Emily_Week9
Which of the following forms of shell scripting is most commonly used? A) Bourne shell B) Korn shell C) Z shell D) Bourne Again shell
A) Bourne shell
A collection of network resources that share a common directory database. A) Domain B) Organization Unit (OU) C) Built in containers D) Object E) Domain controller
A) Domain
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from an employee who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what might be causing the problem. Which of the following is the BEST way to provide the assistance the employee needs? (Select two.) A) Establish a Remote Assistance connection and watch what the employee is doing. B) Schedule the employee to receive more training on using the application. C) Drive to the other location as soon as possible and then watch as the employee performs the task. D) Establish a Quick Assist session with the employee and watch what he is doing. E) Establish a Remote Desktop connection and perform the task on the employee's system.
A) Establish a Remote Assistance connection and watch what the employee is doing. D) Establish a Quick Assist session with the employee and watch what he is doing.
Which of the following are characteristics specific to the Python programming language? (Select two.) A) Focuses on code readability. B) Popular with the scientific community. C) Used for website and web page design. D) Executes multiple Windows commands in sequence. E) Most popular method of scripting in the Linux world.
A) Focuses on code readability. B) Popular with the scientific community.
Which scripting language is widely used for website and web page design and is also the most popular programming language in the world? A) JavaScript B) Visual Basic C) Batch D) Python
A) JavaScript
Which of the following is a valid distinguished name for the MarketSpace common domain name? A) MarketSpace.org B) Market.Space.org C) MarketSpace_com D) MarketSpace/com
A) MarketSpace.org
Does not change the current setting for the policy A) Not configured B) Enabled C) disabled
A) Not configured
Which of the following scripting languages is gradually replacing Windows batch files? A) PowerShell B) Python C) JavaScript D) Visual Basic
A) PowerShell
Your Windows OS starts to act strangely. You find out that there was a Windows automatic update three days ago. Which of the following would be BEST to try first to resolve the issue? A) Uninstall the update B) Startup Repair C) System Image Recovery D) System Restore
A) Uninstall the update
As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. Which of the following are common problems that can be introduced into a system or network with a script? (Select two.) A) Unintentional introduction of malware B) Black (or Blue) Screen of Death C) Beeps upon startup D) Accidentally changed system settings E) Strange characters on a printed page
A) Unintentional introduction of malware D) Accidentally changed system settings
You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it. What is the MOST likely cause of the issue? A) You deleted a group that was created by the third-party application. B) You switched from a domain account login to a local login. C) You assigned the wrong permissions to your user account. D) You assigned the application user account to the Users group.
A) You deleted a group that was created by the third-party application.
You recently installed a Windows 11 system. During the installation process, you elected to sign in to the system with a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.
Accounts
Which of the following BEST describes a scripting language? A) A text file with commands and structures. B) An interpreted programming language used to write scripts. C) A popular method of scripting based on the Bourne shell. D) The process of organizing commands and structures into a script.
B) An interpreted programming language used to write scripts
Which of the following scripting languages includes multiple Windows commands that are run in sequence? A) Shells B) Batch C) JavaScript D) Python
B) Batch
Which of the following is a troubleshooting step to try when troubleshooting application conflicts? A) Run System File Checker. B) Check for application driver updates. C) Rename files in Registry Editor. D) Restart services.
B) Check for application driver updates.
Causes the policy to be enforced A) Not configured B) Enabled C) disabled
B) Enabled
You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly? A) System File Checker B) Event Viewer C) Advanced Options Menu D) File Explorer
B) Event Viewer
A folder-like container that organizes network resources. A) Domain B) Organization Unit (OU) C) Built in containers D) Object E) Domain controller
B) Organization Unit (OU)
A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups should you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) A) Guests B) Remote Desktop Users C) Power Users D) Administrators E) Users
B) Remote Desktop Users D) Administrators
Administrative Templates are Registry-based settings that you can configure within a GPO to control a computer system and its overall user experience. Which of the following can you do with an Administrative Template? (Select two.) A) Allow users to run only the files you specify. B) Restrict access to Control Panel features. C) Control notifications. D) Identify allowed or blocked software. E) Determine who can add trusted publishers.
B) Restrict access to Control Panel features. C) Control notifications
Which of the following are common uses for scripting? (Select three.) A) Bookmark list management B) System updates C) Script creation D) Email mass mailings E) Automated backups F) File management G) Network drive remapping
B) System updates E) Automated backups G) Network drive remapping
Local Group Policy - Enabled Default Domain Policy GPO - Not configured GPO linked to the user's organizational unit -Disabled After logging in, the user is able to see the Programs and Features option. Why did this happen? A) The Local Group Policy is applied last. It is set to Enabled, which makes the Programs and Features option visible. B) The GPO linked to the user's organizational unit is applied first, so this setting takes precedence over settings that are applied later. C) The GPO linked to the user's organizational unit is applied last, so this setting takes precedence. D) The Default Domain GPO is applied last. It is set to Not configured, so it doesn't change the configuration.
B) The GPO linked to the user's organizational unit is applied first, so this setting takes precedence over settings that are applied later.
What does Windows 11 do when you log in with an administrator account with elevated privileges? A) Assign you a unique administrator token. B) Use your credentials to assign you administrative privileges. C) Assign you a user and an administrator token. D) Notify you that you have administrative privileges.
C) Assign you a user and an administrator token.
Default containers used to organize Active Directory objects that cannot be deleted. A) Domain B) Organization Unit (OU) C) Built in containers D) Object E) Domain controller
C) Built in containers
You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do? A) Configure UAC to Never notify. B) Configure UAC to Always notify. C) Disable the Secure Desktop. D) Disable UAC.
C) Disable the Secure Desktop.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue? A) Tell the user to wait until you are scheduled to be in that location. B) Drive to the other location as soon as possible and update the driver. C) Establish a Remote Desktop connection and update the driver. D) Escalate the call to another technician or your supervisor.
C) Establish a Remote Desktop connection and update the driver.
You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements? A) Organize the OUs at the top level by resource and office (country); then assign specific rights to each user. B) Organize the OUs at the top level by department; then use group accounts to help control resource rights. C) Organize the OUs at the top level by office (country); then use group accounts to help control resource rights. D) Organize the OUs at the top level by employee and resource; then assign specific rights to each user.
C) Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.
You are a network administrator for a large financial institution. There are several account advisors who are constantly on the road with their Windows laptop devices. You want to be able to occasionally check on the health of these laptops, including the ability to receive automated alerts for any unusual activity that may indicate some kind of security breach. Which of the following remote management technologies would BEST help you monitor these laptops? A) MSRA B) File transfer software C) RMM D) Desktop management software
C) RMM
Which Active Directory service simplifies how users log in to all the systems and applications that they need? A) Domain B) Workgroup C) SSO D) PIN
C) SSO
Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account? A) Users and Groups B) Family & other users C) Sign in with a Microsoft account instead D) Manage my accounts
C) Sign in with a Microsoft account instead
Which of the following troubleshooting utilities scans the operating system files and replaces corrupt files? A) System Image Recovery B) System Restore C) System File Checker D) Services
C) System File Checker
Which of the following is true of Remote Assistance? A) Only one user is logged in at a time. B) The remote user initiates the session. C) The user initiates the session. D) It is designed to improve user productivity.
C) The user initiates the session.
Which of the following actions should you take to BEST secure your video conferencing software? (Select two.) A) Disable the software when not in use. B) Use recording. C) Use waiting room features. D) Use strong passwords. E) Use two-factor authentication. F) Apply spam filters.
C) Use waiting room features. D) Use strong passwords.
You have just installed Windows 11 on your laptop, purchased an infrared camera, and set up Windows Hello facial recognition as your login option. As part of the setup process, you enter a PIN as a backup login method. After a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your PIN. Because it has been several weeks, you have forgotten the exact number. You attempt to enter your PIN at least 24 times, but are never locked out. What is the MOST likely reason that you have not been locked out after several failed PIN login attempts? A) Your laptop has a TPM chip, but you have failed to set up BitLocker for lockout. B) You have failed to set up both your TPM chip and BitLocker for lockout. C) Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout. D) You have set up BitLocker for lockout, but you have also failed to set up your TPM chip.
C) Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.
Prevents the policy from being enforced A) Not configured B) Enabled C) disabled
C) disabled
Which of the following is the No operating system found error likely caused by? A) Time drift B) Outdated applications C) incorrect boot order D) Outdated drivers
C) incorrect boot order
Which of the following is the Not enough USB controller resources warning most often a result of? A) An overheated hard drive. B) Plugging into a USB hub. C) plugging into a 3.0 USB port.: D) Plugging into a 2.0 USB port.
C) plugging into a 3.0 USB port.:
What is the most commonly used file extension for a shell script? A) .zsh B) .bash C) .ksh D) .sh
D) .sh
Which of the following BEST describes the Blue Screen of Death (BSoD)? A) A time drift error. B) A No operating system found error. C) A Not enough USB controller resources warning. D) A Windows stop error.
D) A Windows stop error.
You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business? A) A tree B) A domain C) A forest D) A workgroup
D) A workgroup
A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled? A) The Default Domain Policy GPO. B) GPOs linked to the domain that contains this user's object. C) The Local Group Policy. D) GPOs linked to organizational units that contain this user's object.
D) GPOs linked to organizational units that contain this user's object.
Which of the following is true of groups on a Windows system? A) Users and local resources, such as printers and shared folders, can be made members of a group. B) A group allows multiple users to share a single logon. C) Users can log on as the group and have all the assigned access rights. D) Group members have the access rights that are assigned to the group.
D) Group members have the access rights that are assigned to the group.
A user calls to report a problem. She is trying to install an application on her new Windows 11 system, but the installation will not proceed. Her user account is a member of the Users group. What is MOST likely causing the installation issue? A) She is not using an app from the Microsoft Store. B) The application is incompatible with Windows 11. C) She is not a member of the Power Users group. D) Her group membership does not allow her to install new software.
D) Her group membership does not allow her to install new software.
A resource within Active Directory. A) Domain B) Organization Unit (OU) C) Built in containers D) Object E) Domain controller
D) Object
Which of the following must be set up before you can register a facial or fingerprint scan for your account? A) Picture password B) Password C) Security key D) PIN
D) PIN
Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer? A) Remote Assistance B) Screen Sharing C) Telnet D) Remote Desktop
D) Remote Desktop
You are working on your Windows 10 computer during a fierce thunder storm. Lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue? A) chkdsk B) bootrec C) defrag D) SFC
D) SFC
Listen to exam instructions Which remote access solution is built into macOS? A) Quick Assist B) Remote Assistance C) Remote Desktop D) Screen Sharing
D) Screen Sharing
A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change? A) System Properties > Advanced B) System Properties > System Protection C) System Properties > Remote D) System Properties > Computer Name
D) System Properties > Computer Name
Rachel wants to use Screen Sharing to allow a system administrator to remotely access her Apple iMac. However, when she initiates the Screen Sharing session, the administrator is not able to access her iMac desktop from his iMac computer. What is the MOST likely reason that the administrator cannot access the Screen Sharing session? A) The Observe mode is not enabled. B) The VNC Viewer setting is not enabled. C) Screen Sharing is not enabled on Rachel's iMac. D) The administrator is not included in her Specific Users Only list.
D) The administrator is not included in her Specific Users Only list.
As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been escalated from a Level 1 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop? A) Your firewall is not set up to allow the connection through port 3389. B) The employee's computer is turned off. C) You have the wrong IP address for the employee's computer. D) The remote session from the Level 1 operator has not been disconnected.
D) The remote session from the Level 1 operator has not been disconnected.
Adding more RAM does not necessarily improve system performance. Which of the following must you also do to make sure that system performance does improve? A) Rebuild the Windows profile. B) Uninstall the most current update. C) Reboot the system. D) Upgrade the CPU to one with multiple cores.
D) Upgrade the CPU to one with multiple cores.
As a network administrator for several hundred machines, you have been given the task of listing all workstations and servers in your company network that have less than 16 GB of RAM. What is the BEST method for accurately collecting this data? A) Check each machine's IT record. B) Send out an email requesting the information. C) Remotely connect to each machine. D) Use a script to run a query of all machines
D) Use a script to run a query of all machines
A Windows server that holds a copy of the Active Directory database. A) Domain B) Organization Unit (OU) C) Built in containers D) Object E) Domain controller
E) Domain controller
You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer? A) Windows Firewall B) Settings C) Programs D) Control Panel E) Local Group Policy Editor
E) Local Group Policy Editor
You are troubleshooting a computer that runs Windows 11. The operating system has halted, and a black screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue? A) Check the voltage levels on the DC side of the power supply. B) Uninstall the last application or system update that was installed. C) Update the BIOS. D) Remove all memory modules and replace them one at a time until the error reappears. E) Search for the error in Microsoft's knowledge base or by using an internet search engine.
E) Search for the error in Microsoft's knowledge base or by using an internet search engine.