IT 116

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following allows backward compatibility in Windows 10?

.NET Framework 3.5

What is the default value for the Maximum password age setting in the Password Policy?

42 days

Which of the following best describes a set of performance indicators captured when system performance is acceptable, effectively defining normal performance?

A baseline

When a limitation in a single computer system component slows down the entire system, which of the following occurs?

A bottleneck

What type of bottleneck occurs when Windows 10 and running applications want to read and write information to the physical disk in the system faster than the disk can manage?

A disk bottleneck

An IP address is composed of a network ID and which of the following?

A host ID

Running fewer applications at once is a way to resolve which type of bottleneck?

A memory bottleneck

What type of bottleneck occurs when the applications you are running require more memory than is physically available on the computer?

A memory bottleneck

Which of the following is responsible for enabling communications between Windows 10 and the network device(s) in your computer?

A network driver

Ruzwana is a system administrator at an organization that has over 1000 employees. Each of the employees brings their own devices to work. She wants to find an efficient method that will allow her to make the various devices meet organizational standards. In addition, she would like to deploy various universal applications such as the VPN client, meeting software, and productivity software to these systems.Which of the following options should Ruzwana use to achieve the desired outcome in this scenario?

A provisioning package

Which of the following is bootable media that you can use to repair or reinstall Windows 10?

A recovery drive

Ahva purchases a new hard disk to expand the storage on her PC.In which of the following scenarios should Ahva skip initializing the disk?

Ahva intends to add the hard disk to a storage pool.

Instead of logging performance counters to disk, you can configure which of the following to occur?

Alerts

Howard's Windows 10 laptop is a few years old. Over time, his laptop has slowed down, causing performance issues, so he decides to use the Reset the PC recovery method to gain some performance improvement.If Howard chooses the Keep my files option, which of the following items is unlikely to be retained after the reset?

Application files in AppData

Ahva, a graphic designer, uses a Windows 10 PC. Her PC recently crashed, so she wants to use the Reset this PC option to recover her PC.Which of the following items will Ahva be unable to restore with the Reset this PC option?

Apps that she installed on the PC after purchasing it

You are using an MMC snap-in to troubleshoot an issue on a user's computer. The MMC snap-in is using the WinRM service to communicate between the user's computer and your computer.Which of the following is true of the security used by WinRM if the port used is 5985?

Authentication to WinRM is protected by Kerberos.

What is the preferred method to configure clients to use Work Folders?

Automatic discovery

Trisha is configuring File History for the first time on her computer. She attaches an external hard drive and configures it as the drive for File History.Which of the following is most likely to occur in this scenario?

Backup data will be added to the free space on the hard drive

Employees in your organization have been given access to Microsoft 365 apps. Their computers run on the Windows 10 operating system. As a network administrator, you need to minimize network utilization when these apps are automatically updated by Microsoft.How will you do it?

By configuring the computers to receive updates from a shared folder

Temi decides to use PowerShell commands to automate the configuration of System Restore. She wants to create a new restore point.Which of the following cmdlets should she use in this scenario?

Checkpoint-Computer

As a systems administrator, you have been asked to quicken the domain join process in your organization by allowing domain-joined computers to join offline.Which of the following actions will you take?

Create a blob file on the Windows server and import it to the computers

Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, to take control of systems?

DEP

You have successfully created an FFU image using DISM. You now want to apply the image to a computer.What is the syntax for the command that you must use to accomplish this task?

DISM /apply-ffu /imagefile=imagefile.ffu /ApplyDrive:\\.\PhysicalDriveX

Yixuan, a system administrator, configures Windows Update for Business in her organization to control updates for Windows 10 systems. The settings are configured such that a test system first receives any new Windows update and other Windows systems receive the update after two weeks. Being a small organization, Yixuan wants to reduce bandwidth consumption during the organization-wide update.Which of the following options should Yixuan use in this scenario?

Delivery optimization

Derwin uses OneDrive to back up files from his laptop to the cloud.Which of the following circumstances will require Derwin to use the OneDrive website instead of the OneDrive client?

Derwin wants to recover a file that was deleted from OneDrive.

Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?

Disk

Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?

Distribution share

To see the permissions a user has to a file that takes into account their group memberships, which tab should you display in the Advanced Security Settings dialog box?

Effective Access

The process of taking data and rendering it unreadable is known as which of the following?

Encryption

Which utility is used to browse events stored in system event logs?

Event Viewer

Data Collector Sets organize multiple counters into a single unit. Which type of data can a Data Collector Set monitor to track when system events occur?

Event trace

Frida, a travel blogger, configures File History on her Windows 10 laptop because she often works while traveling. She often works from remote locations without access to charging points for her laptop. She wants to know the frequency with which her laptop can back up files with the default settings.How often are files being backed up on Frida's laptop?

Every hour

Zachary wants to use File History to create regular backups of the data on his laptop. He is using File History for the first time and is unaware of this feature, so he approaches his friend, Leah, who has experience using this feature.Assuming that Leah has good knowledge of File History, which of the following is Leah most likely to tell Zachary?

File History is disabled by default

Malaika is troubleshooting an issue on a Windows 10 computer using Event Viewer. In the application log, she can find several entries for several events. She wants to limit this and only see errors.Which of the following filter options should Malaika use?

Filter by Event level

Rishi works as a network administrator. He configures the domain-joined laptops in his company to sleep if they are on battery power and idle for more than 20 minutes. Some users, to save battery, change this duration to 10 minutes. However, the next time they restart the laptop, it is automatically configured to sleep in 20 minutes.Which of the following has Rishi likely used to configure the laptops?

Group Policy Preferences

Which registry hive contains details about the current hardware profile in use?

HKEY_CURRENT_CONFIG

Rizwan, a data analyst, is generating a report by pulling data from multiple databases and analyzing it. The data processing application is resource-intensive, so Rizwan wants to ensure that other applications do not consume resources that this application needs.How can Rizwan boost the performance of the data processing application?

He can raise the priority of the application using the Details tab in Task Manager

Saeju is using video editing software to edit large video files to create a short movie. The application keeps freezing on his Windows 10 computer. Upon investigating the issues, he finds that the paging file is huge, and reading it from the SSD takes a lot of time.What should Saeju do to resolve this issue?

He should increase the amount of physical memory

Jordan installs Windows 10 on a laptop with low-end specifications. The laptop does not have a dedicated graphics card as well. In order to improve the performance of Windows 10, he wants to adjust the appearance of Windows by reducing most OS animations.Which of the following options in the Performance Options dialog box should Jordan use to achieve this?

He should select the Adjust for best performance option on the Visual Effects tab

Guocheng, a system administrator, is testing the network at his organization to identify performance issues. He is using Resource Monitor on a Windows 10 system to identify whether the network subsystem is a bottleneck.Which of the following would indicate that the network connection between the local address and a remote address is oversaturated?

High packet losses

Which of the following terms is used to refer to the individual sections of the registry?

Hive

Which of the following is not part of the performance tuning process?

Identifying and verifying users

You must right-click the disk name in Disk Management and select which of the following from the menu to initiate the import process?

Import Foreign Disk

Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.What should Sharon do next?

Import the recovery certificate into the local security policy as a data recovery agent

Which of the following is not true of GPT?

It is bootable from BIOS or UEFI firmware.

Characteristics of a file such as file name, creation date, and modified date, are known as which of the following?

Metadata

Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is the equivalent of enabling Write and Read & execute permissions combined.Which of the following options is the best choice?

Modify

What is used to prevent users from connecting to Remote Desktop until the connection is authenticated?

Network Level Authentication

Chieh is changing the default configuration in Event Log to manage the logs that are created. She is altering the Log behavior when maximum log size is reached option. She chooses Do not overwrite events. Which of the following is true of this scenario?

New events will not be recorded when the log is full

Ruzwana configures Always On VPN for the Windows 10 client computers in her organization. The client computers have a mix of Windows 10 Enterprise and Windows 10 Pro licenses.Which of the following is true of this scenario?

Only user tunnel is available for Windows 10 Pro computers.

Parth is using Steps Recorder to capture the steps that are causing an application to malfunction. After capturing the necessary steps, he can send the report to the IT team so that they can troubleshoot the issue. He is not sure if Steps Recorder will capture all of his actions that are causing the application to fail.Which of Parth's interactions with the application is unlikely to be captured by Steps Recorder?

Parth typing text in the application

Which utility allows you to visually display the data generated by counters and allows you to select the individual counters you want to review?

Performance Monitor

If File History or Backup and Restore (Windows 7), or both, had been configured to protect data, that data can be recovered using which feature?

Previous Versions

Which of the following is a new interface for managing printers in Windows 10?

Printers & scanners

Yunha uses Microsoft Edge on her work laptop, home laptop, and smartphone. She wants her saved passwords and favorites that are on her home laptop to be available on her smartphone and work laptop.Which of the following features in Microsoft Edge should Yunha use in this scenario?

Profile synchronization

Which Windows 10 service controls the flow of network traffic?

QoS Packet Scheduler

Chieh is assigned the Read permission to a shared folder as user. She is also part of the Marketing group that has List Folder permissions to the shared folder.What is Chieh's effective permission to this folder?

Read & Execute

Which of the following registry editing tools has the built-in functionality to export a portion of a registry to a .reg file using commands?

Reg.exe

Yunha, a college student, uses a Windows 10 laptop to study and play games. During the past month, Yunha updated the operating system and drivers on his laptop. Some of the games began crashing after these updates.Which of the following tools should Yunha use to identify the underlying issue?

Reliability Monitor

A user working from a different location from yours is experiencing an issue with an application on their system. To diagnose and resolve the issue, you need to be able to see the application while it is in use on the user's system.Which of the following options should you use to resolve this issue?

Remote Assistance

Selecting a counter displays information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?

Report

Which of the following are used to process log file data and display it in a meaningful way?

Reports

Which term best describes a snapshot of system files and settings created at a specific point in time?

Restore point

How will you configure your computer to be visible on a remembered network that is profiled as a public network?

Select the turn on network discovery option in the Network and Sharing Center.

Ayaka's Windows 10 computer has slowed over time. She wants to enhance the performance of the computer by tuning her system. She begins by choosing to adjust the virtual memory settings in Performance Options. Her computer has two physical disks, and the paging file is currently placed on one of the disks on the same volume as the operating system.Which of the following should Ayaka do?

She should spread the paging file over both disks

Laila's browser continually hangs and appears to consume most of the resources on her Windows 10 system. Whenever she opens more than 10 tabs, the computer slows down and her browser eventually crashes. To understand the underlying issue, Laila wants to test how the browser's processes are impacting the processor.Which of the following should Laila do?

She should suspend the browser's processes using the CPU tab in Resource Monitor

Kathryn, the IT administrator at Alpha Systems, recently upgraded five computers from Windows 7 with Service Pack 1 to Windows 10. After the upgrade, she ran Standard User Analyzer.Which of the following is the most likely reason for Kathryn choosing to run Standard User Analyzer?

She wanted to identify why some older applications were not compatible with Windows 10.

Glenda is using a speech-to-text program on her Windows 10 laptop to dictate notes. After completing this task, she switches to other tasks but leaves the speech-to-text application open in the background. When she tries dictating notes again after a couple of hours, she is unable to interact with the application. She opens Task Manager to check if the associated process for the application is still running or suspended.Under which header on the Details tab is Glenda most likely to find this information?

Status

Which Windows 10 feature captures a screenshot each time the user clicks a screen item and saves the screenshots and user actions in a report that can be sent via email or saved to a shared storage location?

Steps Recorder

Which protocol is included with Windows 10 for network communication?

TCP/IP

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?

TCP/IPv6

Odilon installs a VPN application on his Windows 10 computer. The application is configured by default to start automatically. This is impacting the boot time on his computer, so he wants to disable automatic startup. The application does not have a setting to disable this, and Odilon is unsure of the mechanism used by the application to start automatically.Which of the following tools can Odilon use to prevent the VPN application from automatically starting?

Task Manager

Which utility can be used to provide an overview of the current state of a computer?

Task Manager

TEXMII Consultants, a tax consulting firm, uses legacy web-based applications. To allow these applications to run on Microsoft Edge, Ablorde adds these websites to IE Mode. Some of the users report that all the legacy applications are still being launched in Microsoft Edge on their computers.Which of the following is the most likely reason for this issue?

The Internet Explorer 11 optional feature has been uninstalled from the computers.

To enable centralized management of BitLocker, you need to install which of the following on each computer?

The MBAM agent

Chao creates a file YTDReport and places it a folder titled TownHall. Only the Managers group has full control permissions to the TownHall folder. Later, Chao moves this folder to the Presentations folder on the same NTFS volume. The Managers group does not have any explicit permissions to the content in the Presentations folder.Which of the following is true of this scenario?

The Managers group will have full control permissions to the TownHall folder.

Kathryn has the latest version of Windows 10 installed on her laptop. She configures File History on her computer but wants to use Backup and Restore (Windows 7) to create a system image.Which of the following is a caveat to using the System Image Backup option?

The System Image Backup option is deprecated beginning in Windows 10 version 1709

Samir is using an external hard disk with File History to back up files from his laptop. He needs to detach the hard disk for another task, so he configures an external SSD to be used with File History.Which of the following is most likely to occur in this scenario?

The backed-up data on the hard disk will not be deleted

Ablorde, a programmer, installed a new code editor on his laptop. After the installation, he is prompted to restart the laptop. He notices that the code editor has a registry key in the following location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.What does this most likely indicate?

The code editor will run a configuration routine after the next restart

Ablorde, a programmer, installed a new code editor on his laptop. After the installation, he is prompted to restart the laptop. He notices that the code editor has a registry key in the following location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.What does this most likely indicate?

The code editor will run a configuration routine after the next restart.

Yemi creates a Word document in a OneDrive folder on her laptop and begins working on the document. Once Yemi completes her work, she closes the document. She notices that the file status icon is two arrows in a circle.What does this indicate?

The file is synchronizing.

Jin has configured File History on his Windows 10 computer using an external hard disk. Some of the files on the computer that are selected for backup are EFS-protected. For the backup to proceed smoothly, which of the following conditions should be met?

The hard disk should be formatted with NTFA

Howard's organization purchased laptops with Windows 10 Home preinstalled, and he is tasked with upgrading these computers to Windows 10 Pro. Along with the OEM installation of Windows 10, he notices that several additional software is installed by the vendor. He performs a clean installation on these computers.Which of the following is true in this scenario?

The hard drive of the computers will be wiped before installation.

As a network administrator, Lea helps a small start-up set up a temporary network at a rented space. She configures a host computer with the IP address provided by the ISP to act as a router. Other computers in the network share the Internet connection through the host computer. After few hours, the owners of the start-up complain that they are not able to connect to the Internet.Which of the following, if true, is preventing Internet access?

The host computer was manually configured using ICS.

Trisha is using OneDrive on her Windows 10 laptop at work. She wants to enable Personal Vault but cannot find the option using the OneDrive client.Which of the following is the most likely reason for this?

The laptop is running a business plan of Microsoft 365.

Frida uses OneDrive storage to back up data from her phone and laptop. Over time, the hard disk on her laptop has accumulated a lot of files. She wants to free up some space on her disk. She notices that one of the OneDrive folders, Media, is close to 200 GB. She right-clicks the folder and selects Free up space.What will happen to the Media folder?

The local copy of the Media folder will be removed, but it will be retained in OneDrive.

Nikita downloaded software from the Internet and installed it on her computer. She suspects that the software has also installed malware onto her computer. She uses the Autoruns application to look for malware on her computer.Which of the following in Autoruns most likely indicates the presence of malware on her computer?

There is a file in a nonstandard location

Umama wants to enable User Experience Virtualization (UE-V) by configuring Group Policy settings. Two important settings that she needs to configure are the setting storage location and settings template catalog location.Which of the following is true of this scenario?

Umama needs to create settings location templates for custom apps and non-Microsoft apps.

Which of the following is not true of App-V?

Updates are installed directly on the client computers.

Linda works as a network administrator in a multinational corporation. It has come to her notice that some updates lead to a significant computer downtime because they are either incompatible or not installed properly. In order to resolve this issue, she decides to use the Windows Server Update Services to control the updates that are sent to the computers.How would this move help resolve the current issue?

Updates can be tested before they are applied.

Yemi, a software developer, uses a Windows 10 PC at home. She usually runs several resource-intensive applications on her system. Her PC crashed and failed to restart, so she decided to use WinRE to troubleshoot and repair the PC. She has a recovery DVD that she wants to use to perform the recovery. Which of the following options in WinRE should Yemi select?

Use a device

Melita recently purchased a new Windows 10 laptop because her old laptop crashed. To ensure that her data is protected, she enables system protection on her laptop.Which of the following is true of this scenario?

When the storage space dedicated to restore points becomes too large, the oldest restore point is automatically removed

Which of the following is true of BitLocker Drive Encryption?

When you use BitLocker Drive Encryption, an entire volume is encrypted.

What do applications use to request services and functionality from Windows 10?

Windows API

Which Advanced startup option in recovery settings is a small instance of Windows 10 that includes several options for troubleshooting and repairing Windows 10?

Windows Recovery Environment (WinRE)

When a generalized image is applied to a computer, that computer generates all of the system-specific data that is required, including the computer name and what other item?

computer SID

Jin, a system administrator, implements Work Folders at his organization, Nelconnect. He decides to enable automatic discovery of the Work Folders URL to support devices that are not domain joined. Darwish is working from home and opens the Work Folders client to access his work files.If Darwish's email is [email protected], what address will the Work Folders client attempt to connect to?

https://workfolders.nelconnect.com

Which of the following configuration passes is used to apply packages to a Windows 10 image after it is copied to the computer hard drive, but before it is running?

offlineServicing

Which of the following commands will you use to check the basic connectivity between your computer and a computer with the IP address 192.168.1.100? You need to send a minimum of six requests.

ping 192.168.1.100 -n


Set pelajaran terkait

Chapter 36: Partnerships & Limited Liability Partnerships

View Set

7th Grade Abeka Literature Test 7

View Set

Test #2: Ignition Harnesses (leads) + Spark Plugs.

View Set

Psych Test 1: Chapter 2 study questions

View Set

NUR 1109 Final Units 5-7 & Pharm

View Set

pharm exam 1- chapter 6 PrepU practice questions

View Set

Chapter 2: Cardiovascular Management

View Set