CIS140 Practice Questions 10, 11, 12
You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed?
%systemdrive%\Program Files
Which of the following file extension types can be run from the command prompt?
.exe .com .bat
Which of the following extensions identifies a program packaged for use by Windows installer?
.msi
Which of the following file extensions indicates a Windows system file?
.vxd .dll
Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?
/v
You need to copy several hundred files from one directory to another. Most of the files exists in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?
/y
Which port does Telnet use?
23
Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?
3389
You are purchasing a PC system that will be used as a file and print server in a small business. Which of the following hardware selection criteria is the MOST important for this system?
64-bit Multi-core Processor Raid 1+0 Array
You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business?
A workgroup
You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.
Accounts
What is the name of the service included with the Windows Server operating system that manages a centralized database containing user accounts and security information?
Active Directory
Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16GB of RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?
Add paging files to the E: and F: volumes.
Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfill Ben's needs?
Administrative Share
You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?
Administrators
A user works primarily in your organization's production area. However, she frequently needs access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration?
Administrators Remote Desktop Users
Which tool would you use to configure the paging file location and size on a Windows system?
Advanced System Settings in Control Panel
You manage two folders in your computer as follows: C:\Confidential C:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?
Allow Full Control to both.
Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permissions to the Users group. For the C:\PublicReports, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports Copy Costs.doc from C:\Confidential to C:\PublicReports Which of the following BEST describes the permission of the members of the Users group will have for the two files in the C:\PublicReports folder?
Allow Full Control to both.
Which file attribute identifies the file as having been modified since the last backup?
Archive
Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?
Bob can open, read, and write changes to the file.
Where system root is the C: drive, what is the path to directories that hold users profiles in Windows 10?
C:\Users\username
Which file system path is the default location for system files in Windows 10?
C:\Windows
Where system root is the C: drive, where are fonts stored on a Windows 10 system?
C:\Windows\Fonts
You are a PC technician for a national computer retailer. A business customer asks you to build three custom computers to be used by employees at a branch office: CAD / CAM design workstation Home Theater PC Virtualization Workstation Drag and drop each PC hardware configuration the left to the most appropriate workstation on the right.
CAD / CAM design workstation: 2GB GDDR5 PCle video adapter, 16 GB PCl3-21300 DDR4 ECC RAM, 1 TB SATA HD Virtualization Workstation: 32 GB PC4-21300 DDR4 RAM, 4 TB SATA HD, Integrated Video adapter Home Theater PC: HDMI output, compact form factor, 5.1 channel surround sound adapter, TV tuner adapter
You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to an Active Directory?
Centralized Authentication Centralized Configuration Control
You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do?
Check the DataComLink website regularly for patches and updates to the software. Configure the applicationi to automatically download and install updates as they are released.
You want to configure your Windows 10 workstation so that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft. Click the Settings app option you would use to do this.
Choose How Updates are Delivered
You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager?
Control Panel
You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?
Default Domain Policy
The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: Allow Full Control to the D:\Reports folder. Deny Full Control to the D:\Sales folder. Deny Full Control to the D:\Reports\2010reports.doc file. Allow Full Control to the D:\Sales|2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?
Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc
Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports Copy Costs.doc from C:\Confidential to C:\PublicReports Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?
Deny Read to Reports.doc; Allow Full Control to Costs.doc
Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue. What should you do next?
Deploy the hotfix on a test computer.
On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?
Details
Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?
Directory Permissions
You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?
Disable Secure Desktop
Drag each definition on the left to its corresponding performance counter on the right.
Disk Queue Length - The number of read and write requests that are waiting to be processed. Process Utilization - The amount of time the processor spends performing non-idle tasks. Commit Charge - The amount of memory that has been assigned to running processes. Disk Time - The amount of time that the disk subsystem is busy reading from and writing to disk. Page File Usage - Memory Pages Per Second - The number of hard faults that occur each second.
Match the Active Directory definition on the left with its corresponding term on the right.
Domain Controller - A server that holds a copy of the Active Directory database that can be written to. Site - Represents a group of networks that are connected with high-speed links. Subnet - Represents a physical network segment. Forest Root Domain - The first domain created in an Active Directory forest. Tree Root Domain - The highest-level domain in a tree.
Which of the following are true of libraries?
Each library can contain multiple folders from different file system locations. A single folder can be added to multiple libraries.
You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?
Edit settings in the Local Security Policy.
The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in the folder and (2 without affecting the abilities of any other users?
Edit the properties for the file; assign Rachel the Deny Full Control permission.
Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right.
Enabled - Causes the policy to be enforced. Not Configured - Does not change the current setting for the policy. Disabled - Prevents the policy from being enforced.
What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8GB of RAM installed?
Equal to the amount of physical RAM.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?
Establish a Remote Assistance connection and watch what the user is doing.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?
Establish a Remote Desktop connection and update the driver.
Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access?
File Explorer Network This PC
If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?
Full Control
A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. To determine whether the policy is enabled, where should you look next?
GPOs linked to the organizational units that contain this user's object.
On a Windows system, which of the following is true of groups?
Group members have the access rights assigned to the group.
A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?
Her group membership does not allow her to install new software.
You are a PC technician for a national computer retailer. A customer asks you to build three custom computers for him to use at his home office. He requests one gaming PC, a home office server, and a thick client workstation. Match each PC with its appropriate components.
Home Office Server: 2 TB RAID 5 disk array, 600 W power supply, no audio adapter, integrated video adapter. Gaming PC: 1000 W power supply, 1 TB SATA HD, Dual SLI 6 GB PCle video adapters, 5.1 channel surround adapter, Liquid CPU cooler Thick Client Workstation: 400 W Power supply, 500 GB SATA HD, 512 MB PCle video adapter, Basic desktop applications installed
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic bases?
Hotfix
Which of the following paths opens the Computer Management tool in Windows 10?
In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon. Right-click the Windows icon and select Computer Management
You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop?
In the Control Panel, select User Accounts and then User Accounts. In the Control Panel, select System and Security and then Security and Maintenance.
You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?
Include the D:\Reports folder in the library.
Which of the following actions directly improves system security on a Windows workstation?
Install the latest updates.
You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. Which of the following will BEST resolve this issue?
Instruct the employees to activate their Windows installation.
Don is an accountant in the Finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires as local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is most likely the reason Don could not install the application?
Insufficient permissions.
You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?
Local Group Policy Editor
You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability?
MMC
Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?
Make Manuel the owner of the file.
You want to upgrade your Windows 7 system to Windows 10. You purchase an upgrade version of Windows and perform an in-place upgrade. Which of the following is the BEST next step?
Make sure that all installed applications run correctly.
You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer. Which of the following steps is the BEST course of action?
Manually install applications, copy data, and configure settings on the new computer.
Which aspects of virtual memory can you configure on a Windows workstation?
Maximum size of the paging file. Location of the paging file.
You have a folder on your Windows computer that you would like to share with members of your development team. Uses should be able to view wand edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?
Modify the NTFS permissions on the folder.
Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?
Modify the permissions on the document.
Which utility allows you to choose Selective Startup in Windows?
Msconfig (System Configuration)
Which tool can you use to view (but not modify) hardware and configuration information for your computer?
Msinfo32
Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT Technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?
Network Share
You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?
On the system volume.
Match each Active Directory term on the left with its corresponding definition on the right.
Organizational Unit - Logical organization of resources. Domain - Collection of network resources Forest - Collection of related domain trees. Object - Network resource in the directory. Tree - Group of related domains.
You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.
Performance
You are an IT Technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how her computer is running?
Performance Processes
You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running?
Performance Processes
Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system?
Performance Monitor
You manage two folders in your computer as follows: C:\Confidential C:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports Copy Costs.doc from C:\Confidential to D:\PublicReports Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?
Permissions are removed from both files.
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next?
Place the files on an NTFS partition. Configure both share and NTFS permissions.
What is the purpose of the Microsoft Management Console (MMC)?
Provide a common user interface for performing system administration. Provide a shell for running snap-ins.
You have a file which you would like other users to see, but not modify. Which file attribute should you use?
R
Which tool lets you view and directly edit the registry?
Regedit
Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?
Remote Assistance
A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform?
Rename the Administrator account. Disable the Guest account.
Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
Resource Monitor
Jodie's computer is acting unusually sluggish today. She calls you, an IT Technician, to see if you can find out what is going on and to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to stop the application from running?
Right-click > End Task
Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running?
Right-click > End task
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running hte application?
Run the application in compatibility mode. Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs.
Which of the following can be used to create a secure connection to a remote server?
SSH
Which of the following network services or protocols uses TCP/IP port 22?
SSH
Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. which option can Rachel use to access her MAC?
Screen Sharing
A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution?
Set login time restrictions
Which of the following best describes the use of Libraries in Windows?
Special folders that group files and folders, possibly stored in both local or network locations, into a single logical foolder.
You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.
Startup
Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages?
System
A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change?
System Properties > Computer Name
You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. Click the Control Panel option you use to accomplish this task.
System and Security
You manage a Windows system. You want to view information about all of the programs running on your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?
Task Manager
You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations.
Task Manager Performance Monitor
Your computer has a quad-core processor that supports multithreading installed. Given that the system is running Windows, how can you verify whether multithreading has been enabled?
Task Manager can display CPU utilization graphs for eight processors.
Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?
Task Scheduler
You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?
Task Scheduler
You would like to run an application on your Windows workstation every monday at 3:00 p.m. Which tool would you ouse to configure the application to run automatically?
Task Scheduler
The Hide Programs option setting is configured for a specific user as follows: Local Group Policy: Enabled Default Domain Policy GPO: Not configured GP linked to the user's organizational unit: Disabled After logging in, the user is able to see the Programs option. Why does this happen?
The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.
Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?
The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.
You own a custom PC retail store. A small business client asks you to build three workstations for her organization: Virtualization workstation Video editing workstation Thin client PC Match each PC to it's appropriate specs.
Thin Client PC: Intel Celeron dual-core 2.7GHz CPU, 320 GB SATA HD, 2 GB DDR3 RAM, Few or no applications installed. Video Editing Workstation: Intel Core i7 six-core 3.4 GHz CPU, 1 TB SSD SATA HD, 16 GB DDR4 RAM, Video capture card Virtualization Workstation: AMD 12-core 4 GHz CPU, 4 TB SATA HD, 32 GB DDR4 RAM, Hardware-assisted virtualization (HAV)
Which of the following statements are true regarding administrative shares?
To connect to an administrative share, you must use the UNC path. By default, Windows automatically creates an administrative share for every volume.
Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem?
Use Task Manager to monitor memory utilization. Use Resource Monitor to monitor memory utilization.
A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?
Use the C$ administrative share to copy the file.
Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation?
User Account Control (UAC)
You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?
Users
You have just purchased a new home and want to purchase a home theater computer system. Which of the following hardware selection criteria is the MOST important for this system?
Video card with HDMI output HTPC form factor
What is the purpose of the Services snap-in?
View and manage software programs running in the background.
What is the purpose of the dxdiag tool?
View information related to DirectX operation.
Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.
View your update history.
Which of the following is another name for the paging file?
Virtual Memory
You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?
Windows Updates
You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?
\\Home1\Pictures
You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. Which command would you use?
attrib +r -h
Which command would you use to change the current directory to the immediate parent directory?
cd ..
Which Windows command displays a list of files and subdirectories in a directory?
dir
You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to accomplish this task?
gpupdate
While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?
md
Which commands can you use to create a new directory?
md mkdir
A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?
net use
What command lets you see a list of valid command parameters for the net use command?
net use /?
Which command lets you delete subdirectories in addition to files in the current directory?
rd /s
Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?
robocopy
After installation, you Windows 10 client system are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this?
w32tm /query/status w32tm /query/source
Your Windows client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?
w32tm /tz
Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?
xcopy /e