TestOut Client Pro Unit 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Put the steps for the suggested procedure for remediation of an infected system in the order they should be performed in.

1. Identify the symptoms 2. Quarantine the infected system 3. Disable System Restore 4. Update anti-malware definitions 5. Scan for and remove malware 6. Schedule future anti-malware scans 7. Re-enable System Restore 8. Educate the end user

Your Windows 11 workstation has automatically started in WinRE. Which of the following has Windows detected that caused it to start automatically in the recovery environment? (Select two.)

A BitLocker error on touch-only drives. Two consecutive unintended shutdowns within two minutes of booting the system.

Which of the following is the BEST description of a BCD store?

A database that identifies possible operating systems and their locations on a disk.

To protect your system and the data on your Windows computer, you use the Backup and Restore console to create a system image backup. While working with a file, you accidentally delete some data. You need to restore the older version of the file, but you cannot find any previous versions of the file. What should you do? (Select two. Each answer is part of the complete solution.)

Attach the .vhd file created from the Backup and Restore console. Use Windows Explorer to browse to and then copy the file.

Match each backup method on the left with the correct description on the right.

Backs up all files (even those that have not changed). Full Backs up every file that has changed since the last full or incremental backup. Incremental Backs up every file that has changed since the last full backup. Differential Compares the data found in the last full backup with the current content and uploads only the changes. Synthetic

You want to use an optical disc as a system recovery drive. In the System and Security category, click the Control Panel item you must use to create a system repair disc.

Backup and Restore (Windows 7)

You want to protect all the files on the hard drive of your Windows notebook system to prevent unauthorized access. You also want to prevent access to any encrypted file on the hard drive, even if the hard drive is moved to another computer. Which feature should you implement?

BitLocker

You experience startup errors after you install a new device driver. What should you do FIRST to resolve the issue?

Boot in Safe Mode and roll back the driver.

You are using a Windows 11 system to work on the schedule for a very important project. You saved your files in the Documents library of your user account. Unfortunately, malware from a malicious website has infected your system. You were able to remove the infection with anti-malware software. However, after shutting down, you discover that Windows does not boot properly. Which action can you take to get your system back up and running properly without losing your project files and while minimizing the risk of infecting other systems on the network? (Select two. Each option is part of the complete solution.)

Boot the system from a recovery drive. Select Troubleshoot > Reset this PC > Keep My Files.

Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot, and now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent him from using the TV until you can install an updated driver. What should you do?

Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

Which of the following describes the grandfather backup in a grandfather-father-son (GFS) rotation scheme?

A full backup that is stored offsite.

You use a Windows system with File History running. Currently, File History is configured to save copies of files every hour. However, you've been assigned to work on a high-profile project, and you would like File History to save copies of files every 15 minutes. What should you do? (Select two. Each answer is part of the complete solution.)

Click Advanced settings and then set Save copies of files to Every 15 minutes. In Control Panel, click System and Security > File History.

One of the users you support, VKumar, has just turned on File History and selected the internal D: drive as the location to which his files will be copied. By default, which directory does File History copy files from to save on the D: drive?

C:\Users\VKumar

You need to change how Windows provides notifications when the firewall blocks a new program. Click the links that you would choose to make this change. (Select two.)

Change notification settings Turn Windows Defender Firewall on or off

You have just installed Windows 11 on a new laptop. The notebook does not have a Trusted Platform Module (TPM) chip. You want to configure the computer to use BitLocker to protect the volume used for the operating system and all user data. What should you do? (Select two. Each correct answer is complete solution.)

Configure BitLocker to use a startup key on a USB drive. Configure BitLocker to require a PIN for startup.

You want to use BitLocker on a laptop that belongs to a domain. Your implementation needs to meet the following requirements: The laptop should start up without requiring a PIN or USB device. To meet security requirements, USB support must be disabled on the laptop. The computer should automatically generate recovery keys and store them in a central location. How can you implement a solution that meets the stated requirements? (Select two. Each answer is part of the complete solution.)

Configure Group Policy to store recovery keys in Active Directory. Implement BitLocker with a TPM

You are getting ready to install Windows 11 on a new laptop. You would like to configure the laptop to use BitLocker. How can you configure the laptop to start without requiring a PIN or USB device? (Select two. Each answer is part of the complete solution.)

Create two partitions on the hard disk. Put boot files on the first partition and operating system files and data on the second partition. Enable the TPM.

Which malware type is designed to facilitate identity theft by gaining access to a user's online financial accounts?

Crimeware

To provide additional storage space, you have added a second internal hard drive to your Windows system. For the past several weeks, you have created and changed many files stored on the new hard drive. One of the files on the new drive has become corrupted. You want to recover as much as you can by reverting to a previous version of that file. After viewing the file properties, you notice no previous versions are available. Which action must you take to ensure that you can revert files to previous versions on the new hard drive of your Windows computer?

Enable System Protection on the new hard drive.

You are supporting a Windows computer used by three different users. The computer has the following volumes with default System Protection settings: C: (System drive with user profiles and individual user files) E: (Data files common to all users) Which option is the easiest way to protect the data on both volumes with restore points?

Enable system protection for the E: volume.

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described?

Enable the Remote Assistance exception only on the private profile.

You want to provide encryption for individual files and folders for the Windows laptops in your company without using Bitlocker. In addition, you want the encryption to meet the following requirements: Individual files and folders are encrypted using a symmetric key. The symmetric key is encrypted with an asymmetric key tied to the user account. Works well with the NTFS file system. Which of the following BEST meets your encryption requirements?

Encrypting File System (EFS)

You're the network administrator for the local hospital, and you're configuring some new computers that will run the medical equipment to monitor patients' vital signs. It's imperative that these computers always stay on and don't reboot. Which of the following options should you implement for Windows Update?

Enroll the computers in the Long-Term Servicing Channel.

Microsoft offers three different servicing channels for Windows. Match each channel on the left with its description on the right. (Each channel may be used once, more than once, or not at all.)

Ideal for pilot deployment and lab testing of Windows updates. Semi-Annual Channel For highly sensitive systems that can't tolerate any downtime. Long-Term Servicing Channel Gives system administrators a chance to provide feedback to Microsoft on any bugs before Microsoft releases the update. Windows Insider Program (WIP) New updates are typically released every 2-3 years. Long-Term Servicing Channel Feature updates are automatically installed as soon as they are released unless deferred. Semi-Annual Channel Provides very early pre-released Windows builds or feature updates. Windows Insider Program (WIP)

The vendor of your accounting software recently released an update that you downloaded and installed on your Windows system. Unfortunately, now your accounting software crashes when launched. Which action can you take to get your system running properly as quickly as possible without losing your accounting files? (Select two. Each answer is a possible solution.)

In Control Panel, go to System and select Security > System > System Protection > System Restore. Boot the system from a recovery drive and select Troubleshoot > Advanced Options > System Restore.

You want to use a USB flash drive as a system recovery drive. Which of the following steps can you use to launch the utility you must use to perform this task?

In the taskbar search field, type Create a recovery drive. Then select the Create a recovery drive entry in the search results.

You have booted your Windows workstation in Safe Mode and enabled boot logging. Which log file is the boot logging information now written to?

Ntbtlog.txt

When should you disable the Windows firewall?

Only if the computer is protected by a different firewall program.

You have created a system image of Windows 11 on your laptop before updating several applications on your hard drive. The system image is stored on an external hard drive. After updating one of the applications, you are required to restart your laptop. However, during the restart, you receive an error message that the system is unable to reboot. You try to restore the system image from the external hard drive, but you are unsuccessful. Which of the following do you need to do BEFORE successfully restoring your Windows 11 system using the system image?

Use a recovery disc to restore the operating system.

You manage a Windows computer that is shared by multiple users. Recently, a user downloaded and installed two malware programs on the computer. The applications had a .msi extension. What is the first line of defense in protecting your system against applications like these from being copied or downloaded to your system?

Use anti-malware software that provides real-time protection.

To protect the data on your Windows computer from loss or corruption, you enable system protection on all the drives on your computer. You also schedule regular backups of the system drive and all other drives using the Backup and Restore (Windows 7) console. After working with a file, you notice that you accidentally deleted most of the data. How can you restore the file to the state it was in before you modified it? (Select two. Each answer is a complete solution.)

Use the Backup and Restore (Windows 7) console to locate and restore the file. Use the file's properties to restore a previous version of the file.

You have a Windows computer configured with volumes C: and D:. You want to schedule backup jobs of the C: volume to include all user files on the C: volume as well as creating a system image of the C: volume. How do you configure the backup job and the schedule with a minimal amount of effort?

Use the Backup and Restore (Windows 7) console.

Your Windows computer has the following drives: C: (System drive with user profiles) E: (Data files) F: (External USB hard drive) You enable system protection on the C: drive. You also schedule regular backups with the following settings: Back up all user libraries Back up the C: and E: drives Include a system image Save the backup to the F: drive Last night, the E: drive crashed. How can you restore the data files found on the E: drive?

Use the Backup and Restore console to restore data from a backup.

To protect the data on your Windows computer from loss or corruption, you enable system protection on all drives in your computer. You also schedule regular backups with the following settings: Back up all user libraries Back up all drives Include a system image Today, you notice that your user profile settings are corrupt. How can you restore the user profile settings with the least amount of effort?

Use the Backup and Restore console to restore the user profile from the backup.

You support a Windows computer that has the following volumes: The C: drive is the system drive with user profiles and individual user files. The D: drive holds data files common to all users. The user has taken the following actions: Scheduled regular backups to back up all user libraries. The scheduled backup includes the entire D: drive as well as a system image. Used System Restore to take a snapshot. After working with a file on the D: drive, the user has accidentally deleted most of the data in the file. The user needs your help to recover the file as it existed before making the changes. You check the System Protection settings and find that System Protection is not enabled for the D: drive. How can you restore the data in the file with the least amount of effort?

Use the Previous Versions tab of the file properties to restore the file.

Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue?

Verify that the BIOS/UEFI is configured to use the correct video adapter.

Which command can be used to attempt to repair infected files?

sfc

You are supporting a Windows computer that has the following volumes: The C: drive is the system drive with user profiles and individual user files. The D: drive holds data files common to all users. System Protection has been configured as follows: A system image backup has been created that includes both the C: and D: drives. Regular backups are scheduled to back up all user libraries. The scheduled backup includes a system image. System Restore has been used to take a snapshot. A user has edited and saved a file on the D: drive. The user doesn't like the changes and wants to revert to a previous version of the file. The user goes to the Previous Versions tab of the file and sees nothing listed. How can you help the user restore the previous version of the file?

Restore the file from the system image.

You have installed a financial asset management application on your Windows computer. Now your computer is sluggish and doesn't seem to be working well. What should you try first to get the computer to troubleshoot the issue?

Restore the system from a restore point saved before the app was installed.

Your Windows system has been infected with malware that has replaced the standard boot loader on the hard disk with its own malicious software. Which type of exploit is being used in this scenario?

Rootkit

You have just set up a new Windows system. You want to be able to recover this system if a major failure occurs. With some system failures, you can still boot the system, log on, and then perform tasks to recover the system using a backup. Click the option you must use if you want to be able to recover from a system failure when this type of failure occurs.

Set up backup

You're the network administrator for the local hospital, and you're configuring Windows updates for the computers in the ER nurses' workstation. These computers are connected to the local network, but the configuration settings are all managed locally. Windows update KB5003637 was recently installed, and some nurses are complaining about issues with their taskbar icons disappearing. Which of the following Uninstall Updates features should you use to resolve the issue?

Settings > Windows Update > View Update History > Uninstall Updates

You are the IT administrator for a small corporate network. You are configuring Windows Update on the Office1 workstation. In this lab, your task is to: Configure Windows Update options to receive updates for other Microsoft products when you update Windows. Set the Windows Update active hours for Office1 to be 6:00 AM to 11:00 PM. Check for Windows updates. Answer the question.

1. Access Windows Update. a. Right-click Start and select Settings. b. Maximize the window for better viewing. C. From the left pane, select Windows Update. 2. Enable updates for other Microsoft products. a. From the right, select Advanced options. b. For Receive updates for other Microsoft products, slide the button to On. 3. Enable and configure the computer's active hours. a. Select Active hours. b. Select a value in the current Start time. c. Change the Start time to 6:00 AM and then select the checkmark. d. Select a value in the End time. e. Change the End time to 11:00 PM and then select the checkmark. 4. Check for Windows updates. a. From the left, select Windows Update. b. From the right, select Check for updates. Wait for the updates to download and install. c. From the top right, select Answer Questions. d. Answer Question 1. e. Select Score Lab.

You are the IT administrator for a small corporate network. You have just changed the SATA hard disk in the workstation in the Executive Office. You need to edit the boot order to make it consistent with office standards. In this lab, your task is to: Access the computer's BIOS settings. Disable booting from the diskette drive. Configure the remaining devices to boot using the following boot order:Internal HDDCD/DVD/CD-RW driveOnboard NICUSB storage device

1. Access the BIOS settings. a. Select the power button on the computer. b. As the computer begins to boot, press the Delete (or F2) key to enter the computer's BIOS settings. 2. Disable booting from the diskette drive. a. From the left pane, under General, select Boot Sequence. b. Under Boot Sequence, clear Diskette Drive to disable the ability to boot from the diskette. 3. Change the boot sequence order of the remaining active devices. a. From the right, select a device field that needs to be moved to a different boot order location. b. Using the arrows to the right of the device list, move the selected device up or down. c. Repeat steps 3a-3b to modify additional device priorities as required. d. Select Apply and then select Exit. The computer automatically boots to Windows.

You would like to have the ability to restore your computer to a previous point in time should the process of installing an app, driver, or update cause your system to function improperly. In this lab, your task is to: Configure and enable System Protection.Set a maximum of 5% of disk space for restore points on the C: volume.Set a maximum of 7% of disk space for restore points on the D: volume.Create a manual restore point and give it a name of your choosing.

1. Access the System Protection options. a. Right-click Start and then select Settings. b. From the right pane, scroll to the bottom and select About. c. Under Device specifications, in the Related links box, select System protection. d. Make sure that the System Protection tab is selected. 2. Configure the Protection Settings. a. Select Local Disk (C:) and then select Configure. b. Under Restore Settings, select Turn on system protection. c. Under Disk Space Usage, adjust Max Usage to 5% and then select OK. d. Select Data (D:) and then select Configure. e. Under Restore Settings, select Turn on system protection. f. Under Disk Space Usage, adjust Max Usage to 7% and then select OK. 3. Create a restore point. a. Select Create to create a restore point. b. Enter in a name of your choosing for the restore point; then select Create. c. When prompted, select Close to acknowledge the completion of the restore point. d. Select OK to close the System Properties dialog.

You are the IT administrator for a small corporate network. An employee has just called you saying that when they turn their laptop computer on, a strange screen pops up that they don't recognize. In this lab, your task is to: Boot the Exec-Laptop computer and evaluate the system. Answer Question 1. Determine which option would most likely fix the issue and run that option.

1. Boot the Exec-Laptop computer and evaluate the system. a. Above the Exec-Laptop, select Top to view the power button. b. Turn on the desktop computer by selecting the power button. C. From the top right, select Answer Questions. d. Answer Question 1. -Windows Recovery e. Minimize the question window. 2. Determine which option would most likely fix the issue. a. Select Advanced options. b. Select Troubleshoot. c. Select Advanced options. d. Determine which option to use. 3. Use the applicable option to repair the computer. a. Select Startup Repair. b. Allow the computer to be repaired and to boot into Windows. On a real computer, the Startup Repair option may take an hour or more to complete. c. From the top right, select Answer Questions. d. Select Score Lab.

Zoey, an employee in Office1, is responsible for developing an important new advertising campaign. To protect her data, you have decided to enable File History on her Windows system and configure it to take frequent snapshots of her files. In this lab, your task is to: Enable File History on the Data (D:) volume. Configure File History to save copies of files every 10 minutes. Retain previous versions of files for 3 months.

1. Enable File History on the Data (D:) volume. a. Select Search. b. In the search field, type File history. c. Under Best match, select File History. d. Verify that disk Data (D): has been selected for storing File History information. e. Select Turn on. 2. Configure File History. a. From the left, select Advanced settings. b. Use the Save copies of files dropdown menu to select Every 10 minutes. c. Use the Keep saved versions dropdown menu to select 3 months. d. Select Save changes.

Your laptop is running Windows. You notice a security message indicating that Windows Firewall has been disabled. The laptop is currently connected to your organization's network, and the Domain network profile settings are in effect. You plan to travel this week and connect the laptop to various airport Wi-Fi hotspots. You need to enable Windows Firewall for any public network. In this lab, your task is to: Turn on the Windows Firewall for the Public network profile only. Allow the following additional service and programs through the firewall for the Public network profile only:A service named Key Management ServiceAn application named Arch98An application named Apconf

1. Turn on Windows Firewall for the Public network. a. Right-click Start and then select Settings. b. From the left pane, select Privacy & security. C. From the right pane, Windows Security. d. Select Firewall & network protection. e. Under Public network, select Turn on. 2. Allow apps through the Public firewall. a. Scroll down and select Allow an app through firewall. b. Select Change settings. c. For the Key Management Service, select the box under the Public column. d. Select Allow another app to configure an exception for an uncommon program. e. Select the program from the list. f. Select Add. g. For the program just added: . Uncheck the box in the Domain column. . Select the box in the Public column. h. Repeat steps 2d-2g for the remaining program. i. Select OK.

You recognize that the threat of malware is increasing, even for your home computer. You have decided to use Windows Security to protect your computer from malware. In this lab, your task is to configure Windows Security as follows: Enable SmartScreen for Microsoft Edge. For Virus & threat protection:Add a file exclusion for D:\Graphics\cat.jpg.Add a process exclusion for the welcome.scr file.Update protection definitions before performing the scan.Perform a quick scan.

1. Enable SmartScreen for Microsoft Edge. a. Right-click Start and then select Settings. b. Select Privacy & security. c. Select Windows Security. d. Select App & browser control. e. Maximize the windows for better viewing. f. Select Reputation-based protection settings. g. Under SmartScreen for Microsoft Edge, slide the switch to On. 2. Add a file exclusion. a. From the left menu, select the shield icon (Virus & threat protection). b. Under Virus & threat protection settings, select Manage settings. c. Under Exclusions, select Add or remove exclusions. d. Select Add an exclusion and then select File. e. From the left pane, select Data (D:). f. From the right, double-click Graphics. g. Double-click cat.jpg. 3. Add a process exclusion. a. Select Add an exclusion and then select Process. b. In the Enter process name field, type welcome.scr and then select Add. 4. Update protection definitions. a. In the left menu, select the shield icon (Virus & threat protection). b. Under Virus & threat protection updates, select Protection updates. c. Select Check for updates. 5. Perform a quick scan. a. In the left menu, select the shield icon (Virus & threat protection). b. Under Current threats, select Quick Scan to run a quick scan.

You are the IT administrator for a corporate network. You've just received an email from Susan, who produces your organization's monthly magazine. The email was to notify you that she had created a help desk ticket using Issue Trax, and she hoped that someone could help her straight away. The computer you work from is named ITAdmin. In this lab, your task is to: From the taskbar, open Issue Trax (the paw print icon) and the open ticket. Resolve the issue using the information found in the open ticket. Add a comment to the ticket indicating that the issue has been resolved. Close the ticket.

1. From ITAdmin, determine the needs and possible fixes for Susan's help desk ticket. a. From the taskbar, select Issue Trax. b. Maximize the window for better viewing. c. Select ticket #21. d. From the open ticket, determine the best course of action to resolve Susan's issue. e. Leave the ticket maximized so you can see the details. 2. On Office1, use Control Panel to access File History. a. From the top left, select Floor 1. b. Under Office 1, select Office1. c. Select Search. d. In the search field, enter Control. e. Under Best match, select Control Panel. f. Select System and Security. g. Select File History. 3. Restore the March2023_Issue.jpg file. a. From the File History window, select Restore personal files. b. From the bottom of the new File History dialog, select the Previous version button (left arrow) to navigate to the backups captured on Wednesday, March 15, 2023 11:15 AM. c. Double-click on the Pictures folder. d. Double-click on the Layouts folder. e. Select the March2023_Issue.jpg file. f. Select Restore to original location (the green arrow) located at the bottom center. g. Select Replace the file in the destination. The Layouts folder, where the file was restored, opens. h. From the Layouts folder, right-click the March2023_Issue.jpg file and then select Properties. i. Verify that the file was last modified on March 15, 2023 at 11:15:12 AM. j. Select OK. k. Close the Layouts window. CONTINUED ON NEXT SECTION

An employee in the finance department inadvertently deleted a large portion of a departmental expense report and then saved the file. The report contained very important information, and the employee needs you to restore the most recent version of the file. You need to perform this without affecting any of the other files in the D:\Finances directory of the employee's computer. In this lab, your task is to restore the most recent previous version of the 2023Report.xlsx file located in D:\Finance\Reports on the Office1 computer. As you complete this lab: Determine the current modified date for the file, before restoring the file. Answer Question 1. Restore the file to the most recent previous version. Determine the new modified date. Answer Question 2.

1. Open the D:\Finances\Reports folder. a. From the Windows taskbar, select File Explorer. b. From the left pane, expand and select This PC > Data (D:) > Finances > Reports. 2. Verify the current file information for the 2023Report.xlsx file. a. Right-click 2023Report.xlsx and then select Properties. b. In the top right, select Answer Questions. C. Answer Question 1. d. Minimize the Lab Question dialog. 3. Restore the most recent version of the 2023Report.xlsx file. a. Select the Previous Versions tab. b. Select the most recent version of the file and then select Restore. C. Select Replace the file in the destination. d. Select OK to close the dialog. 4. Verify that an older version of the 2023Report.xlsx file has been restored. a. Right-click 2023Report.xlsx and then select Properties. b. In the top right, select Answer Questions. c. Answer Question 2. d. Select Score Lab.

You work as the IT security administrator for a small corporate network. The employee in Office 1 is working on a very sensitive project. Management is concerned that if the hard drive in the computer were stolen, sensitive information could be compromised. As a result, you have been asked to encrypt the entire System volume. The Office1 computer has a built-in TPM on the motherboard. In this lab, your task is to configure BitLocker drive encryption as follows: From within the computer's BIOS, turn on and activate TPM Security. From Windows, turn on BitLocker for the System (C:) drive. Back up the recovery key to the \\CorpServer\BU-Office1 folder. Encrypt the entire System (C:) drive. Use the new encryption mode. Run a BitLocker system check.

1. Optional and not needed. Go to step 2. 2. Access the BlOS settings. a. Right-click Start and then select Shut down or sign out > Restart to reboot your computer. b. When the TestOut logo appears, press Delete or F2 to enter the BIOS. 3. Turn on and activate the TPM. a. From the left pane, expand and select Security > TPM Security. b. Select TPM Security and then select Apply. c. Select Activate and then select Apply. d. Select Exit. Your computer will automatically reboot. 4. Turn BitLocker on. a. From the taskbar, select Search. b. In the Search field, type Control C. From Best match, select Control Panel. d. Select System and Security. e. Select BitLocker Drive Encryption. f. Under Operating system drive, select Turn on BitLocker. Windows begins the Drive Encryption setup. 5. Back up a BitLocker recovery key. a. Select Save to a file. b. From the left pane, expand and select Network > CorpServer > BU-Office1. c. Select Save. d. Select Next. 6. Configure BitLocker encryption. a. Select Encrypt entire drive and then select Next. b. Make sure that New encryption mode is selected and then select Next. c. Select Run BitLocker system check and then select Continue. d. Select Restart now. The computer will reboot, and the encryption process will run automatically. e. When the encryption process is complete, select Close. 7. Verify that encryption is enabled. a. From the Windows taskbar, select File Explorer. b. From the left pane, select This PC. c. From the right pane, verify that the System (C:) drive shows the encryption lock icon.

Continued

4. Provide power to the computer and turn it on. a. Above the computer, select Back. b. Select the power button on the power supply to provide power to the computer. c. Above the computer, select Front. d. Select the power button on the computer to turn it on. The computer boots, but no bootable device is found. 5. Check for proper SATA cable connections. a. From the upper left, select Workbench. b. Select the power button to turn the computer off. c. Above the computer, select Motherboard. d. For the top disk, select the SATA cable. Notice that the other end of the cable is disconnected. e. From the Selected Component pane, drag the Connector, SATA, 7-pin connector to a SATA port on the motherboard. 6. Test the solution. a. Above the computer, select Front. b. Select the power button on the computer to turn it on. The computer boots to Windows. c. From the taskbar, select the File Explorer icon. d. From the left pane, select This PC. e. Under Devices and drives, verify that all the drives are shown (three hard drives and an optical drive).

In this lab, your task is to diagnose and correct the problems with this system. You'll know that you've successfully corrected all the problems when: All the drives are recognized in the BIOS. The computer recognizes all the components in the BIOS (including the correct amount of memory).As part of your diagnoses, boot the computer into its BIOS setup (when possible) and answer Question 1. The computer boots to Windows. Keep in mind the following when working on the system: Replace any non-working parts with spare parts from the Shelf. Do not replace working parts with parts from the Shelf. The lab should end with all original working parts installed in the computer. If you remove any working parts as you troubleshoot, be sure to replace them in the computer before ending the lab. Place any unused parts back on the Shelf.

1. Replicate the problem by turning on the computer. a. On the computer, select the power button to turn it on. A prompt is shown, indicating that the computer failed to turn on. b. Select OK to acknowledge the prompt. 2. Troubleshoot the causes of the computer not having power. a. Above the computer, select Motherboard. Notice that the 20+4 pin motherboard connector is not plugged into the motherboard. b. Select the power supply. c. From the Selected Component pane, drag the Connector, Power Supply, 20+4 pin connector to the motherboard. 3. Test the solution. a. Above the computer, select Front. b. Select the power button on the computer to turn it on. The computer attempts to boot but continues to beep. This indicates a possible problem with the memory. c. From the top left, select Workbench. d. Select the power button on the computer to turn it off. 4. Test the memory and replace it as needed. a. Above the computer, select Motherboard. b. Under Shelf, expand PC Tools. c. Drag the Memory Tester to the workspace. d. Drag a memory module from the motherboard to the Memory Tester's left slot; then select Test. e. If the memory module is bad: . Under Shelf, expand Memory Modules. " Drag a DIMM memory module to the empty slot. " Drag the bad memory module from the Memory Tester to the Workspace. f. If the memory module is good, return it to the slot from which it was removed. g. Repeat steps 4d-4f for each remaining memory module. 5. Test the solution. a. Above the computer, select Front. b. Select the power button on the computer and, as the computer boots, press F2 to load the BIOS. The BIOS opens to General > System Information. c. From the right pane, verify that there is 32 GB of DDR4 memory being recognized. d. From the top right, select Answer Questions. e. Answer Question 1. f. Select Exit.

You work at a computer repair store. A customer has just bought a used computer at a very good price. The previous owner said the computer won't start, but should have the following components: AMD Phenom II X4 quad-core processor 8 GB of DDR3 memory One SATA hard drive with Windows 11 installed One optical drive In this lab, your task is to diagnose and correct the problems with this system. You'll know that you've successfully corrected all the problems when: The computer recognizes all the components in the BIOS (including the correct amount of memory). The computer boots to Windows. Keep in mind the following when working on the system: Replace any non-working parts with spare parts from the Shelf. Do not replace working parts with parts from the Shelf.The lab should end with all original working parts installed in the computer. If you remove any working parts as you troubleshoot, be sure to replace them in the c

1. Replicate the problem by turning on the computer. a. On the computer, select the power button to turn it on. A prompt is shown, indicating that the computer failed to turn on. b. Select OK to acknowledge the prompt. 2. Provide power to the computer. a. Above the computer, select Back. b. Select the AC Power Connector plugged into the computer. c. Verify that the other end is plugged into the wall plate. d. Zoom in on the red voltage switch. Notice that it is set for 230 volts. e. Select the red voltage switch to change it to 115 volts. f. Above the computer, select Front. g. Select the power button on the computer to turn it on. A prompt is shown, indicating that the computer failed to turn on. h. Select OK to acknowledge the prompt. 3. Check the motherboard for a working CPU. a. Above the computer, select Motherboard. b. Drag the Heat Sink and Fan to the Workspace. Notice that there is no CPU installed. c. Under Shelf, expand Processors. d. Drag the CPU to the motherboard's CPU socket. e. Drag the Heat Sink and Fan to the motherboard (on top of the CPU). f. From the Selected Component pane, drag the Connector, Fan, CPU 4-pin connector to the motherboard (top right of the fan) 4. Test the solution. a. Above the computer, select Front. b. Select the power button on the computer to turn it on. The computer attempts to boot but continues to beep. This indicates a possible problem with the memory. c. From the top left, select Bench. d. Select the power button on the computer to turn it off.

You work at a computer repair store. A customer has brought in a computer for repairs. It has the following specifications: Intel i7-960 processor 16 GB of DDR4 memory Three SATA hard drives (one with the operating system installed and the others for storing data) A single SATA optical (DVD) drive You replaced the power supply in the computer, and now the computer won't boot. In this lab, your task is to diagnose and correct the problems with this system. You'll know that you've successfully corrected all the problems when: The computer recognizes all the components in the BIOS. The computer boots to Windows. All the drives are shown in File Explorer.

1. Replicate the problem by turning the computer on. a. On the computer, select the power button to turn the computer on. A prompt is shown, indicating that the computer failed to turn on. b. Select OK to acknowledge the prompt. 2. Provide power to the computer. a. Above the computer, select Back. b. Select the AC Power Connector plugged into the computer. c. Verify that the other end is plugged into the wall plate. d. Select the power button on the power supply to provide power to the computer. e. Above the computer, select Front. f. Select the power button on the computer to turn it on. A prompt is shown, indicating that the computer failed to turn on. g. Select OK to acknowledge the prompt. 3. Check for power to the motherboard and disks. a. Above the computer, select Back. b. Select the power button on the power supply to turn it off. c. Above the computer, select Motherboard. d. Select the power supply. Notice that the motherboard has no power connector attached. Also notice that the primary disk has no power attached either. e. From the Selected Component pane: . Drag the Connector, Power Supply, 8-pin CPU connecter to the power port (upper left) on the motherboard. " Drag an unconnected Connector, SATA, 15-pin cable to the top disk (the left port).

You work at a computer repair store. A customer brought in a computer and asked you to upgrade the motherboard. You replaced the motherboard with a newer model, but now the computer will not boot. In addition to the new motherboard, the computer currently contains the following: Intel i7-960 processor 12 GB of DDR3 memory Two SATA hard drives (one with the operating system installed and the other with a single volume for storing data) A single SATA optical drive In this lab, your task is to diagnose and correct the problems with this system. You'll know that you've successfully corrected all the problems when: The computer boots to Windows and stays powered on. The computer recognizes all the components in the BIOS (including the correct amount of memory). All the drives are shown in File Explorer.

1. Replicate the problem described in the scenario. a. On the computer, select the power button. b. Select OK to close the prompt indicating that the computer failed to run. This is most likely due to the computer not getting power. 2. Provide power to the computer. a. Above the computer, select Back. b. Select the AC Power Connector (Female) that is currently plugged into the power supply. Notice in the Selected Component area that the other end is not connected. c. From the Selected Component pane, drag the AC Power Connector (Male) to an open outlet on the wall plate. d. Above the computer, select Front and then select the power button. The computer still won't start. e. Select OK to close the prompt. 3. Connect the case's power switch to the motherboard header. a. Above the computer, select Motherboard. Notice that under Partial Connections for the computer, the system case is shown. b. Under Partial Connections for the computer, select the system case. c. From the Selected Component pane, drag the Connector, Case, Power Switch to the motherboard header (bottom right). If needed, select the motherboard and then, in the Selected Component pane, select Details for the motherboard. Then select the Specifications tab to view the motherboard details in order to find the connection areas. d. Above the computer, select Front and then select the power button. The computer boots to Windows, but soon powers off. This is typically caused by the computer overheating. e. Select OK to close the prompt.

You have recently completed a major project that is vital to your company's success. To ensure that this and all future data in critical areas is protected, you have decided to implement Windows backup. In this lab, your task is to: Use Windows backup to sync the following folders to OneDrive:DocumentsDesktopDo NOT back up the Pictures folder.Back up the selected folders. Turn on the feature that will remember your apps. Turn on the feature that will remember your preferences and enable:PasswordsLanguage preferences

1. Use Windows backup to sync data to OneDrive. a. Right-click Start and then select Settings. b. From the left pane, select Accounts. c. Select Windows backup. d. For OneDrive folder syncing, select Manage sync settings. e. Use the slide button to toggle syncing off for Pictures. f. Select Start backup. A prompt is shown indicating that your files are being backed up. g. Close the above dialog. 2. Turn on the feature that will remember your apps. a. For Remember my apps, slide the button to On. 3. Turn on the feature that will remember your preferences. a. For Remember my preferences, slide the button to On. b. Select the drop-down menu for this feature and then enable the following preferences: . Passwords Language preferences

Continued

4. Provide power to the heat sink and fan to prevent the computer from overheating. a. Above the computer, select Motherboard. Notice that, under Partial Connections for the computer, the Heat Sink and Fan is shown. b. Under Partial Connections for the computer, select the Heat Sink and Fan. c. From the Selected Component pane, drag the Connector, Fan, CPU 4-pin connector to the motherboard (top center). d. Above the computer, select Front. e. On the computer, select the power button. The computer powers on and stays on. 5. Verify that the memory (12 GB), two hard drives, and an optical drive are all recognized. a. Right-click Start. b. Select Shut down or sign out > Restart. c. When you see the TestOut splash screen, press F2 (or delete) to enter the BIOS settings. d. Verify that the memory (12 GB) and the two hard drives are recognized. e. Select Exit to boot to the operating system. f. From the taskbar, select File Explorer. g. From the left pane, select This PC. h. Verify that the optical drive is shown.

Continued

4. Restore the Coverart.jpg file. a. From the top left of the current File History window, select the up arrow to navigate to the Home\Pictures folder. b. Select the Next version button (the right arrow) at the bottom to navigate to the backups captured on Tuesday, March 14, 2023 10:15 AM. c. Double-click on the Images folder. d. Select the coverart.jpg file. e. Select Restore to original location (the green arrow) located at the bottom center. f. Select Replace the file in the destination. g. Right-click the coverart.jpg file and select Properties. h. Verify that the file was last modified on Tuesday, March 14, 2023 10:15 AM. i. Select OK. 5. Add a comment to the ticket and close the ticket. a. From the top left, select Floor 1. b. Under IT Administration, select ITAdmin. C. In the New Comment field of the open ticket, enter a comment of your choice to indicate that the files were restored. d. Select + (the plus sign) to add the comment. e. From the top of the ticket: . Select Closed. . Select the left arrow. There are no more tickets to be processed. f. Close Issue Trax.

Continued

5. Test the memory and replace it as needed. a. Above the computer, select Motherboard. b. Under Shelf, expand PC Tools. C. Drag the Memory Tester to the Workspace. d. Drag a memory module from the motherboard to the Memory Tester's right slot; then select Test. e. If the memory module is bad: . Under Shelf, expand Memory Modules. . Drag a DIMM memory module to the empty slot. " Drag the bad memory module from the Memory Tester to the Workspace. f. If the memory module is good, return it to the slot from which it was removed. g. Repeat steps 5d-5f for each remaining memory module. h. Drag all bad memory modules to the Shelf. 6. Test the solution. a. Above the computer, select Front. b. Select the power button on the computer to turn it on. The computer boots to Windows. 7. Verify that the memory (8 GB) and hard drive are recognized. a. Right-click Start. b. Select Shut down or sign out > Restart. c. When you see the TestOut splash screen, press F2 (or delete) to enter the BIOS settings. d. Verify that the memory (8 GB) and the SATA hard drive are recognized. e. Select Exit to boot to the operating system. f. From the taskbar, select File Explorer. g. From the left pane, select This PC. h. Verify that the optical drive is shown.

You use a Windows desktop system. You need to configure Windows Firewall to allow traffic for a newly-installed application that dynamically opens multiple ports on an as-needed basis. What should you do?

Add an exception for the application.

You have installed a new Windows system, and you have not changed the default configuration of the Windows Firewall. How will the Windows Firewall handle inbound responses to requests sent from the local system?

All such traffic is allowed by default.

You have installed a new Windows system, and you have not changed the default configuration of the Windows Firewall. How will the Windows Firewall handle inbound traffic that was initiated from an external server that a hacker is using to spread a worm?

All such traffic is blocked by default.

Windows provides several interfaces that can be used to configure the Windows Defender Firewall. Drag the Windows Firewall interface on the left to its appropriate description on the right. (Each tool may be used once, more than once, or not at all.)

Allows you to create rules based on ports. Windows Defender Firewall with Advanced Security Lets you add, change, or remove ports that are allowed through the firewall. Allowed apps Allows you to turn a firewall on or off for a specific profile or network. Firewall & network protection Allows you to create rules based on authentication. Windows Defender Firewall with Advanced Security The main interface and starting point for the other two interfaces. Firewall & network protection

Your Windows system has two volumes defined. The C: volume contains the Windows system and is formatted with NTFS. The D: volume is formatted with FAT32. Which action must you take to create a system image backup with the D: volume as the destination?

Convert the D: drive to NTFS.

Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is the MOST likely source of the problem?

Corrupt MBR or partition table

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows?

Disable and then enable devices and services one by one.

Which Group Policy setting, when disabled, forces users to update their system before the system is shut down?

Do not display Install Updates and Shut Down option in Shut Down Windows dialog box

You're the network administrator for the local hospital, and you're configuring Windows updates for the computers in the ER nurses' workstation. These computers are connected to the local network, but the configuration settings are all managed locally. You want to ensure that these computers receive the latest Windows 11 builds. Which type of update do you want to make sure is installed?

Feature updates

Which of the following are types of operating system updates for Windows 10 provided by Microsoft? (Select two.)

Feature updates Quality updates

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: Only customer data files created by the financial consultants need to be backed up. Back up data to a flash drive. Backed up files must be uncompressed. Include contact lists and desktop preferences. Which of the following backup solutions BEST meets your requirements?

File History

You are supporting a Windows computer that has two volumes: The C: drive is the system drive with user profiles and individual user files. The D: drive holds data files common to all users. System Protection has been configured as follows: A system image backup has been created that includes both the C: and D: drives. Regular backups are scheduled to back up all user libraries. The scheduled backup includes a system image. System Restore has been used to take a snapshot. A user has edited and saved a file on the D: drive. The user doesn't like the changes and wants to revert to a previous version of the file. The user goes to the Previous Versions tab of the file and sees nothing listed. To avoid this situation in the future, you must ensure that users can revert files on the D: drive to earlier versions of the file from the Previous Versions tab. What should you do? (Select two. Each answer is a complete solution.)

Modify the backup settings in Backup and Restore to include the D: drive. Enable System Protection for the D: drive.

Your Windows computer has two hard drives. The C: drive is the system drive, and the D: drive holds data files. You perform a system image backup that includes both drives using the Backup and Restore console. Your computer takes regular restore point snapshots. One day, you find that the D:\finances folder has been deleted. You check previous versions of the drive but find nothing listed. Which action can you take to restore the folder and its contents as quickly as possible?

Mount the .vhd file in the backup and copy the folder to the drive.

Which of the following is a characteristic of a virus?

Must be attached to a file or program to run.

Which statements are true regarding firewalls? (Select two.)

Network firewalls are typically implemented using hardware and positioned at the network's perimeter. Host-based firewalls are implemented using software and reside on the individual hosts within the network.

You need to back up user data on a Windows 11 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to back up user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work?

No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

You need to create a recovery drive for your Windows system. To do this, you've procured a USB flash drive with the following characteristics: USB version: 2.0 Capacity: 4 GB Can you create a recovery drive using this device?

No. The device must be 8 GB (or larger) in size.

Windows Update Delivery Optimization (WUDO) is Microsoft's approach to offering options for how systems receive updates. Which of the following are the locations provided by WUDO to receive updates? (Select two.)

Other Windows systems on the internet Microsoft Update servers

Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS?

POST

With a Windows firewall, which option best describes the role of the access control list?

Permits or denies network traffic through a firewall.

You're the network administrator for the local hospital, and you're configuring Windows updates for the computers in the ER nurses' workstation. These computers are connected to the local network, but the configuration settings are all managed locally. You want to ensure that each machine receives monthly updates to address security issues and software updates. Which type of Windows update do you want to make sure is installed?

Quality updates

You have a Windows server with Bitlocker enabled. You have just finished a complete restoration of the laptop due to a virus issue. Which of the following do you need to do in order to ensure that BitLocker is still enabled for the files and folders on your server?

Reapply BitLocker after the restoration is complete.

You have previously installed Windows 11 on two new computers and configured both computers with BitLocker. Both computers have a TPM chip installed and enabled. Because of a hardware failure, one of the computers will not boot. You replace the failed hardware, but now BitLocker is preventing the system from starting because it has failed the startup system integrity checks. Which of the following options would you use to reconfigure BitLocker so the system will start?

Recovery key

Which of the following predefined exceptions in Windows Firewall allows users to view and control remote desktops?

Remote Assistance

Which of the following types of malware are designed to scam money from the victim? (Select two.)

Scareware Ransomware

When you initially set up your Windows 11 system, you configured it to create regular backups. You have also kept an up-to-date system image. Recently, your system has been experiencing serious issues. At first, the system would boot and let you log on, but then it would crash within a couple of minutes. You tried booting from the installation DVD, clicking the Repair your computer option, and running Startup Repair and System Restore to resolve the issue. Both of these options failed to recover your system. You want to avoid losing installed applications and data. You have again booted from the installation disc. Which of the following options should you try next?

Select Repair your computer. Select Troubleshoot. Run the System Image Recovery option.

A user keeps attempting to open a text file. All that happens is a Command Prompt window flashes on screen and then disappears. Which of the following actions will help you determine the cause of this issue?

Show full file extensions.

Once a piece of malware is detected and reverse-engineered, its unique characteristics are identified. Anti-malware programs use these characteristics to identify malware. What do anti-malware programs call these unique characteristics of malware?

Signature

Marcus attempted to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue?

System Restore

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.)

System memory is initialized, verified, and allocated. The CPU and chipset are verified and fully initialized.

Which of the following BitLocker modes is the recommended option and provides the highest level of security?

TPM with PIN and startup key

Your Windows system is a member of a domain. Your IT administrator has recently set up Windows Updates to be controlled through Group Policy. After a few months, you notice that Windows Updates are not being applied automatically. What is the MOST likely reason that you are not receiving updates automatically?

The Configure Automatic Updates policy In Group Policy is disabled.

On computers with TPM chips, BitLocker can be used to encrypt the system partition and protect hard disks that have been moved to a different computer. Drag the BitLocker security component on the left to its description on the right. (Components may be used once, more than once, or not at all.)

The only option for systems without a TPM chip. Startup key Provides access to encrypted volumes if there are problems related to BitLocker as the computer boots. Recovery key A user account that can recover encrypted data from BitLocker-protected drives when the password or keys are lost. Data Recovery Agent A copy of this is saved in the TPM. PIN Must be present on a USB flash device during system startup. Startup key Without this, the system can only boot to recovery mode, and the data on the disk cannot be accessed. Recovery key

Why should you store backup media offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

You're the network administrator for a consulting firm. The network consists of: 10 laptops in the sales department 5 computers for HR 3 laptops for management 4 computers in marketing You're responsible for ensuring that these devices always stay operational and running. You also want to make sure that any Windows updates are safe for the devices before they're installed, and you've set up lab machines in IT to match the different devices in use across the firm. You now want to configure Windows Update to provide early pre-release Windows builds so you can test them before they're deployed to the network. Which of the following servicing channels should you use for the lab computers?

Windows Insider Program

You have noticed malware on your network that is spreading from computer to computer and deleting files. Which type of malware are you most likely dealing with?

Worm

You need to use command line tools to prepare the default drive on a Windows system for use by BitLocker. The new system partition should be 500 MB in size and should not be assigned a drive letter. Which command should you use?

bdehdcfg -target default -size 500

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: Boot the system from the Windows 11 installation DVD. Access the Recovery Environment. Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr


Ensembles d'études connexes

Organizational Behavior Study Guide (from McGraw Hill)

View Set

PSY 1010 Ch. 11: Social Psychology

View Set

IT Security: Defense against the digital dark arts

View Set

Spanish 101: Conjugation of verbs

View Set

Ameritech COTAC II Winter 2021: Exam 4 quizzes

View Set