Lesson 11: Managing Windows Flashcards

1
Q

A security analyst is investigating a possible incident and wants to view the logs on a remote computer. What should the security analyst use to accomplish this?

A.msinfo32.exe
B.gpedit.msc
C.services.msc
D.eventvwr.msc

A

D. eventvwr.msc

The Event Viewer (eventvwr.msc) is a management console snap-in for viewing and managing logs on a Windows host. The default page summarizes system status, with recent error and warning events collected for viewing.

Other options

A. The System Information (msinfo32.exe) tool produces a comprehensive report about the system’s hardware and software components. Running the tool produces an inventory of system resources, firmware, OS versions, driver file locations, and more.

B. The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of the Windows settings than editing the registry directly.

C. The Services console (services.msc) starts, stops, and pauses processes running in the background. The services console could disable nonessential services to improve performance or security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user wants to use the xcopy command at a command (CMD) prompt but is unfamiliar with the syntax and switches. What can they use to learn more? (Select all that apply.)

A.xcopy help
B.help xcopy
C.xcopy |
D.xcopy /?

A

B. help xcopy and D. xcopy /?

B. When using help Command, the help system lists the syntax and switches used for the command.

D. The user can also display help on a particular command by using the /? switch.

Other options

A. Using xcopy help will result in an attempt to copy the help file if it exists in the directory.

C. Using xcopy | will result in an error stating the syntax is incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An incident handler is reviewing a possible cryptomining infection on one of the corporate servers. What should the handler use first to investigate?

A.eventvwr.msc
B.taskmgr.exe
C.regedit.exe
D.tasksch.msc

A

B. taskmgr.exe

The Task Manager (taskmgr.exe) tool can monitor the PC’s key resources. Cryptomining software will use resources heavily, so this would be the first place to look.

Other options

A. The Event Viewer (eventvwr.msc) is a management console snap-in for viewing and managing logs on a Windows host. The default page summarizes system status, with recent error and warning events collected for viewing.

C. The Registry Editor (regedit.exe) makes manual edits to the database of Windows configuration settings. The registry’s structure is a set of five root keys that contain computer and user databases.

D. The Task Scheduler (tasksch.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A software technician is working on a help ticket for a Windows-based computer that appears to have performance issues. What provides a console that offers live monitoring of resource utilization data for the CPU, system memory, disk/file system, and network?

A.certmgr.msc
B.taskschd.msc
C.resmon.exe
D.gpedit.msc

A

C. resmon.exe

The Resource Monitor (resmon.exe) provides a console for live monitoring of resource utilization data for the CPU, system memory, disk/file system, and network and shows an enhanced version of the sort of snapshot monitoring provided by Task Manager.

Other options

A. The Certificate Manager provides a console for managing digital certificates for the current user and trusted root certification authority certificates.

B. The Task Scheduler (taskschd.msc) is an administrative tool that runs software and scripts according to calendar or event triggers.

D. The Group Policy Editor (gpedit.msc) is a console for configuring detailed user and system registry settings via policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user experiences issues with large files and wants to run diagnostics to help figure out what might be the issue. Which of the following commands should the user try?

A.format
B.diskpart
C.chkdsk
D.winver

A

C. chkdsk

The chkdsk scans the file system and/or disk sectors for faults and attempts to repair any problems detected.

Other option

A. The format command writes a new file system to a drive. This process deletes any data existing on the drive. The basic command is format X: /fs:SYS, where X is a drive letter, and SYS is the file system, such as NTFS, FAT32, or EXFAT.

B. The command diskpart is the interface underlying the Disk Management tool. The Disk Management tool prevents users from completing destructive actions, like deleting the system or boot volume. However, it does not have restrictions in this way, so users should use it with care.

D.The winver command reports version information. Users will often need to use this for support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Windows server administrator wants to use a scheduled local script to transfer logs from that server to a central security incident and event monitoring platform. Copying the logs over and ingesting them locally saves on the licensing. Which command should the script use?

A.ftp Source [Destination] [Switches]
B.md Source [Destination] [Switches]
C.robocopy Source [Destination] [Switches]
D.rmdir Source [Destination] [Switches]

A

C. robocopy Source [Destination] [Switches]

The robocopy command (or “robust copy”) is another file copy utility. Microsoft now recommends using robocopy rather than xcopy. For example, robocopy works better with long file names and New Technology File System (NTFS) attributes.

Other options

A. While ftp could be used to copy the logs over, this is not the correct syntax. Also, robocopy is more reliable in the event of connection loss.

B. To create a directory, use the md command. For example, to create a directory called Data in the current directory, type md Data.

D. To delete an empty directory, enter rd Directory or rmdir Directory. If the directory is not empty, users can remove files and subdirectories from it using the /s switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user starts experiencing a blue screen of death (BSoD) on start up. Where should the user check for changes after getting back on the computer?

A.WSL
B.devmgmt.msc
C.taskschd.msc
D.services.msc

A

B. devmgmt.msc

Most blue screens of death (BSoD), especially those that occur during startup, are caused by faulty hardware or hardware drivers. Device Manager (devmgmt.msc) allows users to view and edit the properties of installed hardware.

Other options

A. Windows Subsystem for Linux (WSL) allows the installation of a Linux distribution and the use of Linux applications. This is different from the Windows management utilities.

C. The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

D. The Services console (services.msc) starts, stops, and pauses processes running in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A server administrator is writing a script that will help administer their servers. The administrator saves the script to the Desktop folder. Instead of typing out the full path to the script in the command prompt, the administrator wants to change the directory to the desktop to make it easier to run the script. Which of the following commands should the server administrator use?

A.dir C:\Users\user\Desktop
B.cd C:\Users\user\Desktop
C.Desktop:
D.C:\Users\user\Desktop help

A

B. cd C:\Users\user\Desktop

The cd command sets the focus to a different working directory. The administrator can change to any directory by entering the full path, such as cd C:\Users\user\Desktop.

Other options

A. Use the dir command to list the files and subdirectories from either the working drive and directory or from a specified path. For example, running dir C:\Users\user\Desktop will display the contents of Desktop.

C. Running Desktop: will attempt to change to the root of a drive named Desktop: which will fail. For example, D: changes to the D drive.

D. Running C:\Users\user\Desktop help will error out as it is not a valid command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A computer technician wants to optimize the input/output operations performance of HDDs. What should the technician utilize?

A.devmgmt.msc
B.dfrgui.exe
C.resmon.exe
D.secpol.msc

A

B. dfrgui.exe

The Defragment and Optimize Drives tool (dfrgui.exe) runs various operations to speed up the performance of hard disk drives (HDDs).

Other options

A. Device Manager (devmgmt.msc) allows users to view and edit the properties of installed hardware. Users can change hardware configuration settings, update drivers, or remove/disable devices.

C. The Resource Monitor (resmon.exe) and Performance Monitor (perfmon.msc) view and log performance statistics. The Resource Monitor shows an enhanced version of the sort of snapshot monitoring provided by Task Manager.

D. The Local Security Policy (secpol.msc) views and edits the security settings. The Local Security Policy editor can be used to modify security settings specifically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A helpdesk operator wants to use a set of tools that will help them during troubleshooting. What can help the operator customize their toolset?

A.mmc
B.gpedit.msc
C.lusrmgr.msc
D.taskschd.msc

A

A. mmc

The mmc command allows the operator to perform MMC customization and create a console with a personal selection of snap-ins. The console can be saved to the Administrative Tools folder as a file with an MSC extension.

Other options

B. The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of the Windows settings than editing the registry directly.

C. The Local Users and Groups (lusrmgr.msc) console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

D. The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security analyst is investigating a possible incident where an alert showed a possible indicator of malware. The malware has a tactic of replacing system files with its own version, which also runs the malware code. Which of the following commands has the best chance of helping the security analyst?

A.sfc
B.chkdsk
C.winver
D.shutdown

A

A. sfc

The Windows Resource Protection mechanism prevents damage to, or malicious use, of system files and registry keys and files. In addition, the System File Checker utility (sfc) provides a manual interface for verifying system files and restoring them from the cache if found corrupt or damaged.

Other options

B. The chkdsk scans the file system and/or disk sectors for faults and can attempt to repair any problems detected.

C. The winver command reports version information. Users will often need to use this for support.

D. The shutdown command can safely halt the system or log out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security administrator revisits the security of client machines and wants to push out configuration changes to users. What is the best way to do this?

A.regedit.exe
B.services.msc
C.lusrmgr.msc
D.gpedit.msc

A

D. gpedit.msc

The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of these Windows settings than editing the registry directly.

Other options

A. The Registry Editor (regedit.exe) makes manual edits to the database of Windows configuration settings. The registry is structured as a set of five root keys that contain computer and user databases.

B. The Services console (services.msc) starts, stops, and pauses processes running in the background. The services console could be used to disable nonessential services to improve performance or security.

C. The Local Users and Groups (lusrmgr.msc) console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user wants to learn and grow with different versions of Windows operating systems, so the user installs dual versions of Windows OS on their computer. The computer currently boots to Windows 10, but the user wants to change the default operating system to another version. What should the user utilize to do this?

A.msconfig.exe
B.resmon.exe
C.taskschd.msc
D.gpedit.msc

A

A. msconfig.exe

The System Configuration Utility (msconfig.exe) modifies various settings and files that affect the way the computer boots and loads Windows. For example, users can change the default OS, add boot options (such as Safe Mode boot) with minimal drivers and services, and set the timeout value.

Other options

B. Resource Monitor (resmon.exe) shows an enhanced version of the snapshot monitoring provided by Task Manager.

C. The Task Scheduler (taskschd.msc) runs commands and scripts automatically. Many of Windows’s processes come with predefined schedules.

D. The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many of the Windows settings than editing the registry directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A vulnerability manager has significantly improved patching in the environment and now wants to focus on system security. Which of the following options will directly support the manager’s intent of making the system more secure?

A.msinfo32.exe
B.resmon.exe
C.services.msc
D.dfrgui.exe

A

C. services.msc

From Task Manager, the Open Services button links to the Services (services.msc) console. This can disable nonessential services to improve performance or security.

Other options

A. The System Information (msinfo32.exe) tool produces a comprehensive report about the system’s hardware and software components. For example, running the tool produces an inventory of system resources, firmware, OS versions, driver file locations, etc.

B. Resource Monitor (resmon.exe) shows an enhanced version of the snapshot monitoring provided by Task Manager.

D. The Defragment and Optimize Drives tool (dfrgui.exe) runs various operations to speed up the performance of HDDs and SSDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A server administrator performs a statistical analysis on server operations to provide optimized resources. For example, the administrator wants to see resource performance graphs and key statistics, such as threads started by a process or hard page faults/second. What is the best tool to use?

A.taskmgr.exe
B.services.msc
C.msconfig.exe
D.resmon.exe

A

D. resmon.exe

Resource Monitor (resmon.exe) shows an enhanced version of the type of snapshot monitoring provided by the Task Manager.

Other options

A. The Task Manager (taskmgr.exe) tool can monitor key resources of personal computers (PCs). Use Task Manager to determine if any resources are at 90–100% utilization, and then note which process is most active.

B. The Open Services button links to the Services (services.msc) console from the Task Manager. The Open Services button can disable nonessential services to improve performance or security.

C. The System Configuration Utility (msconfig.exe) modifies various settings and files that affect the way the computer boots and loads Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are supporting a user who has installed a vendor keyboard driver. The keyboard no longer functions correctly. Under Windows 10, what are the steps to revert to the previous driver?

A

Open Device Manager from the WinX menu, Instant Search, or the Computer Management console. Expand Keyboards, then right-click the device and select Properties. On the Driver tab, select Roll Back Driver.

14
Q

You are troubleshooting an issue with a wireless adapter. When you open Device Manager, you find the device’s icon is shown with a down arrow superimposed. What does this mean, and why might this configuration have been imposed?

A

The icon indicates that the device has been disabled. It could be that there was a fault, or there may be a network configuration or security reason for disabling the adapter. In this sort of situation, use incident logs and device documentation to establish the reason behind the configuration change.

15
Q

If a single physical disk is divided into three partitions, how many different file systems can be supported?

A

Three

Each partition can use a different file system.

16
Q

True or false? The dfrgui.exe utility should be disabled if Windows is installed to an SSD.

A

False

While solid state drives (SSDs) and hard disk drives (HDDs) have different mechanical and performance characteristics, it is still necessary to run the Defragment and Optimize Drives (dfrgui.exe) periodically to optimize performance.

17
Q

In Windows, what is the difference between the boot partition and the system partition?

A

The system partition contains the boot files. Is not normally assigned a drive letter.

The boot partition contains the system root (OS files). Is normally assigned the drive letter C.

18
Q

You take a support call where the user doesn’t understand why a program runs at startup when the Startup folder is empty. What is the likely cause, and how could you verify this?

A

The program has added a registry entry to run at startup. You could check this (and optionally disable the program) by using Task Manager

19
Q

You are monitoring CPU Usage and notice that it often jumps to 100% and then falls back. Does this indicate a problem?

A

Probably not

CPU Usage usually peaks and falls. If it stays over 80–90%, the system could require a faster CPU, or if it spikes continually, there could be a faulty application.

20
Q

You have a computer with two SATA disks. You want to evaluate the performance of the primary disk. How would you select this in Performance Monitor, and what might be appropriate counters to use?

A

Select the Physical Disk object, select the counter, and then select the 0 C: instance. Counters that are useful for evaluating performance include % Disk Time and Average Disk Queue Length.

21
Q

You are monitoring system performance and notice that a substantial number of page faults are occurring. Does this indicate that a memory module is faulty?

A

No

it shows the system is using the pagefile intensively and could benefit from more system RAM being installed.

22
Q

You are attempting to run a command but receive the message “The requested operation requires elevation.” What must you do to run the command?

A

Open a new command prompt window with sufficient privileges. You can right-click the Command Prompt icon and select Run as administrator or press CTRL+SHIFT+ENTER to execute the icon or cmd.exe command.

23
Q

Which Windows command is probably best suited for scripting file backup operations?

A

The robocopy command offers more options than those offered by the xcopy command, so it will usually be the better choice.

The copy command is quite basic and probably not suitable

24
Q

Is the command format d: /fs:exfat /q valid? If so, what is its effect, and what precaution might you need to take before running it?

A

Yes, it is valid.

It formats drive D with the exFAT file system by using a quick format (does not scan for bad sectors). This will delete the file table on the drive so existing data files can be overwritten. The formatted drive will appear to be empty in Explorer.

If there are existing files that need to be preserved, they should be backed up before running the format command.

25
Q

How do you perform a scan to identify file system errors in read-only mode?

A

At a command prompt, run chkdsk without any switches.

Note that sfc is not the correct answer as this verifies the integrity of protected system files rather than checks the file system on a drive.

26
Q

Why might you run the shutdown command with the /t switch?

A

To specify a delay between running the command and shutdown starting.

You might do this to give users a chance to save work or to ensure that a computer is restarted overnight.