Stu sesh FINALE

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following actions should you take to BEST secure your video conferencing software? (Select two.)

Use waiting room features. Use strong passwords.

Which of the following statements about an SSL VPN are true? (Select two.)

Uses port 443. Encrypts the entire communication session.

While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using?

VPN

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN concentrator

Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue?

Verify that the BIOS/UEFI is configured to use the correct video adapter.

Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. Now, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.

View Your Update History

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches, you are concerned that your Windows 11 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip?

You can boot the hard drive without providing the startup key.

You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it. What is the MOST likely cause of the issue?

You deleted a group that was created by the third-party application.

You have just installed Windows 11 on your laptop, purchased an infrared camera, and set up Windows Hello facial recognition as your login option. As part of the setup process, you enter a PIN as a backup login method. After a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your PIN. Because it has been several weeks, you have forgotten the exact number. You attempt to enter your PIN at least 24 times, but are never locked out. What is the MOST likely reason that you have not been locked out after several failed PIN login attempts?

Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\Home1\Pictures

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?

bash

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: 1. Boot the system from the Windows 11 installation DVD. 2. Access the Recovery Environment. 3. Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use?

chmod

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

grep

What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?

ip

Which operating system uses the Time Machine backup program?

macOS

You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command?

man cat

While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

What would you enter at the shell prompt on a Linux system to display the present working directory?

pwd

You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again?

robocopy

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt?

shutdown -h +10 message

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the Command Prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file. Which of the following tools would be best suited for this task? (Select two.)

tail cat

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?

%systemdrive%\Program Files (x86)

Which of the following describes the grandfather backup in a grandfather-father-son (GFS) rotation scheme?

A full backup that is stored offsite.

You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business?

A workgroup

You recently installed a Windows 11 system. During the installation process, you elected to sign in to the system with a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

Accounts

A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups could you make her user account a member of in order to enable this Remote Desktop connection? (Select two.)

Administrators Remote Desktop Users

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control for both.

Which file attribute identifies the file as having been modified since the last backup?

Archive

What does Windows 11 do when you log in with an administrator account with elevated privileges?

Assign you a user and an administrator token.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 11. She is concerned that she may accidently delete a personal file or that her primary hard disk may fail at some future time, causing her to lose her personal files. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files?

Back up her files using File History.

Match each backup method on the left with the correct description on the right.

Backs up all files (even those that have not changed).- Full Backs up every file that has changed since the last full or incremental backup.- Incremental correct answer: Backs up every file that has changed since the last full backup.- Differential Compares the data found in the last full backup with the current content and uploads only the changes.- Synthetic

What tool can you use to create a full system image of your Windows drive?

Backup and Restore

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption?

BitLocker To Go

Which of the following is true of the Windows BitLocker program?

BitLocker is designed to protect files against offline access only.

When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive?

BitLocker with TPM

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

You experience startup errors after you install a new device. What should you do FIRST to resolve the issue?

Boot in Safe Mode and roll back the driver.

Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot, and now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent him from using the TV until you can install an updated driver. What should you do?

Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

Which of the following statements are true regarding administrative shares? (Select two.)

By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.

You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11?

C:\Users\username

Drag each Group Policy setting on the left to the appropriate description of how the setting is enforced on the right.

Causes the policy to be enforced- Enabled Does not change the current setting for the policy- Not Configured Prevents the policy from being enforced- Disabled

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.)

Configure both share and NTFS permissions. Place the files on an NTFS partition.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.)

Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by the DataComLink corporation. What should you do to ensure this? (Select two.)

Configure the application to automatically download and install updates as they are released. Check the DataComLink website regularly for patches and updates to the software.

Administrative Templates are Registry-based settings that you can configure within a GPO to control a computer system and its overall user experience. Which of the following can you do with an Administrative Template? (Select two.)

Control notifications. Restrict access to Control Panel features.

Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is the MOST likely source of the problem?

Corrupt MBR or partition table

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows?

Disable and then enable devices and services one by one.

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable the Secure Desktop.

Match each Active Directory definition on the left with its corresponding component on the right.

Domain- A collection of network resources that share a common directory database. Organizational unit (OU)- A folder-like container that organizes network resources. Built-in containers- Default containers used to organize Active Directory objects that cannot be deleted. Object- A resource within Active Directory. Domain controller- A Windows server that holds a copy of the Active Directory database.

A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file?

EFS

Which of the following security solutions would prevent you from reading a file that you did not create?

EFS

After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file?

EFS encrypts the FEK by creating a key pair (private and public).

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?

Edit the file properties and assign Rachel the Deny Full Control permission.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from an employee who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what might be causing the problem. Which of the following is the BEST way to provide the assistance the employee needs? (Select two.)

Establish a Remote Assistance connection and watch what the employee is doing. Establish a Quick Assist session with the employee and watch what he is doing.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue?

Establish a Remote Desktop connection and update the driver.

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: Only customer data files created by the financial consultants need to be backed up. Data backed up to a flash drive. Backed up files must be uncompressed. Include contact lists and desktop preferences. Which of the following backup solutions BEST meets your requirements?

File History

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled?

GPOs linked to organizational units that contain this user's object.

Which of the following VPN protocols was developed by Cisco and can be used to route any Layer 3 protocol across an IP network?

GRE

Which of the following Windows Update options releases updates as soon as they are available to the public?

General Availability Channel

Which of the following is true of groups on a Windows system?

Group members have the access rights that are assigned to the group.

A user calls to report a problem. She is trying to install an application on her new Windows 11 system, but the installation will not proceed. Her user account is a member of the Users group. What is MOST likely causing the installation issue?

Her group membership does not allow her to install new software.

Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis?

Hotfix

Which of the following protocols provides authentication and encryption services for VPN traffic?

IPsec

You are using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert Mode

Which of the following actions directly improves system security on a Windows workstation?

Install the latest updates.

While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command?

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.)

L2TP IPsec PPTP

You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

Which of the following is a valid distinguished name for the Market Space common domain name?

MarketSpace.org

Which of the following tools can manage bandwidth usage and deployment times for updates?

Microsoft Endpoint Configuration Manager

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request?

Network share

You need to back up user data on a Windows 11 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to back up user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work?

No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written?

Ntbtlog.txt

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied?

Only the R attribute is retained on the file.

You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements?

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

Which of the following must be set up before you can register a facial or fingerprint scan for your account?

PIN

Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS?

POST

Which of the following was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP?

PPTP

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.)

PPTP L2TP

You would like to set Windows Update to delay updates for a week. Which of the following Windows Update settings would you use to configure the delay?

Pause Updates

You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files.

You are a network administrator for a large financial institution. There are several account advisors who are constantly on the road with their Windows laptop devices. You want to be able to occasionally check on the health of these laptops, including the ability to receive automated alerts for any unusual activity that may indicate some kind of security breach. Which of the following remote management technologies would BEST help you monitor these laptops?

RMM

Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer?

Remote Desktop

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 10 to Windows 11 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 10 operating system?

Restore her system using the recovery partition.

Which Active Directory service simplifies how users log in to all the systems and applications that they need?

SSO

An administrator configures the Time Machine application on macOS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

Scheduled backups

Which remote access solution is built into macOS?

Screen Sharing

You need to specify which location File History should use to store backup data. Click the Control Panel option you would use to do this.

Select Drive

Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account?

Sign in with a Microsoft account instead

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering on your computer, Windows 11 will not start. Which of the following tools should you use FIRST to try and resolve the issue?

Startup Repair

You have just installed the latest Windows updates on your Windows 11 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Because your computer won't start, you have booted your computer into the Advanced Options section of the Windows 11 recovery environment (see image below). While troubleshooting this issue, which of the advanced options would be the BEST to try first?

Startup Repair

What is a VPN's primary purpose?

Support secure communications over an untrusted network.

A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change?

System Properties > Computer Name

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue?

System Restore

System Restore has been enabled for all volumes on a Windows system. Recently, a new network driver was installed on the system. However, the driver code contained bugs, and now your network board no longer functions. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed. Click the option you would use to do this.

System Restore

Which of the following is true about System Restore?

System changes made since the restore point was taken are undone.

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.)

The CPU and chipset are verified and fully initialized. System memory is initialized, verified, and allocated.

The Hide Programs setting is configured for a specific user as follows: Local Group Policy = Enabled Default Domain Policy GPO = Not configured GPO linked to the user's organizational unit = Disabled After logging in, the user is able to see the Programs and Features option. Why did this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

Rachel wants to use Screen Sharing to allow a system administrator to remotely access her Apple iMac. However, when she initiates the Screen Sharing session, the administrator is not able to access her iMac desktop from his iMac computer. What is the MOST likely reason that the administrator cannot access the Screen Sharing session?

The administrator is not included in her Specific Users Only list.

Which user type is the Windows Beta channel recommended for?

The average user

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive?

The file will no longer be encrypted.

You have recently purchased a Windows 11 laptop and have just installed several applications, including a graphics editor. Using the application, you have edited several images that you need to send to a company executive for a presentation. However, you are experiencing problems using the application and are deciding whether or not to use the Reset this PC option to remove the application and try re-installing it. What can you expect to happen if you use this option? (Select two.)

The laptop will be reset to the factory defaults. You are given the choice to keep your edited images.

As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been given to you from another Level 2 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop?

The remote session from the original Level 2 operator has not been disconnected.

Which of the following is true of Remote Assistance?

The user initiates the session.

You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer?

The wrong file extension was used when saving the file.

System Restore is currently disabled for all volumes on a Windows 11 system. You need to enable System Protection for the C: volume. Click the option you would select to do this.

To enable system protection in this scenario, you would select the C: volume from the Available Drives list and then click Configure.

Why should you store backup media offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys?

Trusted Platform Module (TPM)

You have just finished installing a new Windows Update when your computer locks up. What should you do first?

Uninstall the Windows Update

You are the system administrator for several Windows servers in your company. Instead of scheduling the same updates for all the Windows servers, your systems engineer would like to begin approving the updates based on specific groups of servers. In addition, the systems engineer would like you to begin checking the update logs on the servers on a regular basis to determine if and how the updates were applied. Which of the following tools would BEST help you meet the new requirements requested by the systems engineer? (Select two.)

Update History WSUS

You have created a system image of Windows 11 on your laptop before updating several applications on your hard drive. The system image is stored on an external hard drive. After updating one of the applications, you are required to restart your laptop. However, during the restart, you receive an error message that the system is unable to reboot. You try to restore the system image from the external hard drive, but you are unsuccessful. Which of the following do you need to do BEFORE successfully restoring your Windows 11 system using the system image?

Use a recovery disc to restore the operating system.

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.


Set pelajaran terkait

History & Geography 808: Twentieth Century World Power - Quiz 3: Peace, Prosperity, and Depression

View Set

Saunders | Postpartum Complications

View Set

(4TH QUARTER) LESSON 2 - Pakikilahok sa Pansibiko

View Set

Vertical integration, Disintegration, transaction cost, regulation

View Set

Week 1 - Pursue a Career in UX Design Quiz 1 - 15 Questions

View Set

chapter 6 and 7 Personal financial stewardship

View Set

Ch 14: Structure and function of the Neurologic System

View Set