Module 9 Performance Tuning and System Recovery / Module 10 Enterprise Computing

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following best describes a set of performance indicators captured when system performance is acceptable, effectively defining normal performance?

A baseline

Which of the following can be used to restrict the installation of a USB drive on a Windows 10 computer?

A device identification string

Running fewer applications at once is a way to resolve which type of bottleneck?

A memory bottleneck

Which of the following is bootable media that you can use to repair or reinstall Windows 10?

A recovery drive

Instead of logging performance counters to disk, you can configure which of the following to occur?

Alerts

Malaika is troubleshooting an issue on a Windows 10 computer using Event Viewer. In the application log, she can find several entries for several events. She wants to limit this and only see errors. Which of the following filter options should Malaika use?

Filter by Event level

Saeju is using video editing software to edit large video files to create a short movie. The application keeps freezing on his Windows 10 computer. Upon investigating the issues, he finds that the paging file is huge, and reading it from the SSD takes a lot of time. What should Saeju do to resolve this issue?

He should increase the amount of physical memory.

Guocheng, a system administrator, is testing the network at his organization to identify performance issues. He is using Resource Monitor on a Windows 10 system to identify whether the network subsystem is a bottleneck. Which of the following would indicate that the network connection between the local address and a remote address is oversaturated?

High packet losses

You and your friends decide to start up a small company that provides web-based services. You are a team of five working out of a basement. You need to set up email accounts and purchase cloud storage. Which of the following cloud services would be the most cost-effective for you?

Microsoft 365 Business

Which of the following can be used to handle domain-joined desktop computers?

Microsoft Endpoint Configuration Manager

Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?

Multimaster

Each domain can be subdivided into which of the following that allows you to organize the objects in a domain?

Organizational units (OUs)

Parth is using Steps Recorder to capture the steps that are causing an application to malfunction. After capturing the necessary steps, he can send the report to the IT team so that they can troubleshoot the issue. He is not sure if Steps Recorder will capture all of his actions that are causing the application to fail. Which of Parth's interactions with the application is unlikely to be captured by Steps Recorder?

Parth typing text in the application

Yunha, a college student, uses a Windows 10 laptop to study and play games. During the past month, Yunha updated the operating system and drivers on his laptop. Some of the games began crashing after these updates. Which of the following tools should Yunha use to identify the underlying issue?

Reliability Monitor

Selecting a counter displays information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?

Report

Glenda is using a speech-to-text program on her Windows 10 laptop to dictate notes. After completing this task, she switches to other tasks but leaves the speech-to-text application open in the background. When she tries dictating notes again after a couple of hours, she is unable to interact with the application. She opens Task Manager to check if the associated process for the application is still running or suspended. Under which header on the Details tab is Glenda most likely to find this information?

Status

Ablorde, a programmer, installed a new code editor on his laptop. After the installation, he is prompted to restart the laptop. He notices that the code editor has a registry key in the following location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce. What does this most likely indicate?

The code editor will run a configuration routine after the next restart.

Rodriguez returns to his office after taking a sabbatical. When he tries to connect his Windows 10 workstation to the organization domain, authentication to Active Directory is unsuccessful. Identify the issue that could have caused the authentication to fail.

The time on the computer was 10:00, and the time on the domain controller was 10:08.

Linda works as a network administrator in a multinational corporation. It has come to her notice that some updates lead to a significant computer downtime because they are either incompatible or not installed properly. In order to resolve this issue, she decides to use the Windows Server Update Services to control the updates that are sent to the computers. How would this move help resolve the current issue?

Updates can be tested before they are applied.

Yemi, a software developer, uses a Windows 10 PC at home. She usually runs several resource-intensive applications on her system. Her PC crashed and failed to restart, so she decided to use WinRE to troubleshoot and repair the PC. She has a recovery DVD that she wants to use to perform the recovery. Which of the following options in WinRE should Yemi select?

Use a device

Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually?

WSUS

Melita recently purchased a new Windows 10 laptop because her old laptop crashed. To ensure that her data is protected, she enables system protection on her laptop. Which of the following is true of this scenario?

When the storage space dedicated to restore points becomes too large, the oldest restore point is automatically removed.

Which Active Directory component is responsible for authenticating users when they sign in to a workstation?

Domain controllers

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, to take control of systems?

DEP

When a printer is plugged into a Windows 10 computer, which of the following is used to identify the appropriate driver?

Devices & printers folder


संबंधित स्टडी सेट्स

Organizational Behavior, Chapter 12: Power, Influence, and Politics, Business Management Final-In Class Notes&Homework, Organizational Behavior Chapter 12 Quiz, Power, Influence and Politics, Principles of Organizational Behavior

View Set

MIS Chapter 6 - Foundations of Business

View Set

Chapter 6 Lesson 2 Preparing Your Résumé

View Set

Chapter 27: Republican Resurgence and Decline

View Set

AIS Chp. 18 Genral Ledger and Reporting System Quiz

View Set

Chapter 10: The late 1960s, Chapter 9: The 1960s, Chapter 8, Ch 7 Postwar Era, Chapter 6

View Set

Unit 12 Phys, Diagram of a Contractile Myocardiocyte Action Potential

View Set

Gas Law Problems, Gas Laws, Gas Laws

View Set

Fuentes Primarias: Bartolomé de Las Casas y el legado de Colón

View Set