ITMT 1358 CHAPTER 9-12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following programs can be installed via group policy?

- .msi files

Where is the Event Viewer located on a system running Windows 10?

- Administrative Tools - The Computer Management console - The Server Manager console

By default, when will Windows install software updates?

- Daily at 3:00 A.M.

Which of the following can be used to deploy an application to users? (Choose all that apply)

- Group Policy Objects - System Center Operations Manager - Windows Imaging and Configuration Designer

How many inbound Remote Desktop connections are allowed by Windows 10?

- One

In Windows 10, which of the following is used to uninstall a program?

- Open Control Panel Programs and Features

Which of the following methods enable you to deploy a Windows App that has been created within your organization and needs to be deployed to your users? (Choose all that apply)

- Placing the app in the Windows Store - Implementing the app in the Windows Store for Business

Which of the following allows you to run PowerShell commands on a remote computer?

- PowerShell Remoting

Which of the following scan options are available in Windows Defender? (Choose all that apply.)

- Quick - Full - Custom

In addition to being able to select an operating system to emulate, there are several other compatibility settings you can select from. Which of the following settings are available? (Choose all that apply)

- Reduced color modes - Disable Display Scaling On High DPI Images

Which of the following troubleshooting tools enables you to connect to a user's remote computer, view and interact with the user's screen, and chat with the user?

- Remote Assistance

Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from the remote computer, so that they can interact with the Windows desktop and applications?

- Remote Desktop

Which of the following ports are used by Remote Assistance and Remote Desktop?

- TCP 3389

Before you can Sideload Windows Apps, which of the following requirements must be met on your organization's computers? (Choose all that apply)

- The computers must be running Windows 10 Enterprise or Professional. - Group Policy settings must allow trusted apps to be installed. - A product activation key must be available for non-domain joined computers. - The Computer must be part of the Active Directory domain.

Which of the following statements best describes Windows Apps? (Choose all that apply)

- They are designed to run in a single, full window display. - They are available from the Windows Store. - They are certified for content by Microsoft.

The Program Compatibility Troubleshooter provides you with which of the following options after attempting to determine what is preventing the program from running properly? (Choose all that apply)

- Try Recommended Settings - Troubleshoot Program

7. Which Remote Assistance option requires Peer Name Resolution Protocol (PNR) and IPv6?

- Use Easy Connect

How do you connect to the Remote Desktop administrative session?

- Use the mstsc /admin command

A widget program automatically starts up when you turn on the computer. However, this program is consuming too many resources. Which of the following actions stops this program from starting during bootup?

- Using Task Manager to disable the startup program

Which service enables administrators to execute a command on remote computers using Windows PowerShell or the Windows Remote Shell command-line programs?

- Windows Remote Management

Which of the following can be used to deploy Windows apps via a private store that would be available only to corporate users?

- Windows Store for Business

An administrator has configured WSUS settings to be applied via a Group Policy Object linked to a specific OU in her organization. She has recently moved a new computer into the OU and wants it to show up in the WSUS console immediately. Which command can she use to help with this situation?

- gpupdate /force

Which of the following command-line commands can be executed to force a computer to contact its configured WSUS server immediately?

- wuauclt /detectnow

When reading events in the Event Viewer, you need to recognize the designated levels or classifications. Which of the following statements best describes the Information level?

A change in an application or component has occurred (such as an operation has successfully completed, a resource has been created, or a service started).

Which type of Windows Defender scan checks only the locations you specify?

A custom scan

When reading events in the Event Viewer, you need to recognize the designated levels or classifications. Which of the following statements best describes the Critical level?

A failure has occurred from which the application or component that triggered the event cannot automatically recover.

Which type of Windows Defender scan checks all files on your disks and running programs?

A full scan

When reading events in the Event Viewer, you need to recognize the designated levels or classifications. Which of the following statements best describes the Error level?

A problem has occurred that might impact functionality that is external to the application or component that triggered the event.

Task Manager provides which of the following insights into computer performance?

A quick glance.

Which type of Windows Defender scan checks only the areas that are most likely to contain malware?

A quick scan

Which type of Windows Defender scan uses signature detection methodology and heuristics to monitor and catch malware behavior as files are being accessed?

A real-time scan

When reading events in the Event Viewer, you need to recognize the designated levels or classifications. Which of the following statements best describes the Warning level?

An issue has occurred that can impact service or result in a more serious problem if action is not taken.

Which of the following names is given to software updates that fix a specific problem addressing a critical nonsecurity bug?

Critical Updates

Which of the following names is given to software updates that contain a tested set of cumulative updates?

Cumulative patch

Which of the following update scenarios defer updates for four months after Microsoft makes the updates available to the public?

Current Branch for Business servicing

Which of the following is used to group multiple performance counters so that they can be used over and over in Performance Monitor?

Data Collector Sets

Which of the following is used to view the Windows logs?

Event Viewer

Which of the following programs is used to view the Windows logs?

Event Viewer

When troubleshooting a problem and using Event Viewer, which of the following should be used to help focus on a reduced set of events?

Filters

On which of the following tabs can the items Windows Defender quarantined be found?

History tab

Event Viewer is essentially which type of tool?

It is a log viewer tool.

In the Windows Defender console, in which of the following locations will you find items that were not allowed to run but were not removed from the computer?

Quarantined items

Which program is used to determine what process is using a file?

Resource Monitor

Which of the following allows viewing events from multiple computers using Event Viewer?

Subscriptions

Which program is used to stop a running process?

Task Manager

Which of the following statements is true of Task Manager?

Task Manager can indicate when you might have a bottleneck.

Which of the following is used to configure which files are being indexed and where the index files are stored?

The Control Panel Indexing options page

Windows 10 provides many emulation modes for older versions of Windows. Which of the following modes is not available to select from?

Windows 2000

Which of the following features can protect a PC against malware?

Windows Defender

Which of the following statements best describes how Windows Defender responds to the installation of a different antivirus product?

Windows Defender completely disables itself.

Which of the following allows you to receive early builds of Windows?

Windows Insider Preview

Which of the following tasks can be performed by using the Event Viewer MMC snap-in?

You can save useful event filters as custom views that can be reused.

To examine performance correctly, you must establish a performance baseline. When is this task performed?

during normal usage

Event Viewer allows you to collect events from remote computers and store them locally. By what name is this collection of events known?

event subscription

Which of the following terms is used to identify when a program is being executed?

process

Resource Monitor is a powerful tool for understanding how your system resources are used by which of the following system consumers?

processes and services

The Reliability Monitor provides a range of numbers to help you evaluate the reliability of a computer. What is the name of this range of numbers?

stability index

Which command is used to configure a collecting computer to receive an event subscription?

wecutil qc


Ensembles d'études connexes

Intro to Physical Anthropology Chapter 10

View Set

Business Process Management Midterm

View Set

Compare and Contrast the Chesapeake Colonies and New England Colonies

View Set

Lof & Johnson: Chapter 7 - Language Disorders in Young Children

View Set

Johnny Tremain Chapter 1 Vocabulary

View Set

AP Computer Science A Final Exam

View Set

Types of imagining, testing, procedures

View Set

Biology 201 Fall 2017 - Exam 2 - Uwe Pott - UWGB

View Set

Leadership and Performance Midterm

View Set