CpS 201 Quiz 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Joshua, a systems administrator, is configuring new Windows 10 laptops. He is creating new local users on each laptop. He realizes that two users have the same name, Miguel. He uses the name Miguel for one user.Which of the following is a valid user name that he can create for the second user?

MigueL

Which of the following is used to protect your computer from malware that may attempt to steal your password?

Secure sign-in

The engineering department of a neighboring university is looking to upgrade the operating systems used in its laboratory computers. These computers have many 16-bit engineering applications installed. The university does not have the funding to replace or upgrade the existing 16-bit software.Which of the following versions of Windows 10 Pro should the university buy for the lab computers?

The 32-bit version

Luis, a computer support specialist of a small tax consultancy, is manually installing Windows 10 on all the new computers in the company using the DVD boot installation method.At what point during the installation should Luis insert the installation DVD in the DVD drive?

Before starting the computer

You have installed new antivirus software in your Windows 10 computer. How will you ensure the service associated with the software is configured to start when Windows boots?

By checking if the startup type for the associated service is set to Automatic

Which account is the most powerful local user account possible?

Administrator

An Administrator account derives its privileges from being a member of which local group?

Administrators

Identify a difference between a standard user account and an administrator account.

An administrator account can update device drivers, whereas a standard account cannot.

Which of the following protocols is used for resolving host names to IP addresses?

DNS

Identify the default settings that can be used to control the methods used for encryption in IPSec connections.

Data protection

What does Windows need to manage and communicate with hardware components?

Device drivers

Which of the following commands will you use if you are asked to check the connectivity between two Windows 10 computers connected to a local network?

ping

Which tool should you use to configure computers to communicate with external disks over standard Ethernet networks?

iSCSI Initiator

You have a computer that runs on a Windows 10 operating system and supports Modern Sleep. What will happen if you close the lid of the computer?

he computer will be put in sleep mode.

If you want to configure authentication to Windows 10 or create and manage local user accounts, which Settings category should you open?

Accounts

Where should you go on the Windows 10 desktop if you want to see important notifications from the operating system?

The Action Center

Which of the following commands will you use to check the basic connectivity between your computer and a computer with the IP address 192.168.1.100? You need to send a minimum of six requests.

ping 192.168.1.100 -n

Which of the following is the CIDR notation of 255.255.255.0?

/24

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

10

Venona Inc., a food processing company, buys laptops that have the 64-bit version of Windows 10 preinstalled. On the first day of use, employees run into issues with the new laptops. They are unable to use a critical 16-bit business application that they were using without issues on their previous computers.Which of the following is the most likely reason the employees are not able to run the business application?

16-bit software cannot run on a 64-bit version of Windows 10.

How much RAM is supported by the 32-bit version of Windows 10?

4 gb

Talal, an IT administrator, sets up a KMS server in his organization to enable KMS activation of Windows 10 licenses. The organization buys 20 new computers with generic volume license keys (GVLK) configured. Two days after the purchase, Talal tries to activate these 20 computers using the KMS server, but the licenses are not activated.Which of the following is a reason for the activation failure?

A KMS server has a minimum activation threshold of 25 instances for Windows 10.

Which of the following is essential for the communication between a newly installed printer and the Windows 10 operating system?

A device driver

Which of the following terms is a collection of computers and users that are identified by a common security database?

A domain

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?

A domain network

Which of the following can be used in an advanced authentication method?

A fingerprint reader

Which of the following illustrates the use of a domain network?

A group policy setting is used to update the settings of all computers in the network.

Which of the following is responsible for enabling communications between Windows 10 and the network device(s) in your computer?

A network driver

Which location type is used when a computer is connected as part of a peer-to-peer network in a trusted location?

A private network

Which location type is used when a computer is connected in an untrusted public location, such as an airport?

A public network

Which profile is different from other profiles because it is not a complete profile?

A public profile

As a systems administrator, you are asked to set up an infrastructure that would allow employees to use any computer, and the files that a user stores on one computer should be available on any other computer that he or she signs into.Which of the following user profiles will you configure for the user accounts?

A roaming profile

Which profile is stored in a network location rather than on the local hard drive?

A roaming profile

Which of the following is a type of Windows application that runs in the background without user interaction?

A service

What does Windows Hello store when biometric authentication is being configured?

A unique pattern

Which of the following are required for individuals to sign in to Windows 10 and use resources on the computer?

A user account

If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?

APIPA

Which of the following options in the Settings window must be selected to view speech recognition settings?

Apps

Which of the following can be used to configure a dynamic IPv4 address in a Windows 10 computer?

Automatic assignment

Members of which of the following groups can back up and restore all files and folders on the computer?

Backup Operators

After too many sign-in attempts, one of your colleagues has been blocked from using her Windows 10 user account. As a systems administrator, you need to help resolve this issue.How will you help her sign in using the computer management administrative tool?

By deselecting the Account is locked out option

The device driver does not have a valid digital signature.

By staging the driver in the driver store

Geeta downloads a free music player and installs it on her computer. The computer runs on a Windows 10 operating system. When she tries to play a song on her computer, the audio file opens in the audio player that comes with Windows 10 instead of the new music player.What should Geeta have done to avoid this issue?

Change the default apps settings

Karen has installed a new router for her home network. She connects her Windows 10 computer and smartphone to the Wi-Fi to access the Internet. The next day, when she tries connecting to the Internet, she gets the error message "Check your Internet connection and try again."Which of the following should Karen do first to troubleshoot the issue?

Check if the wireless radio on her computer is turned on

You are having trouble with a printer installed on your system. The network administrator in your organization asks you to remove the device so that he can reinstall the printer.Which of the following categories will you select to follow the recommendation made by the administrator?

Devices

Jack is looking to buy a new computer and asks his friend Antonio, a software developer, for advice. Jack wants to know if the choice of operating system will impact the applications he uses or whether he can ignore this aspect and focus on the other specifications.How should Antonio respond?

Different operating systems use different application programmer interfaces, so an application written for one operating system will not run on another operating system.

Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns.Which of the following actions can she take to ensure this?

Disable the account

Identify the cmdlet that can be used to temporarily prevent users from signing in using the account name Ignis without deleting it.

Disable-LocalUser Ignis

As a network administrator, Joshua is helping a nearby library set up a local network. He manually assigns an IPv6 address, as well as a default gateway and DNS server, to each Windows 10 computer using the Network and Sharing Center.Which of the following is true of this configuration?

Each computer in the network is assigned a static IP address.

Which of the following actions will you perform on the Windows sign-in screen if your organization uses a virtual smart card for authentication?

Enter a PIN on the sign-in screen.

Identify an administrative tool in Windows 10 that helps in the troubleshooting process.

Event Viewer

Which tool in Administrative Tools should you open if you want to view messages to troubleshoot errors?

Event Viewer

The Guest account derives all of its privileges from being a member of the Guests group and which other group?

Everyone

Which of the following is a biometric authentication method supported by Windows Hello?

Facial recognition

Which Windows 10 feature ensures that a second user can sign in to a locked computer without signing out the first user and losing their work?

Fast user switching

In which of the following power states is the operating system not running and no power supplied to any devices in the computer?

G3 Mechanical Off

Assume that you work as a network administrator. A colleague approaches you with an issue that he is not able to access the company's services on the server. After troubleshooting, you identify the firewall as a possible cause for the issue. To confirm this, you need to verify the firewall configuration in your colleague's computer.Which of the following cmdlets will you use for this purpose?

Get-NetFirewallRule

Which of the following cmdlets can you use to check if the Windows event log is running?

Get-Service

A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on all the computers. The administrator wants all the computers in the new office to have a consistent configuration.

Group Policy

Ricky enables dynamic lock authentication on his computer using his mobile device. He walks around his cubicle without locking his computer. When he returns to his seat, he notices that the computer did not automatically lock the screen.Why do you think this happened?

His mobile device was within the range of the computer.

SpeedNet is an Internet service provider. It provides Wi-Fi services to its subscribers at several cafes, restaurants, and other public places. When a subscriber moves from one place to another, the subscriber's Windows 10 laptop can automatically detect the network and connect to it.Which of the following is the company using to offer wireless connectivity?

Hotspot 2.0 technology

What is the name of the power state in which the computer is in the S3 state, but prepared for the S4 state?

Hybrid sleep

The two most common mechanisms for sharing an IP address are a router or which of the following?

ICS

Which of the following statements about domains is true?

If a domain user account needs to be removed, it has to be removed only from the domain database on the domain controller and not each domain member computer.

Igneta intends to install Windows 10 on her personal computer using a DVD boot installation. She wants to speed up the DVD boot installation process.How can Igneta do this?

Igneta can place the Windows 10 installation files on faster media such as flash storage.

Arun has purchased a new Windows 10 computer. He wants to create user accounts for his family members. Unlike previous versions of Windows, he is not able to use the User Accounts applet in the Control Panel to create new users.What do you think is the issue?

In Windows 10, the User Accounts applet in the Control Panel does not have the option to create new user accounts.

In the context of management features included in Windows 10, which of the following statements is true of Active Directory?

It allows administrators to control authentication to Windows 10 clients without manually configuring user accounts.

Which of the following statements is not true of the Administrator account?

It can be renamed.

Which of the following is not true of the Microsoft Management Console?

It does not provide basic functionality, such as menus.

Some options in the User Accounts applet has a shield displayed beside them. What does this indicate?

It indicates that those options are restricted to administrative users.

Which of the following definitions best describe a snap-in?

It is a component that adds control mechanisms to the MMC console for a specific service or object.

Which of the following is a disadvantage of using the DVD boot installation method to install Windows 10?

It offers a low degree of customization.

Which protocol is responsible for discovering network devices on the network, such as computers and routers?

Link-Layer Topology Discovery Mapper I/O Driver

Which protocol is responsible for responding to discovery requests from other computers?

Link-Layer Topology Discovery Responder

Which tool should you use to configure password policies and auditing policies?

Local Security Policy

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

Loopback address

What should you open if you want to add snap-ins to create a custom management console?

MMC

Which of the following tabs in the properties window of a user account can be used to add the user account to a group?

Member Of

Which of the following allows Windows to update in the background and place hardware devices in their lowest power states?

Modern Standby

Which of the following built-in accounts in Task Scheduler can provide access to resources in another domain?

NT AUTHORITY\NETWORK SERVICE

Which of the following allows you to configure the security settings for each location type differently?

Network location awareness

Which of the following cmdlets will you use to create local users using Windows PowerShell?

New-LocalUser

Identify the network security type commonly used by public Wi-Fi networks.

No authentication

For security reasons, MedCorp, a pharmaceutical company, blocks all inbound connections to a proprietary program installed on its employees' computers through a Group Policy. One of the employees, to override this rule, creates a rule on a local computer that allows all inbound connections to the program.Will the employee be successful in his attempt?

No, only the Group Policy-based rules will be effective.

What is used to configure data sources for applications that require access to a database?

ODBC

DSL connections usually use which protocol in order to secure connections?

PPPoE

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer?

Performance Log Users

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs?

Performance Monitor Users

If you want to change the background of your display, which Settings category should you open?

Personalization

Rules for communicating across a network that define how much data can be sent and the format of that data is known as which of the following?

Protocols

Which Windows 10 service controls the flow of network traffic?

QoS Packet Scheduler

The _____ option in the Services tool allows you to specify which action is taken after first, second, and subsequent failures.

Recovery

Which of the following cmdlets can be used to change the user account Lea to Leahona?

Rename-LocalUser

One of your friends, Steve, wants to rename a local user account using the Computer Management Administrative Tool. He opens the properties window; however, he does not find any option to rename the user account.What should he do instead?

Right-click on the user account to rename it

Each time a user logs on locally, which database is used to verify sign-in credentials?

SAM

What is expressed as the number of horizontal pixels by the number of vertical pixels?

Screen resolution

You have connected your smartphone to your home network to access the Internet. After few hours of browsing, you notice connectivity issues in your smartphone. Your friends suggest that you try resetting the network connection.Which of the following actions will you take?

Select the network in Wi-Fi settings and click Forget.

How will you configure your computer to be visible on a remembered network that is profiled as a public network?

Select the turn on network discovery option in the Network and Sharing Center.

Joanna uses a USB device to sign in to her Office 365 account. She can plug in the device on any computer with an Internet connection. However, in addition to the USB device she must also use a PIN for authentication.Identify the authentication method used by Joanna.

She is using a security key.

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?

Shift

Which of the following allows windows to quickly be resized by clicking the title bar of the window and dragging it to the top, sides, or middle of the screen?

Snap

Which of the following is true of desktop backgrounds?

Standardized desktop backgrounds have no impact on computer performance.

In Windows 10, the only supported method to configure the default profile is to use which utility?

Sysprep

The general settings for notifications, power, storage, and display are found in which category of the Settings tool?

System

Which tool lets you create system maintenance tasks that are performed on a regular schedule or when system events occur?

System Configuration

Lea, a project manager, saves project-related files in a shared folder on her computer. Some project managers are given access to this folder. She notices that one of her colleagues who did not have access to the folder was viewing one of the files on his computer. She asks Martin, the network administrator, to check if the colleague had access to the shared folder.Which section of the Computer Management MMC console should Martin access to view this information?

System Tools

Diane wants to install the 32-bit version of the Windows 10 Home edition on a computer. The computer has a 64-bit processor, 1 GB RAM, 128 GB SSD, and a DirectX 8.1 graphical processor. Diane is unable to proceed with the installation because one of the components does not meet the required installation criteria.Which of these components is causing the issue?

The DirectX 8.1 graphical processor

Which of the following obtains IP configuration information when you connect a Windows 10 computer to a cable modem?

The Dynamic Host Configuration Protocol

Marquez Consulting has a hiring plan for 20 software developers. To prepare for this, the IT team is tasked with procuring 20 new desktops. The vendor contracted by Marquez delivers 20 desktops without any operating system installed. The IT team considers using volume licensing to activate Windows 10 Pro on these laptops.What will be the outcome in this scenario?

The IT team will not be able to activate Windows 10 Pro.

Jordana, a PhD student, is using her Windows 10 laptop to write her thesis. As part of her research, she must refer to multiple documents and applications open in different windows, which makes her writing process cumbersome.Which of the following options will help Jordana preview other windows without having to switch between them?

The Peek feature

Which of the following power states represents a fully functioning computer?

The S0 state

Lorena has multiple windows open on her desktop. She wants to minimize all the windows except the currently active window.Which of the following features of Windows 10 should Lorena use?

The Shake feature

Which Windows feature includes three columns and includes Live Tiles in the right-hand column?

The Start menu

Gerrit installs Windows 10 Home edition on his personal computer. Previously, his computer was running Windows 8.1. After installing Windows 10, Gerrit attempts to run one of the applications that was previously installed on the Windows 8 system.If the application fails to run, which of the following is the most likely reason?

The application is not compatible with Windows 10.

What does a yellow exclamation mark against a hardware component indicate in Device Manager?

The component is not functioning properly.

Abdul uses his Microsoft account to sign in to his desktop computer as well as his mobile device. He uses his mobile device to change his account's password. He signs out of his computer and tries signing in again. However, he is not able to.Why do you think he is not able to sign in?

The computer was not connected to the Internet.

Lara works as a system administrator in a small start-up. The computers in her office are configured to use dynamic IP configuration. One day, the computers had intermittent Internet access, and as the administrator, she was trying to troubleshoot the issue. While the computers could not access the Internet, they were able to communicate with each another. Upon investigating, it was noted that the computers were connected to the 169.274.0.0/16 network.What do you think caused the connectivity issue?

The computers could not contact the DHCP server.

Martha sets up a local peer-to-peer network at her home office. She has five Windows 10 computers connected to the network. The computers were not able to access the Internet. Upon troubleshooting, she noticed that the packets sent from the computers were blocked by an IPv6-aware router; however, she was able to send ping requests from one computer to another.Identify the issue with the network configuration.

The computers were assigned link-local unicast addresses.

You use your domain account to sign in to your devices when you are within the premises of your organization. However, you can use the same credentials to sign in even when you have no access to the domain.How is this possible?

The credentials are stored on the domain.

Which profile is used when new user profiles are created?

The default profile

You have downloaded the latest driver for a scanner that is already installed on your computer. The computer runs on the 64-bit version of Windows 10. While you are trying to install the driver, you encounter a message that windows cannot verify the publisher of this driver software.Why do you think the computer displayed this message?

The device driver does not have a valid digital signature.

Samantha is conducting a presentation on hardware and software troubleshooting. While she is conducting the presentation using a projector screen, one of her colleagues is working on another task on her laptop. During the presentation, the slides keep moving back and forth from the screen.Can you identify the configuration issue that is likely causing this problem?

The displays are probably configured using the Extended option.

As a network administrator, Lea helps a small start-up set up a temporary network at a rented space. She configures a host computer with the IP address provided by the ISP to act as a router. Other computers in the network share the Internet connection through the host computer. After few hours, the owners of the start-up complain that they are not able to connect to the Internet.Which of the following, if true, is preventing Internet access?

The host computer was manually configured using ICS.

Xena is using a 3-year-old desktop with Windows 10 installed. When she set up the computer previously, she intended to use it for purposes that are not resource-intensive such as browsing and watching movies. Recently, she has taken a liking to gaming that requires more power and better specifications for a good gaming experience. She decides to upgrade her desktop. After upgrading the desktop, she notices that the OS needs to be reactivated.Which of the following new components most likely caused this?

The motherboard

Sasha is freelance graphic designer. She often works out of a café close to her house. The café provides free network connection for regular customers. When she tries to connect to the network using her Windows 10 laptop, she is prompted to confirm if she wants to make her laptop visible on the network. ​ Assuming this is not the first time Sasha is connecting to the network, why do you think Windows 10 prompts her with this query?

The network location awareness service in Sasha's laptop has been disabled.

The Windows 10 computers in your office are configured such that the files saved in the Documents folder can be viewed and edited by students singing in using different user accounts. The documents are visible in the Documents folder of each user.Which of the following user profiles does this configuration demonstrate?

The public profile

Nazreen, a media analyst, works on a backup computer as her laptop is corrupted. She saves her documents on the desktop and signs out. When she signs in the next day, she is shocked to see that all her files are gone.Why do you think her files were lost?

The user account she used must have been assigned a mandatory profile.

Your computer displays the date in the m/d/yyyy format. Which of the following options would you choose from the Settings window to change the format to dd-mm-yy?

Time & Language

The computer was not connected to the Internet.

To protect the computer against malware

You have created accounts for five people on a Windows 10 computer. They are able to sign in, work on files, and save them; however, they are not able to install new software on the computer.Which of the following groups do these accounts belong to?

Users

Which of the following ways of configuring a wireless network enables users to share the connection settings with Facebook contacts?

Using Wi-Fi Sense

You have configured your Windows 10 computer such that the computer enters the sleep mode after 10 minutes of idle time. However, you notice that this does not happen.What should you first do to troubleshoot this issue?

Verify the power management settings

Which feature in Windows 10 allows the user to create multiple desktops that can host different open windows?

Virtual User

When is a domain user account required for a scheduled task?

When the task needs to access network resources

Mika is on a flight to visit her parents. Before the takeoff, she is instructed to turn off her devices or put them in Airplane mode. After she gets off the flight and enters the airport, she notices that her Windows 10 laptop does not detect the public network.What do you think is preventing the laptop from connecting to the network?

Wi-Fi and Bluetooth are disabled on the laptop.

Which of the following is not one of the five mainstream versions of Windows 10?

Windows 10 Business

Primewall Informatics is an IT consulting firm that provides IT services to other companies. On one of its projects, the client requires the entire team to use computers with newly installed operating systems. The client wants to retain control over the applications that will be allowed to run on these computers.Which of the following editions of Windows 10 should Primewall choose?

Windows 10 Enterprise

Trang wants to upgrade her personal computer to Windows 10 Pro. Trang completes the upgrade without doing an installation from DVD and only by entering the Windows 10 Pro product key.From which of the operating systems did Trang upgrade to Windows 10 Pro?

Windows 10 Home

Hung, a travel blogger, documents his travels across the world on his blog. On a trekking vacation in Europe, his Windows 10 laptop falls out of his backpack and breaks, so he buys a new laptop with Windows 10 preinstalled on it. When he tries to play a movie from his hard disk, the movie file does not open. He notices that the laptop does not have Windows Media Player. He's able to play the file after downloading and installing the Media Feature Pack from Microsoft.Which of the following editions of Windows 10 is most likely installed on this new laptop?

Windows 10 Home N

Leo, an engineer at a construction firm, installs Windows 10 Home on a new laptop. He wants to connect 4 physical processors to the laptop to meet the high-speed processing requirements of his work. However, when he tries to connect the processors, his operating system does not support all the processors.

Windows 10 Home provides for only 1 physical processor.

Josephine wants to upgrade the operating system on her personal computer to Windows 10 Home.Which of the following operating systems must be currently installed on her computer for the upgrade?

Windows 7 Home

Which tool in Administrative Tools allows you to configure IPSec settings?

Windows Defender Firewall with Advanced Securit

A manufacturing company has bought a new batch of computers that run on a Windows 10 operating system. As the systems administrator, Michael needs to check if the computers support Modern Sleep.What cmdlet should Michael use for this purpose?

powercfg.exe

Identify the file extension used to save Windows PowerShell scripts.

ps1

Which IP utility is used to display response times for every router on the path to the destination?

tracert

Which of the following is a profile that cannot be modified?

A mandatory profile

An IP address is composed of a network ID and which of the following?

A host ID

Which of the following accounts will you create during the installation of Windows 10?

An initial account

Computers in your organization are facing network connectivity issues. As a network administrator, you are tasked with troubleshooting the issue. Several colleagues had complained that they were not able to communicate with a remote host outside the local network.Which of the following actions would you first take?

Check the existing IPv6 settings.

Mei, a system administrator, has installed Windows 10 on 15 computers in her company. She needs to activate the license using the Multiple Activation Key (MAK) activation method. However, the new computers do not have access to the Internet because of certain infrastructure issues.Which of the following methods should Mei use to activate the licenses without having to spend much time?

Configure proxy activation by using the Volume Activation Management Tool

Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices?

DHCP

Xervent Corp. uses the domain name "www.Xervent.com" and the IP address 172.225.120.40 to provide employees access to its services. Several employees report intermittent connectivity issues. When the network administrator troubleshoots the issue, the communication to the remote host works with the IP address but fails when the name is used.Identify the cause of the connectivity issue.

Domain name server resolution

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Guest

Which of the following allows a Windows 10 computer to act as a router to other computers?

Internet connection sharing

Millie works as a network administrator in a multinational company. She configures security rules that use IPSec to authenticate the communication between computers connected in the company's network. She configures the firewall such that outbound connections are allowed only with those computers that can be authenticated.Which of the following rule types has she used?

Isolation

Ksenia is using the DVD boot installation method to install Windows 10 on her computer. She realizes that she needs to install additional drivers during the installation of the operating system.How can Ksenia achieve this?

Ksenia can use a USB storage device to load and install these additional drivers.

You have bought a new Windows 10 desktop. While exploring your new computer, you notice that some of the visual effects that you expected to see on the computer are not being displayed. You browse the Internet to find out that Windows 10 could have disabled some of these effects as per the computer configuration.Which of the following options in Control Panel will you choose to enable them?

System and Security

Which protocol is included with Windows 10 for network communication?

TCP/IP

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?

TCP/IPv6

Steffi has a computer that runs on a Windows 10 operating system. The computer often crashes, displaying the blue screen error. One of her friends, who works as a systems administrator, tells her that the RAM may be faulty.Identify a tool that Steffi can use to check this issue.

The Windows Memory Diagnostics Tool

What is used to perform tests on the physical memory of a computer running Windows 10?

Windows Memory Diagnostics Tool

Sara, a network administrator, downloads a Windows PowerShell script that can be used to delete user accounts. She tries to execute the script through Windows PowerShell. However, the script does not run.What do you think is preventing the script from running?

he execution policy was set as Restricted.

Which of the following is a command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings?

netsh

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

peer-to-peer


Set pelajaran terkait

Chapter 6: Conducting Survey and Self-Report Research

View Set

Cognitive Psychology: Chapter 10

View Set

Finance Test: Conceptual Problems from Chapter 7,8,12,13

View Set

parole con spiegazioni 4 piante,animali

View Set