. A cable lock will allow James to connect his laptop to a table leg or some other object. The lock is then attached to the laptop's security slot. Most laptops have a security slot on the case to connect the cable lock; this slot is called a Kensington Security Slot or K-Slot.
James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels?
Enable Boot Logging Correct. James should use this option to see what did and did not load during the boot. For instance, if the problem is getting a device to work, James can check Ntbtlog.txt to see which driver files loaded.
James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. What setting in the Startup Settings screen will enable James to see which driver might be failing and causing his computer not to boot?
Action Center Correct. The Action Center icon is located next to the time and date on the taskbar and is used to toggle several Windows features on and off, access the Settings app, and view notifications.
John recently upgraded from Windows 8.1 to Windows 10, after the upgrade is complete, on the right-hand side of his desktop there is a new area that contains a way to toggle several Windows features on and off, access the Settings app, and view notifications. What is this area called in Windows 10?
Zero-day Correct. A zero-day attack is when a hacker discovers a security hole in software that is unknown to the developer of the software or when a hacker takes advantage of a recently reported gap in software security before users apply patches released by the developer.
Jordan is talking with a client on the phone. Jordan's company recently completed updates on the client's system and something is not working properly. The client asks Jordan why the company is always doing updates. Jordan explain that updates help to secure computer systems. What specific vulnerability do updates help prevent?
Enable print sharing on the computer.
Kendra, a user, would like to share her serial printer that has no networking connectivity with the other users in her small office. Which of the following would be the best choice for providing this functionality with the least effort and cost to the user?
Windows 10 Home Correct. Windows 10 Home will allow Larry to share files at work and at home. He would need Windows 10 Pro if he needed to connect to a domain.
Larry wants to upgrade to Windows 10. He will use his computer both at home and at work and will need to connect to his company's Wi-Fi network to share files over the network. Which version of Windows 10 would you recommend to Larry?
Details Correct. Use the Details tab to set the priority level of a specific process (such as an application or service).
On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?
Application streaming
One of the users in your company is asking if he can install an app on his company-provided mobile device. The installation of apps by users is blocked on the company's mobile devices, but you have tested and confirmed this app would be useful for everyone. Which of the following will allow users to request a minimal version of the app that downloads only what is required to run?
RAM Correct. RAM is the main factor in determining whether to use a 32-bit or 64-bit version of Windows. If the computers Penny is working on have four or more gigabytes of RAM installed, she should use the 64-bit version because a 32-bit OS will not be able address all the RAM. Processor Correct. The processor is a factor when deciding on which version of Windows 8.1 to use. The computers Penny is working on must have a processor that can support a 64-bit OS. However, all multicore processors allow installation of a 64-bit OS. Hard drive Correct. The hard drive is a factor when deciding whether to use a 32-bit or 64-bit version of Windows 8.1. The amount of storage required for a 32-bit version is 16GB, and the amount of storage required for a 64-bit version is 20GB.
Penny is setting up computers at a local nonprofit organization. The computers were donated by a company that was upgrading to new computers. Penny must decide whether to use a 32-bit or 64-bit version of Windows 8.1. What hardware on the computers should Penny check? (Select all that apply.)
Rootkit Correct. A rootkit loads itself before the OS boot is complete. Because a rootkit is already loaded when most anti-malware software loads, the rootkit is sometimes overlooked by the software.
Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled. What kind of malware could be causing the issues on Frank's computer?
System Protection Correct. System Protection utility automatically backs up system files and stores them on the hard drive at regular intervals and just before you install software or hardware.
Restore points are created at regular intervals and just before you install software or hardware by what utility?
Configure logon time restrictions.
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?
F8 Correct. Pressing the F8 key at startup will display the Advance Boot Options screen. This feature must be enabled in Windows 10/8 as it is disabled by default but is automatically enabled by default in Windows 7.
The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence?
2.2TB Correct. MBR, or Master Boot Record, method is older, allows for four partitions, and is limited to 2.2-TB drives.
The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives?
DDoS Correct. A distributed denial-of-service (DDoS) attack happens when multiple computers attack and overwhelm a computer or network with requests or traffic until new connections can no longer be accepted.
The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred?
Use Safe Mode to boot.
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?
Boot Logging Correct. The Enable Boot Logging option under the Advanced Options screen allows viewing of what did and did not load during the bootup.
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?
System window Correct. Wanda can find the information quickly in the System window. To access the window, she can go to File Explorer, right-click This PC, and select Properties.
Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed on her computer. Where can Wanda find this information quickly in Windows 10?
Activates the HAL Correct. The kernel is responsible for activating the HAL during the startup process. Starts critical services Correct. The kernel is responsible for starting critical services during the startup process. Starts the Session Manager Correct. The kernel is responsible for starting the Session Manager during the startup process.
What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.)
wpeinit Correct. The wpeinit command will enable networking within Windows RE.
What command can be issued within Windows RE to enable networking?
bootsect Correct. The bootsect command is used to repair a dual-boot system.
What command can be used to repair a dual boot system?
md Correct. The md, or make directory, command creates a subdirectory under a directory.
What command creates a subdirectory under a directory?
Restore point Correct. A restore point is a snapshot of the system settings and configuration since the last restore point was made.
What is a snapshot of the system settings and configuration called?
Applets Correct. The Control Panel contains several small utility programs called applets that are used to manage hardware, software, users, and the system.
What is another name for several small utility programs that are found in the Control Panel?
Startup BIOS/UEFI Correct. The Startup BIOS/UEFI is responsible for the early steps in the boot process, including surveying hardware devices, testing hardware for a successful boot, and finding an OS to load.
What is responsible for getting a system up and going and finding an OS to load?
128 Correct. GPT method of partitioning is newer, allows for any size hard drive, and for Windows can have up to 128 partitions on the drive.
What is the maximum number of partitions allowed using the GUID Partition Table (GPT) method for partitioning a drive for Windows?
End-of-life Correct. An end-of-life vendor limitation is the point in time when a vendor (also called manufacturer) no longer provides updates or support for an operating system.
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
X = 1, the Do...Loop is endless. Correct. The Do...Loop is endless but can be stopped by user intervention or by the operating system. When execution ends, the value of X is still 1.
What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop
Spacebar Correct. In Windows 7, pressing the spacebar during the startup process will cause the Windows Boot Manager to appear.
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows 7 startup process?
Cleaning Correct. The cleaning step neutralizes the residual electrical charge on the drum and also sweeps the excess toner from the drum into a waste hopper. The next step immediately after cleaning is charging.
What step in the laser printing process is responsible for conditioning the imaging drum in preparation for receiving an electrical charge?
Thin client Correct. A thin client is a computer that has an operating system but little computing power of its own and may need to support only a browser used to communicate with the server. The server does most of the processing, while the user interacts directly with the thin client.
What type of computer is recommended when you want to allow the server to do most of the computing but would like to connect to the server via a browser?
Magnetic hard disk drives Correct. Magnetic hard disk drives, or HDDs, contain spinning platters.
What type of storage drive contains spinning platters?
Windows 10 Home Correct. Windows 10 Home is a valid, in-place upgrade path for a computer that has Windows 7 Starter edition on it.
What version of Windows 10 is a valid, in-place upgrade path for a computer that has Windows 7 Starter edition on it?
BIOS/UEFI setup Correct. You should disable any virus protection settings that might prevent the boot area of the hard drive from being altered in the BIOS/UEFI setup before any installation.
Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered?
Performance Monitor Correct. Performance Monitor is a Windows tool used specifically for viewing performance statistics. It can monitor and report in real time and can save collected data in logs for future use.
Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time?
Misaligned colors on printed page. Correct. A calibrate function is carried out on laser and inkjet printers to align the colors. Misalignment of colors makes an image look like it is not aligned properly or is streaking. A calibrate function is typically carried out after the print head(s) is replaced on an inkjet printer and the imaging drum or transfer belt is replaced on a color laser printer.
Which of the following printer issues is most likely resolved by performing a calibrate function on a laser or inkjet printer?
File History Correct. File History is available on Windows 8.x and Windows 10 and is used to make copies of a user's data files. Backup and Restore Correct. Backup and Restore is available in Windows 10 and Windows 7 and is used to perform a system image backup. It will also back up any user data stored on the Windows volume.
Which of the following tools are available in Windows 10 for backing up user data or complete system images? (Select TWO.)
Network topology Correct. A network topology diagram will show how nodes are physically or logically connected to the network. Randy should update the diagram when network equipment is changed so that he can use the document to troubleshoot network issues.
While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. What type of documentation did Randy discover?
The initial steps must be performed by the BIOS/UEFI
Why does a normal hard boot take longer than a normal soft boot?
Windows features Correct. Hyper-V is enabled in the Apps and Features window, where William can turn on a Windows feature by using a check box and selecting the required feature.
William's supervisor wants to create a test lab at the company in order to test Windows 10 updates. He has instructed William to create a virtual lab. William decides to use Hyper-V as the hypervisor for the virtual machines. When William tries to use Hyper-V, he realizes that it is not installed. What will William use to install Hyper-V in Windows 10?
smss.exe Correct. Smss.exe is responsible for loading the graphical user interface and starting the client/server runtime subsystem.
Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?
Take ownership of the folder and then change permissions.
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?
FAT32 Correct. The FAT32 files system is available for use on a hard drive in Windows 10. However, FAT32 is not recommended because of its size, 32GB, and security limitations. FAT32 provides no security in the file system, and you cannot limit who has access to the data as you can with NTFS. NTFS Correct. NTFS is the recommend file system for Windows 10. NTFS has security that allows you to limit access to data based on permissions. The maximum size of an NTFS hard drive is 16 TB.
You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are available in Windows 10 for a local hard drive? (Select all that apply.)
Research the error message on the web. Correct. The previous technician recorded the message, making it easy for you to research the error before arriving at the customer's location.
You have received an escalated trouble ticket for a Windows workstation that displays an error message each time the user signs in to Windows. The previous technician logged the error in the ticketing system and made a note that she was not familiar with the error message the system was displaying. What is the first step you should take in resolving this issue?
Enable the supervisor password in the BIOS/UEFI setup.
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?
TACACS+ Correct. TACACS+ is the Cisco improvement to RADIUS. TACACS works with CISCO equipment to provide AAA services. Because of the integration with Cisco equipment, TACACS will work faster.
Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. What will you recommend as an upgrade to RADIUS?
Mantrap Correct. A mantrap system has two doors. The first door is where people enter and show their ID; the second door is the one they pass through after it is verified that they have access to the facility.
Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company's new security called?
Enable the spam filter. Correct. This type of email is known as spam. The company can use the email server to filter these types of messages. Usually the spam filter has specific words or email addresses that it will compare the message to and determine whether the message is valid or spam.
Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software. What will you recommend to your supervisor?
Configure Group Policy to run a logon script. Correct. If you want to configure settings for all users in the same OU, the best tool to use is Group Policy. Policy changes in Group Policy affect all users in the OU.
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?