A.2.2 Pro Domain 2: Software

Ace your homework & exams now with Quizwiz!

You are having problems with the Security Evaluator program that has been installed on your computer. In this lab, your task is to: > Access the Settings app. > Repair the Security Evaluator program

Access Apps using the Settings app. > Right-click Start and then select Settings. > Select Apps. Repair the Security Evaluator app. > From the right pane, select Apps & features. > Under App list, scroll down and locate Security Evaluator. > For the Security Evaluator app, select the kebab menu (three vertical dots) and then select Advanced options. > Under Reset, select Repair. > Wait for the application to be repaired.

You are the IT administrator for a small corporate network. Your supervisor has asked you to gather some networking information for the CorpDHCP server. In this lab, your task is to: > Use Microsoft's Windows PowerShell to find the answers to the following questions: ~ What is the IPv4 address of the server? ~ What is the subnet mask? ~ How did the computer get its IP configuration information? ~ What tells you how the computer is getting its IP address? ~ Assuming the default gateway computer is connected to the internet, which type of internet access would this computer have? > Answer the questions.

Access Microsoft's Windows PowerShell. > Right-click Start. > Select Windows PowerShell (Admin). Find networking information using the ipconfig command (using no options). > From the PowerShell prompt, type ipconfig and then press Enter. > From the top right, select Answer Questions. > Answer Questions 1 and 2. ~ Q1: What is the IPv4 address of the server? ~ Q2: What is the subnet mask? Find the remaining networking information using the ipconfig /all command. > From the PowerShell prompt, type ipconfig /all and then press Enter. > Answer Questions 3 - 5. ~ Q3: How did the computer get its IP configuration information? ~ Q4: What tells you how the computer is getting its IP address? ~ Q5: Assuming the default gateway computer is connected to the internet, which type of internet access would this computer have? > From the Answer Questions window, select Score Lab.

You are the IT administrator for a small corporate network. Your supervisor has asked you to gather some networking information for the Office1 computer. In this lab, your task is to: > Use Microsoft's Windows Terminal (PowerShell) to find the answers to the following questions: ~ What is the IPv4 address of the workstation? ~ What is the subnet mask? ~ What is the default gateway address? ~ What is the address of the first DNS server that the workstation will use for name resolution? ~ How did the computer get its IP configuration information? > Answer the questions.

Access Microsoft's Windows Terminal (PowerShell). > Right-click Start. > Select Windows Terminal (Admin). > PowerShell opens. > Maximize the PowerShell window for better viewing. Find networking information using the ipconfig command (using no options). > From the PowerShell prompt, type ipconfig and then press Enter. > From the top right, select Answer Questions. > Answer Questions 1-3. ~ Q1: What is the IPv4 address of the workstation? ~ Q2: What is the subnet mask? ~ Q3: What is the default gateway address? Find the remaining networking information using the ipconfig /all command. > From the PowerShell prompt, type ipconfig /all and then press Enter. > Answer Questions 4-5. ~ Q4: What is the address of the first DNS server that the workstation will use for name resolution? ~ Q5: How did the computer get its IP configuration information? > From the Answer Questions window, select Score Lab.

You are the IT administrator for a small corporate network. You are in the process of troubleshooting a networking issue and need to find the answers to several questions. In this lab, your task is to: > Use Microsoft's Windows Terminal (PowerShell) to find the answers to the following questions: ~ What is the IPv4 address of the workstation? ~ What is the subnet mask? ~ How did the computer get its IP configuration information? ~ Which type of internet access would this computer have? ~ What tells you how the computer is getting its IP configuration information?

Access Microsoft's Windows Terminal. > Right-click Start. > Select Windows Terminal (Admin). Find networking information using the ipconfig command (using no options). > From the PowerShell prompt, type ipconfig and then press Enter. > From the top right, select Answer Questions. > Answer Questions 1 and 2. ~ Q1: What is the IPv4 address of the workstation? ~ Q2: What is the subnet mask? Find the remaining networking information using the ipconfig /all command. > From the PowerShell prompt, type ipconfig /all and then press Enter. > Answer Questions 3 - 5. ~ Q3: How did the computer get its IP configuration information? ~ Q4: Which type of internet access would this computer have? ~ Q5: What tells you how the computer is getting its IP configuration information? > From the Answer Questions window, select Score Lab.

You are the IT administrator for a small corporate network. You are configuring Windows Update on the Marketing6 workstation. In this lab, your task is to: > Set the active hours of Marketing6 to 6:00 a.m. to 11:00 p.m. > Configure Windows Update options to receive updates for other Microsoft products when you update Windows.

Access Windows Update. > Right-click Start and select Settings. > Maximize the window for easier viewing. > Select Update & Security. Enable and configure the active hours of the computer. > Under Update status, select Change active hours. > Slide the button to turn on Automatically adjust active hours for this device based on activity. > Select Change. > Set the Start time to 6:00 a.m.Select the checkmark. > Set the End time to 11:00 p.m. > Select the checkmark. > Select Save. Configure when updates for other Microsoft products will be used. > Select the arrow in the upper-left corner to return to the Windows Update page. > Select Advanced options. > Slide the button to On to Receive updates for other Microsoft products when you update Windows.

You are the IT administrator for a small corporate network. You recently added an Active Directory domain to the CorpDC server to manage network resources centrally. You now need to add user accounts in the domain. In this lab, your task is to create the following user accounts on CorpDC: User >> Job Role Juan Suarez >> Marketing manager Susan Smith >> Permanent sales employee Mark Burnes >> Sales manager Borey Chan >> Temporary sales employee As you create each account, use the following user account naming standards and specifications: > User account name: first name + last name > Logon name: first initial + last name (with @CorpNet.local as the domain). > Original password: 1234abcd$ (must change after the first logon). > Place the user account in the departmental OU (organizational unit) that corresponds to the employee's department. For example: ~ The Marketing\MarketingManagers OU for the marketing manager. ~ The Sales\PermSales OU for the permanent sales employee. ~ The Sales\SalesManagers OU for the sales manager. ~ The Sales\TempSales OU for the temporary sales employee. > Configure the following for the temporary sales employee: ~ Limit the logon hours to allow logon only from 8:00 a.m. to 5:00 p.m., Monday through Friday. ~ Set the user account to expire on December 31st of the current year.

Access the CorpDC server. > From the Hyper-V Manager, select CORPSERVER. > Under Virtual Machines, double-click CorpDC. Create a domain user account. > From Server Manager, select Tools > Active Directory Users and Computers. > Maximize the window for better viewing. > From the left pane, expand CorpNet.local. > Browse to the appropriate OU. > Right-click the OU and select New > User. > In the First name field, enter the first name of the user. > In the Last name field, enter the last name of the user. > In the User logon name field, enter the user's logon name, which should be the first letter of the user's first name together with their last name (e.g. jsuarez). The domain, @CorpNet.local, is appended automatically to the end of the logon name. > Select Next. > Enter 1234abcd$ in the Password field. > Enter 1234abcd$ in the Confirm password field. > Make sure User must change password at next logon is selected and then select Next. > Select Finish to create the object. > Repeat steps 2d-2m to create the additional users. Modify user account restrictions for the temporary sales employee. > Right-click Borey Chan and select Properties. > Select the Account tab. > Select Logon hours. > In the Logon Hours window, select Logon Denied to clear the allowed logon hours. > Select the time range of 8:00 a.m. to 5:00 p.m., Monday through Friday. > Select Logon Permitted to allow logon during these hours. > Select OK. > Under Account expires, select End of. > In the End of field, enter 12/31 of the current year (example: 12/31/2022). > Select OK.

You are the IT administrator for a small corporate network. You have installed Active Directory on a new Hyper-V guest server named CorpDC. You have also created an Active Directory structure based on the company's own departmental structure. While creating the structure, you added an OU named Workstations to each of the departmental OUs. Now you would like to use one Workstations OU for the company. As a result, you need to delete the departmental Workstations OUs. In this lab, your task is to delete the following on CorpDC: > In the Marketing OU, delete the Workstations OU. > In the Research-Dev OU, delete the Workstations OU. > In the Sales OU, delete the Workstations OU.

Access the CorpDC server. > From the Hyper-V Manager, select CORPSERVER. > Under Virtual Machines, double-click CorpDC. Enable Active Directory Users and Computers advanced features. > From Server Manager, select Tools > Active Directory Users and Computers. > From the top menu, select View > Advanced Features. > Maximize the Active Directory Users and Computers window. Delete the departmental Workstations OUs. > From the left pane, expand CorpNet.local. > From the left pane, select the OU that you wish to open. > From the right pane, right-click Workstations and select Properties.Select the Object tab. > Clear Protect object from accidental deletion. > Select OK. > Right-click Workstations and select Delete. > Select Yes to confirm deletion. > Repeat steps 3b-3h to delete the additional OUs.

You are working on a small office/home office (SOHO) network. You recently created a wireless network to allow the owner's laptop and mobile devices to make a connection to the wired network and the internet. However, without additional configuration, the wireless access point will allow connections from any laptop or mobile device. You need to secure the wireless network from unauthorized access. In this lab, your task is to: Access the TRENDnet wireless access point from the Home-PC computer. > From Google Chrome, use 192.168.0.254 as the connection URL. > Log in using: ~ Username: admin ~ Password: password ~ Do not save these credentials. Change the settings on the wireless access point as follows: > Use PoliceVan for the SSID. (The SSID name is case-sensitive.) > Use WPA2-PSK authentication with AES for encryption. > Configure 4WatchingU as the passphrase. (The passphrase is case-sensitive.) Change the wireless access point's administrator authentication credentials from their defaults as follows: > Username: @dm1n > Password: StayOut! (O is the capital letter O) Configure the Home-Laptop to connect to the wireless network and save the wireless profile with the settings as listed above. > Configure the settings to connect automatically. > Using the Settings app, verify the connection to the internet.

Access the TRNEDnet wireless access point configuration tool. > From the home office view, under Computer Desk, select Home-PC. > In the URL field, type 192.168.0.254 and press Enter. > In the Username field, enter admin.In the Password field, enter password. > Make sure Remember my credentials is not selected.Select OK. > Maximize the window for better viewing. Change the settings on the wireless access point. > From the left menu, select Wireless. > Select Basic. > For the Wireless Name (SSID) field, use PoliceVan as the name. > Select Apply. > In the Username field, enter admin. > In the Password field, enter password. > Select OK. > From the left menu under Wireless, select Security. > From the Security Mode drop-down list, select WPA2-PSK. > In the Pass Phrase field, enter 4WatchingU. > Select Apply. Change the wireless access point's administrator authentication credentials from their defaults.From the left, select Administrator. > Select Management.In the Account field, use @dm1n as the new username. > In the Password field, use StayOut! (O is the capital letter O). > For the Administrator Settings pane, select Apply. > Close Google Chrome. Configure the Home-Laptop computer to connect to the wireless network and save the wireless profile. > From the top left, select Computer Desk. > On the monitor of Home-Laptop, select Click to view Windows 11. > In the notification area, select the network icon. > Under Available, select the arrow. > Select PoliceVan. > Select Connect Automatically and then select Connect. > Enter 4WatchingU in the Security Key field. > Select Next. > In the notification area of the taskbar, right-click the network icon and select Network & Internet settings. > Confirm that the computer has a connection.

To allow other users access to certain content on your computer, you have decided to share two folders. To better control who has access to the data in these folders, you need to configure share and NTFS permissions. In this lab, your task is to share and configure the share and NTFS permissions for these folders as follows: Share Folder >> Share Permissions D:\Finances >> Give the Everyone and Accounting groups Read/Write (Full Control) permissions. D:\Graphics >> Give the Everyone group Read/Write (Full Control) permissions. Folder > > D:\Finances NTFS Permissions > > Convert the inherited permissions into explicit permissions. > If they exist, remove the Everyone and Users groups from the access control list to prevent all users from having access. > Give or make sure the Accounting group has been assigned the Full Control permission. Folder > > D:\Graphics NTFS Permissions > > Do not modify inherited permissions. (This gives all users Read access.) > Make sure that the Everyone group only has the following permissions: ~Read & execute ~List folder contents ~Read > Add the Marketing group and give this group the additional Modify permission. A common strategy for combining NTFS permissions is to apply the least restrictive share permissions and then add more restrictive NTFS permissions. For example, you assign the Everyone group Full Control (Read/Write) share permissions to the shared folder and then assign more restrictive NTFS permissions to control access. When you use Share with > Specific people and choose Read/Write, Full Control permission is assigned.

Access the folders on the D:\ drive. > From the taskbar, select File Explorer. > From the left pane, select This PC. > From the right pane, double-click Data (D:). Configure share permissions for the D:\Finances folder. > Right-click Finances and then select Show more options. > Select Give access to > Specific people. > Using the drop-down menu, select the Everyone group and then select Add. > Select the Everyone group and then select Read/Write. > Using the drop-down list, select Find People. > In the Enter the object names to select field, type Accounting and then select OK. > Select Accounting and then select Read/Write. > Select Share. > Select Done. Configure share permissions for the D:\Graphics folder. > Right-click Graphics and then select Show more options. > Select Give access to > Specific people. > Using the drop-down list, select the Everyone group and then select Add. > Select Everyone and then select Read/Write. > Select Share. > Select Done. Configure NTFS permissions for the D:\Finances folder. > Right-click Finances and then select Properties. > Select the Security tab. > Select Advanced to modify inherited permissions. > Select Disable inheritance. > Select Convert inherited permissions into explicit permissions on this object. > Select the Everyone group and then select Remove to remove the group from the access control list. > Select Users and then select Remove. > Select OK to close the Advanced Security Settings for Finances dialog. > Select OK to close the Finances Properties dialog. Because the Give access to > Specific people option was used to add Accounting to the share, that group is already in the ACL and has the Allow Full Control NTFS permission. Configure NTFS permissions for the D:\Graphics folder. > Right-click Graphics and then select Properties. > Select the Security tab. > Select Edit to change permissions for a group. > Select the Everyone group. > Under Permissions for Everyone, clear Full control, Modify, and Write. > Select Add to add a group. > In the Enter the object names to select field, enter Marketing and then select OK. > With Marketing selected, select Modify. (Leave all other existing permissions as-is.) > Select OK to close the Permissions for Graphics dialog. > Select OK to close the Graphics Properties dialog.

You are the IT administrator for a small corporate network. The area around your office complex is under construction. The power company informed you that there may be short interruptions to the electrical service that could last up to 15 minutes. You need to add a UPS to the workstation and monitor in Office 1 so that work can be saved in the event of an outage. A UPS protects against over- and under-voltage conditions. The battery included with the UPS provides backup power in case the main power is lost. In this lab, your task is to: > Add a UPS to your computer: > Plug the UPS into the wall outlet and turn it on. > Plug the computer and monitor power cables into the appropriate UPS outlets. > Plug the printer in to the appropriate UPS outlets. > Connect the network cables through the UPS to the computer. The cable from the wall connects to the IN port. > Connect the USB cable to the UPS and the computer. > Power on the monitor and then the computer. > Unplug the UPS from the wall outlet. Do the computer and monitor still have power?

Add a UPS to the Workspace, plug it in, and power it on. > Under Shelf, expand Outlets. > Drag the UPS to the Workspace. > From the Selected Component pane, drag the power plug to a power outlet on the wall plate. > Click the power button on the UPS to turn it on. Plug the computer and monitor in to the appropriate power outlets. > Under Partial Connections for the computer, select the power cord. > From the Selected Component pane, drag the AC Power Connector (Male) to a battery backup outlet on the top of the UPS. > Under Partial Connections for the monitor, select the power cord. > From the Selected Component pane, drag the AC Power Connector (Male) to a battery backup outlet on the top of the UPS. Plug the printer in to the appropriate power outlets. > Select the printer in the Workspace. > From the Selected Component pane, drag the AC Power Connector (Male) to a surge protected outlet on the bottom of the UPS. Printers typically require more power than can be supplied by the battery backup portion of a UPS. In addition, if the printer loses power, no work will be lost. Connect to the network through the UPS. > Above the surge protector, select Side to switch to the side view of the UPS. > Select the RJ45 Shielded Connector (Cat6a) cable connected to the network port on the wall plate. > From the Selected Component pane, drag the RJ45 Shielded Connector from the wall plate to the Network OUT port on the UPS to add protection to the network connection. The OUT port connects to the computer. > Under Shelf, expand Cables. > Select the Cat6a Cable. > From the Selected Component pane: ~ Drag an RJ45 Shielded Connector to the Network IN port on the UPS. ~ Drag the unconnected RJ45 Shielded Connector to the network port on the wall plate. Connect the USB cable to the UPS and the computer. > Above the computer, select Back to switch to the back view of the computer. > Under Shelf, select USB Cable (A/B). > From the Selected Component pane: ~ Drag the USB Type B Connector to the USB port on the UPS. ~ Drag USB Type A Connector to an open USB port on the computer to allow the UPS to communicate with the computer. > The USB cable allows the UPS to send signals to the computer to shut down when the battery is low. Verify that the computer and monitor have power: > Above the computer, select Front to switch to the front view of the computer. > Select the power button on the monitor to make sure the power is connected. > Select the power button on the computer to make sure it powers up. > From the top left, select Office 1. > From the wall plate, drag the AC Power Connector (Male) to the Workspace. > From the Office 1 monitor, select Click to view Windows 11. > Because the computer is being powered by the UPS, the computer is still on.

You have recently completed a major project that is vital to your company's success. To ensure that this and all future data is protected, you have decided to implement Windows 10 backups. In this lab, your task is to: > Configure the Backup (E:) drive as the backup drive. > Back up files daily. > Keep files for 6 months. > Back up the entire Data (D:) volume. > Make a backup now.

Add a drive to which backups can be saved. > Right-click Start and select Settings. > Select Update & Security. > From the left pane, select Backup. > Select Add a drive. > Select Backup (E:). Notice that Automatically back up my files is automatically set to ON. Configure when backups will happen and how long to keep them. > Select More options. > Under Back up my files, use the drop-down menu to select Daily. > Under Keep my backups, use the drop-down menu to select 6 months. Configure which folders to back up and then run a backup. > Under Back up these folders, select Add a folder. > Expand and select This PC > Data (D:). > Select Choose this folder. > Scroll to the top and select Back up now.

You are the IT administrator for a small corporate network. An employee has just called you saying that when they turn their laptop computer on, it comes up with a funny screen that they don't recognized. In this lab, your task is to: > Boot the Exec-Laptop computer and evaluate the system. > Answer Question 1. > Determine which option would most likely fix the issue and run that option.

Boot the Exec-Laptop computer and evaluate the system. > Above the Exec-Laptop, select Top to view the power button. > Turn on the desktop computer by selecting the power button. > From the top right, select Answer Questions. > Answer Question 1. ~ Q1: Which environment is the computer booting into? > Minimize the question window. Determine which option would most likely fix the issue. > Select Advanced options. > Select Troubleshoot. > Select Advanced options. Determine which option to use. Use the applicable option to repair the computer. > Select Startup Repair. > Allow the computer to boot into Windows. On a real computer, the Startup Repair option may take an hour or more. > From the top right, select Answer Questions. > Select Score Lab.

You are the IT administrator for a small corporate network. The employee in Office 1 needs your assistance setting attributes on files and folders. In this lab, your task is to: > Compress the D:\Graphics folder and all of its contents. > Make the following files Read-only: ~ D:\Tools\Snagit.exe ~ D:\Tools\Audacity-64bit.exe > Hide the D:\Finances folder.

Compress the D:\Graphics folder. > From the Windows taskbar, select File Explorer. > Maximize the window for better viewing. > From the left pane, expand and select This PC > Local Disk (D:). > Right-click the Graphics folder and then select Properties. > From the General tab, select Advanced. > Select Compress contents to save disk space and then select OK. > Select OK to close the Graphics Properties dialog. The Confirm Attribute Changes dialog is shown. > Make sure Apply changes to this folder, subfolders and files is selected and then select OK. From the D:\Tools folder, configure the Audacity-64bit.exe and the Snagit.exe programs to have the Read-only attribute. > Double-click Tools to view this folder's contents. > Right-click [file_name].exe and then select Properties. > Select Read-only and then select OK. > Repeat steps 2b - 2c to configure attributes for the second file. Hide the D:\Finances folder. > From the left pane, expand and select This PC > Local Disk (D:). > Right-click Finances and then select Properties. > For Attributes, select Hidden and then select OK. > Make sure Apply changes to this folder, subfolders and files is selected and then select OK.

You work at a computer repair store. You want to use the RAID feature on the motherboard to configure two RAID arrays. You have installed five new SATA hard drives on the computer. You have installed Windows on the first drive, and you want to use the other four drives for your RAID arrays. In this lab, your task is to: > Configure the SATA to support the RAID mode. ~ Use F2 or the Delete keys to enter the systems BIOS settings. > Using two disks, create a striped raid volume named LD1 (Logical Disk 1). Use all of the space on the two disks. > Using two disks, create a mirrored raid volume named LD2 (Logical Disk 2). > Use all of the space on the two disks. If you miss the keystrokes for entering the BIOS or RAID configuration utility, select Send Ctrl + Alt + Del at the bottom of the screen to restart the computer.

Configure RAID for the SATA drive mode. > On the computer, select the power button to turn the computer on. > When you see the BIOS load screen, press Delete or F2 to enter the BIOS. > From the left pane, expand and select System Configuration > SATA Operation. > From the right pane, select RAID On. > Select Apply. > Select Exit and then (when prompted) press CTRL + I (i) to enter the RAID Configuration Utility. Define a striped array using the name LD1. > With Create RAID Volume highlighted, press Enter. > In the Name field, enter LD1. > Press the TAB key to highlight RAID Level. > Use the up and down arrow keys to select RAID0 (Stripe). > Press the TAB key to highlight Select Disks. > Press Enter to view the available disks. > Use the arrow keys to highlight ID 1 and then press the space bar to select the disk. > Use the arrow keys to highlight ID 2 and then press the space bar to select the disk. > Press Enter. > Press the TAB key to highlight Create Volume and then press Enter. > Press Y to create the RAID array. Define a mirrored array using the name LD2. > With Create RAID Volume highlighted, press Enter. > In the Name field, enter LD2. > Press the TAB key to highlight RAID Level. > Use the up and down arrow keys to select RAID1 (Mirror). > Press the TAB key to highlight Select Disks. > Press Enter to view the available disks.Use the arrow keys to highlight ID 1 and then press the space bar to select the disk. > Use the arrow keys to highlight ID 2 and then press the space bar to select the disk. > Press Enter. > Press the TAB key to highlight Create Volume and then press Enter. > Press Y to create the RAID array.

You are the IT administrator for a small corporate network. The Marketing6 computer needs to connect to the local network and internet using a static IP address. Marketing6 also needs to connect to a testing network using a static IP address. The testing network will be set up at a later time. You have already installed the second network card for the testing network. In this lab, your task is to: Configure the IP version 4 TCP/IP settings for both network adapters using the settings below: > Ethernet ~ IP address: 192.168.0.254 ~ Subnet mask: 255.255.255.0 ~ Default gateway: 192.168.0.5 ~ Preferred DNS server: 163.128.78.93 ~ Alternate DNS server: 163.128.80.93 >Ethernet 2 ~ IP address: 10.0.255.254 ~ Subnet mask: 255.255.0.0 ~ Default gateway: none ~ Preferred DNS server: none . ~ Alternate DNS server: none

Configure the Ethernet adapter to use a static IP address. > From the notification area, right-click the Network icon and select Open Network & Internet settings. > From the right pane, select Change adapter options to configure the Ethernet adapter. > Right-click Ethernet and select Properties. > Select Internet Protocol Version 4 (TCP/IPv4). > Select Properties. > Select Use the following IP address. > Configure the addresses. ~ IP address: 192.168.0.254 ~ Subnet mask: 255.255.255.0 ~ Default gateway: 192.168.0.5 ~ Preferred DNS server: 163.128.78.93 ~ Alternate DNS server: 163.128.80.93 > Select OK. > Select Close. Configure the Ethernet 2 adapter to use a static IP address. > Right-click Ethernet 2 and select Properties. > Select Internet Protocol Version 4 (TCP/IPv4). > Select Properties. > Select Use the following IP address. > Configure the addresses. ~ IP address: 10.0.255.254 ~ Subnet mask: 255.255.0.0 ~ Default gateway: none (leave blank) ~ Preferred DNS server: none (leave blank) ~ Alternate DNS server: none (leave blank) > Select OK. > Select Close.

You are the IT administrator for a small corporate network. You have recently re-imaged the computer in Office 1, and now you need to add it to the domain. In this lab, your task is to: > Connect the Office1 computer to the local Active Directory domain. ~ Domain name: CorpNet.local ~ Domain account: jgolden ~ Password: jgolden > Restart the computer and verify that it is a member of the domain.

Connect the Office1 computer to the local Active Directory domain. > Right-click Start and then select Settings. > Select Accounts. > Select Access work or school. > Under Access work or school, select Connect. > Select Join this device to a local Active Directory domain. > In the Domain name field, enter CorpNet.local. > Select Next. > Enter jgolden in the User name field. > Enter jgolden in the Password field. > Select OK. > Select Restart now. Verify that Office1 is connected to the CorpNet.local domain. > Right-click on the network icon and select Network and Internet settings. > Verify that Office1 is connected to the CorpNet.local domain and has internet access.

You work at a computer repair store, and you are on site at a customer's office. They have signed up for cable internet access. The cable company has installed a line in their office. You need to configure the network so that wired and wireless computers can share the cable internet connection. In the customer's office, all connectors on the wall plate are for WAN connections only. You do not have LAN connections inside the office. In this lab, your task is to connect the components to set up an internet connection. > Connect the cable modem to the WAN connection on the wall plate. > Connect the wireless router to the cable modem. > Connect the computer to the wireless router. > Provide power to the cable modem. > Provide power to the the wireless router. In this lab, you will only configure the hardware to set up the internet connection. You will not complete operating system tasks, configure the cable modem, or configure the wireless router.

Connect the cable modem to the WAN connection on the wall plate. > Under Shelf, expand Routers. > Drag the Cable Modem to the Workspace. > Above the cable modem, select Back to switch to the back view of the cable modem. > Under Shelf, expand Cables. > Select Coaxial Cable. > From the Selected Component pane: ~ Drag a Coaxial Type F Connector to the port on the cable modem. ~ Drag the unconnected Coaxial Type F Connector to the port on the wall plate. Connect the wireless router to the cable modem. > Under Shelf, expand Routers. > Drag the Router, Wireless, Ethernet router to the Workspace. > Above the wireless router, select Back to switch to the back view of the wireless router. > Under Shelf, expand Cables. > Select the Cat6a Cable. > From the Selected Component pane: ~ Drag an RJ45 Connector to the Internet port on the wireless router. ~ Drag the unconnected RJ45 Connector to the LAN port on the cable modem. Connect the computer to the wireless router.Above the computer, select Back. > Under Shelf, select the Cat6a Cable. > From the Selected Component pane: ~ Drag an RJ45 Connector to the network port on the computer. ~ Drag the unconnected RJ45 Connector to a LAN port on the wireless router. Provide power to the cable modem. > Under Shelf, select the Power Adapter. > From the Selected Component pane: ~ Drag the DC Power Connector to the port on the cable modem. ~ Drag the AC Power Adapter to an open wall outlet. Provide power to the wireless router. > Under Shelf, select the Power Adapter. > From the Selected Component pane: ~ Drag the DC Power Connector to the port on the wireless router. ~ Drag the AC Power Adapter to the power outlet.

You need to configure a VPN connection on a laptop in your organization. The user needs to be able to establish a secure connection to the company network while working on the road. You need to choose a VPN type that operates using firewall ports that are left open on most networks, and you need to use the most secure password-based authentication possible without using a smart card. It is not necessary to specify a domain when configuring this VPN connection. In this lab, your task is to: Configure a VPN connection on Office2-Lap using the following settings: > VPN provider: Windows (built-in) > Connection name: SalesVPN > Server address: 198.10.20.12 > VPN type: Secure Socket Tunneling Protocol (SSTP)SSTP works by encapsulating PPP traffic over the SSL channel of the HTTPS protocol. This type of VPN runs on port 443, which is typically left open on most network firewalls. > Don't allow Windows to remember authentication credentials. Connect to Sales > VPN.Username: MaryS49 > Password: Sm4rt72#

Create a VPN connection on Office2-Lap. > Right-click Start and then select Settings. > Select Network & internet. > From the right pane, select VPN. > Select Add VPN. > Under VPN provider, use the drop-down menu to select Windows (built-in). > Enter SalesVPN in the Connection name field. > In the Server name or address field, enter 198.10.20.12 for the server address. > Under VPN type, use the drop-down menu to select Secure Socket Tunneling Protocol (SSTP). > Under Type of sign-in info, make sure User name and password is selected. > Scroll to the bottom and unmark Remember my sign-in info. > Select Save. Connect to SalesVPN. > For SalesVPN, select Connect. > In the User name field, enter MaryS49 as the username. > In the Password field, enter Sm4rt72# as the password. > Select OK.

You are the IT administrator for a small corporate network. One of the executives is preparing to give a presentation. She expects the machine to be plugged in during the presentation. However, while she prepares the presentation, she will likely run on battery power. You need to help her create a power plan to accommodate both conditions that won't interfere with the presentation if the machine is not plugged into a power source. In this lab, your task is to: > Create a custom power plan named Presentation based on the Balanced plan as follows: Settings >> Turn off the display after On Battery >> 1 hour Plugged In >> Never Settings >> Put the computer to sleep after On Battery >> 2 hours Plugged In >> Never Settings >> Turn off the hard disk after On Battery >> 15 min Plugged In >> Never (use 0) Settings >> Low battery action On Battery >> Hibernate Plugged In >> Do nothing > Make the new power plan the current plan.

Create a custom balanced power plan. > Right-click Start and then select Power Options. > Maximize the window for better viewing. > From the right pane, under Related settings, select Additional power settings. > From the left, select Create a power plan. > Make sure Balanced is selected. > Change the Plan name field to Presentation. > Select Next. > Using the drop-down menus, configure the Presentation power plan as follows: Settings >> Turn off the display On Battery >> 1 hour Plugged In >> Never Settings >> Put the computer to sleep On Battery >> 2 hours Plugged In >> Never > Select Create. Modify the Presentation power plan's settings. > To the right of Presentation, select Change plan settings. > Select Change advanced power settings. > Expand Hard disk. > Expand Turn off hard disk after. > Select On battery. > Enter 15 in the On battery field. > Select Plugged in. > Enter 0 in the Plugged in field. > Expand Battery. > Expand Low battery action. > Select On battery. > From the On battery drop-down menu, select Hibernate. > Select Plugged in. > From the Plugged in drop-down menu, make sure Do nothing is selected. > Select OK.

In this lab, you will use some system commands to explore the file system. Your task is to complete the following from Windows PowerShell. In Windows 11 PowerShell is also referred to as the "Windows Terminal". > Copy a file to a new folder. ~ Create a new folder in the E: drive named Graphics. ~ Copy D:\Graphics\cat.jpg to the E:\Graphics folder. > Use nslookup to query the DNS for the CorpServer server using its full name (CorpServer.CorpNet.local). ~ Answer Question 1. > Use chkdsk to check the file system on the D: Data volume. ~ Answer Question 2. > Use gpupdate to apply the latest Group Policy changes to your workstation. ~ Use gpresult /r to see which policies are applied to the workstation. ~ Answer Question 3. > Use Task Manager to identify the process ID (PID) for the Language Application; then use taskkill to stop that process. > Use net use to map the P: drive to the Personnel shared folder on CorpFiles. ~ Change to the P: drive to look at the folders on the drive. ~ Answer Question 4.

Create a new folder and copy a file into that folder. > Right-click Start and select Windows Terminal (Admin) to open Windows PowerShell. > At the PowerShell prompt, type E: and press Enter. > Type dir or ls; then press Enter to view the folders. > Notice that there are no folders or files on the drive. > Type md Graphics and press Enter to create the Graphics folder. > Type cd Graphics and press Enter to move to the Graphics folder. > Type D: and press Enter to change to the D: drive. > Type dir or ls; then press Enter to view the folders. > Type cd Graphics and press Enter to move to the Graphics folder on the D: drive. > Type copy cat.jpg E: and press Enter to copy the file from the D: drive to the E:\Graphics folder. > Type E: and press Enter to change back to the E: drive. > Type dir and press Enter. > Notice that the cat.jpg file was copied. Find the IP address of CorpServer. > From the PowerShell prompt, type nslookup CorpServer.CorpNet.local and press Enter. > CorpDC responds to the query with the IP address for CorpServer. > From the top right, select Answer Questions. > Answer Question 1. ~ Q1: What is the IP address of CorpServer.CorpNet.local? Check for bad sectors. > From the PowerShell prompt, type chkdsk D: and press Enter. > Answer Question 2. ~ Q2: How many bad sectors were found? Update the computer's policies. > From the PowerShell prompt, type gpupdate and press Enter. > Type gpresult /r and press Enter. > Answer Question 3. ~ Q3: Which of the following Applied Group Policy Objects were updated? Kill the Language Application task. > Right-click Start and select Task Manager. > Select the Details tab. > Find the PID for the Language Application. > From the PowerShell prompt, type taskkill /pid 6661 and press Enter. > Notice that the Language Application was removed from the Task Manager window. > Close Task Manager. Map a drive to a folder on the server. > From the PowerShell prompt, type net use P: \\CorpFiles\Personnel and press Enter. > Type P: and press Enter. > Type dir and press Enter. > Answer Question 4. ~ Q4: How many folders are in the root of the P: drive? > Select Score Lab.

You are the IT administrator for a small corporate network. The employee in the Marketing Group C office needs your assistance managing files and folders. In this lab, your task is to use the PowerShell tool to complete the following: IMPORTANT: Do NOT close the PowerShell window. If you do, you will need to restart the lab. > Create the D:\utilities\recover directory. > Delete the D:\software\arch98 directory and all of its files. > Set the following files to Hidden: ~ D:\software\apconf.exe ~ D:\cmdstrt.cfg ~ D:\strt.bat > Set the following files to Read-only. ~ D:\software\softcfg.cfg ~ D:\software\pixel.cfg > The Windows taskbar has been disabled for this lab. > You can press the up arrow key to recall the last command and then modify the command to use a different filename.

Create the D:\Utilities\Recovery folders. > At the PowerShell prompt, type d: and press Enter to change the working directory to the D: drive. > Type dir and press Enter to see the existing contents of the drive. > Type md utilities\recover and press Enter to create the directory. > Type dir and press Enter to verify that the d:\utilities folder was created. > Type cd \utilities\recover and press Enter to verify that the folders were created. Delete the D:\software\arch98 directory and all of its files. > (Optional) ~ Type cd \software\arch98 and press Enter to verify that these folders exist. ~ Type cd \ and press Enter to change the working directory back to the root of the hard drive. ~ Type rmdir d:\software\arch98 and press Enter to delete the arch98 directory. ~ The directory could not be deleted because it contains files. ~ Type rmdir /? and press Enter to see a list of switches that can be used with the command. ~ Type rmdir d:\software\arch98 switch and press Enter to delete the directory and all of its contents. ~ Type Y and press Enter to confirm the deletion. Set file attributes to hide the following files: ~ D:\software\apconf.exe ~ D:\cmdstrt.cfg ~ D:\strt.bat > Type attrib /? and press Enter to see the syntax for using the command. > Type attrib path\filename and press Enter. > Which attributes are currently set for the file? > Type attrib +h path\filename and press Enter. > Type attrib path\filename and press Enter to verify that the file attribute was set. > Repeat steps 3b - 3d for the remaining two files. Set file attributes for the following files to Read-only: ~ D:\software\softcfg.cfg ~ D:\software\pixel.cfg > Type CD \Software and then press Enter. > Type attrib +r filename and press Enter to set the file to Read-only. > Type attrib filename and press Enter to verify that the file attribute was set. > Repeat steps 4b - 4c to set the additional file to Read-only.

You have shared a number of files located on your computer with other employees in your company. This has been working fine. However, when you came in the office today, you received a number of calls from users who say they can't connect to your shared files. After checking your computer, you find that the Ethernet cable was unplugged. You have now plugged the Ethernet cable in, and now you need to start the network interface card. In this lab, your task is to: > Determine which network interface went down when the Ethernet cable was unplugged. > Start the network interface from the command line. > Verify that the network interface is up.

Determine which network interface went down when the Ethernet cable was unplugged. > From the Favorites bar, select Terminal. > From the Terminal prompt, run any of the following commands. Press Enter after typing in the chosen command. ~ ip addr ~ ip addr show ~ ip addr show enp2s0 ~ ifconfig -a Start the network interface from the command line and verify that it is up. > From the Terminal prompt, run any of the following commands. Press Enter after typing in the chosen command. ~ ifup enp2s0 ~ ip link set enp2s0 From the Terminal prompt, run any of the following commands. Press Enter after typing in the chosen command. ~ ip addr ~ ip addr show ~ ip addr show enp2s0 ~ ifconfig -a

Your computer has a single paging file managed by the system on the system volume (C:). To increase system performance, you would like to move the paging file to the D: volume. In this lab, your task is to: > Disable the automatically managed paging file. > Delete the paging file on the C: drive. > Create a paging file on the D: drive using the following settings: ~ Initial size = 2048 ~ Maximum size = 3072 > Reboot to apply the changes.

Disable automatically managed paging files for all drives. > Right-click Start and then select Settings. > From the right pane, scroll to the bottom and select About. > In the Related links box, select Advanced system settings. > The System Properties are shown, and the Advanced tab is selected. > On the Advanced tab in the Performance section, select Settings. > Select the Advanced tab. > Under Virtual memory, select Change. > Clear Automatically manage paging file size for all drives to change the default settings. Remove the paging file from the C: drive. > Under Drive [Volume Label], make sure the C: drive is selected. > Select No paging file and then select Set. > Read the warning message and then select Yes. Add a custom paging file to the D: drive. > Select the D: drive. > Select Custom size and configure its options as follows: ~ Initial size (MB): 2048. ~ Maximum size (MB): 3072 ~ Select Set to add the paging file. > Select OK to save your changes. > Select OK to confirm that a restart is required. > Select OK to close the Performance Options dialog. > Select OK to close the System Properties dialog. Select Restart Now and wait for the computer to reboot to Windows.

You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the Office2 computer. For example, the new Broadcom network card you installed isn't working as expected (the speed is only 1 Mbps). Until you can figure out what the problem is, you have decided to use the Realtek network card instead. In addition, you have recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. In this lab, your task is to: > Disable the Broadcom network adapter. > Enable and update the Realtek network adapter. > Roll back the video card driver. > Connect the Ethernet cable to the integrated Realtek adapter.

Disable the Broadcom network adapter. > Right-click Start and select Device Manager. > Expand Network adapters. > Right-click Broadcom NetXtreme 57xx Gigabit Controller and select Disable device. > Select Yes. Enable and update the Realtek network adapter. > Right-click Realtek 8169 and select Enable device. > Right-click Realtek 8169 and select Update driver. > Select Search automatically for updated driver software. > After the driver is installed, select Close. Roll back the video card driver. > Expand Display adapters. > Right-click ATI Radeon HD 3300 and select Properties. > Select the Driver tab. > Select Roll Back Driver. > Select Yes. > Select OK. Move the Ethernet cable to the integrated network port on the motherboard. > From the top left, select Office 2 to view the computer. > Above the computer, select Back to switch to the back view of the computer. > Drag the Ethernet connector from the PCIe NIC to the integrated network port on the motherboard.

Zoey, an employee in Office1, is responsible for developing an important new advertising campaign. To protect her data, you have decided to enable File History on her Windows 10 system and configure it to take frequent snapshots of her files. In this lab, your task is to: > Enable File History on the Data (D:) volume. > Configure File History to save copies of files every 10 minutes. > Retain previous versions of files for 3 months.

Enable File History on the Data (D:) volume. > Select Start. > Scroll down and expand Windows System and then select Control Panel. > Select System and Security. > Select File History. > Verify that disk Data (D): has been selected for storing File History information. > Select Turn on. Configure File History. > From the left, select Advanced settings. > Use the Save copies of files drop-down menu to select Every 10 minutes. > Use the Keep saved versions drop-down menu to select 3 months. > Select Save changes.

You need to customize the Remote Desktop settings on your computer to allow Tom Plask, a help desk technician, remote access to your computer. In this lab, your task is to: > Enable Remote Desktop. > Allow Tom Plask to connect to your computer using a Remote Desktop connection. > Verify that the firewall ports for Remote Desktop are opened appropriately.

Enable Remote Desktop. > Right-click Start and then select Settings. > From the right pane, scroll down and select Remote Desktop. > For Remote Desktop, slide the switch to ON. > Select Confirm. Select the users that can remotely access this PC. > From the right pane, select Remote Desktop users. > Select Add. > In the Enter the object names to select field, type Tom Plask and then select Check Names. > Select OK to choose the user. > Select OK to add the user. Verify the firewall port configuration. > From the left pane, select Privacy & security. > From the right pane, select Windows Security. > Select Open Windows Security. > Select Firewall & network protection. > Select Allow an app through firewall. > Scroll down and verify that Remote Desktop is selected, indicating that the port is opened. The corresponding port is opened or closed automatically when you enable or disable Remote Desktop. > Select Cancel.

You are the IT administrator for a corporate network. You just received an email from Margarita, who produces your organization's monthly magazine. The email was to notify you that she had created a help desk ticket using Issue Trax, and she hoped that someone could help her straight away. The computer you work from is named ITAdmin. In this lab, your task is to: > Open Issue Trax and the open ticket. > Resolve the issue using the information found in the open ticket. > Add a comment to the ticket indicating that the ticket has been resolved. > Close the ticket.

From ITAdmin, determine the needs and possible fixes for Margarita's help desk ticket. > From the taskbar, select Issue Trax. > Maximize the window for better viewing. > Select ticket #21. > From the open ticket, determine the best course of action to resolve Margarita's issue. > Leave the ticket maximized so you can see the details. Access the File History options on Marketing6 using the Settings app. > From the top left, select Floor 1. > Under Building A, select Floor 2. > Under Marketing Group C, select Marketing6. > Right-click Start and then select Settings. > Select Update & Security. > From the left pane, select Backup. > Make sure Automatically back up my files is set to On. > Select More options. > Scroll to the bottom of the Backup options dialog and, under Related settings, select Restore files from a current backup. > Maximize the window for better viewing. Restore the March2022_Issue.jpg file. > From the bottom of the File History dialog, select the Previous version button (left arrow) to navigate to the backups captured on Tuesday, March 15, 2022 11:15 AM. > Double-click on the Pictures folder. > Double-click on the Layouts folder. > Select the March2022_Issue.jpg file. > Select Restore to original location (green arrow) located at the bottom center. > Select Replace the file in the destination. > The Layouts folder, where the file was restored, opens. > From the Layouts folder, right-click the March2022_Issue.jpg file and then select Properties. > Verify that the file was last modified on March 15, 2022 at 11:15:12 AM. > Select OK. > Close the Layouts window. Restore the Coverart.jpg file. > In the top left of File History, select the up arrow to navigate to the Home\Pictures folder. > Select the Next version button (right arrow) at the bottom to navigate to the backups captured on Monday, March 14, 2022 10:15 AM. > Double-click on the Images folder. > Select the coverart.jpg file. > Select Restore to original location (green arrow) located at the bottom center. > Select Replace the file in the destination. > Right-click the coverart.jpg file and select Properties. > Verify that the file was last modified on Monday, March 14, 2022 10:15:12 AM. > Select OK. Add a comment to the ticket and close the ticket. > From the top left, select Floor 2. > Under Building A, select Floor 1. > Under IT Administration, select ITAdmin. > In the New Comment field of the open ticket, enter a comment of your choice to indicate that the files were restored. > Select + (the plus sign) to add the comment. > From the top of the ticket: ~ Select Closed. ~ Select the left arrow. > There are no more tickets to be processed. > Close Issue Trax.

You are one of the IT administrators for a corporate network. Your manager (Melanie) has been working on a help desk ticket that was created by the marketing manager (Elijah). Your manager has now asked you to complete the remaining requirements for this ticket. In this lab, your task is to: > Open Issue Trax and the open ticket. > Assign the ticket to yourself (Me). > Resolve the remaining issues using the information found in the open ticket. > Add a comment to the ticket indicating that it has been resolved. > Close the ticket.

From ITAdmin, review the help desk ticket. > From the taskbar, select Issue Trax. > Maximize the window for better viewing. > Select ticket #11. >Using the Assignee dropdown list, assign the ticket to Me (yourself). > From the open ticket, determine the remaining tasks that need to be completed. > Leave the ticket maximized so you can see the details. Configure the integrated NIC for PXE boot. > From the top left, select Floor 1. > Under Building A, select Floor 2. > Under Marketing Group C, select Hardware. > On the computer, select the power button and, while the computer is starting, press F2 to enter the Setup Utility. > Expand System Configuration. > Select Integrated NIC. > Select Enabled w/PXE. > Select Apply. > From the left pane, under General, select Boot Sequence. > Make sure that Onboard NIC has a check mark. > Select Exit. Boot the computer and install the Window 10 image. > From the Windows Boot Manager, press Enter to select the Windows 10 (x64) image. > View the image being downloaded. > After the image is downloaded, verify that the computer boots to Windows 10. Add a comment to the ticket and close the ticket. > From the top left, select Floor 2. > Under Building A, select Floor 1. > Under IT Administration, select ITAdmin. > In the New Comment field of the open ticket, enter a comment of your choice to indicate that the OS has been installed. > Select + (the plus sign) to add the comment. > From the top of the ticket, select Closed. > Close Issue Trax.

You are the IT administrator for a small corporate network. The Office1 computer will be used by three employees as follows: > Sylvia needs to be able to perform all actions on the computer. > Scott needs to be able to back up and restore files, but should not have any other rights above those of a normal user. > Jed needs normal access to start the computer, run applications, and save files. All users automatically become members of the Users group when you create the user accounts. In this lab, your task is to create user accounts and add them to groups as follows: User Account > Sylvia Account Settings > Assign an initial password of 0Clever1 (0 is a zero). Force the user to change the password at next logon. Force the user to change the password at next logon. User Account > Scott Account Settings > Assign an initial password of 0Clever1 (0 is a zero). Force the user to change the password at next logon. Add to the applicable group. User Account > Jed Account Settings > Assign an initial password of 0Clever1 (0 is a zero). Force the user to change the password at next logon.

From Office1, create the user accounts for Scott, Sylvia, and Jed. > Right-click Start and select Computer Management. > Maximize the window for better viewing. > Expand Local Users and Groups. > Right-click Users and select New User. > In the User Name field, enter the username. > In the Password field, enter 0Clever1 (0 is a zero). > In the Confirm password field, enter 0Clever1 (0 is a zero). > Make sure User must change password at next logon is selected. > Select Create. > Repeat steps 1d - 1h to create the additional user accounts. > Select Close. Add the new user to their applicable group. > From the left pane, select Groups. > In the center pane, right-click the group and then select Add to Group. ~ Sylvia > Administrators and Users groups only ~ Scott > Backup Operators and Users groups only ~ Jed > Users group only > Select Add. > Under Enter the object names to select, enter the username to be added to the group; then select OK. > Select OK. > Repeat steps 2b - 2e to assign additional users to other groups.

In this lab, you will use several commands from the Terminal to manage files. You are currently in the wadams home directory (/home/wadams). In this lab, your task is to: > Use the rm command to delete the old_myfile.txt file found in your home directory. > Use the touch command to create the new_myfile.txt file in your home directory. > Use nano or vi to add some text of your choosing to the new_myfile.txt file you just created. > Use the cat command to view the changes you made to the file. > Use the cp command to copy the new_myfile.txt file to the /home/wadams/practice directory. > Use the mv command to rename /home/wadams/practice/new_myfile.txt to final_myfile.txt. > Be sure to use the correct spelling, capitalization, and spacing when using a command line interface.

From the wadams home directory, use the rm command to delete the old_myfile.txt file. > From the Favorites bar, select Terminal. > From the Terminal prompt, type ls -l and press Enter to see a listing of the files in the directory. > Type rm old_myfile.txt and press Enter. > Type y and then press Enter to remove the old_myfile.txt file. > Type ls -l and press Enter to see that the old_myfile.txt file was removed from the directory. Use the touch command to add the new_myfile.txt file. > From the Terminal prompt, type touch new_myfile.txt and press Enter to create a new file in the wadams home directory. > Type ls -l and press Enter to see that the new_myfile.txt file was created. Use nano to add a line to the new_myfile.txt file. > From the Terminal prompt, type nano new_myfile.txt and press Enter to use the nano editor to open the new_myfile.txt file for editing. > From within the editor, type some text of your choosing. > Press Ctrl+x to exit the edit mode. > Press y to save the modified buffer and then press Enter to save and exit the file. Use the cat command to view the changes you made to the new_myfile.txt file. > Type cat new_myfile.txt and then press Enter to view the contents of this file. Use the cp command to copy the new_myfile.txt file to the directory named practice. > From the Terminal prompt, type cp new_myfile.txt /home/wadams/practice and press Enter to copy the new_myfile.txt file to the practice directory. > Type cd practice and press Enter to move to the practice directory. > Type ls -l and press Enter to see that the new_myfile.txt file is in the /home/wadams/practice directory. Use the mv command to rename the new_myfile.txt file to final_myfile.txt. > Type mv new_myfile.txt final_myfile.txt and press Enter to rename the new_myfile.txt file. > Type ls -l and press Enter to see that the file name has changed.

Brenda Cassini (bcassini) is taking over payroll documentation for Will Adams (wadams). In this lab, your task is to give the bcassini user ownership of the /hr/payroll file. Use the ls -l command to verify the ownership changes.

Give the bcassini user ownership of the /hr/payroll file. > From the Favorites bar, select Terminal. > At the Terminal prompt, type ~ chown bcassini /hr/payroll ~ press Enter to give bcassini ownership of the /hr/payroll file. > Type ~ ls -l /hr ~ press Enter to verify the change in ownership.

You need to optimize your Windows 10 system by disabling unnecessary services and applications at startup. You also need to ensure that necessary services are enabled and automatically start when the system boots. In this lab, your task is to: > Prevent the following services from loading at system startup: ~ Function Discovery Resource Publication ~ Link-Layer Topology Discovery Mapper ~ SNMP Trap ~ Telephony > Prevent the following applications from running at system startup: ~ Compy DVD Apps ~ DIRE Event Monitor ~ SM66 Win32 Utility > Start the following services and configure them to run automatically when the system starts: ~ Bluetooth Support Service ~ Print Spooler ~ Routing and Remote Access

Prevent services from loading at startup. > From the taskbar, in the search field, type System Configuration. > Under Best match, select the System Configuration app. > Select the Services tab. > Clear each service that is not required to load at system startup and then select Apply. Prevent applications from running at startup. > Select the Startup tab. > Select Open Task Manager. > From the Startup page, select the application that you do not want to run at startup and then select Disable. > Repeat step 2c for each additional application. > Close Task Manager. > Select OK to close the System Configuration dialog. > Select Exit without restart. Start and modify services. > Right-click Start and select Computer Management. > Maximize the window for better viewing. > Expand and select Services and Applications > Services. > From the Services pane, double-click the service that needs to be configured. > Using the Startup type drop-down menu, select Automatic. > Select Apply and then select Start. > Select OK. > Repeat steps 3d - 3g for the remaining services. > Close Computer Management.

You need to update the drivers for two devices in your system, the Realtek 8169 network adapter and the Mustek scanner. You have downloaded the driver for the network adapter to a USB drive that is currently on the Shelf. In this lab, your task is to: > Disconnect the external hard drive from the system. Be sure to use the correct procedure for removing the device from the operating system. > Insert the USB drive in a free USB port. Verify that the system detects the device. > Update the driver for the Realtek 8169 network adapter using the driver on the USB drive. > Update the driver for the Mustek scanner by searching Windows Update for the new driver.

Remove the external hard disk. > In the notification area of the taskbar, select the caret (^) icon to show hidden icons. > Select the removable device icon. > Select Eject extHDD-USB-2015. > From the top left, select Bench to switch to the hardware view to remove the external hard drive. > Above the external hard drive, select Back to switch to the back view of the hard drive. > Drag the USB Cable from the external hard drive and place it on the Workspace. > Above the computer, select Back. > Drag the USB Type A Connector from the computer to the Workspace. Connect the USB drive. > Under Shelf, expand Storage Devices. > Drag the USB Thumb Drive to a USB port on the back of the computer. > On the monitor, select Click to view Windows 11. Update the driver for the network adapter. > Right-click Start and select Device Manager to open Device Manager. > From Device Manager, expand Network adapters. > Right-click Realtek 8169 and select Update Driver. > Select Browse my computer for driver software to use the driver on the USB drive. > Select Browse. > Select JumpDrive (E:) and then select OK. > Make sure Include subfolders is selected. > Select Next. > After the driver is installed, select Close. Update the driver for the scanner. > Expand Imaging devices to update the scanner driver. > Right-click Mustek ScanExpress 1200 Pro and select Update driver. > Select Search automatically for updated driver software. > After the driver is installed, select Close.

You are working on a small office/home office (SOHO) network. The homeowner recently changed their internet service provider (ISP), and they have an existing Ethernet router connected to an RJ45 jack on the wall plate. They have a new laptop and would like to connect this laptop to the internet with a wireless connection. You need to create a wireless network. In this lab, your task is to: > Access the hardware view, and select a wireless access point that meets the following criteria: ~ Transmission speeds up to 600 Mbps. ~ Backwards-compatible with other wireless standards that use 2.4GHz. > Install the wireless access point as follows: ~ Place the wireless access point on the computer desk. ~ Select the correct cable to connect the wireless access point to an open LAN port on the existing router. ~ Connect power to the wireless access point through an outlet on the surge protector or wall plate. > Configure the owner's new laptop to connect to the wireless network: ~ Enable the integrated wireless network interface card on the laptop using the physical switch. ~ Connect the laptop to the wireless network. Make sure that it connects automatically if the computer is rebooted.

Select and install a wireless access point on the Workspace. > From the home office view, under Computer Desk, select Hardware. > From the Shelf, expand Wireless Access Points. > Read the device descriptions to identify the correct wireless access point. > Drag the Wireless Access Point, 802.11b/g/n to the Workspace. For ease of use, place it next to the existing switch. > Above the wireless access point, select Back to switch to the back view of the wireless access point. Provide power to the wireless access point. > From the Shelf, expand Cables. > Select the Power Adapter. > From the Selected Component pane: ~ Drag the DC Power Connector to the port on the wireless access point. ~ Drag the AC Power Adapter to an open outlet on the surge protector. Connect the wireless access point to the router. > Above the router, select Back. > From the Shelf, select the Cat6a cable. > From the Selected Component pane: ~ Drag an RJ45 Shielded Connector to the Ethernet port on the back of the wireless access point. ~ Drag the other RJ45 Shielded Connector to one of the free LAN ports on the router. Configure the owner's new laptop to connect to the wireless network. > On the front of the laptop, click the wireless switch to enable the integrated wireless network interface on the laptop. > This will slide the switch to the ON position. > On the Home-Laptop monitor, select Click to view Windows 11. > In the notification area of the taskbar, select the network icon. > Select the arrow above Available. > Select TrendNet-BGN. > Select Connect Automatically. > Select Connect.

You are the IT administrator for a small corporate network. An employee in Marketing Group C is setting up a virtualization environment for software development. To make the system easier to use, they have requested dual monitors. You need to upgrade the Marketing6 computer to support dual monitors. You have purchased a second monitor and placed it in the Workspace (the monitor on the left). The video card in the computer currently only supports a single monitor, so you will need to upgrade the video card to support dual monitors. In this lab, your task is to: > Select and install a video card that provides you with dual-monitor support for both monitors using a digital connection to the video card. When installing the video card, connect the PCIe power connector to the video card. > Connect the left monitor to the newly installed video card using an HDMI cable. The new monitor is already plugged into the surge protector. > Connect the original monitor to the new video card using the DVI-D cable. > Turn on the computer. > Turn on the new monitor. > Make sure that Extend these displays is selected. > Configure the display properties to show the Start menu and taskbar on the left monitor. > Configure the relationship of the two monitors to reflect the physical placement of both monitors with the new Monitor 2 on the left as the main display.

Select and install the video card. > Above the right monitor, select Back to switch to the back view and examine the available ports. > Above the left monitor, select Back to examine the available ports. > On the computer, select the power button to turn the computer off. > Above the computer, select Motherboard to switch to the motherboard view of the computer. > Under Shelf, expand Video Cards. > Drag Video Adapter, DVI-I, HDMI, Crossfire, PCIe to the PCIe slot on the computer. > Select the power supply. > From the Selected Component pane, drag the Connector, Power Supply, 6-pin PCIe power connector into the video card power slot. Connect the new (left) monitor. > Above the computer, select Back. > Under Shelf, expand Cables. > Read the descriptions for each cable to identify the correct cable to connect each monitor to the computer. > Select the HDMI to HDMI Cable. > From the Selected Component pane: ~ Drag an HDMI Connector to the new video adapter in the computer. ~ Drag the unconnected HDMI Connector to the HDMI port on the left monitor. Connect the right monitor. > On the computer, drag the DVI-D connector from the built-in connector to the new video card in the computer. > Above the computer, select Front to switch to the front view for the computer. > Above the right monitor, select Front to switch to the front view. > Above the left monitor, select Front to switch to the front view. Extend the desktop to both monitors. > On the left monitor, select the power button. > On the computer, select the power button. > The computer starts on Monitor 1 (currently the right monitor), which has the Windows taskbar (so it is the main display). > Right-click the desktop and select Display settings. > Maximize the window for better viewing. > Under Multiple displays, Extend these displays is set by default. Make the left monitor the main monitor. > Under Select and rearrange displays, select the monitor labeled 2. > Under Multiple displays, select Make this my main display. > Notice that the taskbar disappear. > Under Select and rearrange displays, select Identify to verify which screen you are on. > The monitor displays a large 1. Change the arrangement of the monitors. > From the top left, select Marketing Group C to verify the main display. > On the left monitor, select Click to view Windows 10. > This monitor now has the Windows taskbar (so it is now the main display). > Right-click the desktop and select Display settings. > Under Select and rearrange displays, drag the 2 box for the monitor to the left so that the main display monitor is on the left. > Select Apply. > Select Identify to identify the monitor you are working with (Monitor 1 or Monitor 2) as identified by the operating system. > If you have configured the monitors correctly, the taskbar should show on the left monitor's screen.

You are the IT administrator for a small corporate network. You want to modify the power and battery settings for the laptop in Executive Office. In this lab, your task is to: > Set the following default settings for the power button action (for all existing power plans): ~ On battery: Hibernate ~ Plugged in: Shut down > Set the computer to use a password on wakeup. > Select and modify the High Performance power plan as follows: Option >> Turn off the display On battery >> 5 minutes Plugged in >> 1 hour Option >> Put the computer to sleep On battery >> 30 minutes Plugged in >> 5 hours Option >> When lid is closed On battery >> Sleep Plugged in >> Do nothing Be sure to set the default settings first so they don't overwrite the specific power plan settings.

Set the default settings for the power button. > Right-click Start and then select Power Options. > Maximize the window for better viewing. > Under Related settings, select Additional power settings. > Maximize the window for better viewing. > From the Power Options window, select Choose what the power buttons do to modify the power button behavior. > Using the drop-down menus, change the Power and sleep buttons and lid settings as follows: ~ Option >> When I press the power button ~ On battery >> Hibernate ~ Plugged in >> Shut down Set the computer to use a password on wakeup. > Select Change settings that are currently unavailable to change the password protection settings. > Under Password protection on wakeup, select Require a password. > Select Save Changes. Select and modify the High Performance power plan settings. > Under Hide additional plans, select High Performance. > Select Change plan settings (to the right of High Performance). > Using the drop-down menus, configure the High Performance plan as follows: Option >> Turn off the display On battery >> 5 minutes Plugged in >> 1 hour Option >> Put the computer to sleep On battery >> 30 minutes Plugged in >> 5 hours Configure how the power to the computer will be handled when the lid is closed. > Select Change advanced power settings. > Expand Power buttons and lid. > Expand Lid close action. > For On battery, make sure Sleep is selected. > Select Plugged in. > From the Plugged in drop-down list, select Do nothing. > Select OK. > Select Save Changes.

You have installed Hyper-V on the ITAdmin computer and are experimenting with virtual hard disks. In this lab, your task is to: Create a virtual hard disk named Test1 using the following parameters: > Disk format: VHD > Disk type: Fixed size > Disk filename: Test1.vhd > Location: D:\HYPERV\Virtual Hard Disks > New blank disk with a disk size of: 500 GB Create a virtual hard disk named Test2 using the following parameters: > Disk format: VHDX > Disk type: Dynamically expanding > Disk filename: Test2.vhdx > Location: D:\HYPERV\Virtual Hard Disks > New blank disk with a disk size of: 4096 GB

Start Hyper-V Manager. > From the taskbar, select Start. > In the search field, type Hyper-V. > Under Best match, select Hyper-V Manager. Create a virtual hard disk named Test1. > Right-click ITADMIN and then select New > Hard Disk. > From the Before You Begin window, select Next. > Select VHD and then select Next. > Make sure Fixed size is selected and then select Next. > In the Name field, enter Test1.vhd as the name of the hard disk. > Select Next. > For the Size field, use 500 GB and then select Next. > Select Finish. Create a virtual hard disk named Test2. > Right-click ITADMIN and then select New > Hard Disk. > From the Before You Begin window, select Next. > Make sure VHDX is selected and then select Next. > Make sure Dynamically expanding is selected and then select Next. > In the Name field, enter Test2.vhdx as the name of the hard disk. > Select Next. > For the Size field, use 4096 GB and then select Next. > Select Finish.

You have installed Hyper-V on ITAdmin. You want to create two new virtual machines (VMs) on which you will later install Windows 11. These new VMs will be used for testing. In this lab, your task is to: Create a new virtual machine named VM1 using the following parameters: > Virtual machine name: VM1 > Virtual machine location: D:\HYPERV > Generation: Generation 1 > Startup memory: 1024 MB (do not use dynamic memory) > Networking connection: External > Virtual hard disk name: VM1.vhdx > Virtual hard disk location: D:\HYPERV\Virtual Hard Disks > Virtual hard disk size: 50 GB > Operating system will be installed later. Create a new virtual machine named VM2 using the following parameters: > Virtual machine name: VM2 > Virtual machine location: D:\HYPERV > Generation: Generation 1 > Startup memory: 2048 MB (use dynamic memory) > Networking connection: Internal > Virtual hard disk name: VM2.vhdxVirtual hard disk location: D:\HYPERV\Virtual Hard Disks > Virtual hard disk size: 250 GB > Operating system will be installed later. Configure the minimum and maximum RAM values for VM2. > Minimum RAM: 512 MB > Maximum RAM: 4096 MB

Start Hyper-V Manager. > From the taskbar, select Start. > In the search field, type Hyper-V. > Under Best match, select Hyper-V Manager. From ITAdmin, create a new virtual machine named VM1. > Right-click ITADMIN and then select New > Virtual Machine. > In the Before You Begin window, select Next. > In the Name field, enter VM1 and then select Next. > Make sure Generation 1 is selected and then select Next. > For the Startup memory field, use 1024 MB as the amount of memory to use with the virtual machine; then select Next. > For Connection, use the drop-down menu to select External and then select Next. > For Connection, use the drop-down menu to select External and then select Next. > Make sure Create a virtual hard disk is selected. Virtual disks created along with virtual machines are dynamically expanding disks. If you need to create any other kind of disk, you can either create the disk before the virtual machine or convert the disk type after the virtual machine has been created. > In the Name field, make sure VM1.vhdx is entered. > In the Location field, make sure D:\HYPERV\Virtual Hard Disks is entered. > For the Size field, use 50 GB and then select Next. > Make sure Install an operating system later is selected and then select Next. > Select Finish to create the virtual machine. From ITAdmin, create a new virtual machine named VM2. > From Hyper-V manger, right-click ITADMIN and then select New > Virtual Machine. > In the Before You Begin window, select Next. > In the Name field, enter VM2. > Select Next. > Make sure Generation 1 is selected and then select Next. > In the Startup memory field, enter 2048 MB of memory to use with the virtual machine. > Mark Use Dynamic Memory for this virtual machine and then select Next. > For Connection, use the drop-down menu to select Internal and then select Next. > Make sure Create a virtual hard disk is selected. > In the Name field, make sure VM2.vhdx is entered. > In the Location field, make sure D:\HYPERV\Virtual Hard Disks is entered. > For the Size field, use 250 GB and then select Next. > Make sure that Install an operating system later is selected and then select Next. > Select Finish to create the virtual machine. Configure the minimum and maximum RAM values for VM2. > Under Virtual Machines, right-click VM2 to adjust the virtual machine memory. > Select Settings. > From the left pane, select Memory. > For the Minimum RAM field, use 512 MB. > For the Maximum RAM field, use 4096 MB and then select OK.

You are the IT administrator for a small corporate network. There are two groups of users who access the computer in Office 1, which are called DayGroup and NightGroup. Each group has a corresponding folder (D:\Day Data and D:\Night Data) on the computer respectively. You have been asked to help configure appropriate access to each folder for each group. In this lab, your task is to: > Turn off permissions inheritance for D:\Day Data and D:\Night Data. ~ Convert the existing permissions to explicit permissions. > Remove the Users group from each folder's ACL. > Add the appropriate group (DayGroup or NightGroup) to the folder's ACL. > Assign Full Control over each folder to the appropriate group. > Do not change any other permissions assigned to other users or groups.

Turn off permissions inheritance. > From the taskbar, select File Explorer. > Maximize the window for better viewing. > From the left pane, expand and select This PC > Data (D:). > Right-click the folder whose permissions you want to modify and select Properties. > Select the Security tab. > Select Advanced.Select Disable inheritance. > Select Convert inherited permissions into explicit permissions on this object. Remove the Users group from the Permission entries list (ACL). > Select Users. > Select Remove. > Select OK. Add the appropriate group to the folder's security (ACL). > From the Properties dialog, select Edit. > Select Add. > Enter the name of the group you want to add. > Select OK. Assign Full Control over each folder to the appropriate group. > With the group highlighted, under the Allow column, select Full Control. > Select OK to close the Permissions window. > Select OK to close the Properties window. Repeat steps 1d-4 to modify the permissions for each additional folder.

As a part of your daily maintenance, you scan for and kill any zombie processes on the system. In this lab, your task is to: > Use the ps aux command to find zombie processes. Zombie processes have a Z in the STAT column of the ps aux output. ~ Use the up/down arrows to view all the processes. > Use kill -9 PID to terminate the zombie processes. Use ps aux | more or ps aux | less to see all of the processes.

Use the ps aux command to find zombie processes. > From the Favorites bar, select Terminal. > At the Terminal prompt, type ps aux | less to view the list of processes. > Use the up/down arrows to find the processes with a status (STAT) of z. > Type q to exit the process list and return to Command Prompt. Terminate the zombie processes found. > Type ~ kill -9 1301 ~ press Enter. > Type ~ kill -9 1570 ~ press Enter. > Type ~ kill -9 1980 ~ press Enter.

You are the IT administrator for a small corporate network. You recently upgraded your network adapter to a Gigabit Ethernet adapter on the Office1 workstation. You have already installed the network card in a free PCIe slot and downloaded the latest drivers from the manufacturer's website. As such, your computer now has two network adapters installed - the new one you just added, and the original one you are replacing. Rather than remove the first network adapter, you have decided to leave it in your computer. However, you do not want Windows to use that network adapter. In this lab, your task is to: > Update the device driver for the Broadcom network adapter using the driver in the D:\drivers folder. > Disable the Realtek network adapter.

Using Device Manager, access the network adapters. > Right-click Start and select Device Manager. > Expand Network adapters. Update the drivers for the Broadcom adapter. > Right-click Broadcom NetXtreme 57xx Gigabit Controller and select Update driver. > Select Browse my computer for driver software to use the driver that you have downloaded. > In the Search for driver software in this location field, enter D:\drivers. > Make sure Include subfolders is selected and then select Next. > After the driver is installed, select Close. Disable the Realtek adapter. > Right-click Realtek 8169 and select Disable device. > Select Yes to confirm that you want to disable the device.

The sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on the directory only allow the user and group owners to view the directory and list its contents. As part of a new company policy to increase teamwork, you want to allow all users to be able to see the /sales directory and list its contents. You also want to let all users open any document inside that directory, but you don't want them to make changes to documents. In this lab, your task is to: > Allow the Other group to browse the /sales directory. > Modify permissions on all files in the /sales directory to allow members of the Other group to view the file, but prohibit them from changing it.

View the current rights for the /sales directory. > From the Favorites bar, select Terminal. > At the Terminal prompt, type CD / and then press Enter to go to the root of the system. > Type ls -l and then press Enter. > From the upper right, select Answer Questions. > Answer Question 1. ~ Q1: Which permissions does Other have for the /sales directory? Give Other the rights needed to browse the /sales directory. > At the prompt, type chmod o+rx /sales and then press Enter to enable the Other group to browse the /sales directory. > Type ls -l and then press Enter to verify the change. > Notice that the /sales directory now has the read and execute (r-x) permission. The read and execute permissions are necessary to see the directory and list its contents. Give Other the permissions to read all documents in the /sales directory. > From the prompt, type ls -l /sales and then press Enter. > From the upper right, select Answer Questions. > Answer Question 2. ~ Q2: Which rights does Other have for the contents of the /sales directory? > At the prompt, type chmod o+r /sales/* and press Enter to allow the Other group to read all documents in the /sales directory. > Type ls -l /sales and press Enter. > Notice that Other now has read permissions (r--) for all documents in the /sales directory. > Select Score Lab.


Related study sets

Chapter 20: Stellar Evolution - The Life and Death of a Star

View Set

Post Office: Nouns, M. Words and Adjectives

View Set

Software Development Life Cycle (SDLC)

View Set

csuf art 101 (david plouffe) - final exam, art final, csuf art 101 (david plouffe) - final exam, ART101 Final: David Plouffe, csuf art 101 (david plouffe) - final exam

View Set

Directional Terms, Cavities, Planes, and Body Systems

View Set