Module 9 Performance Tuning and System Recovery / Module 10 Enterprise Computing
Which of the following best describes a set of performance indicators captured when system performance is acceptable, effectively defining normal performance?
A baseline
Which of the following can be used to restrict the installation of a USB drive on a Windows 10 computer?
A device identification string
Running fewer applications at once is a way to resolve which type of bottleneck?
A memory bottleneck
Which of the following is bootable media that you can use to repair or reinstall Windows 10?
A recovery drive
Instead of logging performance counters to disk, you can configure which of the following to occur?
Alerts
Malaika is troubleshooting an issue on a Windows 10 computer using Event Viewer. In the application log, she can find several entries for several events. She wants to limit this and only see errors. Which of the following filter options should Malaika use?
Filter by Event level
Saeju is using video editing software to edit large video files to create a short movie. The application keeps freezing on his Windows 10 computer. Upon investigating the issues, he finds that the paging file is huge, and reading it from the SSD takes a lot of time. What should Saeju do to resolve this issue?
He should increase the amount of physical memory.
Guocheng, a system administrator, is testing the network at his organization to identify performance issues. He is using Resource Monitor on a Windows 10 system to identify whether the network subsystem is a bottleneck. Which of the following would indicate that the network connection between the local address and a remote address is oversaturated?
High packet losses
You and your friends decide to start up a small company that provides web-based services. You are a team of five working out of a basement. You need to set up email accounts and purchase cloud storage. Which of the following cloud services would be the most cost-effective for you?
Microsoft 365 Business
Which of the following can be used to handle domain-joined desktop computers?
Microsoft Endpoint Configuration Manager
Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called?
Multimaster
Each domain can be subdivided into which of the following that allows you to organize the objects in a domain?
Organizational units (OUs)
Parth is using Steps Recorder to capture the steps that are causing an application to malfunction. After capturing the necessary steps, he can send the report to the IT team so that they can troubleshoot the issue. He is not sure if Steps Recorder will capture all of his actions that are causing the application to fail. Which of Parth's interactions with the application is unlikely to be captured by Steps Recorder?
Parth typing text in the application
Yunha, a college student, uses a Windows 10 laptop to study and play games. During the past month, Yunha updated the operating system and drivers on his laptop. Some of the games began crashing after these updates. Which of the following tools should Yunha use to identify the underlying issue?
Reliability Monitor
Selecting a counter displays information about that counter's collected data as a chart type. Which chart type displays the current value of each performance counter in decimal format?
Report
Glenda is using a speech-to-text program on her Windows 10 laptop to dictate notes. After completing this task, she switches to other tasks but leaves the speech-to-text application open in the background. When she tries dictating notes again after a couple of hours, she is unable to interact with the application. She opens Task Manager to check if the associated process for the application is still running or suspended. Under which header on the Details tab is Glenda most likely to find this information?
Status
Ablorde, a programmer, installed a new code editor on his laptop. After the installation, he is prompted to restart the laptop. He notices that the code editor has a registry key in the following location: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce. What does this most likely indicate?
The code editor will run a configuration routine after the next restart.
Rodriguez returns to his office after taking a sabbatical. When he tries to connect his Windows 10 workstation to the organization domain, authentication to Active Directory is unsuccessful. Identify the issue that could have caused the authentication to fail.
The time on the computer was 10:00, and the time on the domain controller was 10:08.
Linda works as a network administrator in a multinational corporation. It has come to her notice that some updates lead to a significant computer downtime because they are either incompatible or not installed properly. In order to resolve this issue, she decides to use the Windows Server Update Services to control the updates that are sent to the computers. How would this move help resolve the current issue?
Updates can be tested before they are applied.
Yemi, a software developer, uses a Windows 10 PC at home. She usually runs several resource-intensive applications on her system. Her PC crashed and failed to restart, so she decided to use WinRE to troubleshoot and repair the PC. She has a recovery DVD that she wants to use to perform the recovery. Which of the following options in WinRE should Yemi select?
Use a device
Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually?
WSUS
Melita recently purchased a new Windows 10 laptop because her old laptop crashed. To ensure that her data is protected, she enables system protection on her laptop. Which of the following is true of this scenario?
When the storage space dedicated to restore points becomes too large, the oldest restore point is automatically removed.
Which Active Directory component is responsible for authenticating users when they sign in to a workstation?
Domain controllers
Which processor feature monitors processes to ensure that they do not access unauthorized memory spaces, which is done by various types of malware, to take control of systems?
DEP
When a printer is plugged into a Windows 10 computer, which of the following is used to identify the appropriate driver?
Devices & printers folder
