A+ Practical Unit 12
You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidentally delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files? -Create a network share to which Lily can copy her files -Purchase a third-party backup software -Configure scheduled disk maintenance -Back up her files using File History
-Back up her files using File History
You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration Which advantages would you gain by switching to Active Directory? (Select TWO) -Centralized configuration control -Centralized authentication -Increased local control of workstation settings -Reduced need for specialized hardware -Decreased implementation cost
-Centralized configuration control -Centralized authentication
You are an IT Technician for you company. Jodie, a receptionist, think her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running? (Select TWO) -Users -Processes -App history -Details -Services -Performance
-Performance -Processes
What is the purpose of the Microsoft Management Console (MMC)? (Select TWO) -Display statistics that ell you about the operation of your computer -Process request from other applications or users -Provide a shell for running snap-ins -Provide a common user interface for performing system administration task -View historical data that describes the operating system's stability
-Provide a common user interface for performing system administration tasks. -Provide a shell for running snap-ins
Which of the following paths open the Computer Management tool in Windows 10? (Select TWO) -Right-click the Windows icon and select Run. Then enter cmd in the Run field. -Right-click the Windows icon and select Computer Management -In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon -Right-click the Windows icon and then select System
-Right-click the windows icon and select computer management. -In the control panel, open system and security > administrative tools and then double-click the computer management icon
You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select TWO) -Task Manager -Performance Monitor -Disk Management -Services -Device Manager
-Task Manager -Performance Monitor
Which port does Telnet use? -34 -23 -80 -25
23
Which port must be opened in the firewall of a Windows system in order Remote Desktop connections to be established with it? -23 -123 -3389 -22
3389
Domain Controller
A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources.
When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use? -A runaway application does not respond to user input - The operating system needs to be rebooted - A user accidentally sends a large job to a printer - A remote desktop connection needs to be closed
A runaway application does not respond to user input
You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business? -A domain -A forest -A tree -A workgroup
A workgroup If you only have five PCs and the network is not growing, a Windows workgroup will let you organize your computers in a peer-to-peer network. This workgroup network lets you share files, internet access, and printers between the five employees A domain would do the same thing, but in this case, it is not a good idea because Windows Server brings in a bunch of new costs and complexity that probably wouldn't pay off for such a small company. In addition, you are introducing a single point of failure, the server. Trees and forests are subsets, or components, of a domain.
You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decided to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.
Accounts
What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information? -Access -SQL -Active Directory -Active Desktop
Active Directory is the centralized database that is included with the Windows Server operating system. is used to store information about a network, such as user accounts, computers, printers, and security policies
You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of? -Administrator -Guest -Users -Power Users
Administrators
A user works primarily in you organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration?
Administrators Remote Desktop Users
While using the new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.
Buttons
You want to make sure that you always have the latest patches installed on you workstation for an order entry application created by DataComLink corporation. What should you do? -Download any patches from the company as you are notified of them -Check the DataComLink Website regularly for patches and updates to the software -Configure Windows Update to download and install updates automatically -Configure Windows Update to download updates for other Microsoft products when Windows is updated -Configure the application to automatically download and install updates as they are released
Check the DataComLink Website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.
You want to configure your Windows 10 workstation such that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft.
Choose how updates are delivered
Which category can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer? -Advanced System Settings -Appearance and Personalization -Clock and Region -Administrative Tools
Clock and Region
Domain
Collection of network resources
Forest
Collection of related domain trees
You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do? -Configure visual setting to optimize performance -Add an additional drive to the system and configure a new Storage Space using the files from the old D:\drive -Configure indexing to include the D:\Drive -Configure Work Folders for the folders on the D:\drive
Configure indexing to include the D:\drive
You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager? -Services -Component Services -System Configuration -Control Panel
Control Panel
What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?
DRM
You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach? -Domain Security Policy -Group Security Policy -Default Domain Policy -Group Domain Policy
Default Domain Policy Contains a policy you can enable for all computers in a domain that prevents anyone from trying multiple passwords to see if they can guess login information
Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue. What should you do next? -Deploy the hotfix on a test computer -Deploy the hotfix for users who have experienced problems -Wait until the next service pack comes out -Deploy the hotfix immediately on all company computers
Deploy the hotfix on a test computer.
On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?
Details
You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do? -Configure UAC to Never notify -Disable Secure Desktop -Disable UAC -Configure UAC to Always notify
Disable Secure Desktop Explanation: When you select the Notify me only when programs try to make changes to my computer (do not dim my desktop) option, the following happens: -Notification happens when programs makes changes -Notifications does not occur when you make changes. -The desktop is not dimmed, which means Secure Desktop is disabled
You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do? -In the Control Panel, select System and Security and then System. Click System protection -Edit settings in the Local Security Policy -In the Control Panel, select Programs, then Programs and Features -In the Control Panel, go to System and Security, then System
Edit settings in the Local Security Policy
Description of how the setting is enforced Causes the policy to be enforced Does not change the current setting for the policy Prevents the policy from being enforced
Enabled Not configured Disabled
You proved desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding you directions and is becoming frustrated. What should you do? -Tell the user to wait until you are scheduled to be in that location -Establish a Remote Desktop connection and update the driver -Drive to the other location as soon as possible and update the driver -Escalate the call to another technician or your supervisor
Establish a Remote Desktop connection and update the driver
You proved desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding you directions and is becoming frustrated. What should you do? -Establish a Remote Desktop connection and update the driver. -Schedule the user to get more training on using the application -Drive to the other location as soon as possible and then watch as the user performs the task 0Establish a Remote Desktop connection and perform the task on the user's system
Establish a Remote Desktop connection and update the driver.
A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option To determine whether the policy is enabled, where should you look next? -The Default Domain Policy GPO -GPOs linked to organizational units that contain this user's object -The Local Group Policy -GPOs linked to the domain that contains this user's object
GPOs linked to organizational units that contain this user's objects You should look at GPOs linked to organizational units that contain this user's object to see where the Hide Programs and Features Page policy might be enabled. If the policy was enabled in a GPO linked to the domain, it would be applied to all users in the domain. The next level GPOs are applied from is GPOs linked to organizational units that contain the user's object
On a Windows system, which of the following is true of groups? -Users and local resources, such as printers and shared folders, can be made members of a group. All Group members have access to all resources in the same group -Group members have the access rights assigned to the group -A group allows multiple users to share a single logon -Users can log on as the group and have all access rights assigned to the group
Group members have the access rights assigned to the group
Tree
Group of related domains
A user calls to report a problem. She is trying to install an application on a Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue? -Only apps from the Microsoft Store can be installed on a Windows 10 system -The application is incompatible with Windows 10 -She is not a member of the Power Users group -Her group membership does not allow her to install new software
Her group membership does not allow her to install new software
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis? -Kernel fix kit -Targeted software patch -Hotfix -Service pack
Hotfix
Page file usage
Identifies the amount or percentage of the page file that is being used.
You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enabled UAC on the laptops? (Select TWO. Each choice is complete solution.) -In the Control Panel, select User Accounts and then Credential Manager -In the Control Panel, select System and Security and then System. Click System protection. -In the Control Panel, select User Accounts and then User Accounts -In the Control Panel, select System and Security and then Security and Maintenance -In the Control Panel, select System and Security and then System. Click Advanced system settings
In the Control Panel, select User Accounts, then User Accounts. In the Control Panel, select System and Security and Maintenance.
Which of the following actions directly improves system security on a Windows workstation? -Disable automatic reboot on error -Install the latest updates -Create a password reset disk -Create regular restore points
Install the latest updates
Don is an accountant in the Finance department, and for the last several months has been testing an online account program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. After downloading, Don tries to install the application on his Windows 10 workstation, but the operating system does not allow it. Out of frustration, he calls the Help Desk. The Help Desk personnel comes to Don's machine and installs the application without issue. Which of the following is the most likely reason Don could not install the application? -Insufficient system RAM -Insufficient disk space -Insufficient permissions -Failed device Driver
Insufficient Permissions
You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer? -Local Group Policy Editor -Windows Firewall -Control Panel -Programs -Settings
Local Group Policy Editor the administration tool used to enable local computer behavior polices and the tasks users are allowed to perform
Organizational Unit
Logical organization of resources
You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want on location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability? -MSTSC -MSINFO32 -SERVICES.MSC -MMC
MMC
Which utility allows you to choose Selective Startup in Windows? -Performance Monitor -Msinfo32 -Event Viewer -Regedit -Msconfig (System Configuration)
Msconfig
Which tool can you use to view (but not modify) hardware and configuration information for your computer? -The System applet in Control Panel -Msinfo32 -Event Viewer -Msconfig
Msinfo32
Objects
Network resource in the directory
One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model? -Personal -Persistent -Enterprise -Proprietary -Open source
Open source
You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.
Performance
You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctions application. To help troubleshoot Rachel's computer you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how her computer is running? (Select TWO)
Performance Processes
Which tool can you use to gather and display statistics that hep you monitor the operation of a Windows system? -Event Viewer -Performance Monitor -MSinfo -Computer Management
Performance Monitor
While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this
Pointer Options
Which tool lets you view and directly edit the registry? -System Configuration Utility -Control Panel -Msinfo32 -Regedit
Regedit
A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO) -Rename the Administrator Account -Disable the Guest Account -Move all accounts in the Administrators group to the Users group -Remove the Power Users group -Move all accounts in the Guest group to the Users group
Rename the Administrator account Disable the Guest Account Explanation: When securing a Windows computer that is in a home office and not part of a domain, a best practice is to rename the Administrator account and disable the Guest account. Beginning with Windows Vista, the Power Users group is only present for backwards compatibility with previous versions. It has not bearing on the security of a Windows computer. Moving all accounts in the Administrators group to the User group will eliminate the ability of the account to perform administrative functions. Moving all accounts in the Guests group to the User group may not change the effective security of the accounts, but the profiles for these accounts will not be deleted when the users sign out.
Site
Represents a group of networks that are connected with high-speed links
Subnet
Represents a physical network segment.
Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
Resource Monitor (Performance Monitor)
Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running? -Right-Click >Stop -Right-click > Disable -Right-click >Switch to -Right-click > End task -Right-click >Disconnect
Right-click > End Task
Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization Which of the following actions can you take from Task Manager to stop the application from running?
Right-click > End task
Which of the following can be used to create a secure connection to a remote server? -FTP SSH -ICMP -SMTP -Telnet
SSH
Which of the following network services or protocols uses TCP/IP port 22? -TFTP -IMAP4 -SSH -NNTP
SSH
Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her Mac? -Screen Sharing -Telnet -Remote Desktop Protocal -SSH
Screen Sharing
A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution? -Require strong passwords -Change the default account names and passwords -Set login time restrictions -Restrict user permissions
Set login time restictions
You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.
Startup
Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? -Programs -Device Manager -Troubleshooting -System
System
You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from you office.
System and Security
A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change? -System Properties > Advanced -System Properties > System Protection -System Properties > Computer Name -System Properties > Remote
System properties > computer name tab lets you view, change, or join a computer to a domain
You manage a Windows system. You want to view information about all of the programs running on your systems and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?
Task Manager
Your computer has a quad-core processor that supports multi threading installed. Given that the system is running Windows, how can you verify whether multi threading has been enabled? -Task Manager can report CPU utilization values up to 800% -Task Manager will show a single process running on multiple processors simultaneously -Task Manager will show each application running with two processes -Task Manager can display CPU utilization graphs for eight processors
Task Manager can display CPU utilization graphs for eight processors.
Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)? -Task Manager -Disk Management -Event Manager -Task Scheduler
Task Scheduler
You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? -msconfig -msinfo32 -Task Manager -Services -Task Scheduler
Task Scheduler
You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? -Services -Startup folder -Task Scheduler -Msconfig
Task Scheduler
The Hide Programs option setting is configured for a specific user as follows: Policy Setting Local Group Policy Enabled Default Domain Policy GPO Not configured GPO linked to the user's OU Disabled After logging in, the user is able to see the Programs option. Why does this happen? -The GPO linked to the user's organizational unit is applied last, so this setting takes precedence -The Local Group Policy is applied last. It is set to Enabled, which makes the Programs option visible -The Default Domain GPO is applied last. It is set to Not configured, so it doesn't change the configuration. -The GPO linked to the user's organizational unit is applied first, so this setting takes precedence over settings that are applied later.
The GPO linked to the user's organizational unit is applied last, so this setting takes precedence The GPO linked to the user's organizational unit is applied last, so the setting that disables the policy to the hide the Program and Features page takes precedence. In this question's scenario, Local Group Policy enables the policy to hide the Programs and Features page. When the Default Domain Policy GPO is applied, this policy is set to Not configured, so it doesn't change anything. When the GPO linked to the user's organizational unit is applied, the setting for this policy is disabled, which reverses the setting in the Local Group Policy and makes the Programs and Features page visible to the user. The Local Group Policy is applied first. GPOs linked to the user's domain are applied second and take precedence over settings in the Local Group Policy. GPOs linked to the user's organizational unit are applied last and take precedence over any preceding policy settings.
Commit charge
The amount of memory that has been assigned to running processes
Disk time
The amount of time that the disk subsystem is busy reading from and writing to disk.
Processor utilization
The amount of time the processor spends performing non-idle tasks.
Forest Root Domain
The first domain created in an Active Directory forest.
Tree Root Domain
The highest level domain in a tree
Memory pages per second
The number of hard faults that occur each second.
Disk queue length
The number of read and write requests that are waiting to be processed.
Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select TWO) -They are moving to strengthen the encryption used to protect their digital files -They are adopting alternatives to DRM such as encouraging customers to not illegally share files -They are offering free backup copies of protected digital files -They are cooperating with other vendors to make their digital files more portable to other vendeos' hardware and software -They are moving away from DRM because of several key shortcomings in the technology
They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files. They are moving away from DRM because of several key shortcomings in the technology.
You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards? -Personalization -Apps -Time & Language -Devices
Time and Language
Your computer seems to be running slow. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem?
Use Task Manager to monitor memory utilization. Use Resource Monitor to monitor memory utilization.
Which Windows component prompt the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation? -Windows Defender -User Account Control (UAC) -Windows Firewall with Advanced Security -Windows SmartScreen
User Account Control (UAC)
You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of? -Guest -Administrators -Users -Remote Desktop Users
Users
What is the purpose of the Services snap-in? -View historical data that describes the operating system's stability -View logs about programs, system events, and security -View and manage software programs running in the background -Display statistics that ell you about the operation of your computer -Manage end-user applications running on your computer
View and manage software programs running in the background
What is the purpose of the dxdiag tool? -Configure your system to enable optimal troubleshooting and diagnosis of technical issues. -View information related to DirectX operation -Gather information about you computer and diagnose issues with your computer -View logs about programs, system events, and security
View information related to DirectX operation
Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.
View your update history
You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? -Antivirus updates -Scheduled backups -Scheduled disk maintenance -Windows update
Windows updates
Which of the following is true of online software activation? (Select THREE) -Before running a newly installed application, the user must activate their license online on the software vendor's website -Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations -The software vend does not track how many times each license code is activated, but uses persistent activation to annually audit the number of licenses being used -With personal software licenses, the limit is usually one to three online activation -With enterprise licenses, the software vendors tracks how many times each license code is activated and automatically charges the enterprise for activations above the license limit -Persistent activation may require the license to be continuously re-activated online at a preconfigured interval
With personal software licenses, the limit usually 1-3 online activations. Before running newly installed application, the user must active their license online on the software vendor's website. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval.
You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies? 1) ps -e 2) dpkg install httpd 3) ps -ef 4) yum install httpd -dep 5) yum install httpd -dep 6) apt-get install httpd
apt-get install httpd Explanation On a Linux distribution that uses Debian Package Manager (dpkg) for package management, entering apt-get install httpd at the command line will install the Apache HTTP Server package and all its dependencies. The apt-get command can automatically locate and download Debian packages for you by searching one or more repositories on the Internet. It installs the package and all of its dependencies at the same time.
You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task? -gpupdate -gpresult -asoc -popd -fsutil
gpupdate Refreshes the local and Active Directory-based Group Policy settings, including security settings.
Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management? 1) ps -ef 2) yum process info 3) apt-get -ef 4) apt-get -e 5) yum -e 6) yum info 7) yum -ef 8) ps -e
ps -e Explanation The ps utility is used to display running processes on a Linux system. Entering ps -e will display a simple list, without extended information, of all processes running on the system.
You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies? 1) apt-get install httpd 2) yum update httpd 3) yum install httpd 4) apt-get update httpd 5) yum install httpd -dep
yum install httpd
You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system?
yum list available Explanation On a Linux distribution that uses RPM for package management, entering yum list available at the command line will display a list of all packages available for installation within the Internet repositories yum is configured to use on this system.
You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation withing the Internet repositories configured on this system? 1) apt-get list 2) yum show all 3) ps -e 4) apt-get list available 5)yum show available 6) yum show available 7) yum list all 8) ps -ef
yum list available Explanation On a Linux distribution that uses RPM for package management, entering yum list available at the command line will display a list of all packages available for installation within the Internet repositories yum is configured to use on this system.
You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed? 1) yum list installed 2) yum list installed httpd 3) yum search httpd 4) yum info httpd
yum list installed httpd Explanation On a Linux distribution that uses RPM for package management, entering yum installed httpd at the command line will check to see if the Apache HTTP Server package is installed.
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO) -You expose your company to litigation by violating the software license agreement -The software company will never detect the violation, so negative consequences are unlikely -Because you should be allowed one to three activation per user, this decision does not put you at risk for negative consequences -You risk losing your job -The software will eventually stop working properly for the 10 extra updates you installed
• You risk losing your job. • Your company is exposed to litigation by violating the software license agreement.